SlideShare a Scribd company logo
1 of 1
London InterCommunity Health Centre:
Fostering Secure and Confidential Delivery.
Background
Purpose
Educate professionals to protect and avoid privacy
breaches within the patient’s health information record.
Legislations
Professionalism, Communication &
Ethical Decision Making
(MacLean, 2018, WK 3, 4)
References
• Freedom of
Information
and Protection
of Privacy Act
• Quality of
Care
Information
Protection Act.
• Personal
Health
Information
Protection Act
• Personal
Information
Protection and
Electronic
Documents
Act
PIPEDA PHIPA
FIPPAQCIPA
Future State
• Make sure each patient
signs a consent form.
• Keep health information
confidential and private.
• Only access information
you are authorized to use.
• Sign out of your account
or lock it once you are
finished with a patient.
• Do not share the
information with
colleagues or any staff
who is not directly
involved with the patient.
• Do not store sensitive
information in portable
devices without strong
encryption.
• Don’t post on social media
anything related to a
patient.
Rodriguez, Y., Mushi, M., Shah, R., Kaur, M., Amir, H., Kaur, G
Health Information Manager Role
Guided by Professor Silvie MacLean, Health Systems Management, School of Information Technology
There are innumerable
reported cases related to
privacy breaches in the
health care environment,
therefore, health care
providers must be educated
by laws and legislation
regarding personal health
information
(MacLean, 2018)
.
• London InterCommunity Health Centre. (n.d). Personal Health Information and
your Privacy. [Brochure]. London, ON
• Greenberg, S. (n.d) Medical Confidentiality. Retrieved from:
https://www.cartoonstock.com/directory/m/medical_confidentiality.asp
• LondonIntercommunity Health Centre. (2018). Retrieved from:
https:www.lihc.on.ca
• Maclean, S. (2018). Wk 4. Retrieved from https://www.fanshaweonline.ca
• Thompson, V. (2016) Administrative and Clinical Procedures for the Canadian
Health Professionals. Pearson.
(Thompson, 2016; Maclean, 2018, W4) (Thompson, 2016)
✔ Privacy Office
✔ Use of Consents
✔ Provide social justice to all
patients.
✔ Authenticate
patient and
provider’s
information.
✔ Follow the
privacy
legislations.
Current State
Technical
knowledge and
skills
Organizational
Skills
Accountability
Self-manageme
nt and coping
skills
Empathetic
oriented
behavior
Professional
physical
appearance
“An agency that deals with
marginalized populations,
including poverty,
homelessness, language or
culture, complex medical
conditions including mental
health and addictions.
Vision: Build opportunities
for healthy and inclusive
communities.”
(LIHC, 2018)

More Related Content

What's hot

MHA 690 week 2 discussin
MHA 690 week 2 discussinMHA 690 week 2 discussin
MHA 690 week 2 discussinBrooke A Thomas
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Trainingndejesus4
 
susanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2ppsusanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2ppPrayerful
 
How to avoid being caught out by HIPAA compliance?
How to avoid being caught out by HIPAA compliance?How to avoid being caught out by HIPAA compliance?
How to avoid being caught out by HIPAA compliance?Lepide USA Inc
 
HIPAA Audit Implementation
HIPAA Audit ImplementationHIPAA Audit Implementation
HIPAA Audit ImplementationValency Networks
 
Legal considerations on the use of monitoring systems at home
Legal considerations on the use of monitoring systems at homeLegal considerations on the use of monitoring systems at home
Legal considerations on the use of monitoring systems at homeAALForum
 
Security & Privacy - Lecture E
Security & Privacy - Lecture ESecurity & Privacy - Lecture E
Security & Privacy - Lecture ECMDLearning
 
Legal implications of HIPAA, HITECH and BAAs
Legal implications of HIPAA, HITECH and BAAsLegal implications of HIPAA, HITECH and BAAs
Legal implications of HIPAA, HITECH and BAAsOnline Tech
 
Mha 690 week one discussion 2 jing presentation hipaa and confidentiality tra...
Mha 690 week one discussion 2 jing presentation hipaa and confidentiality tra...Mha 690 week one discussion 2 jing presentation hipaa and confidentiality tra...
Mha 690 week one discussion 2 jing presentation hipaa and confidentiality tra...sunderstacey
 
Privacy & security training.pptx
Privacy & security training.pptxPrivacy & security training.pptx
Privacy & security training.pptxQmcleod
 
HIPAA Training
HIPAA TrainingHIPAA Training
HIPAA TrainingOakerGirl
 
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingWeek 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingvrgill22
 
Confidentiality
ConfidentialityConfidentiality
ConfidentialityShanaMena1
 
eHealth Governance, Security and Privacy a UK Perspective
eHealthGovernance, Security and Privacya UK PerspectiveeHealthGovernance, Security and Privacya UK Perspective
eHealth Governance, Security and Privacy a UK PerspectiveHealth Informatics New Zealand
 
The viability of Personal Health Information MHA690
The viability of Personal Health Information MHA690The viability of Personal Health Information MHA690
The viability of Personal Health Information MHA690camillemaxwell2
 

What's hot (18)

MHA 690 week 2 discussin
MHA 690 week 2 discussinMHA 690 week 2 discussin
MHA 690 week 2 discussin
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Training
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
susanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2ppsusanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2pp
 
How to avoid being caught out by HIPAA compliance?
How to avoid being caught out by HIPAA compliance?How to avoid being caught out by HIPAA compliance?
How to avoid being caught out by HIPAA compliance?
 
HIPAA Audit Implementation
HIPAA Audit ImplementationHIPAA Audit Implementation
HIPAA Audit Implementation
 
Legal considerations on the use of monitoring systems at home
Legal considerations on the use of monitoring systems at homeLegal considerations on the use of monitoring systems at home
Legal considerations on the use of monitoring systems at home
 
Security & Privacy - Lecture E
Security & Privacy - Lecture ESecurity & Privacy - Lecture E
Security & Privacy - Lecture E
 
Legal implications of HIPAA, HITECH and BAAs
Legal implications of HIPAA, HITECH and BAAsLegal implications of HIPAA, HITECH and BAAs
Legal implications of HIPAA, HITECH and BAAs
 
Mha 690 week one discussion 2 jing presentation hipaa and confidentiality tra...
Mha 690 week one discussion 2 jing presentation hipaa and confidentiality tra...Mha 690 week one discussion 2 jing presentation hipaa and confidentiality tra...
Mha 690 week one discussion 2 jing presentation hipaa and confidentiality tra...
 
Privacy & security training.pptx
Privacy & security training.pptxPrivacy & security training.pptx
Privacy & security training.pptx
 
HIPAA Training
HIPAA TrainingHIPAA Training
HIPAA Training
 
The Health Information Governance Framework
The Health Information Governance FrameworkThe Health Information Governance Framework
The Health Information Governance Framework
 
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingWeek 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
 
Presentation5
Presentation5Presentation5
Presentation5
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
eHealth Governance, Security and Privacy a UK Perspective
eHealthGovernance, Security and Privacya UK PerspectiveeHealthGovernance, Security and Privacya UK Perspective
eHealth Governance, Security and Privacy a UK Perspective
 
The viability of Personal Health Information MHA690
The viability of Personal Health Information MHA690The viability of Personal Health Information MHA690
The viability of Personal Health Information MHA690
 

Similar to poster presentation on fostering secure and confidential delivery

The Ethics of Digital Health
The Ethics of Digital HealthThe Ethics of Digital Health
The Ethics of Digital HealthMegan Ranney
 
Week 1 discussion patient confidentiality
Week 1 discussion  patient confidentialityWeek 1 discussion  patient confidentiality
Week 1 discussion patient confidentialityapalaciosy
 
One London conversation workshop 18 July slide deck
One London conversation workshop 18 July slide deck One London conversation workshop 18 July slide deck
One London conversation workshop 18 July slide deck Katie Harrison
 
Standards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health RecordsStandards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health RecordsMEASURE Evaluation
 
Health Insurance and Portability and Accountability Act
Health Insurance and Portability and Accountability ActHealth Insurance and Portability and Accountability Act
Health Insurance and Portability and Accountability Actসারন দাস
 
Securing health information
Securing health informationSecuring health information
Securing health informationDarla Moore
 
Why FIDO Matters: Healthcare Services
Why FIDO Matters: Healthcare ServicesWhy FIDO Matters: Healthcare Services
Why FIDO Matters: Healthcare ServicesFIDO Alliance
 
Mha 690 discussion 2 Seynabou
Mha 690 discussion 2 SeynabouMha 690 discussion 2 Seynabou
Mha 690 discussion 2 SeynabouSeynaboundiaye
 
Confidentiality
ConfidentialityConfidentiality
ConfidentialityRamiAboali
 
Patient confidentiality training
Patient confidentiality  trainingPatient confidentiality  training
Patient confidentiality trainingtwhit0623
 
Data security and Privacy in Clinical Research -Compliance and Best Practices...
Data security and Privacy in Clinical Research -Compliance and Best Practices...Data security and Privacy in Clinical Research -Compliance and Best Practices...
Data security and Privacy in Clinical Research -Compliance and Best Practices...ClinosolIndia
 
Security, Confidentiality and Privacy in Health of Healthcare Data
Security, Confidentiality and Privacy in Health of Healthcare DataSecurity, Confidentiality and Privacy in Health of Healthcare Data
Security, Confidentiality and Privacy in Health of Healthcare Dataijtsrd
 
Health information confidentiality
Health information confidentialityHealth information confidentiality
Health information confidentialityJames Noon
 
Legal and ethical considerations in nursing informatics
Legal and ethical considerations in nursing informaticsLegal and ethical considerations in nursing informatics
Legal and ethical considerations in nursing informaticsAHMED ZINHOM
 
Enhancing Your Data Security: Closing the Gap on Unsecured Communications
Enhancing Your Data Security: Closing the Gap on Unsecured CommunicationsEnhancing Your Data Security: Closing the Gap on Unsecured Communications
Enhancing Your Data Security: Closing the Gap on Unsecured CommunicationsSpok
 
Confidentiality and Patient Privacy
Confidentiality and Patient PrivacyConfidentiality and Patient Privacy
Confidentiality and Patient PrivacyBethClutts
 

Similar to poster presentation on fostering secure and confidential delivery (20)

The Ethics of Digital Health
The Ethics of Digital HealthThe Ethics of Digital Health
The Ethics of Digital Health
 
Ethics in social media
Ethics in social mediaEthics in social media
Ethics in social media
 
Week 1 discussion patient confidentiality
Week 1 discussion  patient confidentialityWeek 1 discussion  patient confidentiality
Week 1 discussion patient confidentiality
 
Dave Taylor
Dave TaylorDave Taylor
Dave Taylor
 
One London conversation workshop 18 July slide deck
One London conversation workshop 18 July slide deck One London conversation workshop 18 July slide deck
One London conversation workshop 18 July slide deck
 
Standards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health RecordsStandards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health Records
 
Hipaa training
Hipaa trainingHipaa training
Hipaa training
 
Health Insurance and Portability and Accountability Act
Health Insurance and Portability and Accountability ActHealth Insurance and Portability and Accountability Act
Health Insurance and Portability and Accountability Act
 
Securing health information
Securing health informationSecuring health information
Securing health information
 
Why FIDO Matters: Healthcare Services
Why FIDO Matters: Healthcare ServicesWhy FIDO Matters: Healthcare Services
Why FIDO Matters: Healthcare Services
 
Mha 690 discussion 2 Seynabou
Mha 690 discussion 2 SeynabouMha 690 discussion 2 Seynabou
Mha 690 discussion 2 Seynabou
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Patient confidentiality training
Patient confidentiality  trainingPatient confidentiality  training
Patient confidentiality training
 
Data security and Privacy in Clinical Research -Compliance and Best Practices...
Data security and Privacy in Clinical Research -Compliance and Best Practices...Data security and Privacy in Clinical Research -Compliance and Best Practices...
Data security and Privacy in Clinical Research -Compliance and Best Practices...
 
Security, Confidentiality and Privacy in Health of Healthcare Data
Security, Confidentiality and Privacy in Health of Healthcare DataSecurity, Confidentiality and Privacy in Health of Healthcare Data
Security, Confidentiality and Privacy in Health of Healthcare Data
 
Health information confidentiality
Health information confidentialityHealth information confidentiality
Health information confidentiality
 
HIPAA Presentation
HIPAA PresentationHIPAA Presentation
HIPAA Presentation
 
Legal and ethical considerations in nursing informatics
Legal and ethical considerations in nursing informaticsLegal and ethical considerations in nursing informatics
Legal and ethical considerations in nursing informatics
 
Enhancing Your Data Security: Closing the Gap on Unsecured Communications
Enhancing Your Data Security: Closing the Gap on Unsecured CommunicationsEnhancing Your Data Security: Closing the Gap on Unsecured Communications
Enhancing Your Data Security: Closing the Gap on Unsecured Communications
 
Confidentiality and Patient Privacy
Confidentiality and Patient PrivacyConfidentiality and Patient Privacy
Confidentiality and Patient Privacy
 

Recently uploaded

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Recently uploaded (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

poster presentation on fostering secure and confidential delivery

  • 1. London InterCommunity Health Centre: Fostering Secure and Confidential Delivery. Background Purpose Educate professionals to protect and avoid privacy breaches within the patient’s health information record. Legislations Professionalism, Communication & Ethical Decision Making (MacLean, 2018, WK 3, 4) References • Freedom of Information and Protection of Privacy Act • Quality of Care Information Protection Act. • Personal Health Information Protection Act • Personal Information Protection and Electronic Documents Act PIPEDA PHIPA FIPPAQCIPA Future State • Make sure each patient signs a consent form. • Keep health information confidential and private. • Only access information you are authorized to use. • Sign out of your account or lock it once you are finished with a patient. • Do not share the information with colleagues or any staff who is not directly involved with the patient. • Do not store sensitive information in portable devices without strong encryption. • Don’t post on social media anything related to a patient. Rodriguez, Y., Mushi, M., Shah, R., Kaur, M., Amir, H., Kaur, G Health Information Manager Role Guided by Professor Silvie MacLean, Health Systems Management, School of Information Technology There are innumerable reported cases related to privacy breaches in the health care environment, therefore, health care providers must be educated by laws and legislation regarding personal health information (MacLean, 2018) . • London InterCommunity Health Centre. (n.d). Personal Health Information and your Privacy. [Brochure]. London, ON • Greenberg, S. (n.d) Medical Confidentiality. Retrieved from: https://www.cartoonstock.com/directory/m/medical_confidentiality.asp • LondonIntercommunity Health Centre. (2018). Retrieved from: https:www.lihc.on.ca • Maclean, S. (2018). Wk 4. Retrieved from https://www.fanshaweonline.ca • Thompson, V. (2016) Administrative and Clinical Procedures for the Canadian Health Professionals. Pearson. (Thompson, 2016; Maclean, 2018, W4) (Thompson, 2016) ✔ Privacy Office ✔ Use of Consents ✔ Provide social justice to all patients. ✔ Authenticate patient and provider’s information. ✔ Follow the privacy legislations. Current State Technical knowledge and skills Organizational Skills Accountability Self-manageme nt and coping skills Empathetic oriented behavior Professional physical appearance “An agency that deals with marginalized populations, including poverty, homelessness, language or culture, complex medical conditions including mental health and addictions. Vision: Build opportunities for healthy and inclusive communities.” (LIHC, 2018)