SlideShare a Scribd company logo
1 of 7
Confidentiality 
in the workplace
Introduction 
For decades, the confidentiality of health information has been a 
controversial public policy issue because health information of today is 
generally stored on computer systems that can be readily accessed through 
internet websites. In today’s world of technology, there are computer 
hackers that gain access to personal information that can be used to gain 
access to any form of information possible. In order to attempt to safeguard 
electronic health records (EHRs) from being stolen, organizations should 
install a firewall into their system that would block access and warn 
organizations when an attempt has been made to access information 
(Kongstvedt, 2007, p. 5). 
The purpose of today’s training section is to explain what HIPAA stands for, 
its importance within the workplace and the involvement of the Joint 
Commission. I will further explain how to avoid confidentiality dilemmas 
and provide some suggestions as to how this training will be effective for 
employees.
Health Insurance Portability & 
Accountability Act (HIPAA) 
 Privacy Rule of 1996 
 Restricts access to personal health information 
(PHI) 
 Covered entities 
 Importance in the workplace
Joint Commission 
 Adopted HIPAA definition of health care 
information 
What this information contains
Avoiding non-compliance 
 Education 
 Annual recertification
Effective training 
 Establish policies and procedures 
 Holds everyone accountability 
 Educating staff
References 
Confidentiality of worker health information. (2013). 
Workplace Health & Safety, 61(9), 376-378. 
doi:http://dx.doi.org/10.3928/21650799-20130827- 
52. 
Kongstvedt, P. R. (2007). Essentials of Managed 
Health Care. 5th Edition. Jones & Bartlett Learning. 


More Related Content

What's hot

Mha690 brittany koenig week 1 assignment2
Mha690 brittany koenig week 1 assignment2Mha690 brittany koenig week 1 assignment2
Mha690 brittany koenig week 1 assignment2bkoenig2010
 
The convergence of heatlhcare and it ausmedtech may 2103
The convergence of heatlhcare and it   ausmedtech may 2103The convergence of heatlhcare and it   ausmedtech may 2103
The convergence of heatlhcare and it ausmedtech may 2103Hydrix Pty Ltd
 
(How) Can Safe Sharing of EHRs Transform the Health System?
(How) Can Safe Sharing of EHRs Transform the Health System?(How) Can Safe Sharing of EHRs Transform the Health System?
(How) Can Safe Sharing of EHRs Transform the Health System?Health Informatics New Zealand
 
Psychosocial Risks: European Expectations
Psychosocial Risks: European ExpectationsPsychosocial Risks: European Expectations
Psychosocial Risks: European ExpectationsAntea Group
 
Breaking Down Barriers: Interoperability in Primary Care
Breaking Down Barriers: Interoperability in Primary CareBreaking Down Barriers: Interoperability in Primary Care
Breaking Down Barriers: Interoperability in Primary CareTom Blackwell
 

What's hot (8)

Mha690 brittany koenig week 1 assignment2
Mha690 brittany koenig week 1 assignment2Mha690 brittany koenig week 1 assignment2
Mha690 brittany koenig week 1 assignment2
 
The convergence of heatlhcare and it ausmedtech may 2103
The convergence of heatlhcare and it   ausmedtech may 2103The convergence of heatlhcare and it   ausmedtech may 2103
The convergence of heatlhcare and it ausmedtech may 2103
 
The use of open data
The use of open dataThe use of open data
The use of open data
 
(How) Can Safe Sharing of EHRs Transform the Health System?
(How) Can Safe Sharing of EHRs Transform the Health System?(How) Can Safe Sharing of EHRs Transform the Health System?
(How) Can Safe Sharing of EHRs Transform the Health System?
 
CMIO CHIME Survey Results
CMIO CHIME Survey ResultsCMIO CHIME Survey Results
CMIO CHIME Survey Results
 
Psychosocial Risks: European Expectations
Psychosocial Risks: European ExpectationsPsychosocial Risks: European Expectations
Psychosocial Risks: European Expectations
 
Breaking Down Barriers: Interoperability in Primary Care
Breaking Down Barriers: Interoperability in Primary CareBreaking Down Barriers: Interoperability in Primary Care
Breaking Down Barriers: Interoperability in Primary Care
 
Assignment
AssignmentAssignment
Assignment
 

Similar to Confidentially

Confidentially in the workplace
Confidentially in the workplaceConfidentially in the workplace
Confidentially in the workplaceKnighten
 
Ensuring Patient Confidentiality[1]
Ensuring Patient Confidentiality[1]Ensuring Patient Confidentiality[1]
Ensuring Patient Confidentiality[1]romill0700
 
Confidentiality
ConfidentialityConfidentiality
ConfidentialityKym Canty
 
Running head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docx
Running head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docxRunning head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docx
Running head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docxsusanschei
 
Security Best Practices for Health Information Exchange
Security Best Practices for Health Information ExchangeSecurity Best Practices for Health Information Exchange
Security Best Practices for Health Information ExchangeTrend Micro
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Haydenhaydens
 
Protection of Patient Information.docx
Protection of Patient Information.docxProtection of Patient Information.docx
Protection of Patient Information.docxWawire Wycliffe
 
Confidentiality power point
Confidentiality power pointConfidentiality power point
Confidentiality power pointDoug Miller
 
Confidentiality training in healthcare organizations
Confidentiality training in healthcare organizationsConfidentiality training in healthcare organizations
Confidentiality training in healthcare organizationskarmatu000
 
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxArti Parab Academics
 
Implementing The Affordable Care Act Essay
Implementing The Affordable Care Act EssayImplementing The Affordable Care Act Essay
Implementing The Affordable Care Act EssayMichelle Love
 
Health information security system
Health information security systemHealth information security system
Health information security systemDiana Fernandez
 
Information Governance in the Healthcare Industry
Information Governance in the Healthcare IndustryInformation Governance in the Healthcare Industry
Information Governance in the Healthcare IndustryAmber Guy
 
A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )Tasha Holloway
 
HIPAA Compliance in 2023
HIPAA Compliance in 2023HIPAA Compliance in 2023
HIPAA Compliance in 2023RCMMatter
 
The adoption of it security standards in a healthcare environment
The adoption of it security standards in a healthcare environmentThe adoption of it security standards in a healthcare environment
The adoption of it security standards in a healthcare environmentRui Gomes
 
Healthcare Interoperability: The Key to Leveraging Health Tech
Healthcare Interoperability: The Key to Leveraging Health TechHealthcare Interoperability: The Key to Leveraging Health Tech
Healthcare Interoperability: The Key to Leveraging Health TechMityung
 
Top 5 Challenges of Health Informatics Implementation | The Lifesciences Maga...
Top 5 Challenges of Health Informatics Implementation | The Lifesciences Maga...Top 5 Challenges of Health Informatics Implementation | The Lifesciences Maga...
Top 5 Challenges of Health Informatics Implementation | The Lifesciences Maga...The Lifesciences Magazine
 

Similar to Confidentially (20)

Confidentially in the workplace
Confidentially in the workplaceConfidentially in the workplace
Confidentially in the workplace
 
Ensuring Patient Confidentiality[1]
Ensuring Patient Confidentiality[1]Ensuring Patient Confidentiality[1]
Ensuring Patient Confidentiality[1]
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Running head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docx
Running head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docxRunning head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docx
Running head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docx
 
HIPAA
HIPAAHIPAA
HIPAA
 
Security Best Practices for Health Information Exchange
Security Best Practices for Health Information ExchangeSecurity Best Practices for Health Information Exchange
Security Best Practices for Health Information Exchange
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Hayden
 
Protection of Patient Information.docx
Protection of Patient Information.docxProtection of Patient Information.docx
Protection of Patient Information.docx
 
Confidentiality power point
Confidentiality power pointConfidentiality power point
Confidentiality power point
 
Confidentiality training in healthcare organizations
Confidentiality training in healthcare organizationsConfidentiality training in healthcare organizations
Confidentiality training in healthcare organizations
 
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptx
 
Implementing The Affordable Care Act Essay
Implementing The Affordable Care Act EssayImplementing The Affordable Care Act Essay
Implementing The Affordable Care Act Essay
 
Health information security system
Health information security systemHealth information security system
Health information security system
 
Information Governance in the Healthcare Industry
Information Governance in the Healthcare IndustryInformation Governance in the Healthcare Industry
Information Governance in the Healthcare Industry
 
A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )
 
HIPAA Compliance in 2023
HIPAA Compliance in 2023HIPAA Compliance in 2023
HIPAA Compliance in 2023
 
The adoption of it security standards in a healthcare environment
The adoption of it security standards in a healthcare environmentThe adoption of it security standards in a healthcare environment
The adoption of it security standards in a healthcare environment
 
Healthcare Interoperability: The Key to Leveraging Health Tech
Healthcare Interoperability: The Key to Leveraging Health TechHealthcare Interoperability: The Key to Leveraging Health Tech
Healthcare Interoperability: The Key to Leveraging Health Tech
 
Top 5 Challenges of Health Informatics Implementation | The Lifesciences Maga...
Top 5 Challenges of Health Informatics Implementation | The Lifesciences Maga...Top 5 Challenges of Health Informatics Implementation | The Lifesciences Maga...
Top 5 Challenges of Health Informatics Implementation | The Lifesciences Maga...
 

Recently uploaded

OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...NETWAYS
 
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
LANDMARKS  AND MONUMENTS IN NIGERIA.pptxLANDMARKS  AND MONUMENTS IN NIGERIA.pptx
LANDMARKS AND MONUMENTS IN NIGERIA.pptxBasil Achie
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfhenrik385807
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...NETWAYS
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Pooja Nehwal
 
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrSaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrsaastr
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesPooja Nehwal
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfhenrik385807
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@vikas rana
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...henrik385807
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝soniya singh
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxFamilyWorshipCenterD
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Salam Al-Karadaghi
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...NETWAYS
 
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Delhi Call girls
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )Pooja Nehwal
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024eCommerce Institute
 
Motivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfMotivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfakankshagupta7348026
 

Recently uploaded (20)

OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
 
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
LANDMARKS  AND MONUMENTS IN NIGERIA.pptxLANDMARKS  AND MONUMENTS IN NIGERIA.pptx
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
 
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrSaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
 
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
 
Motivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfMotivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdf
 

Confidentially

  • 2. Introduction For decades, the confidentiality of health information has been a controversial public policy issue because health information of today is generally stored on computer systems that can be readily accessed through internet websites. In today’s world of technology, there are computer hackers that gain access to personal information that can be used to gain access to any form of information possible. In order to attempt to safeguard electronic health records (EHRs) from being stolen, organizations should install a firewall into their system that would block access and warn organizations when an attempt has been made to access information (Kongstvedt, 2007, p. 5). The purpose of today’s training section is to explain what HIPAA stands for, its importance within the workplace and the involvement of the Joint Commission. I will further explain how to avoid confidentiality dilemmas and provide some suggestions as to how this training will be effective for employees.
  • 3. Health Insurance Portability & Accountability Act (HIPAA)  Privacy Rule of 1996  Restricts access to personal health information (PHI)  Covered entities  Importance in the workplace
  • 4. Joint Commission  Adopted HIPAA definition of health care information What this information contains
  • 5. Avoiding non-compliance  Education  Annual recertification
  • 6. Effective training  Establish policies and procedures  Holds everyone accountability  Educating staff
  • 7. References Confidentiality of worker health information. (2013). Workplace Health & Safety, 61(9), 376-378. doi:http://dx.doi.org/10.3928/21650799-20130827- 52. Kongstvedt, P. R. (2007). Essentials of Managed Health Care. 5th Edition. Jones & Bartlett Learning. 

Editor's Notes

  1. The Health Insurance Portability & Accountability Act (HIPAA) was passed in 1996 under the entitlement of Public Law 104-191 which holds health care providers accountable for maintaining patient health information confidentiality. The HIPAA Privacy Rule established to protect patient’s health information from being transmitted electronically except when care is provided or to file medical claims. This rule was issued by the U. S. Department of Health and Human Services as a requirement under the laws of the Health Insurance Portability and Accountability Act (HIPAA) which addresses the use and disclosure of individuals’ health information by covered entities (organizations) (U. S. Department Health and Human Services, 2014). It restricts access to health information only if the health care provider generating or maintaining the information is a covered entity under the rule. A covered entity is any organization that is directly affected by the laws of HIPAA such as health plans, providers, and any organization or business associate directly involved in the care of the patient. It is important that these such entities are compliant with the laws governed under HIPAA because it protects them from major lawsuits which holding them accountability for safeguarding patient’s personal information from being stolen.    
  2. The Joint Commission adopted the definition of health care information as defined by HIPAA and utilizing it under what is known as personal health information (PHI). This information provides detailed personal information such as demographics, medical history, insurance data and other vital information necessary to diagnosis and treatment medical concerns. Whereas, the National Information Technology uses identifiable information that is patient specific through the individual’s health records obtained at the time of service according to the PHI.
  3. Covered entities can avoid being non-compliant by educating their employees on the importance of safeguarding patient’s personal health information. This can be done during the orientation phase of employment and implementing an annual module for recertification to remain compliant with the educational aspects of HIPAA according to state laws.
  4. Organizations must establish policies and procedures related to EHRs and implement them organization wide (Confidentially of worker health information, 2013, p. 378). Patient information is illegally being shared among coworkers and in some cases overheard by visitors and this creates a legal issue for the organization. This type of problem can be eliminated by re-educating the staff on the importance of only sharing patient information with individuals that are directly involved in the patient’s care in a private or confidential location