SlideShare a Scribd company logo
HIPPA
YOUR RESPONSIBITY IN THE
WORKPLACE
What Is The HIPPA Privacy
Rule?
   The privacy rule creates national standards to
    protect patient medical records and personal
    health information. The rule:
    gives patients control over their health
    information
   Sets limitations on the use and release of
    health records and information
   Establishes safeguards that providers must
    follow to protect patient privacy
Protected Health Information
   HIPPA protects any identifiable information
    related to the past, present, or future physical
    or metal health of a person
   In any form or medium (oral, written, or
    electronic)
   Examples of protected information include:
    zip codes, telephone numbers, fax numbers,
    e-mail addresses, pictures, dates of service,
    patient history, discharge summary, phone
    notes, inpatient or outpatient progress notes,
    census, and allergies.
Who Is Authorized To See
protected Health Information?
 Health  care providers who are directly
  involved in providing treatment, payment,
  or involved with health operations.
 Efforts must be made to limit protected
  health information to the minimum
  necessary to accomplish the intended
  purpose of the use, disclosure, or request.
HIPPA Rights Guaranteed To
Patients
 Patients can:
 See their records or get a copy
 Request amendments to their records if
  they feel the records are incorrect
 Request a list of who their records have
  been disclosed to
 Complain of privacy problems
Provider Rights
 Use patient information for treatment,
  payment, and health care operations
 Disclose information to family members or
  other patient representatives if the patient
  cannot speak for himself
Fines And Penalties
 Civil: $100 each violation up to $25,000
  per person per year
 Criminal: Knowing – up to $50,000, 1 year
  in prison
 Under false pretences - $100,000 , 5 years
  in prison
 With malice or personal gain - $250,000, 10
  years in prison
How To Safeguard Protected
Health Information
   Avoid discussion about patients in public areas
   Do not leave messages on an answering machine
    concerning a patient’s condition
   Secure storage and transportation of patient
    information
   Display precautions such as public view of
    computer screens
   Log off computers when away from work station
   Records are locked except to people who need
    access to information
   If you have any questions ask the company’s
    safety officer.

More Related Content

What's hot

HIPAA and Information Technology
HIPAA and Information TechnologyHIPAA and Information Technology
HIPAA and Information Technology
Rhess1967
 
Hipaa and information technology pp
Hipaa and information technology ppHipaa and information technology pp
Hipaa and information technology pp
Rhess1967
 
Week 1 discussion 2
Week 1 discussion 2Week 1 discussion 2
Week 1 discussion 2
Tosin Odedere
 
Hippa training for healthcare employees
Hippa training for healthcare employeesHippa training for healthcare employees
Hippa training for healthcare employees
aminahallen
 
HIPAA
HIPAAHIPAA
HIPAA
belziebub
 
Patient confidentiality mha690
Patient confidentiality mha690Patient confidentiality mha690
Patient confidentiality mha690
gquinlan29
 
Hippa 2021
Hippa 2021Hippa 2021
Hippa 2021
John Reardon
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentialityptamayo1958
 
HIPAA
HIPAAHIPAA
HIPAA
kgriffin62
 
Hippa training for healthcare employees
Hippa training for healthcare employeesHippa training for healthcare employees
Hippa training for healthcare employeesaminahallen
 
HIPAA
HIPAAHIPAA
HIPAA
belziebub
 
10 Legal Mistakes Healthcare Providers Must Avoid
10 Legal Mistakes Healthcare Providers Must Avoid10 Legal Mistakes Healthcare Providers Must Avoid
10 Legal Mistakes Healthcare Providers Must Avoid
mosmedicalreview
 
Hippa training on confidentiality
Hippa training on confidentialityHippa training on confidentiality
Hippa training on confidentialitycraig45365
 
香港六合彩
香港六合彩香港六合彩
香港六合彩
shujia
 
HIPAA Complaince
HIPAA ComplainceHIPAA Complaince
HIPAA Complaince
FarhatParveen10
 
Securing health information
Securing health informationSecuring health information
Securing health information
Darla Moore
 
THCS Workforce HIPAA Training
THCS Workforce HIPAA TrainingTHCS Workforce HIPAA Training
THCS Workforce HIPAA Training
kerbertx
 
Patients Privacy and Confidentiality
Patients Privacy and ConfidentialityPatients Privacy and Confidentiality
Patients Privacy and Confidentiality
Oluseyi Ilesanmi
 
Patient privacy & confidentiality training
Patient privacy & confidentiality trainingPatient privacy & confidentiality training
Patient privacy & confidentiality trainingKatie McCaslin
 

What's hot (20)

Mha 690
Mha 690Mha 690
Mha 690
 
HIPAA and Information Technology
HIPAA and Information TechnologyHIPAA and Information Technology
HIPAA and Information Technology
 
Hipaa and information technology pp
Hipaa and information technology ppHipaa and information technology pp
Hipaa and information technology pp
 
Week 1 discussion 2
Week 1 discussion 2Week 1 discussion 2
Week 1 discussion 2
 
Hippa training for healthcare employees
Hippa training for healthcare employeesHippa training for healthcare employees
Hippa training for healthcare employees
 
HIPAA
HIPAAHIPAA
HIPAA
 
Patient confidentiality mha690
Patient confidentiality mha690Patient confidentiality mha690
Patient confidentiality mha690
 
Hippa 2021
Hippa 2021Hippa 2021
Hippa 2021
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
HIPAA
HIPAAHIPAA
HIPAA
 
Hippa training for healthcare employees
Hippa training for healthcare employeesHippa training for healthcare employees
Hippa training for healthcare employees
 
HIPAA
HIPAAHIPAA
HIPAA
 
10 Legal Mistakes Healthcare Providers Must Avoid
10 Legal Mistakes Healthcare Providers Must Avoid10 Legal Mistakes Healthcare Providers Must Avoid
10 Legal Mistakes Healthcare Providers Must Avoid
 
Hippa training on confidentiality
Hippa training on confidentialityHippa training on confidentiality
Hippa training on confidentiality
 
香港六合彩
香港六合彩香港六合彩
香港六合彩
 
HIPAA Complaince
HIPAA ComplainceHIPAA Complaince
HIPAA Complaince
 
Securing health information
Securing health informationSecuring health information
Securing health information
 
THCS Workforce HIPAA Training
THCS Workforce HIPAA TrainingTHCS Workforce HIPAA Training
THCS Workforce HIPAA Training
 
Patients Privacy and Confidentiality
Patients Privacy and ConfidentialityPatients Privacy and Confidentiality
Patients Privacy and Confidentiality
 
Patient privacy & confidentiality training
Patient privacy & confidentiality trainingPatient privacy & confidentiality training
Patient privacy & confidentiality training
 

Similar to Hippa

Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentialityLily Isaacson
 
Patient Confidentiality Training Presentation (1)
Patient Confidentiality Training Presentation (1)Patient Confidentiality Training Presentation (1)
Patient Confidentiality Training Presentation (1)
DonnaShockley
 
HIPAA INSERVICE 2017
HIPAA INSERVICE 2017 HIPAA INSERVICE 2017
HIPAA INSERVICE 2017
Meg Oser
 
Hipaa inservice
Hipaa inserviceHipaa inservice
Hipaa inservice
Kelly Snyder
 
Hipaa basics pp2
Hipaa basics pp2Hipaa basics pp2
Hipaa basics pp2martykoepke
 
Tiffany hall mha 690 week 1 discussion 2
Tiffany hall mha 690 week 1   discussion 2Tiffany hall mha 690 week 1   discussion 2
Tiffany hall mha 690 week 1 discussion 2tiffhall
 
Tiffany hall mha 690 week 1 discussion 2
Tiffany hall mha 690 week 1   discussion 2Tiffany hall mha 690 week 1   discussion 2
Tiffany hall mha 690 week 1 discussion 2
tiffhall
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)bholmes
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
 
Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)bholmes
 
HIPAA and RHIOs
HIPAA and RHIOsHIPAA and RHIOs
HIPAA and RHIOsnobumoto
 
Week 1 discussion 2 - HIPAA Training
Week 1 discussion 2 - HIPAA TrainingWeek 1 discussion 2 - HIPAA Training
Week 1 discussion 2 - HIPAA TrainingKristen Tereo
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentation
MarcEtienne6
 
HIPAA
HIPAAHIPAA
Health care confidentiality and privacy
Health care confidentiality and privacyHealth care confidentiality and privacy
Health care confidentiality and privacysawanda
 
Healthcare Compliance and Privacy/Security Training by UCONN
Healthcare Compliance and Privacy/Security Training by UCONNHealthcare Compliance and Privacy/Security Training by UCONN
Healthcare Compliance and Privacy/Security Training by UCONN
Atlantic Training, LLC.
 
Training manual point
Training manual pointTraining manual point
Training manual pointchdafe1253
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion ii
beleza1669
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion iibeleza1669
 

Similar to Hippa (20)

Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
Patient Confidentiality Training Presentation (1)
Patient Confidentiality Training Presentation (1)Patient Confidentiality Training Presentation (1)
Patient Confidentiality Training Presentation (1)
 
HIPAA INSERVICE 2017
HIPAA INSERVICE 2017 HIPAA INSERVICE 2017
HIPAA INSERVICE 2017
 
Hipaa inservice
Hipaa inserviceHipaa inservice
Hipaa inservice
 
Hipaa basics pp2
Hipaa basics pp2Hipaa basics pp2
Hipaa basics pp2
 
Tiffany hall mha 690 week 1 discussion 2
Tiffany hall mha 690 week 1   discussion 2Tiffany hall mha 690 week 1   discussion 2
Tiffany hall mha 690 week 1 discussion 2
 
Tiffany hall mha 690 week 1 discussion 2
Tiffany hall mha 690 week 1   discussion 2Tiffany hall mha 690 week 1   discussion 2
Tiffany hall mha 690 week 1 discussion 2
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)
 
HIPAA Training by UCSD
HIPAA Training by UCSDHIPAA Training by UCSD
HIPAA Training by UCSD
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)
 
HIPAA and RHIOs
HIPAA and RHIOsHIPAA and RHIOs
HIPAA and RHIOs
 
Week 1 discussion 2 - HIPAA Training
Week 1 discussion 2 - HIPAA TrainingWeek 1 discussion 2 - HIPAA Training
Week 1 discussion 2 - HIPAA Training
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentation
 
HIPAA
HIPAAHIPAA
HIPAA
 
Health care confidentiality and privacy
Health care confidentiality and privacyHealth care confidentiality and privacy
Health care confidentiality and privacy
 
Healthcare Compliance and Privacy/Security Training by UCONN
Healthcare Compliance and Privacy/Security Training by UCONNHealthcare Compliance and Privacy/Security Training by UCONN
Healthcare Compliance and Privacy/Security Training by UCONN
 
Training manual point
Training manual pointTraining manual point
Training manual point
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion ii
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion ii
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 

Hippa

  • 2. What Is The HIPPA Privacy Rule?  The privacy rule creates national standards to protect patient medical records and personal health information. The rule:  gives patients control over their health information  Sets limitations on the use and release of health records and information  Establishes safeguards that providers must follow to protect patient privacy
  • 3. Protected Health Information  HIPPA protects any identifiable information related to the past, present, or future physical or metal health of a person  In any form or medium (oral, written, or electronic)  Examples of protected information include: zip codes, telephone numbers, fax numbers, e-mail addresses, pictures, dates of service, patient history, discharge summary, phone notes, inpatient or outpatient progress notes, census, and allergies.
  • 4. Who Is Authorized To See protected Health Information?  Health care providers who are directly involved in providing treatment, payment, or involved with health operations.  Efforts must be made to limit protected health information to the minimum necessary to accomplish the intended purpose of the use, disclosure, or request.
  • 5. HIPPA Rights Guaranteed To Patients  Patients can:  See their records or get a copy  Request amendments to their records if they feel the records are incorrect  Request a list of who their records have been disclosed to  Complain of privacy problems
  • 6. Provider Rights  Use patient information for treatment, payment, and health care operations  Disclose information to family members or other patient representatives if the patient cannot speak for himself
  • 7. Fines And Penalties  Civil: $100 each violation up to $25,000 per person per year  Criminal: Knowing – up to $50,000, 1 year in prison  Under false pretences - $100,000 , 5 years in prison  With malice or personal gain - $250,000, 10 years in prison
  • 8. How To Safeguard Protected Health Information  Avoid discussion about patients in public areas  Do not leave messages on an answering machine concerning a patient’s condition  Secure storage and transportation of patient information  Display precautions such as public view of computer screens  Log off computers when away from work station  Records are locked except to people who need access to information  If you have any questions ask the company’s safety officer.