HIPPA LAWS
Introduction
HIPPA is the federal Health Insurance Portability
and Accountability Act of 1996. The main goal of
this law is to make it easier for people keep
health insurance, protect confidentiality and
security of healthcare information and help the
healthcare industry control administrative costs.
HIPAA regulates the use, transfer, and
disclosure of identifiable health
information. With these examples of
common HIPAA violations, you can
probably better understand HIPAA and the
types of behaviors it prohibits.
TYPES of HIPPA VIOLATIONS
There are many types of HIPPA violations.
• Violations of security
• Data breaches
• Employee Error
• Unauthorized release of patient’s Info
• Unauthorized access to patient Info
The need for HIPPA Training
There is many reasons to ensure that your
staff understands the need to keep the
private health information of there
patients private. In order for people to feel
comfortable to open up to their health care
provider they must believe that the
information they share with their
physicians will remain confidential.
Training Methods
Using educational material supplied by the
government.
Holding several trainings and in-services to train
and re-train staff.
Having information posted in areas that patients
and workers have access to.
Making sure employees understand material
provided to them.
• Checking programs for defects and potential
ways others could access private information.
• Having more than one program to back up the
security of private information.
• Only allow staff that needs to be in the file
access, and keeping private info hidden from
people who need to access file but do not
need private information.
Using methods to ensure HIPPA
• Having a program to monitor who is in a chart
and for how long.
• Using techniques such as punishments when
employees break HIPPA rules.
• Having extreme consequence for people who
actively break the rules, such as fines and
even jail time.
CONCLUSION
The Privacy Law requires that patient
information only be shared for treatment,
payment, and healthcare operations, or as
permitted by law, or as authorized by the
patient. Patient information that does not fall
into certain HIPAA defined categories must be
identified prior to sharing the data. Every
healthcare facility and organization must ensure
that patients rights are protected with training
staff properly and having severe consequences
when a breach has been attempted.
References:
HIPPA. (2015). TN Department of Health. Retrieved on July 23, 2015 from
http://tn.gov/health/
Examples of HIPPA Violations.(2015). Retrieved on July 23, 2015 from
http://examples.yourdictionary.com/examples-of-hipaa-violations.html
HIPPA Privacy & Security Laws. Retrieved on July 23, 2015 from
http://nursing.uncc.edu/sites/nursing.uncc.edu/files/media/HIPAAAceModul
e2010.pdf
Image References:
• Image 1
HIPPA REGULATIONS. Georgetown University. Retrieved on July
23, 2015 from https://ora.georgetown.edu/irb/HIPAA
• Image 2
Learning Can Support HIPPA Compliance Training. Retrieved
on July 23, 2015 from http://www.webanywhere.us/our-
blog/elearning-hipaa-compliance-training/

Hippa laws

  • 1.
  • 2.
    Introduction HIPPA is thefederal Health Insurance Portability and Accountability Act of 1996. The main goal of this law is to make it easier for people keep health insurance, protect confidentiality and security of healthcare information and help the healthcare industry control administrative costs.
  • 3.
    HIPAA regulates theuse, transfer, and disclosure of identifiable health information. With these examples of common HIPAA violations, you can probably better understand HIPAA and the types of behaviors it prohibits.
  • 4.
    TYPES of HIPPAVIOLATIONS There are many types of HIPPA violations. • Violations of security • Data breaches • Employee Error • Unauthorized release of patient’s Info • Unauthorized access to patient Info
  • 5.
    The need forHIPPA Training There is many reasons to ensure that your staff understands the need to keep the private health information of there patients private. In order for people to feel comfortable to open up to their health care provider they must believe that the information they share with their physicians will remain confidential.
  • 6.
    Training Methods Using educationalmaterial supplied by the government. Holding several trainings and in-services to train and re-train staff. Having information posted in areas that patients and workers have access to. Making sure employees understand material provided to them.
  • 7.
    • Checking programsfor defects and potential ways others could access private information. • Having more than one program to back up the security of private information. • Only allow staff that needs to be in the file access, and keeping private info hidden from people who need to access file but do not need private information.
  • 8.
    Using methods toensure HIPPA • Having a program to monitor who is in a chart and for how long. • Using techniques such as punishments when employees break HIPPA rules. • Having extreme consequence for people who actively break the rules, such as fines and even jail time.
  • 9.
    CONCLUSION The Privacy Lawrequires that patient information only be shared for treatment, payment, and healthcare operations, or as permitted by law, or as authorized by the patient. Patient information that does not fall into certain HIPAA defined categories must be identified prior to sharing the data. Every healthcare facility and organization must ensure that patients rights are protected with training staff properly and having severe consequences when a breach has been attempted.
  • 10.
    References: HIPPA. (2015). TNDepartment of Health. Retrieved on July 23, 2015 from http://tn.gov/health/ Examples of HIPPA Violations.(2015). Retrieved on July 23, 2015 from http://examples.yourdictionary.com/examples-of-hipaa-violations.html HIPPA Privacy & Security Laws. Retrieved on July 23, 2015 from http://nursing.uncc.edu/sites/nursing.uncc.edu/files/media/HIPAAAceModul e2010.pdf
  • 11.
    Image References: • Image1 HIPPA REGULATIONS. Georgetown University. Retrieved on July 23, 2015 from https://ora.georgetown.edu/irb/HIPAA • Image 2 Learning Can Support HIPPA Compliance Training. Retrieved on July 23, 2015 from http://www.webanywhere.us/our- blog/elearning-hipaa-compliance-training/