SlideShare a Scribd company logo
CONFIDENTIALITY
Marcuse Dezir
MHA 690 Health Care Capstone
Instructor: Hwang-Ji Lu
09/26/2013
IMPORTANCE OF PRIVACY
Privacy within the healthcare is very important and probably the most difficult
thing to do as well. Lack of resources, lack of internal control over patient
information and lack of training leaves many healthcare organizations ill-
prepared to address privacy and security risks and medical fraud. Information
security and privacy in healthcare are very important matters that need to be
addressed and find solution that will benefit everyone involved. Privacy
protection should be every organization main concern because everyone
would like for their organizations or business to be secure and protected from
all things
MANAGER’S ROLE
As a manager I would I use Slideshare as Web 2.0 tool to train all staff members; All staff members should
have training at least every six months or annually on confidentially simply because the staff members are
dealing and have access to personal and sensitive information’s. The training should include the HIPPA
security regulations because staff members need to be up to date on the latest security systems and
regulations. Staff members should know that there can be serious complications for violating patient
privacy or breach of contract. A lot of companies give handbooks to all their employees that covered
company’s policy and regulation and if employees violated any of those policies under any
circumstances, then the employees should be aware of the consequences to pay for their actions. Above all
things it’s very important to make sure all employees/staff members read and sign the handbook
regulations and company policy before starting the new position. The company should also give all
employees a copy of the regulation signed for they files. Bottom line it’s important to respect people’s
privacy and it doesn’t matter whether it’s a well-known celebrity or a regular patient, the health care
facility is entitle to respect and protect the patient privacy because we wouldn’t want our information out
there for the world to know.
PRICE TO PAY
Knowing that all staff members and employees have read and sign the
disclose information about their role on the job. If violated for any reasons
certain action need to take place. Of course it will depend on the violation
committed by the staff member/employee then the manager will know what
action to take. The result of the violation can be suspension, termination or
anything the manager find appropriate. Bottom line we all know there’s
always consequences to pay for our actions and that too should also take
effect the work place.
HIPAA TRAINING
The online HIPAA training course helps teach HR managers and employees
HIPAA privacy and security laws. The HIPAA compliance training program
helps companies involved in the healthcare industry better protect the privacy
and security of personal information and patient data. HIPAA compliance is
essential in healthcare, where individuals share details of their health, personal
lives and finances when they are at their most vulnerable. The Health
Insurance Portability and Accountability Act ("HIPAA") addresses these issues
by imposing stringent privacy and security requirements on healthcare
providers and their business associates
PRIVACY PROTECTION
Protecting privacy is important not just to avoid harm, but because good
healthcare depends on accurate and reliable information believes that
privacy and security protections will build public trust, which is crucial if the
benefits of health IT are to be realized. A comprehensive privacy and security
framework must be implemented by all stakeholders engaged in e-health
efforts. Such a framework, as outlined for Health, would include:
• Implement core privacy principles;
• Adopt trusted network design characteristics;
• Establish oversight and accountability mechanisms.
• Establish oversight and accountability mechanisms.
IMPLEMENTATION
The framework should be implemented in part by strengthening the HIPAA
Privacy Regulation for records kept by the traditional health system
participants, but also needs to address the increased migration of personal
health information out of the traditional medical system. The Privacy and
Security Framework emphasizes the concept that trust in electronic health
information exchange can best be established in an open and transparent
environment. It also stresses that it is important for individuals to understand
what individually identifiable health information exists about them, how that
information is collected, used, and disclosed, and how reasonable choices
can be exercised with respect to that information.
ENFORCE TRAINING
Many times we are worry about the external aspect of security and forget about the internal, but all types
of security are important. Internal security is even more important because we have all kind of people
inside the facility, some can be trusted and others you just don’t know where they stand. Let’s not forget
that problems will occur, for example staff member may lose identification and not reported it to the
head of security or the charge nurse or doctor. Other times people let colleagues borrow their access card
to the facility. These are the issue that organizations, physicians need to really get control over. They
have been able to use other people’s identity for criminal purposes, but the bad part of it all sometimes
there is no easy way to know the real person. It is also important to keep in mind that they are hackers
out there. Hackers can use computer viruses to get into personal files such as emails and/or propagate
their nastiness by sending new emails that looks as if someone their know may have sent it, like friend
and family. While it is a good and secure idea as part of the training for every single staff
members/employees to have their own login names and password, it should also be enforce those
information need to really be secret because security is too important and they are lot at risk for either
the organization, the patients and/or the staff members as well.
CONCLUSION
Confidentiality is important to everyone whether in our surrounding or the
working place. Knowing that as human being there are certain information we
may or may not want people to know, therefore the same should be in the
work place. It doesn’t matter whether it’s a well known person or just an
everyday person, staff members/ employees have no right to go thru those
people files especially when it has nothing to do with they work. Confidentially
should never be broken under no circumstances and if someone violated
those simple rule, they should pay the price of their actions.
REFERENCES
HIPAA Privacy and Security Training http://www.wecomply.com/ethics-
training/122103-hipaa-privacy-and-security-compliance-training-courses-
classes
Comprehensive privacy and security: critical for health information technology
version 1.0 may 2008
https://www.cdt.org/healthprivacy/20080514HPframe.pdf
Protecting patient privacy and security in healthcare information system
http://www.hhs.gov/testify/2007/06/t20070619b.html

More Related Content

What's hot

Mha wk 1 dis 2
Mha wk 1 dis 2Mha wk 1 dis 2
Mha wk 1 dis 2
Ashford University
 
confidentiality in the workplace
confidentiality in the workplaceconfidentiality in the workplace
confidentiality in the workplace
Nova Zamora
 
Hippa slide show
Hippa slide showHippa slide show
Hippa slide show
heathercool
 
Confidentiality
Confidentiality Confidentiality
Confidentiality
pcsamuels10
 
Mandatory hippa and information security
Mandatory hippa and information securityMandatory hippa and information security
Mandatory hippa and information security
Higgi123
 
Patient confidentiality seminar
Patient confidentiality seminarPatient confidentiality seminar
Patient confidentiality seminar
Lakisha M. Moore
 
Hippa laws
Hippa lawsHippa laws
Hippa laws
Becky Bauer
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
ptamayo1958
 
Hipaa slideshow
Hipaa slideshowHipaa slideshow
Hipaa slideshow
heronimus92
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
DeniseMHA
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
JOANNARANTONIO
 
Hippa
HippaHippa
Confidentiality
ConfidentialityConfidentiality
Confidentiality
Beautie1
 
Mha 690 discussion 1 2
Mha 690 discussion 1 2Mha 690 discussion 1 2
Mha 690 discussion 1 2
radark-9
 
Confidentiality in the Workplace
Confidentiality in the WorkplaceConfidentiality in the Workplace
Confidentiality in the Workplace
salvarez63
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentiality
johnzinn
 
Health care confidentiality and privacy
Health care confidentiality and privacyHealth care confidentiality and privacy
Health care confidentiality and privacy
sawanda
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
drrn1
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcare
kmasterson
 

What's hot (19)

Mha wk 1 dis 2
Mha wk 1 dis 2Mha wk 1 dis 2
Mha wk 1 dis 2
 
confidentiality in the workplace
confidentiality in the workplaceconfidentiality in the workplace
confidentiality in the workplace
 
Hippa slide show
Hippa slide showHippa slide show
Hippa slide show
 
Confidentiality
Confidentiality Confidentiality
Confidentiality
 
Mandatory hippa and information security
Mandatory hippa and information securityMandatory hippa and information security
Mandatory hippa and information security
 
Patient confidentiality seminar
Patient confidentiality seminarPatient confidentiality seminar
Patient confidentiality seminar
 
Hippa laws
Hippa lawsHippa laws
Hippa laws
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
Hipaa slideshow
Hipaa slideshowHipaa slideshow
Hipaa slideshow
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Hippa
HippaHippa
Hippa
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Mha 690 discussion 1 2
Mha 690 discussion 1 2Mha 690 discussion 1 2
Mha 690 discussion 1 2
 
Confidentiality in the Workplace
Confidentiality in the WorkplaceConfidentiality in the Workplace
Confidentiality in the Workplace
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentiality
 
Health care confidentiality and privacy
Health care confidentiality and privacyHealth care confidentiality and privacy
Health care confidentiality and privacy
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcare
 

Viewers also liked

Mha 690 week 1 dq 2
Mha 690 week 1 dq 2Mha 690 week 1 dq 2
Mha 690 week 1 dq 2
Hollis Charles
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
Justina Gee
 
Tasia Confidentiality PPT
Tasia Confidentiality PPTTasia Confidentiality PPT
Tasia Confidentiality PPT
Tasia L. Hilton, Ph.D.
 
Confidentiality and Data Protection
Confidentiality and Data ProtectionConfidentiality and Data Protection
Confidentiality and Data Protection
Ed Horowicz
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentiality
MOTHOM0556
 
Mha 690 confidentiality - peric
Mha 690   confidentiality - pericMha 690   confidentiality - peric
Mha 690 confidentiality - peric
DMPeric72
 
Bringing lean to life
Bringing lean to lifeBringing lean to life
Bringing lean to life
NHS Improvement
 
Introduction to Lean and PDSA Thinking
Introduction to Lean and PDSA ThinkingIntroduction to Lean and PDSA Thinking
Introduction to Lean and PDSA Thinking
Rachel Janzen
 
Cutting costs, improving quality, & speeding delivery through continous impro...
Cutting costs, improving quality, & speeding delivery through continous impro...Cutting costs, improving quality, & speeding delivery through continous impro...
Cutting costs, improving quality, & speeding delivery through continous impro...
Eng Marzouk
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
Karna *
 
Research Presentation Format
Research Presentation FormatResearch Presentation Format
Research Presentation Format
Lifelong Learning
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentiality
swilson0050
 

Viewers also liked (12)

Mha 690 week 1 dq 2
Mha 690 week 1 dq 2Mha 690 week 1 dq 2
Mha 690 week 1 dq 2
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Tasia Confidentiality PPT
Tasia Confidentiality PPTTasia Confidentiality PPT
Tasia Confidentiality PPT
 
Confidentiality and Data Protection
Confidentiality and Data ProtectionConfidentiality and Data Protection
Confidentiality and Data Protection
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentiality
 
Mha 690 confidentiality - peric
Mha 690   confidentiality - pericMha 690   confidentiality - peric
Mha 690 confidentiality - peric
 
Bringing lean to life
Bringing lean to lifeBringing lean to life
Bringing lean to life
 
Introduction to Lean and PDSA Thinking
Introduction to Lean and PDSA ThinkingIntroduction to Lean and PDSA Thinking
Introduction to Lean and PDSA Thinking
 
Cutting costs, improving quality, & speeding delivery through continous impro...
Cutting costs, improving quality, & speeding delivery through continous impro...Cutting costs, improving quality, & speeding delivery through continous impro...
Cutting costs, improving quality, & speeding delivery through continous impro...
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
Research Presentation Format
Research Presentation FormatResearch Presentation Format
Research Presentation Format
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentiality
 

Similar to Health care capstone week 1 disk 1 confidentiality

Confidentiality
ConfidentialityConfidentiality
Confidentiality
robyn42
 
Everlyn moore health care capstone
Everlyn moore health care capstoneEverlyn moore health care capstone
Everlyn moore health care capstone
evelynmoore
 
HIPAA Compliance Email
HIPAA Compliance EmailHIPAA Compliance Email
HIPAA Compliance Email
L Andersen
 
Training
Training Training
Training
Gloria Stanley
 
Discussion2
Discussion2 Discussion2
Discussion2
amberlinn
 
Hippa powerpoint 92613
Hippa powerpoint 92613Hippa powerpoint 92613
Hippa powerpoint 92613
Ravinia Hayes-Cozier
 
Hippa powerpoint 92613
Hippa powerpoint 92613Hippa powerpoint 92613
Hippa powerpoint 92613
Ravinia Hayes-Cozier
 
Patient confedentiality ppt
Patient confedentiality pptPatient confedentiality ppt
Patient confedentiality ppt
Yuli Vargas
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
Chaunta Holmes
 
Data protection in HR
Data protection in HRData protection in HR
Data protection in HR
Strategic Business & IT Services
 
Week 1 discussion 2
Week 1 discussion 2Week 1 discussion 2
Week 1 discussion 2
girly12
 
Mha.690
Mha.690Mha.690
Jeanette Rankins Patient Privacy Training
Jeanette Rankins Patient Privacy TrainingJeanette Rankins Patient Privacy Training
Jeanette Rankins Patient Privacy Training
JeanetteRankins
 
How to Ensure HIPPA Compliance
How to Ensure HIPPA ComplianceHow to Ensure HIPPA Compliance
How to Ensure HIPPA Compliance
Hanna Global
 
The Basics of Protecting PHI - Best Practices When Working with Business Asso...
The Basics of Protecting PHI - Best Practices When Working with Business Asso...The Basics of Protecting PHI - Best Practices When Working with Business Asso...
The Basics of Protecting PHI - Best Practices When Working with Business Asso...
Endeavor Management
 
Week 1 dq1
Week 1 dq1Week 1 dq1
Week 1 dq1
SNikki
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Hayden
haydens
 
Week 1 confidentiality
Week 1 confidentialityWeek 1 confidentiality
Week 1 confidentiality
MarynandSean Eslinger
 
HIPAA Presentation
HIPAA PresentationHIPAA Presentation
HIPAA Presentation
LyubovKarnaukh
 
Mha690 week one discussion two
Mha690 week one discussion twoMha690 week one discussion two
Mha690 week one discussion two
jeanne2204
 

Similar to Health care capstone week 1 disk 1 confidentiality (20)

Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Everlyn moore health care capstone
Everlyn moore health care capstoneEverlyn moore health care capstone
Everlyn moore health care capstone
 
HIPAA Compliance Email
HIPAA Compliance EmailHIPAA Compliance Email
HIPAA Compliance Email
 
Training
Training Training
Training
 
Discussion2
Discussion2 Discussion2
Discussion2
 
Hippa powerpoint 92613
Hippa powerpoint 92613Hippa powerpoint 92613
Hippa powerpoint 92613
 
Hippa powerpoint 92613
Hippa powerpoint 92613Hippa powerpoint 92613
Hippa powerpoint 92613
 
Patient confedentiality ppt
Patient confedentiality pptPatient confedentiality ppt
Patient confedentiality ppt
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Data protection in HR
Data protection in HRData protection in HR
Data protection in HR
 
Week 1 discussion 2
Week 1 discussion 2Week 1 discussion 2
Week 1 discussion 2
 
Mha.690
Mha.690Mha.690
Mha.690
 
Jeanette Rankins Patient Privacy Training
Jeanette Rankins Patient Privacy TrainingJeanette Rankins Patient Privacy Training
Jeanette Rankins Patient Privacy Training
 
How to Ensure HIPPA Compliance
How to Ensure HIPPA ComplianceHow to Ensure HIPPA Compliance
How to Ensure HIPPA Compliance
 
The Basics of Protecting PHI - Best Practices When Working with Business Asso...
The Basics of Protecting PHI - Best Practices When Working with Business Asso...The Basics of Protecting PHI - Best Practices When Working with Business Asso...
The Basics of Protecting PHI - Best Practices When Working with Business Asso...
 
Week 1 dq1
Week 1 dq1Week 1 dq1
Week 1 dq1
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Hayden
 
Week 1 confidentiality
Week 1 confidentialityWeek 1 confidentiality
Week 1 confidentiality
 
HIPAA Presentation
HIPAA PresentationHIPAA Presentation
HIPAA Presentation
 
Mha690 week one discussion two
Mha690 week one discussion twoMha690 week one discussion two
Mha690 week one discussion two
 

Recently uploaded

Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 

Recently uploaded (20)

Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 

Health care capstone week 1 disk 1 confidentiality

  • 1. CONFIDENTIALITY Marcuse Dezir MHA 690 Health Care Capstone Instructor: Hwang-Ji Lu 09/26/2013
  • 2. IMPORTANCE OF PRIVACY Privacy within the healthcare is very important and probably the most difficult thing to do as well. Lack of resources, lack of internal control over patient information and lack of training leaves many healthcare organizations ill- prepared to address privacy and security risks and medical fraud. Information security and privacy in healthcare are very important matters that need to be addressed and find solution that will benefit everyone involved. Privacy protection should be every organization main concern because everyone would like for their organizations or business to be secure and protected from all things
  • 3. MANAGER’S ROLE As a manager I would I use Slideshare as Web 2.0 tool to train all staff members; All staff members should have training at least every six months or annually on confidentially simply because the staff members are dealing and have access to personal and sensitive information’s. The training should include the HIPPA security regulations because staff members need to be up to date on the latest security systems and regulations. Staff members should know that there can be serious complications for violating patient privacy or breach of contract. A lot of companies give handbooks to all their employees that covered company’s policy and regulation and if employees violated any of those policies under any circumstances, then the employees should be aware of the consequences to pay for their actions. Above all things it’s very important to make sure all employees/staff members read and sign the handbook regulations and company policy before starting the new position. The company should also give all employees a copy of the regulation signed for they files. Bottom line it’s important to respect people’s privacy and it doesn’t matter whether it’s a well-known celebrity or a regular patient, the health care facility is entitle to respect and protect the patient privacy because we wouldn’t want our information out there for the world to know.
  • 4. PRICE TO PAY Knowing that all staff members and employees have read and sign the disclose information about their role on the job. If violated for any reasons certain action need to take place. Of course it will depend on the violation committed by the staff member/employee then the manager will know what action to take. The result of the violation can be suspension, termination or anything the manager find appropriate. Bottom line we all know there’s always consequences to pay for our actions and that too should also take effect the work place.
  • 5. HIPAA TRAINING The online HIPAA training course helps teach HR managers and employees HIPAA privacy and security laws. The HIPAA compliance training program helps companies involved in the healthcare industry better protect the privacy and security of personal information and patient data. HIPAA compliance is essential in healthcare, where individuals share details of their health, personal lives and finances when they are at their most vulnerable. The Health Insurance Portability and Accountability Act ("HIPAA") addresses these issues by imposing stringent privacy and security requirements on healthcare providers and their business associates
  • 6. PRIVACY PROTECTION Protecting privacy is important not just to avoid harm, but because good healthcare depends on accurate and reliable information believes that privacy and security protections will build public trust, which is crucial if the benefits of health IT are to be realized. A comprehensive privacy and security framework must be implemented by all stakeholders engaged in e-health efforts. Such a framework, as outlined for Health, would include: • Implement core privacy principles; • Adopt trusted network design characteristics; • Establish oversight and accountability mechanisms. • Establish oversight and accountability mechanisms.
  • 7. IMPLEMENTATION The framework should be implemented in part by strengthening the HIPAA Privacy Regulation for records kept by the traditional health system participants, but also needs to address the increased migration of personal health information out of the traditional medical system. The Privacy and Security Framework emphasizes the concept that trust in electronic health information exchange can best be established in an open and transparent environment. It also stresses that it is important for individuals to understand what individually identifiable health information exists about them, how that information is collected, used, and disclosed, and how reasonable choices can be exercised with respect to that information.
  • 8. ENFORCE TRAINING Many times we are worry about the external aspect of security and forget about the internal, but all types of security are important. Internal security is even more important because we have all kind of people inside the facility, some can be trusted and others you just don’t know where they stand. Let’s not forget that problems will occur, for example staff member may lose identification and not reported it to the head of security or the charge nurse or doctor. Other times people let colleagues borrow their access card to the facility. These are the issue that organizations, physicians need to really get control over. They have been able to use other people’s identity for criminal purposes, but the bad part of it all sometimes there is no easy way to know the real person. It is also important to keep in mind that they are hackers out there. Hackers can use computer viruses to get into personal files such as emails and/or propagate their nastiness by sending new emails that looks as if someone their know may have sent it, like friend and family. While it is a good and secure idea as part of the training for every single staff members/employees to have their own login names and password, it should also be enforce those information need to really be secret because security is too important and they are lot at risk for either the organization, the patients and/or the staff members as well.
  • 9. CONCLUSION Confidentiality is important to everyone whether in our surrounding or the working place. Knowing that as human being there are certain information we may or may not want people to know, therefore the same should be in the work place. It doesn’t matter whether it’s a well known person or just an everyday person, staff members/ employees have no right to go thru those people files especially when it has nothing to do with they work. Confidentially should never be broken under no circumstances and if someone violated those simple rule, they should pay the price of their actions.
  • 10. REFERENCES HIPAA Privacy and Security Training http://www.wecomply.com/ethics- training/122103-hipaa-privacy-and-security-compliance-training-courses- classes Comprehensive privacy and security: critical for health information technology version 1.0 may 2008 https://www.cdt.org/healthprivacy/20080514HPframe.pdf Protecting patient privacy and security in healthcare information system http://www.hhs.gov/testify/2007/06/t20070619b.html