SlideShare a Scribd company logo
The Office for Civil Rights enforces the HIPAA Privacy Rule, which protects the
privacy of individually identifiable health information; the HIPAA Security Rule,
which sets national standards for the security of electronic protected health
information; the HIPAA Breach Notification Rule, which requires covered entities
and business associates to provide notification following a breach of unsecured
protected health information; and the confidentiality provisions of the Patient
Safety Rule, which protect identifiable information being used to analyze patient
safety events and improve patient safety (United, 2013).
What is the Health Insurance Portability and Accountability Act?
The Health Insurance Portability and Accountability Act (HIPAA) of 1996 is set of
statutes designed to improve the efficiency and effectiveness of the US health care
system:
• Title I: Title I of HIPAA provides rules to "improve the portability and
continuity of health insurance coverage" for workers when they change employers.
• Title II: Title II of HIPAA provides rules for controlling health care fraud and
abuse, and includes an "Administrative Simplification" section that sets standards
for enabling the electronic exchange of health information (University, 2013).
What does HIPPA do?
Places limits on how confidential health information can be shared with others.
Establishes patient rights to control the sharing of their health information.
Puts safeguards in place for confidential health information collected, maintained,
used, or transmitted in electronic form
What is privacy?
Refers to WHAT is protected — information about an individual and the
determination of WHO is permitted to use, disclose, or access the information
What is security?
Refers to HOW information is safeguarded—ensuring privacy by controlling
access to information and protecting it from inappropriate disclosure and
accidental or intentional destruction or loss (Upstate, 2011).
Patients expect privacy when they are receiving healthcare. Patients also expect
that their confidential health information will be appropriately protected.
Examples of safeguards that help to ensure confidentiality are:
Shred all paper containing confidential health information or place in closed
receptacles
When faxing, verify the fax number before sending
Close doors or privacy curtains when having discussions ofconfidential health
information
Do not leave medical records unattended or in open areas
Respect the privacy rights of employees who come here for care by affording their
information the utmost confidentiality it deserves
Keep confidential health information you hear or see to yourself
Examples of computer safeguards to secure our information include:
Protect your access by not sharing your account and/or password with others
Do not write down or post your password on computer systems
Never leaving a workstation signed on or left unattended with access to
confidential health information
Access information in computer systems when you have a need to- know the
information
Never disable or remove the virus detection software
Take measures to protect your computer passwords so that they are not misused.
Patients trust that when they share their confidential health information with
healthcare staff, it will be afforded the appropriate privacy and security protections
User education concerning virus protection
User education in importance of monitoring login success/failure, and how to
report discrepancies
User education in password management
Education on awareness
Reference
Sheidy, D.P. & McMahon, M.K. (2002). Hippa and training: Web based strategies
for compliance. Retrieved September 26, 2013, from
http://www.ehcca.com/presentations/HIPAA/sheidy-tue.pdf
United States Department of Health and Human Services. (2013). Health
information privacy. Retrieved September 26, 2013, from
http://www.hhs.gov/ocr/privacy/index.html
Upstate Medical Center. (2011). Protecting patient confidentiality and security.
Retrieved September 26, 2013, from
http://www.upstate.edu/forms/documents/F84037.pdf
University Information Technology Services. (2013). What is HIPPA?. Retrieved
September 26, 2013, from http://kb.iu.edu/data/ayyy.html

More Related Content

What's hot

Patient confidentiality training
Patient confidentiality trainingPatient confidentiality training
Patient confidentiality trainingSheena705
 
Patient confidentiality 2
Patient confidentiality 2Patient confidentiality 2
Patient confidentiality 2Alice Felton
 
Introduction hippaa
Introduction hippaaIntroduction hippaa
Introduction hippaaTina Peña
 
Employee confidentiality training
Employee confidentiality trainingEmployee confidentiality training
Employee confidentiality trainingJessi Morris
 
Shontea shepard hippa training
Shontea shepard hippa trainingShontea shepard hippa training
Shontea shepard hippa trainingsshontea
 
Hipaa
HipaaHipaa
Mha690 disc 2 week 1
Mha690 disc 2 week 1Mha690 disc 2 week 1
Mha690 disc 2 week 1
James Reynolds
 
HIPAA Compliance Checklist
HIPAA Compliance ChecklistHIPAA Compliance Checklist
HIPAA Compliance Checklist
Leigh-Ann Renz
 
Welcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityWelcome to the hippa, privacy and security
Welcome to the hippa, privacy and security
veve1728
 
Patient privacy 2.0 slides
Patient privacy 2.0 slidesPatient privacy 2.0 slides
Patient privacy 2.0 slides
andibear
 
Week 1 dq1
Week 1 dq1Week 1 dq1
Week 1 dq1SNikki
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Training
ridley27
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)bholmes
 
Hippa training 2017
Hippa training 2017Hippa training 2017
Hippa training 2017
Ashley Valenzuela
 
HIPAA Complaince
HIPAA ComplainceHIPAA Complaince
HIPAA Complaince
FarhatParveen10
 
Patient confidentiality seminar
Patient confidentiality seminarPatient confidentiality seminar
Patient confidentiality seminar
Lakisha M. Moore
 

What's hot (19)

Patient confidentiality training
Patient confidentiality trainingPatient confidentiality training
Patient confidentiality training
 
Patient confidentiality 2
Patient confidentiality 2Patient confidentiality 2
Patient confidentiality 2
 
Introduction hippaa
Introduction hippaaIntroduction hippaa
Introduction hippaa
 
Employee confidentiality training
Employee confidentiality trainingEmployee confidentiality training
Employee confidentiality training
 
Shontea shepard hippa training
Shontea shepard hippa trainingShontea shepard hippa training
Shontea shepard hippa training
 
Hipaa
HipaaHipaa
Hipaa
 
Mha690 disc 2 week 1
Mha690 disc 2 week 1Mha690 disc 2 week 1
Mha690 disc 2 week 1
 
Mha690 w1 d2
Mha690 w1 d2Mha690 w1 d2
Mha690 w1 d2
 
HIPAA Compliance Checklist
HIPAA Compliance ChecklistHIPAA Compliance Checklist
HIPAA Compliance Checklist
 
Welcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityWelcome to the hippa, privacy and security
Welcome to the hippa, privacy and security
 
Patient privacy 2.0 slides
Patient privacy 2.0 slidesPatient privacy 2.0 slides
Patient privacy 2.0 slides
 
Week 1 dq1
Week 1 dq1Week 1 dq1
Week 1 dq1
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Training
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)
 
HIPAA Compliance
HIPAA Compliance HIPAA Compliance
HIPAA Compliance
 
Hippa training 2017
Hippa training 2017Hippa training 2017
Hippa training 2017
 
HIPAA Complaince
HIPAA ComplainceHIPAA Complaince
HIPAA Complaince
 
Patient confidentiality seminar
Patient confidentiality seminarPatient confidentiality seminar
Patient confidentiality seminar
 
Hipaa slideshow
Hipaa slideshowHipaa slideshow
Hipaa slideshow
 

Similar to Confidentiality 9.26.13

Patient confidentiality 9.26.13
Patient confidentiality 9.26.13Patient confidentiality 9.26.13
Patient confidentiality 9.26.13pneville0629
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Haydenhaydens
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small Practices
Nisos Health
 
Discussion2
Discussion2 Discussion2
Discussion2
amberlinn
 
Health Insurance and Portability and Accountability Act
Health Insurance and Portability and Accountability ActHealth Insurance and Portability and Accountability Act
Health Insurance and Portability and Accountability Act
সারন দাস
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentation
MarcEtienne6
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
LLSS64
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
amartya2087
 
Describe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdfDescribe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdf
mohammedfootwear
 
HIPAA TITLE II (2)
HIPAA TITLE II (2)HIPAA TITLE II (2)
HIPAA TITLE II (2)
Quinnipiac University
 
Mha690 confidentiality training-week 1, discussion 2
Mha690 confidentiality training-week 1, discussion 2Mha690 confidentiality training-week 1, discussion 2
Mha690 confidentiality training-week 1, discussion 2
Kristen Zimmer
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcherEmed32
 
Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)bholmes
 
Mha 690 presentation hippa
Mha 690 presentation hippaMha 690 presentation hippa
Mha 690 presentation hippa
belle0508
 
The Health Insurance Portability and Accountability Act 
The Health Insurance Portability and Accountability Act The Health Insurance Portability and Accountability Act 
The Health Insurance Portability and Accountability Act 
Kartheek Kein
 
HIPAA , REGULATORY AFFAIRS , M.PHARM ...
HIPAA , REGULATORY AFFAIRS , M.PHARM ...HIPAA , REGULATORY AFFAIRS , M.PHARM ...
HIPAA , REGULATORY AFFAIRS , M.PHARM ...
susmitaghosh93
 

Similar to Confidentiality 9.26.13 (20)

Patient confidentiality 9.26.13
Patient confidentiality 9.26.13Patient confidentiality 9.26.13
Patient confidentiality 9.26.13
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Hayden
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small Practices
 
Discussion2
Discussion2 Discussion2
Discussion2
 
Health Insurance and Portability and Accountability Act
Health Insurance and Portability and Accountability ActHealth Insurance and Portability and Accountability Act
Health Insurance and Portability and Accountability Act
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentation
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
 
Describe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdfDescribe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdf
 
HIPAA TITLE II (2)
HIPAA TITLE II (2)HIPAA TITLE II (2)
HIPAA TITLE II (2)
 
Mha690 confidentiality training-week 1, discussion 2
Mha690 confidentiality training-week 1, discussion 2Mha690 confidentiality training-week 1, discussion 2
Mha690 confidentiality training-week 1, discussion 2
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcher
 
Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)
 
Mha 690 presentation hippa
Mha 690 presentation hippaMha 690 presentation hippa
Mha 690 presentation hippa
 
The Health Insurance Portability and Accountability Act 
The Health Insurance Portability and Accountability Act The Health Insurance Portability and Accountability Act 
The Health Insurance Portability and Accountability Act 
 
HIPAA , REGULATORY AFFAIRS , M.PHARM ...
HIPAA , REGULATORY AFFAIRS , M.PHARM ...HIPAA , REGULATORY AFFAIRS , M.PHARM ...
HIPAA , REGULATORY AFFAIRS , M.PHARM ...
 

Recently uploaded

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

Confidentiality 9.26.13

  • 1. The Office for Civil Rights enforces the HIPAA Privacy Rule, which protects the privacy of individually identifiable health information; the HIPAA Security Rule, which sets national standards for the security of electronic protected health information; the HIPAA Breach Notification Rule, which requires covered entities and business associates to provide notification following a breach of unsecured protected health information; and the confidentiality provisions of the Patient Safety Rule, which protect identifiable information being used to analyze patient safety events and improve patient safety (United, 2013). What is the Health Insurance Portability and Accountability Act? The Health Insurance Portability and Accountability Act (HIPAA) of 1996 is set of statutes designed to improve the efficiency and effectiveness of the US health care system: • Title I: Title I of HIPAA provides rules to "improve the portability and continuity of health insurance coverage" for workers when they change employers. • Title II: Title II of HIPAA provides rules for controlling health care fraud and abuse, and includes an "Administrative Simplification" section that sets standards for enabling the electronic exchange of health information (University, 2013). What does HIPPA do? Places limits on how confidential health information can be shared with others. Establishes patient rights to control the sharing of their health information. Puts safeguards in place for confidential health information collected, maintained, used, or transmitted in electronic form What is privacy? Refers to WHAT is protected — information about an individual and the determination of WHO is permitted to use, disclose, or access the information What is security?
  • 2. Refers to HOW information is safeguarded—ensuring privacy by controlling access to information and protecting it from inappropriate disclosure and accidental or intentional destruction or loss (Upstate, 2011). Patients expect privacy when they are receiving healthcare. Patients also expect that their confidential health information will be appropriately protected. Examples of safeguards that help to ensure confidentiality are: Shred all paper containing confidential health information or place in closed receptacles When faxing, verify the fax number before sending Close doors or privacy curtains when having discussions ofconfidential health information Do not leave medical records unattended or in open areas Respect the privacy rights of employees who come here for care by affording their information the utmost confidentiality it deserves Keep confidential health information you hear or see to yourself Examples of computer safeguards to secure our information include: Protect your access by not sharing your account and/or password with others Do not write down or post your password on computer systems Never leaving a workstation signed on or left unattended with access to confidential health information Access information in computer systems when you have a need to- know the information Never disable or remove the virus detection software Take measures to protect your computer passwords so that they are not misused. Patients trust that when they share their confidential health information with healthcare staff, it will be afforded the appropriate privacy and security protections
  • 3. User education concerning virus protection User education in importance of monitoring login success/failure, and how to report discrepancies User education in password management Education on awareness Reference Sheidy, D.P. & McMahon, M.K. (2002). Hippa and training: Web based strategies for compliance. Retrieved September 26, 2013, from http://www.ehcca.com/presentations/HIPAA/sheidy-tue.pdf United States Department of Health and Human Services. (2013). Health information privacy. Retrieved September 26, 2013, from http://www.hhs.gov/ocr/privacy/index.html Upstate Medical Center. (2011). Protecting patient confidentiality and security. Retrieved September 26, 2013, from http://www.upstate.edu/forms/documents/F84037.pdf University Information Technology Services. (2013). What is HIPPA?. Retrieved September 26, 2013, from http://kb.iu.edu/data/ayyy.html