SlideShare a Scribd company logo

 Confidentiality is a legal right of every client as well
as an ethical responsibility for all healthcare
providers.
 A study conducted by Marshall and Solomon (2003)
found that 59 providers from hospitals and case
management programs were confused as to which
information was confidential (Solomon, 2012). This
proves that providers themselves recognize their
need for training on issues of confidentiality (as cited
in Solomon, 2012).
What is Confidentiality?

Managers should make sure that
employees have a clear
understanding about confidentiality.

Managers and educators must have an open
discussion about confidentiality with their
employees. They should be clear about
resolving and handling confidentiality issues.
https://www.youtube.com/watch?v=jfTZUsOeA-E
Let us watch the video of a discussion about
confidentiality.

Interactive tool, such as Storyline 2 will
enable managers assess employees’
weaknesses and strengths in terms of
confidentiality behaviors.


Course overview
Objectives
Definition of personally identifiable
information (PII)
Examples of these identifiers or PII
Requirements and responsibilities in
protecting PII.
The interactive tools features:

https://www.youtube.com/watch?v=_ITU377uuJY
A short video presentation can be an effective
tool to remind employees periodically about
protecting personal healthcare information
(PHI)

 Don't leave files or documents exposed where they could
be visible to visitors - such as opposing counsel
 Keep phone conversations about a case private
 Don't leave mail that is waiting to be picked up out in the
open where others may see the names of parties
 Use a screen saver and don't leave a computer screen
open on a client file
 Don't leave documents or files in shared common areas,
such as the copying room.
 Don't forget to train staff about the dangers of
confidentiality breaches on the web and in social media.
Reminders about Confidentiality
should include the following:
 Fox News. (2008). Report Over 120 UCLA hospital staff saw celebrity health
records. Retrieved from
http://www.foxnews.com/story/0,2933,398784,00.html
 Guidelines for dealing with confidential information. (n.d). Retrieved from
https://www.youtube.com/watch?v=_ITU377uuJY
 Confidentiality Training for Elederly Services. (n.d.). Retrieved from
https://www.youtube.com/watch?v=jfTZUsOeA-E
 NCHS Confidentiality Training: Safeguarding Confidential Information. CDC.
Retrieved from
 http://www.cdc.gov/nchs/about/policy/confidentiality_training/
 Solomon, P., Molinaro, M., Mannion, E., & Cantwell, K. (2012). Confidentiality
Policies and Practices in Regard to Family Involvement: Does Training Make a
Difference?. American Journal Of Psychiatric Rehabilitation, 15(1), 97-115.
doi:10.1080/15487768.2012.655648
 Hsieh, S. (2010). Training your staff on confidentiality rules. Lawyers USA.
References

More Related Content

What's hot

Confidentially in the workplace
Confidentially in the workplaceConfidentially in the workplace
Confidentially in the workplace
Knighten
 
B johnson unit 3 final project completion
B johnson unit 3 final project completionB johnson unit 3 final project completion
B johnson unit 3 final project completion
Brittany Johnson
 
TaylorWk1d2assignment
TaylorWk1d2assignmentTaylorWk1d2assignment
TaylorWk1d2assignment
mya1743
 
$4.8m HIPAA Breach
$4.8m HIPAA Breach$4.8m HIPAA Breach
$4.8m HIPAA Breach
Infinisource
 
Group presentation hippa ppt
Group presentation hippa pptGroup presentation hippa ppt
Group presentation hippa ppt
Mari Mina
 
Mobile Privacy & Personal Health Information
Mobile Privacy & Personal Health InformationMobile Privacy & Personal Health Information
Mobile Privacy & Personal Health Information
Sheree Martin
 
HIPAA Enforcement Heats Up in the Coldest State
HIPAA Enforcement Heats Up in the Coldest StateHIPAA Enforcement Heats Up in the Coldest State
HIPAA Enforcement Heats Up in the Coldest State
Redspin, Inc.
 
Patient confidentiality MHA 690
Patient confidentiality MHA 690Patient confidentiality MHA 690
Patient confidentiality MHA 690
AMSIMM9932
 
Final powerpoint for social media club program
Final  powerpoint for social media club programFinal  powerpoint for social media club program
Final powerpoint for social media club program
Social Media Club North Jersey
 
CONFIDENTIALITY By J. Jefferson
CONFIDENTIALITY By J. JeffersonCONFIDENTIALITY By J. Jefferson
CONFIDENTIALITY By J. Jefferson
mstura_87
 
اخلاقيات الثاني
اخلاقيات الثانياخلاقيات الثاني
اخلاقيات الثاني
Bunayan ALdosari
 
Week 1 disc 2 pp presentation
Week 1 disc 2 pp presentationWeek 1 disc 2 pp presentation
Week 1 disc 2 pp presentation
AngelaDMolina
 
102 Chapter 4 Pt 2
102 Chapter 4   Pt 2102 Chapter 4   Pt 2
102 Chapter 4 Pt 2
manpreet04
 
Gr 3 Societal Issues of Information System Design and Use
Gr 3 Societal Issues of Information System Design and UseGr 3 Societal Issues of Information System Design and Use
Gr 3 Societal Issues of Information System Design and Use
university of education,Lahore
 
Ethical and social issues in management information systems for BBA hons pro...
Ethical and social issues in management information systems  for BBA hons pro...Ethical and social issues in management information systems  for BBA hons pro...
Ethical and social issues in management information systems for BBA hons pro...
Tonmoy zahid Rishad
 
Policy Brief : Privacy implications of technologies to address social isolati...
Policy Brief : Privacy implications of technologies to address social isolati...Policy Brief : Privacy implications of technologies to address social isolati...
Policy Brief : Privacy implications of technologies to address social isolati...
Mobile Age Project
 
[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security
AriantoMuditomo
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
Ellen Forsström
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Editor IJCATR
 
Cost of Data Breah in Healthcare_Quinlan, Courtney
Cost of Data Breah in Healthcare_Quinlan, CourtneyCost of Data Breah in Healthcare_Quinlan, Courtney
Cost of Data Breah in Healthcare_Quinlan, Courtney
courtneyquinlan
 

What's hot (20)

Confidentially in the workplace
Confidentially in the workplaceConfidentially in the workplace
Confidentially in the workplace
 
B johnson unit 3 final project completion
B johnson unit 3 final project completionB johnson unit 3 final project completion
B johnson unit 3 final project completion
 
TaylorWk1d2assignment
TaylorWk1d2assignmentTaylorWk1d2assignment
TaylorWk1d2assignment
 
$4.8m HIPAA Breach
$4.8m HIPAA Breach$4.8m HIPAA Breach
$4.8m HIPAA Breach
 
Group presentation hippa ppt
Group presentation hippa pptGroup presentation hippa ppt
Group presentation hippa ppt
 
Mobile Privacy & Personal Health Information
Mobile Privacy & Personal Health InformationMobile Privacy & Personal Health Information
Mobile Privacy & Personal Health Information
 
HIPAA Enforcement Heats Up in the Coldest State
HIPAA Enforcement Heats Up in the Coldest StateHIPAA Enforcement Heats Up in the Coldest State
HIPAA Enforcement Heats Up in the Coldest State
 
Patient confidentiality MHA 690
Patient confidentiality MHA 690Patient confidentiality MHA 690
Patient confidentiality MHA 690
 
Final powerpoint for social media club program
Final  powerpoint for social media club programFinal  powerpoint for social media club program
Final powerpoint for social media club program
 
CONFIDENTIALITY By J. Jefferson
CONFIDENTIALITY By J. JeffersonCONFIDENTIALITY By J. Jefferson
CONFIDENTIALITY By J. Jefferson
 
اخلاقيات الثاني
اخلاقيات الثانياخلاقيات الثاني
اخلاقيات الثاني
 
Week 1 disc 2 pp presentation
Week 1 disc 2 pp presentationWeek 1 disc 2 pp presentation
Week 1 disc 2 pp presentation
 
102 Chapter 4 Pt 2
102 Chapter 4   Pt 2102 Chapter 4   Pt 2
102 Chapter 4 Pt 2
 
Gr 3 Societal Issues of Information System Design and Use
Gr 3 Societal Issues of Information System Design and UseGr 3 Societal Issues of Information System Design and Use
Gr 3 Societal Issues of Information System Design and Use
 
Ethical and social issues in management information systems for BBA hons pro...
Ethical and social issues in management information systems  for BBA hons pro...Ethical and social issues in management information systems  for BBA hons pro...
Ethical and social issues in management information systems for BBA hons pro...
 
Policy Brief : Privacy implications of technologies to address social isolati...
Policy Brief : Privacy implications of technologies to address social isolati...Policy Brief : Privacy implications of technologies to address social isolati...
Policy Brief : Privacy implications of technologies to address social isolati...
 
[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
Cost of Data Breah in Healthcare_Quinlan, Courtney
Cost of Data Breah in Healthcare_Quinlan, CourtneyCost of Data Breah in Healthcare_Quinlan, Courtney
Cost of Data Breah in Healthcare_Quinlan, Courtney
 

Viewers also liked

Thurgood Marshall
Thurgood MarshallThurgood Marshall
Thurgood Marshall
lpuckett111
 
Confidentiality for educators
Confidentiality for educatorsConfidentiality for educators
Confidentiality for educators
Tammy Rushing
 
ONSC Parent-Teacher Meeting Presentation_2011-2012
ONSC Parent-Teacher Meeting Presentation_2011-2012ONSC Parent-Teacher Meeting Presentation_2011-2012
ONSC Parent-Teacher Meeting Presentation_2011-2012
onsc
 
parent teacher conf
 parent teacher conf parent teacher conf
parent teacher conf
Ricosoa Theoangel
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
ux singapore
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Stanford GSB Corporate Governance Research Initiative
 

Viewers also liked (6)

Thurgood Marshall
Thurgood MarshallThurgood Marshall
Thurgood Marshall
 
Confidentiality for educators
Confidentiality for educatorsConfidentiality for educators
Confidentiality for educators
 
ONSC Parent-Teacher Meeting Presentation_2011-2012
ONSC Parent-Teacher Meeting Presentation_2011-2012ONSC Parent-Teacher Meeting Presentation_2011-2012
ONSC Parent-Teacher Meeting Presentation_2011-2012
 
parent teacher conf
 parent teacher conf parent teacher conf
parent teacher conf
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Similar to Confidentiality

Mha690 health care capstone ppp
Mha690 health care capstone pppMha690 health care capstone ppp
Mha690 health care capstone ppp
colmon
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
Cristian Mihai
 
Week 5 Reflection Pulse checkTop of FormBottom of FormPulse .docx
Week 5 Reflection Pulse checkTop of FormBottom of FormPulse .docxWeek 5 Reflection Pulse checkTop of FormBottom of FormPulse .docx
Week 5 Reflection Pulse checkTop of FormBottom of FormPulse .docx
helzerpatrina
 
IT Security and Risk Mitigation
IT Security and Risk MitigationIT Security and Risk Mitigation
IT Security and Risk Mitigation
Mukalele Rogers
 
Copy of promoting health and safety
Copy of promoting health and safetyCopy of promoting health and safety
Copy of promoting health and safety
mansoor ali
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
Sharing Slides Training
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
sharing notes123
 
The Role of Information Security Policy
The Role of Information Security PolicyThe Role of Information Security Policy
The Role of Information Security Policy
Robot Mode
 
Hello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were asHello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were as
simba35
 
Panel Presentation Privacy Impact Assessments (PIA)Coordina.docx
Panel Presentation Privacy Impact Assessments (PIA)Coordina.docxPanel Presentation Privacy Impact Assessments (PIA)Coordina.docx
Panel Presentation Privacy Impact Assessments (PIA)Coordina.docx
aman341480
 
Issa Vancouver 6 09 Pareto's Revenge
Issa Vancouver 6 09  Pareto's RevengeIssa Vancouver 6 09  Pareto's Revenge
Issa Vancouver 6 09 Pareto's Revenge
Mike Murray
 
Life Science Patient Data Privacy
Life Science Patient Data PrivacyLife Science Patient Data Privacy
Life Science Patient Data Privacy
Tracey Zdravkovic
 
Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?
CommLab India – Rapid eLearning Solutions
 
PACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT, Security+2.6: Security Related Awareness and TrainingPACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT, Security+2.6: Security Related Awareness and Training
Pace IT at Edmonds Community College
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Calgary Scientific Inc.
 
Human Performance And Commercial Aircraft Accidents
Human Performance And Commercial Aircraft AccidentsHuman Performance And Commercial Aircraft Accidents
Human Performance And Commercial Aircraft Accidents
Kendra Cote
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
Jessica Graf
 
Uhmlg2011
Uhmlg2011Uhmlg2011
Uhmlg2011
SuzanneHardy
 
CREATIVE TECHNOLOGY 7 QI-L4
CREATIVE TECHNOLOGY 7 QI-L4CREATIVE TECHNOLOGY 7 QI-L4
CREATIVE TECHNOLOGY 7 QI-L4
FLORENCE FERNNADEZ
 
System Security Threats and Risks)
System Security Threats and Risks)System Security Threats and Risks)
System Security Threats and Risks)
BPalmer13
 

Similar to Confidentiality (20)

Mha690 health care capstone ppp
Mha690 health care capstone pppMha690 health care capstone ppp
Mha690 health care capstone ppp
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Week 5 Reflection Pulse checkTop of FormBottom of FormPulse .docx
Week 5 Reflection Pulse checkTop of FormBottom of FormPulse .docxWeek 5 Reflection Pulse checkTop of FormBottom of FormPulse .docx
Week 5 Reflection Pulse checkTop of FormBottom of FormPulse .docx
 
IT Security and Risk Mitigation
IT Security and Risk MitigationIT Security and Risk Mitigation
IT Security and Risk Mitigation
 
Copy of promoting health and safety
Copy of promoting health and safetyCopy of promoting health and safety
Copy of promoting health and safety
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
 
The Role of Information Security Policy
The Role of Information Security PolicyThe Role of Information Security Policy
The Role of Information Security Policy
 
Hello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were asHello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were as
 
Panel Presentation Privacy Impact Assessments (PIA)Coordina.docx
Panel Presentation Privacy Impact Assessments (PIA)Coordina.docxPanel Presentation Privacy Impact Assessments (PIA)Coordina.docx
Panel Presentation Privacy Impact Assessments (PIA)Coordina.docx
 
Issa Vancouver 6 09 Pareto's Revenge
Issa Vancouver 6 09  Pareto's RevengeIssa Vancouver 6 09  Pareto's Revenge
Issa Vancouver 6 09 Pareto's Revenge
 
Life Science Patient Data Privacy
Life Science Patient Data PrivacyLife Science Patient Data Privacy
Life Science Patient Data Privacy
 
Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?
 
PACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT, Security+2.6: Security Related Awareness and TrainingPACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT, Security+2.6: Security Related Awareness and Training
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
Human Performance And Commercial Aircraft Accidents
Human Performance And Commercial Aircraft AccidentsHuman Performance And Commercial Aircraft Accidents
Human Performance And Commercial Aircraft Accidents
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
 
Uhmlg2011
Uhmlg2011Uhmlg2011
Uhmlg2011
 
CREATIVE TECHNOLOGY 7 QI-L4
CREATIVE TECHNOLOGY 7 QI-L4CREATIVE TECHNOLOGY 7 QI-L4
CREATIVE TECHNOLOGY 7 QI-L4
 
System Security Threats and Risks)
System Security Threats and Risks)System Security Threats and Risks)
System Security Threats and Risks)
 

Recently uploaded

一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理
一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理
一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理
cadyzeo
 
THE CONCEPT OF RIGHT TO DEFAULT BAIL.pptx
THE CONCEPT OF RIGHT TO DEFAULT BAIL.pptxTHE CONCEPT OF RIGHT TO DEFAULT BAIL.pptx
THE CONCEPT OF RIGHT TO DEFAULT BAIL.pptx
Namrata Chakraborty
 
production-orders-under-article-18-of-the-budapest-convention-on-cybercrime-a...
production-orders-under-article-18-of-the-budapest-convention-on-cybercrime-a...production-orders-under-article-18-of-the-budapest-convention-on-cybercrime-a...
production-orders-under-article-18-of-the-budapest-convention-on-cybercrime-a...
ElenaLazr2
 
一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理
一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理
一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理
ubype
 
Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?
RoseZubler1
 
Safeguarding Against Financial Crime: AML Compliance Regulations Demystified
Safeguarding Against Financial Crime: AML Compliance Regulations DemystifiedSafeguarding Against Financial Crime: AML Compliance Regulations Demystified
Safeguarding Against Financial Crime: AML Compliance Regulations Demystified
PROF. PAUL ALLIEU KAMARA
 
一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
onduyv
 
一比一原版(glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(glasgow毕业证书)格拉斯哥大学毕业证如何办理一比一原版(glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(glasgow毕业证书)格拉斯哥大学毕业证如何办理
ooqzo
 
一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理
一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理
一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理
onduyv
 
一比一原版(uwlc毕业证书)美国威斯康星大学拉克罗斯分校毕业证如何办理
一比一原版(uwlc毕业证书)美国威斯康星大学拉克罗斯分校毕业证如何办理一比一原版(uwlc毕业证书)美国威斯康星大学拉克罗斯分校毕业证如何办理
一比一原版(uwlc毕业证书)美国威斯康星大学拉克罗斯分校毕业证如何办理
qevye
 
一比一原版(uwgb毕业证书)美国威斯康星大学绿湾分校毕业证如何办理
一比一原版(uwgb毕业证书)美国威斯康星大学绿湾分校毕业证如何办理一比一原版(uwgb毕业证书)美国威斯康星大学绿湾分校毕业证如何办理
一比一原版(uwgb毕业证书)美国威斯康星大学绿湾分校毕业证如何办理
pdeehy
 
17-03 2022 -full agreement full version .pdf
17-03 2022 -full agreement full version .pdf17-03 2022 -full agreement full version .pdf
17-03 2022 -full agreement full version .pdf
ssuser0dfed9
 
一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理
一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理
一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理
hedonxu
 
Capital Punishment by Saif Javed (LLM)ppt.pptx
Capital Punishment by Saif Javed (LLM)ppt.pptxCapital Punishment by Saif Javed (LLM)ppt.pptx
Capital Punishment by Saif Javed (LLM)ppt.pptx
OmGod1
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
bhavenpr
 
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
abondo3
 
Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...
Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...
Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...
AHRP Law Firm
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
sunitasaha5
 
Corporate Governance : Scope and Legal Framework
Corporate Governance : Scope and Legal FrameworkCorporate Governance : Scope and Legal Framework
Corporate Governance : Scope and Legal Framework
devaki57
 
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
15e6o6u
 

Recently uploaded (20)

一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理
一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理
一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理
 
THE CONCEPT OF RIGHT TO DEFAULT BAIL.pptx
THE CONCEPT OF RIGHT TO DEFAULT BAIL.pptxTHE CONCEPT OF RIGHT TO DEFAULT BAIL.pptx
THE CONCEPT OF RIGHT TO DEFAULT BAIL.pptx
 
production-orders-under-article-18-of-the-budapest-convention-on-cybercrime-a...
production-orders-under-article-18-of-the-budapest-convention-on-cybercrime-a...production-orders-under-article-18-of-the-budapest-convention-on-cybercrime-a...
production-orders-under-article-18-of-the-budapest-convention-on-cybercrime-a...
 
一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理
一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理
一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理
 
Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?
 
Safeguarding Against Financial Crime: AML Compliance Regulations Demystified
Safeguarding Against Financial Crime: AML Compliance Regulations DemystifiedSafeguarding Against Financial Crime: AML Compliance Regulations Demystified
Safeguarding Against Financial Crime: AML Compliance Regulations Demystified
 
一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
 
一比一原版(glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(glasgow毕业证书)格拉斯哥大学毕业证如何办理一比一原版(glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(glasgow毕业证书)格拉斯哥大学毕业证如何办理
 
一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理
一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理
一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理
 
一比一原版(uwlc毕业证书)美国威斯康星大学拉克罗斯分校毕业证如何办理
一比一原版(uwlc毕业证书)美国威斯康星大学拉克罗斯分校毕业证如何办理一比一原版(uwlc毕业证书)美国威斯康星大学拉克罗斯分校毕业证如何办理
一比一原版(uwlc毕业证书)美国威斯康星大学拉克罗斯分校毕业证如何办理
 
一比一原版(uwgb毕业证书)美国威斯康星大学绿湾分校毕业证如何办理
一比一原版(uwgb毕业证书)美国威斯康星大学绿湾分校毕业证如何办理一比一原版(uwgb毕业证书)美国威斯康星大学绿湾分校毕业证如何办理
一比一原版(uwgb毕业证书)美国威斯康星大学绿湾分校毕业证如何办理
 
17-03 2022 -full agreement full version .pdf
17-03 2022 -full agreement full version .pdf17-03 2022 -full agreement full version .pdf
17-03 2022 -full agreement full version .pdf
 
一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理
一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理
一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理
 
Capital Punishment by Saif Javed (LLM)ppt.pptx
Capital Punishment by Saif Javed (LLM)ppt.pptxCapital Punishment by Saif Javed (LLM)ppt.pptx
Capital Punishment by Saif Javed (LLM)ppt.pptx
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
 
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
 
Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...
Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...
Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
 
Corporate Governance : Scope and Legal Framework
Corporate Governance : Scope and Legal FrameworkCorporate Governance : Scope and Legal Framework
Corporate Governance : Scope and Legal Framework
 
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
 

Confidentiality

  • 1.
  • 2.   Confidentiality is a legal right of every client as well as an ethical responsibility for all healthcare providers.  A study conducted by Marshall and Solomon (2003) found that 59 providers from hospitals and case management programs were confused as to which information was confidential (Solomon, 2012). This proves that providers themselves recognize their need for training on issues of confidentiality (as cited in Solomon, 2012). What is Confidentiality?
  • 3.  Managers should make sure that employees have a clear understanding about confidentiality.
  • 4.  Managers and educators must have an open discussion about confidentiality with their employees. They should be clear about resolving and handling confidentiality issues. https://www.youtube.com/watch?v=jfTZUsOeA-E Let us watch the video of a discussion about confidentiality.
  • 5.  Interactive tool, such as Storyline 2 will enable managers assess employees’ weaknesses and strengths in terms of confidentiality behaviors.
  • 6.
  • 7.  Course overview Objectives Definition of personally identifiable information (PII) Examples of these identifiers or PII Requirements and responsibilities in protecting PII. The interactive tools features:
  • 8.  https://www.youtube.com/watch?v=_ITU377uuJY A short video presentation can be an effective tool to remind employees periodically about protecting personal healthcare information (PHI)
  • 9.   Don't leave files or documents exposed where they could be visible to visitors - such as opposing counsel  Keep phone conversations about a case private  Don't leave mail that is waiting to be picked up out in the open where others may see the names of parties  Use a screen saver and don't leave a computer screen open on a client file  Don't leave documents or files in shared common areas, such as the copying room.  Don't forget to train staff about the dangers of confidentiality breaches on the web and in social media. Reminders about Confidentiality should include the following:
  • 10.  Fox News. (2008). Report Over 120 UCLA hospital staff saw celebrity health records. Retrieved from http://www.foxnews.com/story/0,2933,398784,00.html  Guidelines for dealing with confidential information. (n.d). Retrieved from https://www.youtube.com/watch?v=_ITU377uuJY  Confidentiality Training for Elederly Services. (n.d.). Retrieved from https://www.youtube.com/watch?v=jfTZUsOeA-E  NCHS Confidentiality Training: Safeguarding Confidential Information. CDC. Retrieved from  http://www.cdc.gov/nchs/about/policy/confidentiality_training/  Solomon, P., Molinaro, M., Mannion, E., & Cantwell, K. (2012). Confidentiality Policies and Practices in Regard to Family Involvement: Does Training Make a Difference?. American Journal Of Psychiatric Rehabilitation, 15(1), 97-115. doi:10.1080/15487768.2012.655648  Hsieh, S. (2010). Training your staff on confidentiality rules. Lawyers USA. References

Editor's Notes

  1. The confidentiality training presented in Elder Service (“Confidentiality Training,” n.d.) is a good example on how employees brought up real-life situations about confidentiality issues.