SlideShare a Scribd company logo
Knock, Knock!
Who’s there?
HIPAA!!
HIPAA who?
I can’t tell you THAT!!

Jessica McGrail
Maria Radziminski
Nicole Ring
Juliet Nwokedi
Rodolfo Tadeo
Jacksonville University
June 5, 2014
Group Presentation
What are the Top Violations of The
Health Insurance Portability and
Accountability Act (HIPAA)?

Health Insurance Portability &
Accountability Act
WHAT IS HIPAA?

HIPAA is a federal law
HIPAA establishes uniform rules for protecting
health information & privacy
HIPAA rules were invented to
balance between the flow of information
while protecting the privacy of patients. (US
Department of Health and Human Services,
2014, May 27).
What is HIPAA?

What does HIPAA say?
The patient has the right to:
Request access to health information
Request to amend their health information
Request restriction to information sharing
Request accountability of disclosures (US
Department of Health and Human
Services, 2014, May 27).

HIPPA’s Protection
Who Does
HIPPA Protect?
How Does
HIPPA Protect?

Who and What Does
HIPPA Protect?
HIPPA Protects
Your Individual
Health Information
 HIPPA also Protects
Individual Identifiable
Health Information (IIHI)
 name or partial name
 Address or zip code
 Social Security number
 Birth date
 Phone number
 Diagnosis
 Employer
 Relatives
 Billing information
(US Department of Health
and Human Services, 2014,
May 27).

How Does HIPPA
Protect?
 Requires covered entities
to implement security
measures to protect
improper disclosure of
health information
 Set limits on user access to
individual health
information
 Training programs are
implemented for
employees on how to
protect your health
information
(US Department of Health
and Human Services, 2014,
May 27).

What Information Does
HIPAA Protect?
 Sharing any personal
health information with
anyone other than the
patient, persons
authorized by the
patient to receive IIHI,
or a person directly
involved in patient care
is a violation of HIPAA
(Hebda & Czar, 2013).
Personal Ipad

 Patient’s health information must be secure against
threats to inadvertent disclosure, integrity or
availability (Hebda & Czar, 2013).
Using patient information on personal
computer and taking it home

 Adding password protection and encrypted files
increases security protection (Hebda & Czar, 2013).
Losing backup disks or portable drives
with patient health information
FACEBOOK

Social Media
 The nurse exposed patient data by posting onto her
Facebook page
 How do we safeguard against this?
 Don’t post/tweet or blog about patients
 Don’t discuss medical conditions
 “If you wouldn’t say it in an elevator, don’t put it
online” (Ekrem, 2011).
 Don’t exchange personal data
Dashboard

Dashboard
 The nurse asked another nurse for access to their
dashboard…this should NEVER happen!
 How can we prevent this violation of HIPAA?
 Never share your sign-on information
 Never write passwords down
 Change passwords regularly and use a combination of
upper and lowercase letters, numbers and symbols
 If the program asks to ‘remember’ your password, do not
say yes
 If you think your password has been compromised,
report it immediately. (University of Wisconsin-Madison,
2003).

Wrong Fax Number
Prevention
 Confirm that fax numbers are correct before sending
information to prevent wrong delivery.
 Make use of cover sheet.
 Use sealed envelopes for delivery.
 The use of an encryption key makes it impossible to
read confidential information.
 This safeguards fax transmissions that might be sent
to a wrong number. (Hebda & Czar, 2013).
I
N
C
O
M
P
L
E
T
E
A
U
T
H
O
R
I
Z
A
T
I
O
N

Preventing Incomplete
Authorization
 Only the patient or personal representative has the right
to access patient’s health information!!
 Information privacy form must be completely filled out
during admission.
 Personal information cannot be given to any entity
without written authorization from patient.
 Patients can add and amend an incomplete personal
health information in a written request to the healthcare
provider to avoid ideal representative confusion. (US
Department of Health and Human Services, 2014, May
27).
THE
TEXT

 PHI may NEVER be shared with anyone who is not directly
involved in patient care. Therefore, texting a friend or loved
one any information that could be used to identify a patient is a
violation of the HIPAA code. (US Department of Health and
Human Services, 2014, May 27).
 “The Privacy Rule protects all individually identifiable health
information held or transmitted by a covered entity or its
business associate, in any form or media, whether electronic,
paper or oral. Individual identifiable health information is
information that relates to the individual’s past, present or
future physical or mental health or condition, the provision of
healthcare to that individual, and that identifies the
individual… ” (Hader & Brown, 2010).
Texting PHI

Texting PHI violates HIPAA in a couple of
ways.
First, text messages are not secure or
encrypted. “Texting patient information is
not legal unless the text messages are
transmitted through a secure and encrypted
network.” (Clinch, 2012).
Second, texting does not allow the receiver to
verify the sender’s identity. (Clinch, 2012).
Texting Personal Health Information is a
violation of HIPAA!!

 We avoid violating the Privacy Rule of the HIPAA code
by NEVER texting ANY patient information. Whether a
name, a room number, or a diagnosis, PHI must be
guarded carefully to ensure the safety and security of our
patients. (Hebda & Czar, 2013).
 As nurses, we must protect our patients by honoring their
privacy and not discussing them with anyone who is not
directly involved in their care, even if we feel the
information is benign or could not be traced back to the
patient. Especially in the case of text messages, we just
never know who could be intercepting PHI.
How do we avoid this
violation of HIPAA?

 What is an incidental disclosure of PHI?
 According to The University of Chicago’s HIPAA
Program Office (2006, paragraph 2), “While
reasonable precautions should be used to avoid
sharing patient information with those not involved
in the patient’s care, it is possible that minor
amounts of patient information may be disclosed to
people near where patient care is delivered or being
coordinated. This is referred to as an incidental
disclosure.”
Incidental Disclosures of PHI

 The HIPAA laws state that as long as reasonable efforts
are made to minimize incidental disclosure, sharing
patient information that may be overheard is okay. (US
Department of Health and Human Services, 2014, May
27). But what are reasonable measures?
 Refusing to discuss one patient in front of another patient
or his/her family members, for example, a roommate
 Using a quiet voice to discuss PHI over the phone, such as
with a discharged patient, another healthcare facility, or a
patient’s family member
 Avoiding conversations about patients in public areas,
such as the elevator, hallway, or cafeteria (The University
of Chicago, 2006).
Incidental Disclosure

 The nurse in the video is violating the HIPAA code
because she is not using reasonable measures to
avoid an incidental disclosure of PHI.
 To avoid violating the Privacy Rule, nurses can
encourage patients and family members to come in
to the hospital to discuss sensitive PHI.
 Nurses can also seek out a private area to discuss
PHI over the phone, and make an effort to use a
quiet voice so that others will not overhear. (The
University of Chicago, 2006).
How can we do our
part?

 Although it may seem obvious, the release of the
incorrect patient's information can occur through
careless mistakes.
 If your facility contains records for two patients with
the same name your staff must be trained to
correctly file all medical records, and release
documents only for the authorized patient.
 The use of red name tags in front of charts upon
admission helps notify staff members of patients
with the same name. (Department of Health and
Human Services, n.d.).
Release of the Wrong
Patient's Information
SHRED
IT

Paper PHI should never be thrown in the
regular trash can.
Placing PHI in trash bins or dumpsters is not
a secure method of disposing of PHI.
Failing to shred patient information before
disposal could lead to dangerous
consequences. (Hebda & Czar, 2013).
Improper Disposal of
Patient Records

 Before PHI can be thrown out it should be made
indecipherable by shredding or burning.
 Another alternative is to hire a reputable company to
destroy the records.
 Placing small bins at each work station clearly
labeled “PHI FOR PROPER DISPOSAL ONLY – DO
NOT TRASH” will prevent information from
accidentally ending up in the trash. (Department of
Health and Human Services, n.d.).
Proper Disposal of
Patient Records

 Most of us believe that our medical and other health
information is private and should be protected, and
we want to know who has this information.
 HIPAA gives you the right to protect your health
information and sets rules and limits on who can
look at and receive your health information.
 It regulates the use of all forms of individuals'
protected health information, whether electronic,
written, or oral.
Conclusion

 Clinch, T. (2012). Nursing Practice Question: Is Texting/ Receiving Patient Information a HIPAA Rules
Violation?. Nursing News, 36(2), 8.
 Department of Health and Human Services. (n.d.). Summary of the HIPAA Privacy Rule. Retrieved May
24, 2014, from http://www.hhs.gov/ocr/privacy/hipaa/understanding/summary/index.html
 ehow (2014, May 28). HIPPA individual identifiable information. Retrieved from
http://www.ehow.com/about_6297969_hipaa-individually-identifiable-information.html#ixzz331NjetR4
 Greene, A. H. (2012). HIPAA Compliance for Clinician Texting. Journal Of AHIMA, 83(4), 34-36.
 Hader, A., & Brown, E. (2010). LEGAL BRIEFS. Patient Privacy and Social Media. AANA Journal, 78(4),
270-274.
 Hebda, Toni, and Patricia Czar. Handbook of Informatics for Nurses & Healthcare
Professionals. Boston: Pearson, 2013. Print.
References

 Onesource (2014, May 27). The Top 10 Most Common HIPPA Violations. Retrieved from
http://www.onesourcedoc.com/blog/bid/95955/The-Top-10-Most-Common-HIPAA-Violations
 The University of Chicago. (2006, October). HIPAA - Incidental Disclosures of PHI.
Retrieved May 24, 2014, from http://hipaa.bsd.uchicago.edu/incidental_disc.html
 University of Wisconsin-Madison. (2003). HIPAA Security Practices Best Guidelines
#6. Retrieved from: https://hipaa.wisc.edu/docs/passwordManagement.pdf
 US Department of Health and Human Services (2014, April 4). Alaska settles HIPAA security
case for $1,700,000. Retrieved from
http://www.hhs.gov/news/press/2012pres/06/20120626a.html
 US Department of Health and Human Services (2014, May 27). Health Information Materials.
Retrieved from http://www.hhs.gov/ocr/privacy/hippa/understanding/consumer/index.html
References

More Related Content

What's hot

HIPPA Security Presentation
HIPPA Security PresentationHIPPA Security Presentation
HIPPA Security PresentationRebecca Norman
 
The Basics of HIPAA
The Basics of HIPAA The Basics of HIPAA
The Basics of HIPAA
DamianKnowles1
 
HIPAA in 2023: Changes, Updates, and Best Practices
HIPAA in 2023: Changes, Updates, and Best PracticesHIPAA in 2023: Changes, Updates, and Best Practices
HIPAA in 2023: Changes, Updates, and Best Practices
Conference Panel
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
maggie_Platt
 
HIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowHIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to know
Compliancy Group
 
HIPPA Compliance
HIPPA ComplianceHIPPA Compliance
HIPPA Compliancedixibee
 
Hippa 2021
Hippa 2021Hippa 2021
Hippa 2021
John Reardon
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)bholmes
 
HIPAA & PHI Training
HIPAA & PHI TrainingHIPAA & PHI Training
HIPAA & PHI Training
Hatch Compliance, Inc.
 
HIPAA and How it Applies to You
HIPAA and How it Applies to YouHIPAA and How it Applies to You
HIPAA and How it Applies to You
Winston & Strawn LLP
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentialityptamayo1958
 
HIPAA
HIPAAHIPAA
HIPAA
belziebub
 
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
Sanjeev Bharwan
 
What is the difference between EMR and EHR?
What is the difference between EMR and EHR?What is the difference between EMR and EHR?
What is the difference between EMR and EHR?
ViSolve, Inc.
 
A brief introduction to hipaa compliance
A brief introduction to hipaa complianceA brief introduction to hipaa compliance
A brief introduction to hipaa compliance
Prince George
 
Hippa
HippaHippa
Hippa
HippaHippa
HIPAA for Dummies
HIPAA for DummiesHIPAA for Dummies
HIPAA for Dummies
hipaacompliance
 

What's hot (20)

HIPPA Security Presentation
HIPPA Security PresentationHIPPA Security Presentation
HIPPA Security Presentation
 
The Basics of HIPAA
The Basics of HIPAA The Basics of HIPAA
The Basics of HIPAA
 
HIPAA in 2023: Changes, Updates, and Best Practices
HIPAA in 2023: Changes, Updates, and Best PracticesHIPAA in 2023: Changes, Updates, and Best Practices
HIPAA in 2023: Changes, Updates, and Best Practices
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
HIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowHIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to know
 
HIPPA Compliance
HIPPA ComplianceHIPPA Compliance
HIPPA Compliance
 
Hippa 2021
Hippa 2021Hippa 2021
Hippa 2021
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)
 
HIPAA & PHI Training
HIPAA & PHI TrainingHIPAA & PHI Training
HIPAA & PHI Training
 
HIPAA and How it Applies to You
HIPAA and How it Applies to YouHIPAA and How it Applies to You
HIPAA and How it Applies to You
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
HIPAA
HIPAAHIPAA
HIPAA
 
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
 
What is the difference between EMR and EHR?
What is the difference between EMR and EHR?What is the difference between EMR and EHR?
What is the difference between EMR and EHR?
 
A brief introduction to hipaa compliance
A brief introduction to hipaa complianceA brief introduction to hipaa compliance
A brief introduction to hipaa compliance
 
HIPAA
HIPAAHIPAA
HIPAA
 
Hippa
HippaHippa
Hippa
 
Hippa
HippaHippa
Hippa
 
HIPAA for Dummies
HIPAA for DummiesHIPAA for Dummies
HIPAA for Dummies
 

Similar to HIPAA AND INFORMATION TECHNOLOGY

Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)bholmes
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcarekmasterson
 
Protecting yourself and others
Protecting yourself and othersProtecting yourself and others
Protecting yourself and others
satart1944
 
Patient confidentiality MHA 690
Patient confidentiality MHA 690Patient confidentiality MHA 690
Patient confidentiality MHA 690
AMSIMM9932
 
Week 1 discussion 2 hipaa
Week 1 discussion 2 hipaaWeek 1 discussion 2 hipaa
Week 1 discussion 2 hipaa
MADOZI4671
 
Confidentiality-Arlicia- mha 690-discussion 2
Confidentiality-Arlicia- mha 690-discussion 2 Confidentiality-Arlicia- mha 690-discussion 2
Confidentiality-Arlicia- mha 690-discussion 2
Lisa Heavens Diamond Kendrick
 
Patient Confidentiality wk1_dq2_mha690
Patient Confidentiality wk1_dq2_mha690Patient Confidentiality wk1_dq2_mha690
Patient Confidentiality wk1_dq2_mha690
BrooklynRose1267
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Haydenhaydens
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informatics
kmcanty
 
Patient Privacy and Safety in Healthcare
Patient Privacy and Safety in HealthcarePatient Privacy and Safety in Healthcare
Patient Privacy and Safety in Healthcare
Queen Myers
 
Hipaa overview2011 student orientation
Hipaa overview2011 student orientationHipaa overview2011 student orientation
Hipaa overview2011 student orientationUniversity of Miami
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
karlhennesey
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
honey690131
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
DeniseMHA
 
Mha690 week 1 disc2 10 3-2019
Mha690 week 1 disc2 10 3-2019Mha690 week 1 disc2 10 3-2019
Mha690 week 1 disc2 10 3-2019
TTD001
 
Sample HIPAA Training
Sample HIPAA Training Sample HIPAA Training
Sample HIPAA Training
Tara Goodwin
 
Patient Confidentiality Training Presentation (1)
Patient Confidentiality Training Presentation (1)Patient Confidentiality Training Presentation (1)
Patient Confidentiality Training Presentation (1)
DonnaShockley
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcherEmed32
 

Similar to HIPAA AND INFORMATION TECHNOLOGY (20)

Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcare
 
Protecting yourself and others
Protecting yourself and othersProtecting yourself and others
Protecting yourself and others
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Patient confidentiality MHA 690
Patient confidentiality MHA 690Patient confidentiality MHA 690
Patient confidentiality MHA 690
 
Week 1 discussion 2 hipaa
Week 1 discussion 2 hipaaWeek 1 discussion 2 hipaa
Week 1 discussion 2 hipaa
 
Confidentiality-Arlicia- mha 690-discussion 2
Confidentiality-Arlicia- mha 690-discussion 2 Confidentiality-Arlicia- mha 690-discussion 2
Confidentiality-Arlicia- mha 690-discussion 2
 
Patient Confidentiality wk1_dq2_mha690
Patient Confidentiality wk1_dq2_mha690Patient Confidentiality wk1_dq2_mha690
Patient Confidentiality wk1_dq2_mha690
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Hayden
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informatics
 
Patient Privacy and Safety in Healthcare
Patient Privacy and Safety in HealthcarePatient Privacy and Safety in Healthcare
Patient Privacy and Safety in Healthcare
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Hipaa overview2011 student orientation
Hipaa overview2011 student orientationHipaa overview2011 student orientation
Hipaa overview2011 student orientation
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Mha690 week 1 disc2 10 3-2019
Mha690 week 1 disc2 10 3-2019Mha690 week 1 disc2 10 3-2019
Mha690 week 1 disc2 10 3-2019
 
Sample HIPAA Training
Sample HIPAA Training Sample HIPAA Training
Sample HIPAA Training
 
Patient Confidentiality Training Presentation (1)
Patient Confidentiality Training Presentation (1)Patient Confidentiality Training Presentation (1)
Patient Confidentiality Training Presentation (1)
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcher
 

Recently uploaded

Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 

Recently uploaded (20)

Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 

HIPAA AND INFORMATION TECHNOLOGY

  • 1. Knock, Knock! Who’s there? HIPAA!! HIPAA who? I can’t tell you THAT!!
  • 2.  Jessica McGrail Maria Radziminski Nicole Ring Juliet Nwokedi Rodolfo Tadeo Jacksonville University June 5, 2014 Group Presentation
  • 3. What are the Top Violations of The Health Insurance Portability and Accountability Act (HIPAA)?
  • 4.  Health Insurance Portability & Accountability Act WHAT IS HIPAA?
  • 5.  HIPAA is a federal law HIPAA establishes uniform rules for protecting health information & privacy HIPAA rules were invented to balance between the flow of information while protecting the privacy of patients. (US Department of Health and Human Services, 2014, May 27). What is HIPAA?
  • 6.  What does HIPAA say? The patient has the right to: Request access to health information Request to amend their health information Request restriction to information sharing Request accountability of disclosures (US Department of Health and Human Services, 2014, May 27).
  • 7.  HIPPA’s Protection Who Does HIPPA Protect? How Does HIPPA Protect?
  • 8.  Who and What Does HIPPA Protect? HIPPA Protects Your Individual Health Information  HIPPA also Protects Individual Identifiable Health Information (IIHI)  name or partial name  Address or zip code  Social Security number  Birth date  Phone number  Diagnosis  Employer  Relatives  Billing information (US Department of Health and Human Services, 2014, May 27).
  • 9.  How Does HIPPA Protect?  Requires covered entities to implement security measures to protect improper disclosure of health information  Set limits on user access to individual health information  Training programs are implemented for employees on how to protect your health information (US Department of Health and Human Services, 2014, May 27).
  • 10.  What Information Does HIPAA Protect?  Sharing any personal health information with anyone other than the patient, persons authorized by the patient to receive IIHI, or a person directly involved in patient care is a violation of HIPAA (Hebda & Czar, 2013).
  • 12.   Patient’s health information must be secure against threats to inadvertent disclosure, integrity or availability (Hebda & Czar, 2013). Using patient information on personal computer and taking it home
  • 13.
  • 14.   Adding password protection and encrypted files increases security protection (Hebda & Czar, 2013). Losing backup disks or portable drives with patient health information
  • 16.  Social Media  The nurse exposed patient data by posting onto her Facebook page  How do we safeguard against this?  Don’t post/tweet or blog about patients  Don’t discuss medical conditions  “If you wouldn’t say it in an elevator, don’t put it online” (Ekrem, 2011).  Don’t exchange personal data
  • 18.  Dashboard  The nurse asked another nurse for access to their dashboard…this should NEVER happen!  How can we prevent this violation of HIPAA?  Never share your sign-on information  Never write passwords down  Change passwords regularly and use a combination of upper and lowercase letters, numbers and symbols  If the program asks to ‘remember’ your password, do not say yes  If you think your password has been compromised, report it immediately. (University of Wisconsin-Madison, 2003).
  • 19.
  • 20.  Wrong Fax Number Prevention  Confirm that fax numbers are correct before sending information to prevent wrong delivery.  Make use of cover sheet.  Use sealed envelopes for delivery.  The use of an encryption key makes it impossible to read confidential information.  This safeguards fax transmissions that might be sent to a wrong number. (Hebda & Czar, 2013).
  • 22.  Preventing Incomplete Authorization  Only the patient or personal representative has the right to access patient’s health information!!  Information privacy form must be completely filled out during admission.  Personal information cannot be given to any entity without written authorization from patient.  Patients can add and amend an incomplete personal health information in a written request to the healthcare provider to avoid ideal representative confusion. (US Department of Health and Human Services, 2014, May 27).
  • 24.   PHI may NEVER be shared with anyone who is not directly involved in patient care. Therefore, texting a friend or loved one any information that could be used to identify a patient is a violation of the HIPAA code. (US Department of Health and Human Services, 2014, May 27).  “The Privacy Rule protects all individually identifiable health information held or transmitted by a covered entity or its business associate, in any form or media, whether electronic, paper or oral. Individual identifiable health information is information that relates to the individual’s past, present or future physical or mental health or condition, the provision of healthcare to that individual, and that identifies the individual… ” (Hader & Brown, 2010). Texting PHI
  • 25.  Texting PHI violates HIPAA in a couple of ways. First, text messages are not secure or encrypted. “Texting patient information is not legal unless the text messages are transmitted through a secure and encrypted network.” (Clinch, 2012). Second, texting does not allow the receiver to verify the sender’s identity. (Clinch, 2012). Texting Personal Health Information is a violation of HIPAA!!
  • 26.   We avoid violating the Privacy Rule of the HIPAA code by NEVER texting ANY patient information. Whether a name, a room number, or a diagnosis, PHI must be guarded carefully to ensure the safety and security of our patients. (Hebda & Czar, 2013).  As nurses, we must protect our patients by honoring their privacy and not discussing them with anyone who is not directly involved in their care, even if we feel the information is benign or could not be traced back to the patient. Especially in the case of text messages, we just never know who could be intercepting PHI. How do we avoid this violation of HIPAA?
  • 27.
  • 28.   What is an incidental disclosure of PHI?  According to The University of Chicago’s HIPAA Program Office (2006, paragraph 2), “While reasonable precautions should be used to avoid sharing patient information with those not involved in the patient’s care, it is possible that minor amounts of patient information may be disclosed to people near where patient care is delivered or being coordinated. This is referred to as an incidental disclosure.” Incidental Disclosures of PHI
  • 29.   The HIPAA laws state that as long as reasonable efforts are made to minimize incidental disclosure, sharing patient information that may be overheard is okay. (US Department of Health and Human Services, 2014, May 27). But what are reasonable measures?  Refusing to discuss one patient in front of another patient or his/her family members, for example, a roommate  Using a quiet voice to discuss PHI over the phone, such as with a discharged patient, another healthcare facility, or a patient’s family member  Avoiding conversations about patients in public areas, such as the elevator, hallway, or cafeteria (The University of Chicago, 2006). Incidental Disclosure
  • 30.   The nurse in the video is violating the HIPAA code because she is not using reasonable measures to avoid an incidental disclosure of PHI.  To avoid violating the Privacy Rule, nurses can encourage patients and family members to come in to the hospital to discuss sensitive PHI.  Nurses can also seek out a private area to discuss PHI over the phone, and make an effort to use a quiet voice so that others will not overhear. (The University of Chicago, 2006). How can we do our part?
  • 31.
  • 32.   Although it may seem obvious, the release of the incorrect patient's information can occur through careless mistakes.  If your facility contains records for two patients with the same name your staff must be trained to correctly file all medical records, and release documents only for the authorized patient.  The use of red name tags in front of charts upon admission helps notify staff members of patients with the same name. (Department of Health and Human Services, n.d.). Release of the Wrong Patient's Information
  • 34.  Paper PHI should never be thrown in the regular trash can. Placing PHI in trash bins or dumpsters is not a secure method of disposing of PHI. Failing to shred patient information before disposal could lead to dangerous consequences. (Hebda & Czar, 2013). Improper Disposal of Patient Records
  • 35.   Before PHI can be thrown out it should be made indecipherable by shredding or burning.  Another alternative is to hire a reputable company to destroy the records.  Placing small bins at each work station clearly labeled “PHI FOR PROPER DISPOSAL ONLY – DO NOT TRASH” will prevent information from accidentally ending up in the trash. (Department of Health and Human Services, n.d.). Proper Disposal of Patient Records
  • 36.   Most of us believe that our medical and other health information is private and should be protected, and we want to know who has this information.  HIPAA gives you the right to protect your health information and sets rules and limits on who can look at and receive your health information.  It regulates the use of all forms of individuals' protected health information, whether electronic, written, or oral. Conclusion
  • 37.   Clinch, T. (2012). Nursing Practice Question: Is Texting/ Receiving Patient Information a HIPAA Rules Violation?. Nursing News, 36(2), 8.  Department of Health and Human Services. (n.d.). Summary of the HIPAA Privacy Rule. Retrieved May 24, 2014, from http://www.hhs.gov/ocr/privacy/hipaa/understanding/summary/index.html  ehow (2014, May 28). HIPPA individual identifiable information. Retrieved from http://www.ehow.com/about_6297969_hipaa-individually-identifiable-information.html#ixzz331NjetR4  Greene, A. H. (2012). HIPAA Compliance for Clinician Texting. Journal Of AHIMA, 83(4), 34-36.  Hader, A., & Brown, E. (2010). LEGAL BRIEFS. Patient Privacy and Social Media. AANA Journal, 78(4), 270-274.  Hebda, Toni, and Patricia Czar. Handbook of Informatics for Nurses & Healthcare Professionals. Boston: Pearson, 2013. Print. References
  • 38.   Onesource (2014, May 27). The Top 10 Most Common HIPPA Violations. Retrieved from http://www.onesourcedoc.com/blog/bid/95955/The-Top-10-Most-Common-HIPAA-Violations  The University of Chicago. (2006, October). HIPAA - Incidental Disclosures of PHI. Retrieved May 24, 2014, from http://hipaa.bsd.uchicago.edu/incidental_disc.html  University of Wisconsin-Madison. (2003). HIPAA Security Practices Best Guidelines #6. Retrieved from: https://hipaa.wisc.edu/docs/passwordManagement.pdf  US Department of Health and Human Services (2014, April 4). Alaska settles HIPAA security case for $1,700,000. Retrieved from http://www.hhs.gov/news/press/2012pres/06/20120626a.html  US Department of Health and Human Services (2014, May 27). Health Information Materials. Retrieved from http://www.hhs.gov/ocr/privacy/hippa/understanding/consumer/index.html References