SlideShare a Scribd company logo
Confidentiality
Michelle R. Grate
MHA 690
Dr. Martha Jennings
May 1, 2014
The Health Insurance
Portability and Accountability
Act (HIPAA), was signed into
law on August 21, 1996 and
went into effect in April 2003.
HIPAA requires all health care
providers to have patient
consent for access to their
medical records or
information.
Regulatory Compliance has to do
with policies and procedures that
are used to make sure
laws, rules, and regulation that
direct hospitals are followed or
complied with. This also includes
all staff are aware of, properly
trained, and comply with
appropriate laws and regulations
such as following the HIPAA
compliance regulations.
Centers for Medicare and Medicaid
Services (CMS), JCAHO, state
laws, HIPAA, and EMTALA are just
some of the examples of regulatory
requirement and standards that
health care agencies must be in
compliance with. With Medicare
conditions of practice, certain
conditions must be met by the
hospital in order for them to
participate with the program.
The risk management area is another
important entity that should make sure
and monitor that hospitals are in
compliance with HIPAA regulations. HIPPA
and confidentiality of patient information
also hits the back office of organizations
and medical facilities, because most
claims today are submitted electronically
to payers and must now be consistent
with HIPAA provisions that direct
electronic data interchange submissions
appropriately.
HIPAA has established patients’
rights related to
access, authorization, and release
of medical records and must be
made available to patients by
healthcare entities. Most
institutions have this readily
available for patients and require a
signature that the patients
understands his/her privacy rights
Compliance with HIPAA’s privacy
and security rulings create a good
portion of challenges for electronic
health record information systems
specialists especially with linking
these systems. Many use audit
processes to help make sure they
are maintaining appropriate
security measures.
Al healthcare organizations and medical
facilities should incorporate training for all
new employees and re-training and
updates for all current employees, in
reference to HIPAA rules and regulations
and compliance with these regulations.
Violations to these regulations should also
be discussed and what actions will be
taken for any healthcare employee who
violates a patients privacy under these
guidelines.
Training can be effective for all employees
by utilizing a clear and well defined
presentation such a power point or
utilizing online modules. With online
learning, testing can be included after
each module and a certificate printed out
after the course is completed with the
date. Yearly training utilizing this method
allows health care workers to update their
knowledge at a time that is convenient for
them and gives them flexibility of required
learning.
References
Kongstvedt, P.R. (2007). Essentials of managed health care (5th ed.). MA:
Jones and Bartlett Publishers.
Lund, J. (2005). ERISA enforcement of the HIPAA privacy rules. The University
of Chicago Law Review, 72(4), 1413-1443. Retrieved from
http://search.proquest.com/docview/214788181?accountid=32521
Tan, J. K. H. (2010). Adaptive Health Management Information Systems (3rd
ed.). Sudbury: Jones and Bartlett. ISBN: 9780763756918

More Related Content

What's hot

Modernizing Patient Records
Modernizing Patient RecordsModernizing Patient Records
Modernizing Patient Records
Bob Larrivee
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
Tabbi Reefer
 
Mha690 healthcare confidentiality
Mha690 healthcare confidentialityMha690 healthcare confidentiality
Mha690 healthcare confidentiality
asharp625
 
Week 1 discussion 2 capstone
Week 1 discussion 2 capstoneWeek 1 discussion 2 capstone
Week 1 discussion 2 capstone
brvickers
 
EMR
EMREMR
Electronic medical record 25.04.2021
Electronic medical record 25.04.2021Electronic medical record 25.04.2021
Electronic medical record 25.04.2021
Shazia Iqbal
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
LeRoy Ulibarri
 
HIPAA Presentation
HIPAA PresentationHIPAA Presentation
HIPAA Presentation
LyubovKarnaukh
 
HIPAA
HIPAA HIPAA
HIPAA
ravelo1212
 
E Presentation
E PresentationE Presentation
E Presentation
Chris Oyibe
 
Personal Health Records
Personal Health RecordsPersonal Health Records
Personal Health Records
RRR784
 
How to Ensure HIPPA Compliance
How to Ensure HIPPA ComplianceHow to Ensure HIPPA Compliance
How to Ensure HIPPA Compliance
Hanna Global
 
Confidentially in the workplace
Confidentially in the workplaceConfidentially in the workplace
Confidentially in the workplace
Knighten
 
Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2
9535814851
 
Jeanette Rankins Patient Privacy Training
Jeanette Rankins Patient Privacy TrainingJeanette Rankins Patient Privacy Training
Jeanette Rankins Patient Privacy Training
JeanetteRankins
 
Pt hr confidentiality
Pt hr confidentialityPt hr confidentiality
Pt hr confidentiality
corbsan
 
eHealth - Jim Maclean
eHealth - Jim MacleaneHealth - Jim Maclean
eHealth - Jim Maclean
GHBN
 
The viability of Personal Health Information MHA690
The viability of Personal Health Information MHA690The viability of Personal Health Information MHA690
The viability of Personal Health Information MHA690
camillemaxwell2
 

What's hot (18)

Modernizing Patient Records
Modernizing Patient RecordsModernizing Patient Records
Modernizing Patient Records
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Mha690 healthcare confidentiality
Mha690 healthcare confidentialityMha690 healthcare confidentiality
Mha690 healthcare confidentiality
 
Week 1 discussion 2 capstone
Week 1 discussion 2 capstoneWeek 1 discussion 2 capstone
Week 1 discussion 2 capstone
 
EMR
EMREMR
EMR
 
Electronic medical record 25.04.2021
Electronic medical record 25.04.2021Electronic medical record 25.04.2021
Electronic medical record 25.04.2021
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
HIPAA Presentation
HIPAA PresentationHIPAA Presentation
HIPAA Presentation
 
HIPAA
HIPAA HIPAA
HIPAA
 
E Presentation
E PresentationE Presentation
E Presentation
 
Personal Health Records
Personal Health RecordsPersonal Health Records
Personal Health Records
 
How to Ensure HIPPA Compliance
How to Ensure HIPPA ComplianceHow to Ensure HIPPA Compliance
How to Ensure HIPPA Compliance
 
Confidentially in the workplace
Confidentially in the workplaceConfidentially in the workplace
Confidentially in the workplace
 
Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2
 
Jeanette Rankins Patient Privacy Training
Jeanette Rankins Patient Privacy TrainingJeanette Rankins Patient Privacy Training
Jeanette Rankins Patient Privacy Training
 
Pt hr confidentiality
Pt hr confidentialityPt hr confidentiality
Pt hr confidentiality
 
eHealth - Jim Maclean
eHealth - Jim MacleaneHealth - Jim Maclean
eHealth - Jim Maclean
 
The viability of Personal Health Information MHA690
The viability of Personal Health Information MHA690The viability of Personal Health Information MHA690
The viability of Personal Health Information MHA690
 

Similar to Confidentiality

Patient confidentilty
Patient confidentiltyPatient confidentilty
Patient confidentilty
Sheena705
 
Mha 690 presentation hippa
Mha 690 presentation hippaMha 690 presentation hippa
Mha 690 presentation hippa
belle0508
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
12ort
 
Managing Medical Records_ Compliance and Best Practices for Healthcare Provid...
Managing Medical Records_ Compliance and Best Practices for Healthcare Provid...Managing Medical Records_ Compliance and Best Practices for Healthcare Provid...
Managing Medical Records_ Compliance and Best Practices for Healthcare Provid...
StockHolding1
 
lauren_rosen_compliance_article
lauren_rosen_compliance_articlelauren_rosen_compliance_article
lauren_rosen_compliance_article
Lauren Rosen
 
Assignment 1 Legal Aspects of U.S. Health Care System Administrat.docx
Assignment 1 Legal Aspects of U.S. Health Care System Administrat.docxAssignment 1 Legal Aspects of U.S. Health Care System Administrat.docx
Assignment 1 Legal Aspects of U.S. Health Care System Administrat.docx
braycarissa250
 
Confidentiality training
Confidentiality trainingConfidentiality training
Confidentiality training
Suezqrdh
 
What explains why certain services were covered and others were not .docx
 What explains why certain services were covered and others were not .docx What explains why certain services were covered and others were not .docx
What explains why certain services were covered and others were not .docx
ajoy21
 
Discussion2 week1
Discussion2 week1Discussion2 week1
Discussion2 week1
akei13sha
 
Role-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic ApproachRole-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
EMC
 
HIPAA-Compliant App Development Guide for the Healthcare Industry.pdf
HIPAA-Compliant App Development Guide for the Healthcare Industry.pdfHIPAA-Compliant App Development Guide for the Healthcare Industry.pdf
HIPAA-Compliant App Development Guide for the Healthcare Industry.pdf
SuccessiveDigital
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
amartya2087
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
LeRoy Ulibarri
 
Implementing EHR in Behavioral Health Blog Post
Implementing EHR in Behavioral Health Blog PostImplementing EHR in Behavioral Health Blog Post
Implementing EHR in Behavioral Health Blog Post
Jeff Brevik, PMP
 
HIPAA Privacy & Security
HIPAA Privacy & SecurityHIPAA Privacy & Security
Hipaa omnibus
Hipaa omnibusHipaa omnibus
Hipaa omnibus
wardell henley
 
Introduction hippaa
Introduction hippaaIntroduction hippaa
Introduction hippaa
Tina Peña
 
Sample HIPAA Training
Sample HIPAA Training Sample HIPAA Training
Sample HIPAA Training
Tara Goodwin
 
Confidentiality Training
Confidentiality Training Confidentiality Training
Confidentiality Training
Kendra Guyton-Sheppard
 

Similar to Confidentiality (20)

Patient confidentilty
Patient confidentiltyPatient confidentilty
Patient confidentilty
 
Mha 690 presentation hippa
Mha 690 presentation hippaMha 690 presentation hippa
Mha 690 presentation hippa
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Managing Medical Records_ Compliance and Best Practices for Healthcare Provid...
Managing Medical Records_ Compliance and Best Practices for Healthcare Provid...Managing Medical Records_ Compliance and Best Practices for Healthcare Provid...
Managing Medical Records_ Compliance and Best Practices for Healthcare Provid...
 
lauren_rosen_compliance_article
lauren_rosen_compliance_articlelauren_rosen_compliance_article
lauren_rosen_compliance_article
 
Assignment 1 Legal Aspects of U.S. Health Care System Administrat.docx
Assignment 1 Legal Aspects of U.S. Health Care System Administrat.docxAssignment 1 Legal Aspects of U.S. Health Care System Administrat.docx
Assignment 1 Legal Aspects of U.S. Health Care System Administrat.docx
 
Confidentiality training
Confidentiality trainingConfidentiality training
Confidentiality training
 
What explains why certain services were covered and others were not .docx
 What explains why certain services were covered and others were not .docx What explains why certain services were covered and others were not .docx
What explains why certain services were covered and others were not .docx
 
Discussion2 week1
Discussion2 week1Discussion2 week1
Discussion2 week1
 
Role-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic ApproachRole-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
 
HIPAA-Compliant App Development Guide for the Healthcare Industry.pdf
HIPAA-Compliant App Development Guide for the Healthcare Industry.pdfHIPAA-Compliant App Development Guide for the Healthcare Industry.pdf
HIPAA-Compliant App Development Guide for the Healthcare Industry.pdf
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Implementing EHR in Behavioral Health Blog Post
Implementing EHR in Behavioral Health Blog PostImplementing EHR in Behavioral Health Blog Post
Implementing EHR in Behavioral Health Blog Post
 
HIPAA Privacy & Security
HIPAA Privacy & SecurityHIPAA Privacy & Security
HIPAA Privacy & Security
 
Hipaa omnibus
Hipaa omnibusHipaa omnibus
Hipaa omnibus
 
Introduction hippaa
Introduction hippaaIntroduction hippaa
Introduction hippaa
 
Sample HIPAA Training
Sample HIPAA Training Sample HIPAA Training
Sample HIPAA Training
 
Confidentiality Training
Confidentiality Training Confidentiality Training
Confidentiality Training
 

Recently uploaded

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 

Recently uploaded (20)

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 

Confidentiality

  • 1. Confidentiality Michelle R. Grate MHA 690 Dr. Martha Jennings May 1, 2014
  • 2.
  • 3. The Health Insurance Portability and Accountability Act (HIPAA), was signed into law on August 21, 1996 and went into effect in April 2003. HIPAA requires all health care providers to have patient consent for access to their medical records or information.
  • 4. Regulatory Compliance has to do with policies and procedures that are used to make sure laws, rules, and regulation that direct hospitals are followed or complied with. This also includes all staff are aware of, properly trained, and comply with appropriate laws and regulations such as following the HIPAA compliance regulations.
  • 5. Centers for Medicare and Medicaid Services (CMS), JCAHO, state laws, HIPAA, and EMTALA are just some of the examples of regulatory requirement and standards that health care agencies must be in compliance with. With Medicare conditions of practice, certain conditions must be met by the hospital in order for them to participate with the program.
  • 6. The risk management area is another important entity that should make sure and monitor that hospitals are in compliance with HIPAA regulations. HIPPA and confidentiality of patient information also hits the back office of organizations and medical facilities, because most claims today are submitted electronically to payers and must now be consistent with HIPAA provisions that direct electronic data interchange submissions appropriately.
  • 7. HIPAA has established patients’ rights related to access, authorization, and release of medical records and must be made available to patients by healthcare entities. Most institutions have this readily available for patients and require a signature that the patients understands his/her privacy rights
  • 8. Compliance with HIPAA’s privacy and security rulings create a good portion of challenges for electronic health record information systems specialists especially with linking these systems. Many use audit processes to help make sure they are maintaining appropriate security measures.
  • 9. Al healthcare organizations and medical facilities should incorporate training for all new employees and re-training and updates for all current employees, in reference to HIPAA rules and regulations and compliance with these regulations. Violations to these regulations should also be discussed and what actions will be taken for any healthcare employee who violates a patients privacy under these guidelines.
  • 10. Training can be effective for all employees by utilizing a clear and well defined presentation such a power point or utilizing online modules. With online learning, testing can be included after each module and a certificate printed out after the course is completed with the date. Yearly training utilizing this method allows health care workers to update their knowledge at a time that is convenient for them and gives them flexibility of required learning.
  • 11. References Kongstvedt, P.R. (2007). Essentials of managed health care (5th ed.). MA: Jones and Bartlett Publishers. Lund, J. (2005). ERISA enforcement of the HIPAA privacy rules. The University of Chicago Law Review, 72(4), 1413-1443. Retrieved from http://search.proquest.com/docview/214788181?accountid=32521 Tan, J. K. H. (2010). Adaptive Health Management Information Systems (3rd ed.). Sudbury: Jones and Bartlett. ISBN: 9780763756918