CONFIDENTIALITY & SECURITY TRAININGLinda WalterMHA 690 Instructor - Dr. Jeanette PeckJune 9, 2011
IntroductionHIPAA Definition
HIPAA Privacy Rule Overview
What is Protected Health Information (PHI)
HIPAA Security Rule Overview
Who is  Required to Train?
How Often is Training Required?Health Insurance Portability and Accountability Act (HIPAA)In 1996, Congress passed the HIPAA Public Law 104-191.  HIPAA required Health and Human Services (HHS) to establish – with far-reaching implications and consequences – new guidelines, key principles, and national standards for the handling of electronic healthcare, applicable to everyone working within the US healthcare system (Wolper, 2011, p. 389).
HIPAA Privacy OverviewIntended to protect the privacy of all individually identifiable health information created or held by covered entities, regardless of whether it is or ever has been in electronic form.
Includes paper records and oral communications.

Confidentiality Training

  • 1.
    CONFIDENTIALITY & SECURITYTRAININGLinda WalterMHA 690 Instructor - Dr. Jeanette PeckJune 9, 2011
  • 2.
  • 3.
  • 4.
    What is ProtectedHealth Information (PHI)
  • 5.
  • 6.
    Who is Required to Train?
  • 7.
    How Often isTraining Required?Health Insurance Portability and Accountability Act (HIPAA)In 1996, Congress passed the HIPAA Public Law 104-191. HIPAA required Health and Human Services (HHS) to establish – with far-reaching implications and consequences – new guidelines, key principles, and national standards for the handling of electronic healthcare, applicable to everyone working within the US healthcare system (Wolper, 2011, p. 389).
  • 8.
    HIPAA Privacy OverviewIntendedto protect the privacy of all individually identifiable health information created or held by covered entities, regardless of whether it is or ever has been in electronic form.
  • 9.
    Includes paper recordsand oral communications.
  • 10.
    Must maintain documentationof their policies and procedures for complying with the standards,
  • 11.
    Must include astatement of who has access to protected health information, how it is used within the covered entity, and when it would or would not be disclosed to other entities.
  • 12.
    Providers must obtaina patient's consent for the disclosure or use of the patient's health information, even for treatment, payment, and health care operations purposes. What is Protected Health Information (PHI) ?Protected Health information is any information about a patients health status, the patients care, or any patient information about payments of his care. PHI is any information about the patient.
  • 13.
    HIPAA Security RuleOverviewFinal component of HIPAA
  • 14.
    Deals with protectionof identifiable health information
  • 15.
    Inadvertent disclosure ofidentifiable health information
  • 16.
    Deliberate misuse ofidentifiable health information
  • 17.
    Established standards andregulations for healthcare providers on required procedures ensuring administrative safeguards
  • 18.
    There are differentlevels of penalties for violationsWho is Required to Train?All employees at all levels
  • 19.
    How Often isTraining required?Training is required at date of hire
  • 20.
  • 21.
    Training will becompleted on the internet computerized training education siteREFERENCESTan, J. and Payton, F. (2010). Adaptive health management information systems: concepts, cases, and practical applications (3rd ed.). Sudbury, Massachusetts. Jones and Bartlett Publishers.
  • 22.
    U.S. Department ofHealth and Human Services . Retrieved June 9, 2011 from http://www.ihs.gov/AdminMngrResources/HIPAA/index.cfm?module=privacy_standards.
  • 23.
    Wolper, L. (2011).Health care administration managing organized delivery systems (Fifth Edition). Sudbury, Massachusetts, Jones and Bartlett Publishers.