SlideShare a Scribd company logo
Mandatory HIPPA Training
and its Importance
Falane J. St. Jean
MHA 690
Week 1:Dicussion 2
February 2, 2012
Keep under lock and key!!!
Confidentiality of Patients
PHI
HIPPA and Its Importance
• HIPAA stands for Health Insurance Portability
and Accountability Act of 1996 and is
composed of three components:
• Insurance Portability
• Fraud Enforcement
• Administrative Simplification
HIPPA and Its Importance Cont.
• The Health Insurance Portability and Accountability Act
(HIPAA) of 1996 established guidelines and regulations for the
use and disclosure of information about patients’ records
(www.hippa.gov).
• HIPAA also requires that electronic health transactions be
standardized to improve the efficiency and effectiveness in
the United State’s health care system via strengthening the
use of electronic data (Kongstvedt, P. R.,2007).
• Department of Health and Human Services (HHS) Office for
Civil Rights (OCR) is responsible for enforcing the Privacy and
Security Rules enforcement of HIPAA (www.hippa.gov).
HIPPA and Its Importance Continued
• This session will focus on the Security Rule
section of HIPAA and the responsibilities of
units or entities to protect and safeguard the
confidentiality of PHI that is either created,
maintained, and transmitted in electronic
form.
HIPPA Presentation Goals
• Increase your knowledge and understanding of what is protected health
information (PHI) and how to maintain its security
• Enhance your awareness of your role in assisting in following the HIPAA
Security Rule
• Learn about privacy and the security of information created, maintained,
and transmitted in electronic format, and Inform the workforce about
their reporting responsibilities for HIPAA violations and the possible
penalties for violation of HIPAA law for both you and the this hospital
• Protect the confidentiality and security of PHI
Requirement of HIPPA in Healthcare
• The increasing use of the internet, involving
the storing and transferring of electronic
information, advances in genetic science, and
the concern about WHO would have access to
WHAT information, and HOW it would be used
created great concern and speculation
Requirement of HIPPA in Healthcare Cont.
• Protected Health Information (PHI) is individually identifiable health
information that is held or disclosed by a covered entity that can be
communicated electronically, verbally, or written
• Electronic Protected Health Information (EPHI) is protected health
information (PHI) that is transmitted by electronic media or maintained by
electronic media
• Sensitive Data is protected health information that can be used to
determine the identity of an individual and/or their diagnosis
Golden Security Rules
• Follow the fundamentals of secure password management
• Remember Security impacts privacy
• Adhere to Policies and Procedures regarding safeguarding buildings,
systems, and information
• Report any suspected violations of policies and procedures to your
Security Officer
• Incorporate daily work habits that protect the security and privacy of the
information you have access to
We all can support and implement to safeguard the
security and confidentiality of EPHI at our organization.
Key Practices in Handling PHI
• It is YOUR responsibility to safeguard PHI
• Assist with anticipating reasonable threats or
hazards and protect against use or disclosure
of EPHI that is not permitted or required
under the Privacy Rule
• We must ensure and monitor compliance with
the Security Rule by our faculty and staff.
Actions Taken to Safeguard PHI
• When PHI is in public’s view, cover the file, turn it over. (i.e. screen cover for the
computer screen, colored paper over files)
• When speaking of patients, try to prevent others from overhearing the
conversation
• Hold conversations about patients in private areas, and do not discuss patients
while you are in elevators or other public areas
• When medical records are not in use, store them in offices, shelves or filing
cabinets.
• Remove patient documents from faxes and copiers as soon as you can.
• When disposing documents containing PHI, follow the procedures for disposal of
such documents
• Use only the MINIMUM Information necessary
• Check the motive/reasoning behind usage of the information
Consequences Of Breaching Patient
Confidentiality
• This company has ZERO tolerance for the
breach of PHI not used by the authorized staff
and authorized reasons.
• It is an AUTOMATIC TERMINATION once
investigation confirms breach of usage of
patients’ PHI.
• So, please follow the guidelines in place as we
care for our patients.
References
• Kongstvedt, P. R. (2007) Essentials of managed
health care. Sudbury, MA: Jones and Bartlett
• www.hippa.gov

More Related Content

What's hot

TaylorWk1d2assignment
TaylorWk1d2assignmentTaylorWk1d2assignment
TaylorWk1d2assignment
mya1743
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcherEmed32
 
MHA690 confidentiality training
MHA690 confidentiality trainingMHA690 confidentiality training
MHA690 confidentiality trainingsdavis49
 
HIPAA Audit Implementation
HIPAA Audit ImplementationHIPAA Audit Implementation
HIPAA Audit Implementation
Valency Networks
 
Hipaa slideshare ppt
Hipaa slideshare pptHipaa slideshare ppt
Hipaa slideshare ppt
Kasey Durbin
 
UCLA compliance training
UCLA compliance trainingUCLA compliance training
UCLA compliance training
TCromwell01
 
Hipaa training by p. lynch
Hipaa training by p. lynchHipaa training by p. lynch
Hipaa training by p. lynchplynch2012
 
Week 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityWeek 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityLucy Lacy
 
Confidentiality 9.26.13
Confidentiality 9.26.13Confidentiality 9.26.13
Confidentiality 9.26.13pneville0629
 
Hipaa basics.pp2
Hipaa basics.pp2Hipaa basics.pp2
Hipaa basics.pp2martykoepke
 
Legal implications of HIPAA, HITECH and BAAs
Legal implications of HIPAA, HITECH and BAAsLegal implications of HIPAA, HITECH and BAAs
Legal implications of HIPAA, HITECH and BAAsOnline Tech
 
Understanding the HIPPA Act
Understanding the HIPPA ActUnderstanding the HIPPA Act
Understanding the HIPPA Act
Alice Bell, M.B.A.
 
Introduction hippaa
Introduction hippaaIntroduction hippaa
Introduction hippaaTina Peña
 
Week 1 discussion 2 confidentiality final
Week 1 discussion 2 confidentiality finalWeek 1 discussion 2 confidentiality final
Week 1 discussion 2 confidentiality finalLucy Lacy
 
PROTECTED HEALTH INFORMATION_PATIENT PRIVACY
PROTECTED HEALTH INFORMATION_PATIENT PRIVACYPROTECTED HEALTH INFORMATION_PATIENT PRIVACY
PROTECTED HEALTH INFORMATION_PATIENT PRIVACY
Denise Masella
 
Phi masella
Phi masellaPhi masella
Phi masella
Denise Masella
 

What's hot (19)

TaylorWk1d2assignment
TaylorWk1d2assignmentTaylorWk1d2assignment
TaylorWk1d2assignment
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcher
 
MHA690 confidentiality training
MHA690 confidentiality trainingMHA690 confidentiality training
MHA690 confidentiality training
 
HIPAA Audit Implementation
HIPAA Audit ImplementationHIPAA Audit Implementation
HIPAA Audit Implementation
 
Hipaa slideshare ppt
Hipaa slideshare pptHipaa slideshare ppt
Hipaa slideshare ppt
 
UCLA compliance training
UCLA compliance trainingUCLA compliance training
UCLA compliance training
 
Hippa
HippaHippa
Hippa
 
Hipaa training by p. lynch
Hipaa training by p. lynchHipaa training by p. lynch
Hipaa training by p. lynch
 
Week 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityWeek 1 discussion 2 confidentiality
Week 1 discussion 2 confidentiality
 
Presentation5
Presentation5Presentation5
Presentation5
 
Confidentiality 9.26.13
Confidentiality 9.26.13Confidentiality 9.26.13
Confidentiality 9.26.13
 
Hipaa basics.pp2
Hipaa basics.pp2Hipaa basics.pp2
Hipaa basics.pp2
 
Hippa privacy
Hippa privacyHippa privacy
Hippa privacy
 
Legal implications of HIPAA, HITECH and BAAs
Legal implications of HIPAA, HITECH and BAAsLegal implications of HIPAA, HITECH and BAAs
Legal implications of HIPAA, HITECH and BAAs
 
Understanding the HIPPA Act
Understanding the HIPPA ActUnderstanding the HIPPA Act
Understanding the HIPPA Act
 
Introduction hippaa
Introduction hippaaIntroduction hippaa
Introduction hippaa
 
Week 1 discussion 2 confidentiality final
Week 1 discussion 2 confidentiality finalWeek 1 discussion 2 confidentiality final
Week 1 discussion 2 confidentiality final
 
PROTECTED HEALTH INFORMATION_PATIENT PRIVACY
PROTECTED HEALTH INFORMATION_PATIENT PRIVACYPROTECTED HEALTH INFORMATION_PATIENT PRIVACY
PROTECTED HEALTH INFORMATION_PATIENT PRIVACY
 
Phi masella
Phi masellaPhi masella
Phi masella
 

Similar to Mha 690 week 1 discussion presentation

Hipaa overview 073118
Hipaa overview 073118Hipaa overview 073118
Hipaa overview 073118
robint2125
 
Are You HIPAA Safe?
Are You HIPAA Safe?Are You HIPAA Safe?
Are You HIPAA Safe?
TriageLogic
 
Week 1 discussion patient confidentiality
Week 1 discussion  patient confidentialityWeek 1 discussion  patient confidentiality
Week 1 discussion patient confidentiality
apalaciosy
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small Practices
Nisos Health
 
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best PracticesDispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
Conference Panel
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
amartya2087
 
Patient confidentiality training
Patient confidentiality  trainingPatient confidentiality  training
Patient confidentiality trainingtwhit0623
 
HIPAA and Privacy Training
HIPAA and Privacy TrainingHIPAA and Privacy Training
HIPAA and Privacy Training
JasAmataga
 
Health Information Technology_272_Presentation_CookDaryle.docx.
Health Information Technology_272_Presentation_CookDaryle.docx.Health Information Technology_272_Presentation_CookDaryle.docx.
Health Information Technology_272_Presentation_CookDaryle.docx.Daryle Cook
 
HIPAA
HIPAAHIPAA
Hipaa and social media using new
Hipaa and social media using newHipaa and social media using new
Hipaa and social media using new
OnlineAudio Training
 
Patient confidentiality.ppt
Patient confidentiality.pptPatient confidentiality.ppt
Patient confidentiality.pptchwiso8418
 
Patient confidentiality power point
Patient confidentiality power pointPatient confidentiality power point
Patient confidentiality power pointchwiso8418
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
chwiso8418
 
Patient confidentiality power point
Patient confidentiality power pointPatient confidentiality power point
Patient confidentiality power pointchwiso8418
 
Dustin HIPAA
Dustin HIPAADustin HIPAA
Dustin HIPAA
Dustin Kinzinger
 
Confidentiality in the healthcare system
Confidentiality in the healthcare systemConfidentiality in the healthcare system
Confidentiality in the healthcare systempfor2012
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Haydenhaydens
 

Similar to Mha 690 week 1 discussion presentation (20)

Hipaa overview 073118
Hipaa overview 073118Hipaa overview 073118
Hipaa overview 073118
 
Are You HIPAA Safe?
Are You HIPAA Safe?Are You HIPAA Safe?
Are You HIPAA Safe?
 
Week 1 discussion patient confidentiality
Week 1 discussion  patient confidentialityWeek 1 discussion  patient confidentiality
Week 1 discussion patient confidentiality
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small Practices
 
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best PracticesDispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
 
Patient confidentiality training
Patient confidentiality  trainingPatient confidentiality  training
Patient confidentiality training
 
HIPAA and Privacy Training
HIPAA and Privacy TrainingHIPAA and Privacy Training
HIPAA and Privacy Training
 
Health Information Technology_272_Presentation_CookDaryle.docx.
Health Information Technology_272_Presentation_CookDaryle.docx.Health Information Technology_272_Presentation_CookDaryle.docx.
Health Information Technology_272_Presentation_CookDaryle.docx.
 
HIPAA
HIPAAHIPAA
HIPAA
 
Hipaa and social media using new
Hipaa and social media using newHipaa and social media using new
Hipaa and social media using new
 
Patient confidentiality.ppt
Patient confidentiality.pptPatient confidentiality.ppt
Patient confidentiality.ppt
 
Patient confidentiality power point
Patient confidentiality power pointPatient confidentiality power point
Patient confidentiality power point
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
Patient confidentiality power point
Patient confidentiality power pointPatient confidentiality power point
Patient confidentiality power point
 
Dustin HIPAA
Dustin HIPAADustin HIPAA
Dustin HIPAA
 
Confidentiality in the healthcare system
Confidentiality in the healthcare systemConfidentiality in the healthcare system
Confidentiality in the healthcare system
 
Hipaa training
Hipaa trainingHipaa training
Hipaa training
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Hayden
 
Final copy 7
Final copy 7Final copy 7
Final copy 7
 

Recently uploaded

Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 

Recently uploaded (20)

Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 

Mha 690 week 1 discussion presentation

  • 1. Mandatory HIPPA Training and its Importance Falane J. St. Jean MHA 690 Week 1:Dicussion 2 February 2, 2012
  • 2. Keep under lock and key!!! Confidentiality of Patients PHI
  • 3. HIPPA and Its Importance • HIPAA stands for Health Insurance Portability and Accountability Act of 1996 and is composed of three components: • Insurance Portability • Fraud Enforcement • Administrative Simplification
  • 4. HIPPA and Its Importance Cont. • The Health Insurance Portability and Accountability Act (HIPAA) of 1996 established guidelines and regulations for the use and disclosure of information about patients’ records (www.hippa.gov). • HIPAA also requires that electronic health transactions be standardized to improve the efficiency and effectiveness in the United State’s health care system via strengthening the use of electronic data (Kongstvedt, P. R.,2007). • Department of Health and Human Services (HHS) Office for Civil Rights (OCR) is responsible for enforcing the Privacy and Security Rules enforcement of HIPAA (www.hippa.gov).
  • 5. HIPPA and Its Importance Continued • This session will focus on the Security Rule section of HIPAA and the responsibilities of units or entities to protect and safeguard the confidentiality of PHI that is either created, maintained, and transmitted in electronic form.
  • 6. HIPPA Presentation Goals • Increase your knowledge and understanding of what is protected health information (PHI) and how to maintain its security • Enhance your awareness of your role in assisting in following the HIPAA Security Rule • Learn about privacy and the security of information created, maintained, and transmitted in electronic format, and Inform the workforce about their reporting responsibilities for HIPAA violations and the possible penalties for violation of HIPAA law for both you and the this hospital • Protect the confidentiality and security of PHI
  • 7. Requirement of HIPPA in Healthcare • The increasing use of the internet, involving the storing and transferring of electronic information, advances in genetic science, and the concern about WHO would have access to WHAT information, and HOW it would be used created great concern and speculation
  • 8. Requirement of HIPPA in Healthcare Cont. • Protected Health Information (PHI) is individually identifiable health information that is held or disclosed by a covered entity that can be communicated electronically, verbally, or written • Electronic Protected Health Information (EPHI) is protected health information (PHI) that is transmitted by electronic media or maintained by electronic media • Sensitive Data is protected health information that can be used to determine the identity of an individual and/or their diagnosis
  • 9. Golden Security Rules • Follow the fundamentals of secure password management • Remember Security impacts privacy • Adhere to Policies and Procedures regarding safeguarding buildings, systems, and information • Report any suspected violations of policies and procedures to your Security Officer • Incorporate daily work habits that protect the security and privacy of the information you have access to We all can support and implement to safeguard the security and confidentiality of EPHI at our organization.
  • 10. Key Practices in Handling PHI • It is YOUR responsibility to safeguard PHI • Assist with anticipating reasonable threats or hazards and protect against use or disclosure of EPHI that is not permitted or required under the Privacy Rule • We must ensure and monitor compliance with the Security Rule by our faculty and staff.
  • 11. Actions Taken to Safeguard PHI • When PHI is in public’s view, cover the file, turn it over. (i.e. screen cover for the computer screen, colored paper over files) • When speaking of patients, try to prevent others from overhearing the conversation • Hold conversations about patients in private areas, and do not discuss patients while you are in elevators or other public areas • When medical records are not in use, store them in offices, shelves or filing cabinets. • Remove patient documents from faxes and copiers as soon as you can. • When disposing documents containing PHI, follow the procedures for disposal of such documents • Use only the MINIMUM Information necessary • Check the motive/reasoning behind usage of the information
  • 12. Consequences Of Breaching Patient Confidentiality • This company has ZERO tolerance for the breach of PHI not used by the authorized staff and authorized reasons. • It is an AUTOMATIC TERMINATION once investigation confirms breach of usage of patients’ PHI. • So, please follow the guidelines in place as we care for our patients.
  • 13. References • Kongstvedt, P. R. (2007) Essentials of managed health care. Sudbury, MA: Jones and Bartlett • www.hippa.gov