SlideShare a Scribd company logo
Confidentiality
Marlene Brooks
April 4, 2014
MHA690: Health Care Capstone
Week 1 Discussion 2
1
Reading the Report: Over 120 UCLA Hospital Staff Saw Celebrity Health
Records article, what training could you as a manager put into place to avoid
this situation?
Healthcare organizations are entrusted with the most private information of their
patients; they have a legal, moral, and ethical duty to protect all clinical and
research information by ensuring that security and privacy safeguards are in
place. They must implement a higher degree of control to prevent unauthorized
access sensitive information; this is especially true for electronic health record.
Health care professionals must be aware of high-risk groups and should also be
able to assess whether electronic systems include features and functionality that
may increase risk of inappropriate use and disclosure and offer additional layers
of protections for sensitive information.
2
What is Confidentiality?
• Confidentiality is the practice of permitting only certain authorized
individuals to access information with the understanding that they will
disclose it only to other authorized individuals as permitted by law. For
example, substance abuse information may not be released without specific
consent.
3
Training to Warrant a Higher Degree of Security in an Electronic
System
• Highly sensitive health data involve certain conditions, tests, and records of
vulnerable and high-profile patients and minors. Implementing security features
for such categories can present challenges because specific functionality may not
be fully evolved or present at all.
• Consistent and reliable methods for authenticating patient identity and linking
patients to their records warrant special security because they are essential to
delivering quality care and improving patient safety.
• There are variability and incompatibility of patient identification systems in
healthcare facilities, making it difficult to uniquely identify patients between
entities. A system of identifying patients between entities must exist for
interoperability to occur. 4
Training to Warrant a Higher Degree of Security in an Electronic System
continued
• Safeguarding patient information is critical to preventing identity
theft, medical identity theft, fraud, and abuse, and may be addressed through
improved physical and logical access control systems and constant vigilance.
Organizations requires strict policies and procedures governing the use of
physical media and portable devices to prevent theft and loss.
• Special circumstances may arise in which patient identification and access to
individual patient records may require anonymity and special
precautions, such as in the case of celebrities and high-profile individuals
privacy, domestic violence, child and vulnerable adult abuse, litigation, organ
donors, and prisoners. In such cases, the use of a record hold, a de-
identification mechanism, access restriction, or an alias should be created to
provide greater protection for a specific period of time.
5
Training to Warrant a Higher Degree of Security in an Electronic System
continued
• Health care must have products that offer security features that fits their need. It
must have the ability to limit access and provide screening controls to only those
staff working directly with the patient or those with administrative responsibilities
such as risk management and legal. Screening controls should include the ability
to redact sensitive information that should not be disclosed.
• User activity will be tied to a unique identification to reliably maintain an audit
trail of navigation, documentation, and other activities. Audit trails are essential in
tracking user activities such as document viewing, manual
printing, addendums, retracted and restored documents, and follow-up requests.
Document creation will be recorded, per user, with appropriate date and time
stamps for when the document was saved, posted, validated, and otherwise
amended. 6
How can this training on confidentiality be effective for the
employees?
• All staff members should have training at least once per year on
confidentiality especially when the staff has access to personal information.
This training should include HIPAA rules and regulations and the
consequences of not following them.
• Staff should know that there can be serious ramifications for violating a
patient’s privacy. All employees that have access to personal information
should be required to attend the annual training. During the meeting they
should be given an employee handbook that address confidentiality and the
employees should sign a copy for their personnel file.
7
References
• Associated Press (2008). Report: Over 120 UCLS Hospital Staff Saw
Celebrity Health Records. Retrieved from
http://www.foxnews.com/story/2008/08/06/report-over-120-ucla-hospital-
staff-saw-celebrity-health-records/
• McGowan, C. (2012). Legal Issues: Patients’ Confidentiality. Retrieved from
http://www.aacn.org/wd/Cetests/media/C1252.pdf
8

More Related Content

What's hot

2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training
Cynthia Holland
 
MHA690 wk 1 assignment
MHA690 wk 1 assignmentMHA690 wk 1 assignment
MHA690 wk 1 assignment
sharpjm20
 
Security, Confidentiality and Privacy in Health of Healthcare Data
Security, Confidentiality and Privacy in Health of Healthcare DataSecurity, Confidentiality and Privacy in Health of Healthcare Data
Security, Confidentiality and Privacy in Health of Healthcare Data
ijtsrd
 
Health care confidentiality and privacy
Health care confidentiality and privacyHealth care confidentiality and privacy
Health care confidentiality and privacy
sawanda
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
maggie_Platt
 
Privacy & confedentiality
Privacy & confedentialityPrivacy & confedentiality
Privacy & confedentiality
Hemang Patel
 
Mha690 week 1 discusssion 2
Mha690 week 1 discusssion 2 Mha690 week 1 discusssion 2
Mha690 week 1 discusssion 2
Aletha Ratcliff
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentiality
jaredbrady
 
Patient Confidentiality
Patient ConfidentialityPatient Confidentiality
Patient Confidentiality
marosemond
 
The importance of patient privacy
The importance of patient privacyThe importance of patient privacy
The importance of patient privacy
tbella
 
HIPPA-Health Insurance Portability and Accountability Act
HIPPA-Health Insurance Portability and Accountability ActHIPPA-Health Insurance Portability and Accountability Act
HIPPA-Health Insurance Portability and Accountability Act
Harshit Trivedi
 
MODULE 8 - PRIVACY AND CONFIDENTIALITY
MODULE 8 - PRIVACY AND CONFIDENTIALITYMODULE 8 - PRIVACY AND CONFIDENTIALITY
MODULE 8 - PRIVACY AND CONFIDENTIALITY
Dr Ghaiath Hussein
 
Patient privacy wsanders
Patient privacy wsandersPatient privacy wsanders
Patient privacy wsanders
michellewand
 
Hipaa
HipaaHipaa
Hipaa training
Hipaa trainingHipaa training
Hipaa training
schmoikel987
 

What's hot (15)

2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training
 
MHA690 wk 1 assignment
MHA690 wk 1 assignmentMHA690 wk 1 assignment
MHA690 wk 1 assignment
 
Security, Confidentiality and Privacy in Health of Healthcare Data
Security, Confidentiality and Privacy in Health of Healthcare DataSecurity, Confidentiality and Privacy in Health of Healthcare Data
Security, Confidentiality and Privacy in Health of Healthcare Data
 
Health care confidentiality and privacy
Health care confidentiality and privacyHealth care confidentiality and privacy
Health care confidentiality and privacy
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
Privacy & confedentiality
Privacy & confedentialityPrivacy & confedentiality
Privacy & confedentiality
 
Mha690 week 1 discusssion 2
Mha690 week 1 discusssion 2 Mha690 week 1 discusssion 2
Mha690 week 1 discusssion 2
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentiality
 
Patient Confidentiality
Patient ConfidentialityPatient Confidentiality
Patient Confidentiality
 
The importance of patient privacy
The importance of patient privacyThe importance of patient privacy
The importance of patient privacy
 
HIPPA-Health Insurance Portability and Accountability Act
HIPPA-Health Insurance Portability and Accountability ActHIPPA-Health Insurance Portability and Accountability Act
HIPPA-Health Insurance Portability and Accountability Act
 
MODULE 8 - PRIVACY AND CONFIDENTIALITY
MODULE 8 - PRIVACY AND CONFIDENTIALITYMODULE 8 - PRIVACY AND CONFIDENTIALITY
MODULE 8 - PRIVACY AND CONFIDENTIALITY
 
Patient privacy wsanders
Patient privacy wsandersPatient privacy wsanders
Patient privacy wsanders
 
Hipaa
HipaaHipaa
Hipaa
 
Hipaa training
Hipaa trainingHipaa training
Hipaa training
 

Viewers also liked

Top Needs of Food Manufacturers
Top Needs of Food ManufacturersTop Needs of Food Manufacturers
Top Needs of Food Manufacturers
Anthony Roach
 
M and w
M and wM and w
M and w
Mabel22Winy
 
Myspace - Camere per ragazzi
Myspace - Camere per ragazziMyspace - Camere per ragazzi
Myspace - Camere per ragazzinatamigoni
 
Amira Youssef_Integrated
Amira Youssef_IntegratedAmira Youssef_Integrated
Amira Youssef_Integrated
Amira Youssef
 
Presentación1
Presentación1Presentación1
Presentación1
kaholix
 
.Mona and fifi powerpoint finally
.Mona and fifi powerpoint finally.Mona and fifi powerpoint finally
.Mona and fifi powerpoint finally
mona23fifi
 
მოსწავლისთვის მიცემული ნიმუში
მოსწავლისთვის მიცემული ნიმუშიმოსწავლისთვის მიცემული ნიმუში
მოსწავლისთვის მიცემული ნიმუშიDaria Gabashvili
 
Personlig integritet på nätet
Personlig integritet på nätetPersonlig integritet på nätet
Personlig integritet på nätetSandraingridpe
 
Unit plan template_overview
Unit plan template_overviewUnit plan template_overview
Unit plan template_overviewDaria Gabashvili
 
მოსწავლისთვის მიცემული ნიმუში
მოსწავლისთვის მიცემული ნიმუშიმოსწავლისთვის მიცემული ნიმუში
მოსწავლისთვის მიცემული ნიმუშიDaria Gabashvili
 
შეფასების პრეზენტაცია
შეფასების პრეზენტაციაშეფასების პრეზენტაცია
შეფასების პრეზენტაციაDaria Gabashvili
 
Unit plan template_overview
Unit plan template_overviewUnit plan template_overview
Unit plan template_overviewDaria Gabashvili
 
Talevi Presentazione
Talevi PresentazioneTalevi Presentazione
Talevi Presentazionenatamigoni
 
Personlig integritet och nätet
Personlig integritet och nätetPersonlig integritet och nätet
Personlig integritet och nätet
Sandraingridpe
 
მოსწავლისთვის მიცემული ნიმუში
მოსწავლისთვის მიცემული ნიმუშიმოსწავლისთვის მიცემული ნიმუში
მოსწავლისთვის მიცემული ნიმუშიDaria Gabashvili
 
მოსწავლისთვის მიცემული ნიმუში
მოსწავლისთვის მიცემული ნიმუშიმოსწავლისთვის მიცემული ნიმუში
მოსწავლისთვის მიცემული ნიმუშიDaria Gabashvili
 
JavaSocks
JavaSocksJavaSocks
JavaSocks
Caitlin Steinert
 

Viewers also liked (17)

Top Needs of Food Manufacturers
Top Needs of Food ManufacturersTop Needs of Food Manufacturers
Top Needs of Food Manufacturers
 
M and w
M and wM and w
M and w
 
Myspace - Camere per ragazzi
Myspace - Camere per ragazziMyspace - Camere per ragazzi
Myspace - Camere per ragazzi
 
Amira Youssef_Integrated
Amira Youssef_IntegratedAmira Youssef_Integrated
Amira Youssef_Integrated
 
Presentación1
Presentación1Presentación1
Presentación1
 
.Mona and fifi powerpoint finally
.Mona and fifi powerpoint finally.Mona and fifi powerpoint finally
.Mona and fifi powerpoint finally
 
მოსწავლისთვის მიცემული ნიმუში
მოსწავლისთვის მიცემული ნიმუშიმოსწავლისთვის მიცემული ნიმუში
მოსწავლისთვის მიცემული ნიმუში
 
Personlig integritet på nätet
Personlig integritet på nätetPersonlig integritet på nätet
Personlig integritet på nätet
 
Unit plan template_overview
Unit plan template_overviewUnit plan template_overview
Unit plan template_overview
 
მოსწავლისთვის მიცემული ნიმუში
მოსწავლისთვის მიცემული ნიმუშიმოსწავლისთვის მიცემული ნიმუში
მოსწავლისთვის მიცემული ნიმუში
 
შეფასების პრეზენტაცია
შეფასების პრეზენტაციაშეფასების პრეზენტაცია
შეფასების პრეზენტაცია
 
Unit plan template_overview
Unit plan template_overviewUnit plan template_overview
Unit plan template_overview
 
Talevi Presentazione
Talevi PresentazioneTalevi Presentazione
Talevi Presentazione
 
Personlig integritet och nätet
Personlig integritet och nätetPersonlig integritet och nätet
Personlig integritet och nätet
 
მოსწავლისთვის მიცემული ნიმუში
მოსწავლისთვის მიცემული ნიმუშიმოსწავლისთვის მიცემული ნიმუში
მოსწავლისთვის მიცემული ნიმუში
 
მოსწავლისთვის მიცემული ნიმუში
მოსწავლისთვის მიცემული ნიმუშიმოსწავლისთვის მიცემული ნიმუში
მოსწავლისთვის მიცემული ნიმუში
 
JavaSocks
JavaSocksJavaSocks
JavaSocks
 

Similar to Marlene brooks week 1 discussion 2 - confidentiality

New microsoft power point presentation
New microsoft power point presentationNew microsoft power point presentation
New microsoft power point presentation
Rudeboy2006
 
Mha690wk1d2 nor
Mha690wk1d2 norMha690wk1d2 nor
Mha690wk1d2 nor
RiriMc
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
DonnaDudley
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
amartya2087
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
LeRoy Ulibarri
 
Jeanette Rankins Patient Privacy Training
Jeanette Rankins Patient Privacy TrainingJeanette Rankins Patient Privacy Training
Jeanette Rankins Patient Privacy Training
JeanetteRankins
 
HIPAA – Where’s the Harm? Final Rule Update
HIPAA – Where’s the Harm? Final Rule Update HIPAA – Where’s the Harm? Final Rule Update
HIPAA – Where’s the Harm? Final Rule Update
Resilient Systems
 
HIPAA
HIPAAHIPAA
Confidentiality
ConfidentialityConfidentiality
Confidentiality
amfields
 
Ruggiero.hipaa training
Ruggiero.hipaa trainingRuggiero.hipaa training
Ruggiero.hipaa training
Gina Ruggiero
 
Week 1 discussion patient confidentiality
Week 1 discussion  patient confidentialityWeek 1 discussion  patient confidentiality
Week 1 discussion patient confidentiality
apalaciosy
 
PURPOSES OF DOCUMENTATION.pptx
PURPOSES OF DOCUMENTATION.pptxPURPOSES OF DOCUMENTATION.pptx
PURPOSES OF DOCUMENTATION.pptx
Anju Kumawat
 
Confidentiality powerpoint
Confidentiality powerpointConfidentiality powerpoint
Confidentiality powerpoint
Ashford University
 
Virtual Mentor American Medical Association Journal of Ethi.docx
Virtual Mentor  American Medical Association Journal of Ethi.docxVirtual Mentor  American Medical Association Journal of Ethi.docx
Virtual Mentor American Medical Association Journal of Ethi.docx
sheronlewthwaite
 
Confidentiality in health care
Confidentiality in health careConfidentiality in health care
Confidentiality in health care
Amy04Lynn
 
Week1discussioncapstone
Week1discussioncapstoneWeek1discussioncapstone
Week1discussioncapstone
bradbury234
 
Hipaa and social media using new
Hipaa and social media using newHipaa and social media using new
Hipaa and social media using new
OnlineAudio Training
 
8- Documentation in ICU.pptx
8- Documentation in ICU.pptx8- Documentation in ICU.pptx
8- Documentation in ICU.pptx
MesfinShifara
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
TravisDC4
 

Similar to Marlene brooks week 1 discussion 2 - confidentiality (20)

New microsoft power point presentation
New microsoft power point presentationNew microsoft power point presentation
New microsoft power point presentation
 
Mha690wk1d2 nor
Mha690wk1d2 norMha690wk1d2 nor
Mha690wk1d2 nor
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Jeanette Rankins Patient Privacy Training
Jeanette Rankins Patient Privacy TrainingJeanette Rankins Patient Privacy Training
Jeanette Rankins Patient Privacy Training
 
HIPAA – Where’s the Harm? Final Rule Update
HIPAA – Where’s the Harm? Final Rule Update HIPAA – Where’s the Harm? Final Rule Update
HIPAA – Where’s the Harm? Final Rule Update
 
HIPAA
HIPAAHIPAA
HIPAA
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Ruggiero.hipaa training
Ruggiero.hipaa trainingRuggiero.hipaa training
Ruggiero.hipaa training
 
Week 1 discussion patient confidentiality
Week 1 discussion  patient confidentialityWeek 1 discussion  patient confidentiality
Week 1 discussion patient confidentiality
 
PURPOSES OF DOCUMENTATION.pptx
PURPOSES OF DOCUMENTATION.pptxPURPOSES OF DOCUMENTATION.pptx
PURPOSES OF DOCUMENTATION.pptx
 
Confidentiality powerpoint
Confidentiality powerpointConfidentiality powerpoint
Confidentiality powerpoint
 
Virtual Mentor American Medical Association Journal of Ethi.docx
Virtual Mentor  American Medical Association Journal of Ethi.docxVirtual Mentor  American Medical Association Journal of Ethi.docx
Virtual Mentor American Medical Association Journal of Ethi.docx
 
Confidentiality in health care
Confidentiality in health careConfidentiality in health care
Confidentiality in health care
 
Week1discussioncapstone
Week1discussioncapstoneWeek1discussioncapstone
Week1discussioncapstone
 
Hipaa and social media using new
Hipaa and social media using newHipaa and social media using new
Hipaa and social media using new
 
8- Documentation in ICU.pptx
8- Documentation in ICU.pptx8- Documentation in ICU.pptx
8- Documentation in ICU.pptx
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 

Recently uploaded

Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 

Recently uploaded (20)

Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 

Marlene brooks week 1 discussion 2 - confidentiality

  • 1. Confidentiality Marlene Brooks April 4, 2014 MHA690: Health Care Capstone Week 1 Discussion 2 1
  • 2. Reading the Report: Over 120 UCLA Hospital Staff Saw Celebrity Health Records article, what training could you as a manager put into place to avoid this situation? Healthcare organizations are entrusted with the most private information of their patients; they have a legal, moral, and ethical duty to protect all clinical and research information by ensuring that security and privacy safeguards are in place. They must implement a higher degree of control to prevent unauthorized access sensitive information; this is especially true for electronic health record. Health care professionals must be aware of high-risk groups and should also be able to assess whether electronic systems include features and functionality that may increase risk of inappropriate use and disclosure and offer additional layers of protections for sensitive information. 2
  • 3. What is Confidentiality? • Confidentiality is the practice of permitting only certain authorized individuals to access information with the understanding that they will disclose it only to other authorized individuals as permitted by law. For example, substance abuse information may not be released without specific consent. 3
  • 4. Training to Warrant a Higher Degree of Security in an Electronic System • Highly sensitive health data involve certain conditions, tests, and records of vulnerable and high-profile patients and minors. Implementing security features for such categories can present challenges because specific functionality may not be fully evolved or present at all. • Consistent and reliable methods for authenticating patient identity and linking patients to their records warrant special security because they are essential to delivering quality care and improving patient safety. • There are variability and incompatibility of patient identification systems in healthcare facilities, making it difficult to uniquely identify patients between entities. A system of identifying patients between entities must exist for interoperability to occur. 4
  • 5. Training to Warrant a Higher Degree of Security in an Electronic System continued • Safeguarding patient information is critical to preventing identity theft, medical identity theft, fraud, and abuse, and may be addressed through improved physical and logical access control systems and constant vigilance. Organizations requires strict policies and procedures governing the use of physical media and portable devices to prevent theft and loss. • Special circumstances may arise in which patient identification and access to individual patient records may require anonymity and special precautions, such as in the case of celebrities and high-profile individuals privacy, domestic violence, child and vulnerable adult abuse, litigation, organ donors, and prisoners. In such cases, the use of a record hold, a de- identification mechanism, access restriction, or an alias should be created to provide greater protection for a specific period of time. 5
  • 6. Training to Warrant a Higher Degree of Security in an Electronic System continued • Health care must have products that offer security features that fits their need. It must have the ability to limit access and provide screening controls to only those staff working directly with the patient or those with administrative responsibilities such as risk management and legal. Screening controls should include the ability to redact sensitive information that should not be disclosed. • User activity will be tied to a unique identification to reliably maintain an audit trail of navigation, documentation, and other activities. Audit trails are essential in tracking user activities such as document viewing, manual printing, addendums, retracted and restored documents, and follow-up requests. Document creation will be recorded, per user, with appropriate date and time stamps for when the document was saved, posted, validated, and otherwise amended. 6
  • 7. How can this training on confidentiality be effective for the employees? • All staff members should have training at least once per year on confidentiality especially when the staff has access to personal information. This training should include HIPAA rules and regulations and the consequences of not following them. • Staff should know that there can be serious ramifications for violating a patient’s privacy. All employees that have access to personal information should be required to attend the annual training. During the meeting they should be given an employee handbook that address confidentiality and the employees should sign a copy for their personnel file. 7
  • 8. References • Associated Press (2008). Report: Over 120 UCLS Hospital Staff Saw Celebrity Health Records. Retrieved from http://www.foxnews.com/story/2008/08/06/report-over-120-ucla-hospital- staff-saw-celebrity-health-records/ • McGowan, C. (2012). Legal Issues: Patients’ Confidentiality. Retrieved from http://www.aacn.org/wd/Cetests/media/C1252.pdf 8