SlideShare a Scribd company logo
1 of 8
MHA690: Health Care Capstone (MNL1331B
Sandra Dee Garrison
Ashford University
Dr. Teresita Gonzalez
HIPAA TRAINING: TRAINING EMPLOYEES ON
PROTECTING PATIENT HEALTH INFORMATION AND
CONFIDENTIALITY.
WHAT IS HIPAA
• HIPAA stands for Health Insurance Portability and
Accountability Act
• This law, known as public law 104-191, was signed by
President Bill Clinton on August 2, 1996, and became
effective on June 1, 1997.
• The law has five Titles, (1)Insurance portability, (2)Fraud
and Abuse Medical Liability Reform,(3) Tax Related
Health Provision, (4)Group Health Plan Requirements,
and (5)Revenue Offsets.
The HIPAA Privacy Rule
The HIPAA Privacy Rule provides federal
protections for individually identifiable health
information held by covered entities and their
business associates and gives patients an array of
rights with respect to that information. At the same
time, the Privacy Rule is balanced so that it
permits the disclosure of health information
needed for patient care and other important
purposes. (www.hhs.gov)
KINDS OF INFORMATION PROTECTED BY
THE PRIVACY RULE.
THE PRIVACY RULE PROTECTS INFORMATION KNOWN AS
PROTECTED HEALTH INFORMATON (PHI). PATIENTS HAVE A RIGHT
TO BE PROVIDED WITH THIS INFORMATION AT MEDICAL VISITS
WHEN THEY PRESENT FOR CARE IN THEIR NOTICE OF PRIVACY
RIGHTS. THE TYPES OF INFORMATION THAT IS KNOWN AS PHI IS:
• PATIENT NAMES DIAGNOSES
• DATE OF BIRTH SEXUAL PREFERENCES
• ADDRESSES TELEPHONE NUMBERS
• INSURANCE INFORMATION BENEFICIARY INFORMATION
• SOCIAL SECURITY NUMBERS ROOM NUMBERS
• WEB ADDRESSES MEDICAL PROVIDER INFORMATION
• LICENSE PLATE NUMBERS DISCHARGE DATES
• MEDICAL RECORDS NUMBERS DATE OF ADMISSIONS
• DATE OF DEATH
• PHOTOGRAPHS ******ANY OTHER INFORMATION FOR WHICH
• FINGERPRINTS PERMISSION WAS NOT OBTAINED OR IT IS NOT
• RELIGIOUS AFFILIATIONS MEDICALLY WARRANTED BY LAW.
• MARRIAGE INFORMATION
HIPAA SECURITY RULES. WHAT IS THIS?
The HIPAA Security rules are designed to protect the patients’ information
against unauthorized access. Computers and Information Technology
equipment should have either encryption or have log-in and password
accesses to ensure that patient information is protected.
The security rules also deal with email access and transmission of information
to authenticate the receiver of the messages and to ensure adequate
protection, by verifying email addresses and sending only the needed
information.
Information to keep secure: Flash drives, computer servers, emails, faxes, and
data that is being disposed of should be shredded and a contract company
should arrange for pick up.
ARE YOU READY TO BE TESTED?
• NURSE MARY NOTICES THAT THE UNIT SECRETARY HAS GOTTEN ILL AND
GONE TO THE EMERGENCY ROOM. WHILE THE SECRETARY IS IN THE
EMERGENCY ROOM SHE IS TREATED AND RELEASED. NURSE MARY IS STILL
ON DUTY AND BEING CONCERNED, SHE CALLS THE E.R. AND ASKS A
FELLOW NURSE ABOUT THE TREATMENTS THAT ARE PERFORMED ON THE
SECRETARY AND SHE ALSO LOOKS UP THE LAB RESULTS ON THE UNIT
SECRETARY. CAN SHE DO THIS, SINCE SHE IS THE NURSE ON THE UNIT
AND IS CONCERNED?
• NO, THIS IS AN INVASION OF PRIVACY. NURSE MARY SHOULD NOT LOOK AT
ANOTHER EMPLOYEES OR ANY OTHER PATIENTS INFORMATION UNLESS IT
IS IN THE COURSE OF HER TAKING CARE OF THE PATIENT, THIS IS A
VIOLATION OF THE HIPAA LAW AND COULD LEAD UP TO TERMINATION.
ARE YOU READY TO BE TESTED?
SHARON IS READY TO GO ON BREAK BUT DOES NOT HAVE THE PROPER
RELIEF AT THE NURSING DESK. JANE OFFERS TO RELIEVE HER FOR LUNCH
AND SAYS THAT SHE WILL SIT THERE AND ANSWER THE CALLS AND PUT ALL
PATIENT ORDERS IN THE COMPUTER FOR SHARON. SHARON, BEING SO
RELIEVED TO GET A BREAK, KNOWS THAT JANE DOESN’T HAVE COMPUTER
ACCESS BUT IS WILLING TO LEAVE HE COMPUTER ON, AS SHE HAS WORKED
WITH JANE FOR OVER 12 YEARS. IS IT OKAY FOR SHARON TO ALLOW JANE
ACCESS TO THE COMPUTER SO THAT THE WORK CAN GO ON?
NO, THIS IS A VIOLATION OF THE HIPAA SECURITY RULE. EACH EMPLOYEE
SHOULD HAVE THEIR OWN ACCESS CODES OR LOG-ONS FOR IDENTITY.
REFERENCES
http://www.ehow.com/about_4604770_what-hipaa.html
http://www.hhs.gov/ocr/privacy/hipaa/understanding/index.html

More Related Content

What's hot

Hippa slide show
Hippa slide showHippa slide show
Hippa slide showheathercool
 
Employee confidentiality training
Employee confidentiality trainingEmployee confidentiality training
Employee confidentiality trainingJessi Morris
 
HIPPA Compliance
HIPPA ComplianceHIPPA Compliance
HIPPA Compliancedixibee
 
Hipaa and patient medical record confidentiality
Hipaa and patient medical record confidentialityHipaa and patient medical record confidentiality
Hipaa and patient medical record confidentialityvflores007
 
Privacy and HIPAA
Privacy and HIPAAPrivacy and HIPAA
Privacy and HIPAAAbbygirl419
 
Hippa privacy and security awareness
Hippa privacy and security awarenessHippa privacy and security awareness
Hippa privacy and security awarenessCharles Taft
 
MHA690 confidentiality training
MHA690 confidentiality trainingMHA690 confidentiality training
MHA690 confidentiality trainingsdavis49
 
Confidentiality in the Workplace
Confidentiality in the WorkplaceConfidentiality in the Workplace
Confidentiality in the Workplacesalvarez63
 
Hippa training for healthcare employees
Hippa training for healthcare employeesHippa training for healthcare employees
Hippa training for healthcare employeesaminahallen
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentialityjohnzinn
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)bholmes
 
Hippa training on confidentiality
Hippa training on confidentialityHippa training on confidentiality
Hippa training on confidentialitycraig45365
 

What's hot (20)

Hippa training 2017
Hippa training 2017Hippa training 2017
Hippa training 2017
 
Hippa slide show
Hippa slide showHippa slide show
Hippa slide show
 
Mha690 w1 d2
Mha690 w1 d2Mha690 w1 d2
Mha690 w1 d2
 
Hippa 2021
Hippa 2021Hippa 2021
Hippa 2021
 
Employee confidentiality training
Employee confidentiality trainingEmployee confidentiality training
Employee confidentiality training
 
HIPPA Compliance
HIPPA ComplianceHIPPA Compliance
HIPPA Compliance
 
HIPAA HITECH training 7-9-12
HIPAA HITECH training 7-9-12HIPAA HITECH training 7-9-12
HIPAA HITECH training 7-9-12
 
Hipaa slideshow
Hipaa slideshowHipaa slideshow
Hipaa slideshow
 
Patient privacy
Patient privacyPatient privacy
Patient privacy
 
Understanding hipaa
Understanding hipaaUnderstanding hipaa
Understanding hipaa
 
Hipaa and patient medical record confidentiality
Hipaa and patient medical record confidentialityHipaa and patient medical record confidentiality
Hipaa and patient medical record confidentiality
 
Privacy and HIPAA
Privacy and HIPAAPrivacy and HIPAA
Privacy and HIPAA
 
Hippa privacy and security awareness
Hippa privacy and security awarenessHippa privacy and security awareness
Hippa privacy and security awareness
 
MHA690 confidentiality training
MHA690 confidentiality trainingMHA690 confidentiality training
MHA690 confidentiality training
 
Confidentiality in the Workplace
Confidentiality in the WorkplaceConfidentiality in the Workplace
Confidentiality in the Workplace
 
Mha 690 w1 d2
Mha 690 w1 d2Mha 690 w1 d2
Mha 690 w1 d2
 
Hippa training for healthcare employees
Hippa training for healthcare employeesHippa training for healthcare employees
Hippa training for healthcare employees
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentiality
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)
 
Hippa training on confidentiality
Hippa training on confidentialityHippa training on confidentiality
Hippa training on confidentiality
 

Similar to HIPAA Training MHA 690 7-31-2013

HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informaticskmcanty
 
Protected health information
Protected health informationProtected health information
Protected health informationmiszkeeta
 
Hippa compliance training
Hippa compliance trainingHippa compliance training
Hippa compliance trainingscapoccia
 
PROTECTED HEALTH INFORMATION_PATIENT PRIVACY
PROTECTED HEALTH INFORMATION_PATIENT PRIVACYPROTECTED HEALTH INFORMATION_PATIENT PRIVACY
PROTECTED HEALTH INFORMATION_PATIENT PRIVACYDenise Masella
 
Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)bholmes
 
Patient Privacy and Safety in Healthcare
Patient Privacy and Safety in HealthcarePatient Privacy and Safety in Healthcare
Patient Privacy and Safety in HealthcareQueen Myers
 
Knowing confidentiality
Knowing confidentialityKnowing confidentiality
Knowing confidentialityjessie66
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcherEmed32
 
HIPAA INSERVICE 2017
HIPAA INSERVICE 2017 HIPAA INSERVICE 2017
HIPAA INSERVICE 2017 Meg Oser
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxamartya2087
 
Protecting yourself and others
Protecting yourself and othersProtecting yourself and others
Protecting yourself and otherssatart1944
 
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)Sanjeev Bharwan
 
· Decoding the Ethics Code, Ch. 81. Assume you have been called .docx
· Decoding the Ethics Code, Ch. 81. Assume you have been called .docx· Decoding the Ethics Code, Ch. 81. Assume you have been called .docx
· Decoding the Ethics Code, Ch. 81. Assume you have been called .docxoswald1horne84988
 

Similar to HIPAA Training MHA 690 7-31-2013 (20)

HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informatics
 
Protected health information
Protected health informationProtected health information
Protected health information
 
Hippa compliance training
Hippa compliance trainingHippa compliance training
Hippa compliance training
 
Hipaa inservice
Hipaa inserviceHipaa inservice
Hipaa inservice
 
Phi masella
Phi masellaPhi masella
Phi masella
 
PROTECTED HEALTH INFORMATION_PATIENT PRIVACY
PROTECTED HEALTH INFORMATION_PATIENT PRIVACYPROTECTED HEALTH INFORMATION_PATIENT PRIVACY
PROTECTED HEALTH INFORMATION_PATIENT PRIVACY
 
Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)
 
Patient Privacy and Safety in Healthcare
Patient Privacy and Safety in HealthcarePatient Privacy and Safety in Healthcare
Patient Privacy and Safety in Healthcare
 
Knowing confidentiality
Knowing confidentialityKnowing confidentiality
Knowing confidentiality
 
Dustin HIPAA
Dustin HIPAADustin HIPAA
Dustin HIPAA
 
Hipaa training
Hipaa trainingHipaa training
Hipaa training
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcher
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
HIPAA INSERVICE 2017
HIPAA INSERVICE 2017 HIPAA INSERVICE 2017
HIPAA INSERVICE 2017
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
 
Protecting yourself and others
Protecting yourself and othersProtecting yourself and others
Protecting yourself and others
 
Annual HIPAA Training
Annual HIPAA TrainingAnnual HIPAA Training
Annual HIPAA Training
 
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
 
· Decoding the Ethics Code, Ch. 81. Assume you have been called .docx
· Decoding the Ethics Code, Ch. 81. Assume you have been called .docx· Decoding the Ethics Code, Ch. 81. Assume you have been called .docx
· Decoding the Ethics Code, Ch. 81. Assume you have been called .docx
 

Recently uploaded

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

HIPAA Training MHA 690 7-31-2013

  • 1. MHA690: Health Care Capstone (MNL1331B Sandra Dee Garrison Ashford University Dr. Teresita Gonzalez HIPAA TRAINING: TRAINING EMPLOYEES ON PROTECTING PATIENT HEALTH INFORMATION AND CONFIDENTIALITY.
  • 2. WHAT IS HIPAA • HIPAA stands for Health Insurance Portability and Accountability Act • This law, known as public law 104-191, was signed by President Bill Clinton on August 2, 1996, and became effective on June 1, 1997. • The law has five Titles, (1)Insurance portability, (2)Fraud and Abuse Medical Liability Reform,(3) Tax Related Health Provision, (4)Group Health Plan Requirements, and (5)Revenue Offsets.
  • 3. The HIPAA Privacy Rule The HIPAA Privacy Rule provides federal protections for individually identifiable health information held by covered entities and their business associates and gives patients an array of rights with respect to that information. At the same time, the Privacy Rule is balanced so that it permits the disclosure of health information needed for patient care and other important purposes. (www.hhs.gov)
  • 4. KINDS OF INFORMATION PROTECTED BY THE PRIVACY RULE. THE PRIVACY RULE PROTECTS INFORMATION KNOWN AS PROTECTED HEALTH INFORMATON (PHI). PATIENTS HAVE A RIGHT TO BE PROVIDED WITH THIS INFORMATION AT MEDICAL VISITS WHEN THEY PRESENT FOR CARE IN THEIR NOTICE OF PRIVACY RIGHTS. THE TYPES OF INFORMATION THAT IS KNOWN AS PHI IS: • PATIENT NAMES DIAGNOSES • DATE OF BIRTH SEXUAL PREFERENCES • ADDRESSES TELEPHONE NUMBERS • INSURANCE INFORMATION BENEFICIARY INFORMATION • SOCIAL SECURITY NUMBERS ROOM NUMBERS • WEB ADDRESSES MEDICAL PROVIDER INFORMATION • LICENSE PLATE NUMBERS DISCHARGE DATES • MEDICAL RECORDS NUMBERS DATE OF ADMISSIONS • DATE OF DEATH • PHOTOGRAPHS ******ANY OTHER INFORMATION FOR WHICH • FINGERPRINTS PERMISSION WAS NOT OBTAINED OR IT IS NOT • RELIGIOUS AFFILIATIONS MEDICALLY WARRANTED BY LAW. • MARRIAGE INFORMATION
  • 5. HIPAA SECURITY RULES. WHAT IS THIS? The HIPAA Security rules are designed to protect the patients’ information against unauthorized access. Computers and Information Technology equipment should have either encryption or have log-in and password accesses to ensure that patient information is protected. The security rules also deal with email access and transmission of information to authenticate the receiver of the messages and to ensure adequate protection, by verifying email addresses and sending only the needed information. Information to keep secure: Flash drives, computer servers, emails, faxes, and data that is being disposed of should be shredded and a contract company should arrange for pick up.
  • 6. ARE YOU READY TO BE TESTED? • NURSE MARY NOTICES THAT THE UNIT SECRETARY HAS GOTTEN ILL AND GONE TO THE EMERGENCY ROOM. WHILE THE SECRETARY IS IN THE EMERGENCY ROOM SHE IS TREATED AND RELEASED. NURSE MARY IS STILL ON DUTY AND BEING CONCERNED, SHE CALLS THE E.R. AND ASKS A FELLOW NURSE ABOUT THE TREATMENTS THAT ARE PERFORMED ON THE SECRETARY AND SHE ALSO LOOKS UP THE LAB RESULTS ON THE UNIT SECRETARY. CAN SHE DO THIS, SINCE SHE IS THE NURSE ON THE UNIT AND IS CONCERNED? • NO, THIS IS AN INVASION OF PRIVACY. NURSE MARY SHOULD NOT LOOK AT ANOTHER EMPLOYEES OR ANY OTHER PATIENTS INFORMATION UNLESS IT IS IN THE COURSE OF HER TAKING CARE OF THE PATIENT, THIS IS A VIOLATION OF THE HIPAA LAW AND COULD LEAD UP TO TERMINATION.
  • 7. ARE YOU READY TO BE TESTED? SHARON IS READY TO GO ON BREAK BUT DOES NOT HAVE THE PROPER RELIEF AT THE NURSING DESK. JANE OFFERS TO RELIEVE HER FOR LUNCH AND SAYS THAT SHE WILL SIT THERE AND ANSWER THE CALLS AND PUT ALL PATIENT ORDERS IN THE COMPUTER FOR SHARON. SHARON, BEING SO RELIEVED TO GET A BREAK, KNOWS THAT JANE DOESN’T HAVE COMPUTER ACCESS BUT IS WILLING TO LEAVE HE COMPUTER ON, AS SHE HAS WORKED WITH JANE FOR OVER 12 YEARS. IS IT OKAY FOR SHARON TO ALLOW JANE ACCESS TO THE COMPUTER SO THAT THE WORK CAN GO ON? NO, THIS IS A VIOLATION OF THE HIPAA SECURITY RULE. EACH EMPLOYEE SHOULD HAVE THEIR OWN ACCESS CODES OR LOG-ONS FOR IDENTITY.