SlideShare a Scribd company logo
1 of 14
HIPAA and Confidentiality
December 19, 2013
Purpose
The purpose of this presentation is to
review the Health Insurance
Portability and Accountability Act and
its application to our organization.
Objectives


To understand the patient privacy laws



Understand your role in protecting and maintaining patient privacy



Protect patient health information (PHI)



Understand what information must be protected



Understand when it is necessary to access PHI
HIPAA Privacy Rule
The HIPAA Privacy Rule protects
health information held or
transmitted by a covered entity or its
business associate, whether
electronic, on paper, or oral.
Protected health information includes:
 Name
 Address
 Birth date
 Social security number
 Any information that can be
associated with a patient’s identity
including demographic information.
Protected Health Information Identifiers as
defined by HIPAA include:


Name

Geographic information



Address
Telephone number
Fax number

Certificate/license number
Vehicle identifiers and serial numbers
Device identifiers and serial numbers

Email address
Social security number
Account numbers

Finger and voice prints
Full-face photographs
Internet Protocol (IP) addresses

License number
Medical record number
Health plan beneficiary
Zip code

Dates directly related to an individualincluding birth date, admission,
discharge, death date












1.

2.
3.

Protected health information (PHI) is
information which relates to:
an individual’s past, present, or
future physical or mental health or
condition.
healthcare provided to an individual
past, present, or future payment for
the provision of healthcare for the
individual.
A medical record, a laboratory report,
or hospital bill is considered PHI
because it contains patient
information or other associated
information that can identify the
patient.
When to access PHI
Patients’ health information can be accessed if
needed:
 To provide continuity of patient care
 To provide information to further evaluate
patient care
 For charting or documentation purposes
HIPAA requires users to access the least
amount of information necessary to
perform their duties.
Ways to Protect PHI








Dispose of documents properly in shred
bins
Never discuss patient information where
it can be heard by others who do not
have a need to know the information
Speak to patients privately about health
issues or concerns
Ensure patient information cannot be
seen by others
The Final Rule and HITECH
The HIPAA Final Rule and Health
Information Technology for Economic
and Clinical Health (HITECH) protects
patient information from business
associates, contractors and
subcontractors that receive PHI. It
also protects when using social
medial or email.
Breach of HIPAA
There are penalties and fines associated
with HIPAA breach.
Any unlawful access, use, or disclosure
of a patient’s medical information
must be reported.
It is everyone’s responsibility to protect
PHI. Report any known or suspected
improper disclosures of Protected
Health Information.
References

Cascardo, D. (2013). The final rule: the final
omnibus HIPAA rules. The Journal of
Medical Practice Management: MPM. 28(6),
359-62. Retrieved from
http://search.proquest.com/docview/141284809
Health Information Privacy. Retrieved
December 18, 2013 from
www.hhs.gov/ocr/privacy/hipaa

More Related Content

What's hot

Hippa slide show
Hippa slide showHippa slide show
Hippa slide showheathercool
 
Hipaa basics
Hipaa basicsHipaa basics
Hipaa basicsmlireton
 
HIPPA Compliance
HIPPA ComplianceHIPPA Compliance
HIPPA Compliancedixibee
 
HIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of ComplianceHIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of ComplianceJay Hodes
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Trainingridley27
 
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingWeek 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingvrgill22
 
Mha 690 ppt hipaa for healthcare professionals
Mha 690 ppt hipaa for healthcare professionalsMha 690 ppt hipaa for healthcare professionals
Mha 690 ppt hipaa for healthcare professionalslee5lee
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarcEtienne6
 
HIPAA Compliance for Developers
HIPAA Compliance for DevelopersHIPAA Compliance for Developers
HIPAA Compliance for DevelopersTrueVault
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Trainingndejesus4
 

What's hot (19)

Abc hospital
Abc hospitalAbc hospital
Abc hospital
 
Hippa slide show
Hippa slide showHippa slide show
Hippa slide show
 
Hipaa basics
Hipaa basicsHipaa basics
Hipaa basics
 
Hippa laws
Hippa lawsHippa laws
Hippa laws
 
HIPPA Compliance
HIPPA ComplianceHIPPA Compliance
HIPPA Compliance
 
HIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of ComplianceHIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of Compliance
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Training
 
HIPAA Complaince
HIPAA ComplainceHIPAA Complaince
HIPAA Complaince
 
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingWeek 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
 
What is hipaa
What is hipaaWhat is hipaa
What is hipaa
 
Hipaa privacy rule
Hipaa privacy ruleHipaa privacy rule
Hipaa privacy rule
 
Mha 690 ppt hipaa for healthcare professionals
Mha 690 ppt hipaa for healthcare professionalsMha 690 ppt hipaa for healthcare professionals
Mha 690 ppt hipaa for healthcare professionals
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentation
 
HIPAA Compliance for Developers
HIPAA Compliance for DevelopersHIPAA Compliance for Developers
HIPAA Compliance for Developers
 
Joint Commission Inservice Hipaa
Joint Commission Inservice HipaaJoint Commission Inservice Hipaa
Joint Commission Inservice Hipaa
 
HIPAA for Dummies
HIPAA for DummiesHIPAA for Dummies
HIPAA for Dummies
 
Mha690 w1 d2
Mha690 w1 d2Mha690 w1 d2
Mha690 w1 d2
 
HIPAA and How it Applies to You
HIPAA and How it Applies to YouHIPAA and How it Applies to You
HIPAA and How it Applies to You
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Training
 

Viewers also liked

Таргетированная реклама Вконтакте.
Таргетированная реклама Вконтакте. Таргетированная реклама Вконтакте.
Таргетированная реклама Вконтакте. Digitrend
 
sitNL 2015 algorithm programming made easy (Marcel de Bruin, Sander de Wildt)
sitNL 2015 algorithm programming made easy (Marcel de Bruin, Sander de Wildt)sitNL 2015 algorithm programming made easy (Marcel de Bruin, Sander de Wildt)
sitNL 2015 algorithm programming made easy (Marcel de Bruin, Sander de Wildt)Twan van den Broek
 
Panteó d'Agripa (Història de l'art)
Panteó d'Agripa (Història de l'art)Panteó d'Agripa (Història de l'art)
Panteó d'Agripa (Història de l'art)History4
 
Cara memasang visitor di blog atau website
Cara memasang visitor di blog atau websiteCara memasang visitor di blog atau website
Cara memasang visitor di blog atau websitejoedhy kristianto
 
Textual analysis american horror story
Textual analysis  american horror storyTextual analysis  american horror story
Textual analysis american horror storycourtney1998
 
Hong kong names
Hong kong namesHong kong names
Hong kong namesbirahe2oo3
 
Poster Consumer Alert
Poster Consumer AlertPoster Consumer Alert
Poster Consumer AlertDaniel Lowry
 
sitNL 2015 Lean Data Management (Frank Gundlich)
sitNL 2015 Lean Data Management (Frank Gundlich)sitNL 2015 Lean Data Management (Frank Gundlich)
sitNL 2015 Lean Data Management (Frank Gundlich)Twan van den Broek
 
Buku Pedoman MUI ttg Syiah 4
Buku  Pedoman MUI ttg Syiah 4Buku  Pedoman MUI ttg Syiah 4
Buku Pedoman MUI ttg Syiah 4Feizal Karim
 
Afogamento e choques eletricos
Afogamento e choques eletricosAfogamento e choques eletricos
Afogamento e choques eletricosClebson Reinaldo
 

Viewers also liked (20)

Таргетированная реклама Вконтакте.
Таргетированная реклама Вконтакте. Таргетированная реклама Вконтакте.
Таргетированная реклама Вконтакте.
 
sitNL 2015 algorithm programming made easy (Marcel de Bruin, Sander de Wildt)
sitNL 2015 algorithm programming made easy (Marcel de Bruin, Sander de Wildt)sitNL 2015 algorithm programming made easy (Marcel de Bruin, Sander de Wildt)
sitNL 2015 algorithm programming made easy (Marcel de Bruin, Sander de Wildt)
 
Panteó d'Agripa (Història de l'art)
Panteó d'Agripa (Història de l'art)Panteó d'Agripa (Història de l'art)
Panteó d'Agripa (Història de l'art)
 
Marry Christmas
Marry ChristmasMarry Christmas
Marry Christmas
 
Merry Christmas
Merry ChristmasMerry Christmas
Merry Christmas
 
Cara memasang visitor di blog atau website
Cara memasang visitor di blog atau websiteCara memasang visitor di blog atau website
Cara memasang visitor di blog atau website
 
Wozer Dance Resume
Wozer Dance Resume Wozer Dance Resume
Wozer Dance Resume
 
Christmasaryulai
ChristmasaryulaiChristmasaryulai
Christmasaryulai
 
Textual analysis american horror story
Textual analysis  american horror storyTextual analysis  american horror story
Textual analysis american horror story
 
Karta śiąteczna 4
Karta śiąteczna 4Karta śiąteczna 4
Karta śiąteczna 4
 
Merry Christmas
Merry ChristmasMerry Christmas
Merry Christmas
 
Hong kong names
Hong kong namesHong kong names
Hong kong names
 
Poster Consumer Alert
Poster Consumer AlertPoster Consumer Alert
Poster Consumer Alert
 
sitNL 2015 Lean Data Management (Frank Gundlich)
sitNL 2015 Lean Data Management (Frank Gundlich)sitNL 2015 Lean Data Management (Frank Gundlich)
sitNL 2015 Lean Data Management (Frank Gundlich)
 
Eva
EvaEva
Eva
 
Buku Pedoman MUI ttg Syiah 4
Buku  Pedoman MUI ttg Syiah 4Buku  Pedoman MUI ttg Syiah 4
Buku Pedoman MUI ttg Syiah 4
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Calida de vida
Calida de vidaCalida de vida
Calida de vida
 
2015 MOVE Agents Events organization toolkit
2015 MOVE Agents Events organization toolkit 2015 MOVE Agents Events organization toolkit
2015 MOVE Agents Events organization toolkit
 
Afogamento e choques eletricos
Afogamento e choques eletricosAfogamento e choques eletricos
Afogamento e choques eletricos
 

Similar to HIPAA Privacy and PHI Protection

HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)Sanjeev Bharwan
 
HIPPA---Chantel Artis Spencer
HIPPA---Chantel Artis SpencerHIPPA---Chantel Artis Spencer
HIPPA---Chantel Artis Spencershay1234
 
Hipaa training
Hipaa trainingHipaa training
Hipaa trainingmussell
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
 
Health Insurance Portability & Accountability Act (HIPAA).pptx
Health Insurance Portability & Accountability Act (HIPAA).pptxHealth Insurance Portability & Accountability Act (HIPAA).pptx
Health Insurance Portability & Accountability Act (HIPAA).pptxHariomjaiswal14
 
HIPAA Training - 2011
HIPAA Training - 2011HIPAA Training - 2011
HIPAA Training - 2011darichardson
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippamaggie_Platt
 
Patient confidentiality MHA 690
Patient confidentiality MHA 690Patient confidentiality MHA 690
Patient confidentiality MHA 690AMSIMM9932
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)bholmes
 
Protected health information
Protected health informationProtected health information
Protected health informationmiszkeeta
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion iibeleza1669
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion iibeleza1669
 
Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)bholmes
 
MEDICAL ANSWERING SERVICE
MEDICAL ANSWERING SERVICE MEDICAL ANSWERING SERVICE
MEDICAL ANSWERING SERVICE Milk663
 

Similar to HIPAA Privacy and PHI Protection (20)

HIPAA Audio Presentation
HIPAA  Audio PresentationHIPAA  Audio Presentation
HIPAA Audio Presentation
 
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
 
HIPPA---Chantel Artis Spencer
HIPPA---Chantel Artis SpencerHIPPA---Chantel Artis Spencer
HIPPA---Chantel Artis Spencer
 
Hipaa training
Hipaa trainingHipaa training
Hipaa training
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
Health Insurance Portability & Accountability Act (HIPAA).pptx
Health Insurance Portability & Accountability Act (HIPAA).pptxHealth Insurance Portability & Accountability Act (HIPAA).pptx
Health Insurance Portability & Accountability Act (HIPAA).pptx
 
HIPAA Training - 2011
HIPAA Training - 2011HIPAA Training - 2011
HIPAA Training - 2011
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
Basic HIPAA Training by CMU
Basic HIPAA Training by CMUBasic HIPAA Training by CMU
Basic HIPAA Training by CMU
 
Patient confidentiality MHA 690
Patient confidentiality MHA 690Patient confidentiality MHA 690
Patient confidentiality MHA 690
 
Hipaa.uo a
Hipaa.uo aHipaa.uo a
Hipaa.uo a
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)
 
Protected health information
Protected health informationProtected health information
Protected health information
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion ii
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion ii
 
Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)
 
HIPAA
HIPAAHIPAA
HIPAA
 
Confidentiality-Arlicia- mha 690-discussion 2
Confidentiality-Arlicia- mha 690-discussion 2 Confidentiality-Arlicia- mha 690-discussion 2
Confidentiality-Arlicia- mha 690-discussion 2
 
MEDICAL ANSWERING SERVICE
MEDICAL ANSWERING SERVICE MEDICAL ANSWERING SERVICE
MEDICAL ANSWERING SERVICE
 
Hipaa inservice
Hipaa inserviceHipaa inservice
Hipaa inservice
 

Recently uploaded

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

HIPAA Privacy and PHI Protection

  • 2. Purpose The purpose of this presentation is to review the Health Insurance Portability and Accountability Act and its application to our organization.
  • 3. Objectives  To understand the patient privacy laws  Understand your role in protecting and maintaining patient privacy  Protect patient health information (PHI)  Understand what information must be protected  Understand when it is necessary to access PHI
  • 4. HIPAA Privacy Rule The HIPAA Privacy Rule protects health information held or transmitted by a covered entity or its business associate, whether electronic, on paper, or oral.
  • 5. Protected health information includes:  Name  Address  Birth date  Social security number  Any information that can be associated with a patient’s identity including demographic information.
  • 6. Protected Health Information Identifiers as defined by HIPAA include:  Name Geographic information  Address Telephone number Fax number Certificate/license number Vehicle identifiers and serial numbers Device identifiers and serial numbers Email address Social security number Account numbers Finger and voice prints Full-face photographs Internet Protocol (IP) addresses License number Medical record number Health plan beneficiary Zip code Dates directly related to an individualincluding birth date, admission, discharge, death date         
  • 7.  1. 2. 3. Protected health information (PHI) is information which relates to: an individual’s past, present, or future physical or mental health or condition. healthcare provided to an individual past, present, or future payment for the provision of healthcare for the individual.
  • 8. A medical record, a laboratory report, or hospital bill is considered PHI because it contains patient information or other associated information that can identify the patient.
  • 9. When to access PHI Patients’ health information can be accessed if needed:  To provide continuity of patient care  To provide information to further evaluate patient care  For charting or documentation purposes HIPAA requires users to access the least amount of information necessary to perform their duties.
  • 10. Ways to Protect PHI     Dispose of documents properly in shred bins Never discuss patient information where it can be heard by others who do not have a need to know the information Speak to patients privately about health issues or concerns Ensure patient information cannot be seen by others
  • 11. The Final Rule and HITECH The HIPAA Final Rule and Health Information Technology for Economic and Clinical Health (HITECH) protects patient information from business associates, contractors and subcontractors that receive PHI. It also protects when using social medial or email.
  • 12. Breach of HIPAA There are penalties and fines associated with HIPAA breach. Any unlawful access, use, or disclosure of a patient’s medical information must be reported.
  • 13. It is everyone’s responsibility to protect PHI. Report any known or suspected improper disclosures of Protected Health Information.
  • 14. References Cascardo, D. (2013). The final rule: the final omnibus HIPAA rules. The Journal of Medical Practice Management: MPM. 28(6), 359-62. Retrieved from http://search.proquest.com/docview/141284809 Health Information Privacy. Retrieved December 18, 2013 from www.hhs.gov/ocr/privacy/hipaa