SlideShare a Scribd company logo
Confidentiality
MHA690: Health Care Capstone
Ryan L. Ulibarri
9-26-2013
Report: Over 120 UCLA hospital staff saw celebrity health records (2008)
Introduction
Patient Confidentiality
Importance of Patient
Confidentiality
HIPAA
 Maintaining
Confidentiality
Display Actions
Conclusion
 In recent years, other
laws, especially the
Health Insurance
Portability and
Accountability Act
(HIPAA), have had
serious impact on the
administration of these
plans by, among other
things, implementing
privacy and related
requirements with
respect to personal
health information of
plan participants.
(Wolper 2011, p. 268)
Patient Confidentiality
 AMA's Code of Medical Ethics states that the information disclosed to a physician during the
course of the patient-physician relationship is confidential to the utmost degree.
 The legal basis for imposing liability for a breach of confidentiality is more extensive than
ethical guidelines, which dictate the morally right thing to do.
 This agreement allows the patient to feel free and easy no confidential medical information
will be disclosed or looked at without the patients express consent unless required to
disclose the information by law.
 A breach of confidentiality is a disclosure to a third party, without patient consent or court
order, of private information that the physician has learned within the patient-physician
relationship.
 Physicians should set up office procedures to prevent the release of medical records without
a copy of the patient's release.
 Do not release patients medical records to any 3rd parties in any case unless the patient has
the proper documents allowing to do that, this will can otherwise lead to breach of
confidentiality.
 Any breach in confidentiality—even one that seems minor—can result in mistrust and,
possibly, a lawsuit and/or disciplinary action.
Patient Confidentiality. (“n.d.”). Retrieved September 25, 2013, from http://www.ama-assn.org/ama/pub/physician-
resources/legal-topics/patient-physician-relationship-topics/patient-confidentiality.page
Importance of Confidentiality
Physicians have always had a duty to keep their
patients' medical records Confidential.
Physicians, Nurses, and office personal should
inform patients of the limits of confidentiality
protections and allow the patients to decide
whether treatment outweighs the risk of the
disclosure of sensitive information.
Protecting patients personal information needs to
be a mission to hospitals and all its staff to
provide the best patient experiences possible.
HIPAA
Health Insurance Portability and Accountability Act
Passed in 1996 by Congress
 The HIPAA Privacy regulations require health care providers and
organizations, as well as their business associates, develop and follow
procedures that ensure the confidentiality and security of protected
health information (PHI) when it is transferred, received, handled, or
shared.
 Mandates industry-wide standards for health care information on
electronic billing and other processes.
 Requires the protection and confidential handling of protected health
information.
 All personal who handles patient records of any kind need to be educated
on HIPPA compliances.
 HIPPA requirements are enforced by the Office for Civil Rights, an agency
within the US Department of Health and Human Services.
Health Insurance Portability and Accountability Act. (2013). Retrieved September 24, 2013, from
http://www.dhcs.ca.gov/formsandpubs/laws/hipaa/Pages/1.00%20WhatisHIPAA.aspx
Maintaining Confidentiality
Protection of Individually Identifiable Health Information (PHI)
 All information contained in patient medical and billing records is
confidential regardless of format; print, audio, electronic display or
storage.
 Hospitals need to inform patients of the current laws regarding Privacy
Practices.
 Violation of patient information and confidentiality standards, whether
intentional or unintentional, will be subject to disciplinary actions.
 All employees shall receive information and training concerning the
standards for Confidentiality of Patient Information and HIPAA in annual
mandatory education training.
 Healthcare organizations need to implement role-based access control
measures and processes for ensuring compliance measures within their
organizations to not allow medical records to be viewed by non authorized
personnel.
Maintaining Confidentiality
Continued
Safeguards
 Make sure you log off computer when leaving your area.
 Dispose paper in proper confidential bins to throw away.
 Position computer screens so patient information is not
visible to passerby
 Locate printers and fax machines in secure areas.
 Never take home patient information home unless it is
approved.
 Do not discuss a patients medical history to other
employees.
 A key thing to remember, patients need to feel confident
their medical records are confidential – ‘they trust you’.
Display Actions
 All personnel members need to trained on the Privacy and
Security Polices and Procedures to the level appropriate for
their job responsibilities and training must be documented.
 All new hires need to be provided training during their hiring
and orientation process.
 All employees need to sign a Confidentiality Agreement which
will be stored in their company Human Resource Department.
 All employees shall receive information and training
concerning the standards for Confidentiality of Patient
Information and HIPAA in annual mandatory education
training.
 All employees shall receive information and training
concerning the standards for Confidentiality of Patient
Information and HIPAA in annual mandatory education
training.
Conclusion
A breach of patient confidential information, whether
intentional or unintentional needs to be subject to
disciplinary actions. UCLA like so many health care
organizations have little real information on the number of
people within their organizations that have access to
electronic medical records, and even less information on
those who might have actually accessed those records.
This is a major problem and the case against UCLA
personnel in 2008 created organizations to implement
role-based access control measures and processes for
ensuring compliance to maintaining confidentiality of
patient information. As shared by Wolper (2011), “In
general, the Privacy Rule comprises five key principles: (1)
consumer control, (2) the setting of boundaries, (3)
accountability, (4) public responsibility, and (5) security’ (p.
390).
References
Health Insurance Portability and Accountability Act. (2013).
Retrieved September 24, 2013, from
http://www.dhcs.ca.gov/formsandpubs/laws/hipaa/Pages/1.00%
20WhatisHIPAA.aspx
Patient Confidentiality. (“n.d.”). Retrieved September 25, 2013,
from http://www.ama-assn.org/ama/pub/physician-
resources/legal-topics/patient-physician-relationship-
topics/patient-confidentiality.page
Wolper, L.F. (2011). Health care administration: Managing
organized delivery systems (5th ed.). Sudbury, MA: Jones and
Bartlett Publishers

More Related Content

What's hot

Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentation
MarcEtienne6
 
TaylorWk1d2assignment
TaylorWk1d2assignmentTaylorWk1d2assignment
TaylorWk1d2assignment
mya1743
 
susanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2ppsusanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2pp
Prayerful
 
Hippa training 2017
Hippa training 2017Hippa training 2017
Hippa training 2017
Ashley Valenzuela
 
Hippa privacy and security awareness
Hippa privacy and security awarenessHippa privacy and security awareness
Hippa privacy and security awareness
Charles Taft
 
Hipaa
HipaaHipaa
Employee confidentiality training
Employee confidentiality trainingEmployee confidentiality training
Employee confidentiality trainingJessi Morris
 
Patient confidentiality seminar
Patient confidentiality seminarPatient confidentiality seminar
Patient confidentiality seminar
Lakisha M. Moore
 
Keys To HIPAA Compliance
Keys To HIPAA ComplianceKeys To HIPAA Compliance
Keys To HIPAA Compliance
CBIZ, Inc.
 
HIPAA Audio Presentation
HIPAA  Audio PresentationHIPAA  Audio Presentation
HIPAA Audio Presentation
Lisa Shannon, RN, BSN, JD.
 
HIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowHIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to know
Compliancy Group
 
HIPAA Training: Preventing Employees from Violating HIPAA
HIPAA Training: Preventing Employees from Violating HIPAAHIPAA Training: Preventing Employees from Violating HIPAA
HIPAA Training: Preventing Employees from Violating HIPAA
jbhicks
 
Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2
9535814851
 
HIPAA
HIPAAHIPAA
HIPAA
belziebub
 
Leading your HIPAA Compliance Culture in 2016
Leading your HIPAA Compliance Culture in 2016Leading your HIPAA Compliance Culture in 2016
Leading your HIPAA Compliance Culture in 2016
Lance King
 
Mha 690 wk1 d2 confidentiality
Mha 690 wk1 d2 confidentialityMha 690 wk1 d2 confidentiality
Mha 690 wk1 d2 confidentiality
solifen2
 
HIPPA-Health Insurance Portability and Accountability Act
HIPPA-Health Insurance Portability and Accountability ActHIPPA-Health Insurance Portability and Accountability Act
HIPPA-Health Insurance Portability and Accountability ActHarshit Trivedi
 

What's hot (18)

Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentation
 
TaylorWk1d2assignment
TaylorWk1d2assignmentTaylorWk1d2assignment
TaylorWk1d2assignment
 
susanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2ppsusanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2pp
 
Hippa training 2017
Hippa training 2017Hippa training 2017
Hippa training 2017
 
Hippa privacy and security awareness
Hippa privacy and security awarenessHippa privacy and security awareness
Hippa privacy and security awareness
 
Hipaa
HipaaHipaa
Hipaa
 
Employee confidentiality training
Employee confidentiality trainingEmployee confidentiality training
Employee confidentiality training
 
Patient confidentiality seminar
Patient confidentiality seminarPatient confidentiality seminar
Patient confidentiality seminar
 
Keys To HIPAA Compliance
Keys To HIPAA ComplianceKeys To HIPAA Compliance
Keys To HIPAA Compliance
 
Hipaa
HipaaHipaa
Hipaa
 
HIPAA Audio Presentation
HIPAA  Audio PresentationHIPAA  Audio Presentation
HIPAA Audio Presentation
 
HIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowHIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to know
 
HIPAA Training: Preventing Employees from Violating HIPAA
HIPAA Training: Preventing Employees from Violating HIPAAHIPAA Training: Preventing Employees from Violating HIPAA
HIPAA Training: Preventing Employees from Violating HIPAA
 
Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2
 
HIPAA
HIPAAHIPAA
HIPAA
 
Leading your HIPAA Compliance Culture in 2016
Leading your HIPAA Compliance Culture in 2016Leading your HIPAA Compliance Culture in 2016
Leading your HIPAA Compliance Culture in 2016
 
Mha 690 wk1 d2 confidentiality
Mha 690 wk1 d2 confidentialityMha 690 wk1 d2 confidentiality
Mha 690 wk1 d2 confidentiality
 
HIPPA-Health Insurance Portability and Accountability Act
HIPPA-Health Insurance Portability and Accountability ActHIPPA-Health Insurance Portability and Accountability Act
HIPPA-Health Insurance Portability and Accountability Act
 

Viewers also liked

Patient Confidentiality
Patient ConfidentialityPatient Confidentiality
Patient ConfidentialityMike1fla
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Week 1 discussion on confidentiality
Week 1 discussion on confidentialityWeek 1 discussion on confidentiality
Week 1 discussion on confidentialitytjefferson81
 
CONFIDENTIALITY Week 1 discussion 2 presentation mha 690
CONFIDENTIALITY Week 1 discussion 2 presentation mha 690CONFIDENTIALITY Week 1 discussion 2 presentation mha 690
CONFIDENTIALITY Week 1 discussion 2 presentation mha 690Ricardo Rios
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02
stanbridge
 
Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...
Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...
Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...Rennessa Jackson
 

Viewers also liked (8)

Patient Confidentiality
Patient ConfidentialityPatient Confidentiality
Patient Confidentiality
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Ageand sports
Ageand sportsAgeand sports
Ageand sports
 
Week 1 discussion on confidentiality
Week 1 discussion on confidentialityWeek 1 discussion on confidentiality
Week 1 discussion on confidentiality
 
CONFIDENTIALITY Week 1 discussion 2 presentation mha 690
CONFIDENTIALITY Week 1 discussion 2 presentation mha 690CONFIDENTIALITY Week 1 discussion 2 presentation mha 690
CONFIDENTIALITY Week 1 discussion 2 presentation mha 690
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02
 
Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...
Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...
Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...
 

Similar to Mha690 health care capstone - confidentiality 9-26-2013

The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentialityswilson0050
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacy
kendale
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacy
kendale
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
DonnaDudley
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
maggie_Platt
 
MHA 690 week 2 discussin
MHA 690 week 2 discussinMHA 690 week 2 discussin
MHA 690 week 2 discussin
Brooke A Thomas
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion iibeleza1669
 
Protected health information
Protected health informationProtected health information
Protected health information
miszkeeta
 
Healthcare Confidentiality
Healthcare ConfidentialityHealthcare Confidentiality
Healthcare Confidentialityljbroshious
 
Patient’s confidentiality
Patient’s confidentialityPatient’s confidentiality
Patient’s confidentiality
Darkfawn
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
 
DVHIMSS Ensuring Privacy and Security of HIEs in PA
DVHIMSS Ensuring Privacy and Security of HIEs in PADVHIMSS Ensuring Privacy and Security of HIEs in PA
DVHIMSS Ensuring Privacy and Security of HIEs in PA
William Buddy Gillespie ITIL Certified
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
amartya2087
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
JOANNARANTONIO
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informatics
kmcanty
 
HIPAA Presentation
HIPAA PresentationHIPAA Presentation
HIPAA Presentation
LyubovKarnaukh
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcherEmed32
 
HIPAA and RHIOs
HIPAA and RHIOsHIPAA and RHIOs
HIPAA and RHIOsnobumoto
 

Similar to Mha690 health care capstone - confidentiality 9-26-2013 (20)

The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentiality
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacy
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacy
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
MHA 690 week 2 discussin
MHA 690 week 2 discussinMHA 690 week 2 discussin
MHA 690 week 2 discussin
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion ii
 
Protected health information
Protected health informationProtected health information
Protected health information
 
Healthcare Confidentiality
Healthcare ConfidentialityHealthcare Confidentiality
Healthcare Confidentiality
 
Patient’s confidentiality
Patient’s confidentialityPatient’s confidentiality
Patient’s confidentiality
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
DVHIMSS Ensuring Privacy and Security of HIEs in PA
DVHIMSS Ensuring Privacy and Security of HIEs in PADVHIMSS Ensuring Privacy and Security of HIEs in PA
DVHIMSS Ensuring Privacy and Security of HIEs in PA
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Hipaa
HipaaHipaa
Hipaa
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informatics
 
HIPAA Presentation
HIPAA PresentationHIPAA Presentation
HIPAA Presentation
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcher
 
HIPAA and RHIOs
HIPAA and RHIOsHIPAA and RHIOs
HIPAA and RHIOs
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

Mha690 health care capstone - confidentiality 9-26-2013

  • 1. Confidentiality MHA690: Health Care Capstone Ryan L. Ulibarri 9-26-2013 Report: Over 120 UCLA hospital staff saw celebrity health records (2008)
  • 2. Introduction Patient Confidentiality Importance of Patient Confidentiality HIPAA  Maintaining Confidentiality Display Actions Conclusion  In recent years, other laws, especially the Health Insurance Portability and Accountability Act (HIPAA), have had serious impact on the administration of these plans by, among other things, implementing privacy and related requirements with respect to personal health information of plan participants. (Wolper 2011, p. 268)
  • 3. Patient Confidentiality  AMA's Code of Medical Ethics states that the information disclosed to a physician during the course of the patient-physician relationship is confidential to the utmost degree.  The legal basis for imposing liability for a breach of confidentiality is more extensive than ethical guidelines, which dictate the morally right thing to do.  This agreement allows the patient to feel free and easy no confidential medical information will be disclosed or looked at without the patients express consent unless required to disclose the information by law.  A breach of confidentiality is a disclosure to a third party, without patient consent or court order, of private information that the physician has learned within the patient-physician relationship.  Physicians should set up office procedures to prevent the release of medical records without a copy of the patient's release.  Do not release patients medical records to any 3rd parties in any case unless the patient has the proper documents allowing to do that, this will can otherwise lead to breach of confidentiality.  Any breach in confidentiality—even one that seems minor—can result in mistrust and, possibly, a lawsuit and/or disciplinary action. Patient Confidentiality. (“n.d.”). Retrieved September 25, 2013, from http://www.ama-assn.org/ama/pub/physician- resources/legal-topics/patient-physician-relationship-topics/patient-confidentiality.page
  • 4. Importance of Confidentiality Physicians have always had a duty to keep their patients' medical records Confidential. Physicians, Nurses, and office personal should inform patients of the limits of confidentiality protections and allow the patients to decide whether treatment outweighs the risk of the disclosure of sensitive information. Protecting patients personal information needs to be a mission to hospitals and all its staff to provide the best patient experiences possible.
  • 5. HIPAA Health Insurance Portability and Accountability Act Passed in 1996 by Congress  The HIPAA Privacy regulations require health care providers and organizations, as well as their business associates, develop and follow procedures that ensure the confidentiality and security of protected health information (PHI) when it is transferred, received, handled, or shared.  Mandates industry-wide standards for health care information on electronic billing and other processes.  Requires the protection and confidential handling of protected health information.  All personal who handles patient records of any kind need to be educated on HIPPA compliances.  HIPPA requirements are enforced by the Office for Civil Rights, an agency within the US Department of Health and Human Services. Health Insurance Portability and Accountability Act. (2013). Retrieved September 24, 2013, from http://www.dhcs.ca.gov/formsandpubs/laws/hipaa/Pages/1.00%20WhatisHIPAA.aspx
  • 6. Maintaining Confidentiality Protection of Individually Identifiable Health Information (PHI)  All information contained in patient medical and billing records is confidential regardless of format; print, audio, electronic display or storage.  Hospitals need to inform patients of the current laws regarding Privacy Practices.  Violation of patient information and confidentiality standards, whether intentional or unintentional, will be subject to disciplinary actions.  All employees shall receive information and training concerning the standards for Confidentiality of Patient Information and HIPAA in annual mandatory education training.  Healthcare organizations need to implement role-based access control measures and processes for ensuring compliance measures within their organizations to not allow medical records to be viewed by non authorized personnel.
  • 7. Maintaining Confidentiality Continued Safeguards  Make sure you log off computer when leaving your area.  Dispose paper in proper confidential bins to throw away.  Position computer screens so patient information is not visible to passerby  Locate printers and fax machines in secure areas.  Never take home patient information home unless it is approved.  Do not discuss a patients medical history to other employees.  A key thing to remember, patients need to feel confident their medical records are confidential – ‘they trust you’.
  • 8. Display Actions  All personnel members need to trained on the Privacy and Security Polices and Procedures to the level appropriate for their job responsibilities and training must be documented.  All new hires need to be provided training during their hiring and orientation process.  All employees need to sign a Confidentiality Agreement which will be stored in their company Human Resource Department.  All employees shall receive information and training concerning the standards for Confidentiality of Patient Information and HIPAA in annual mandatory education training.  All employees shall receive information and training concerning the standards for Confidentiality of Patient Information and HIPAA in annual mandatory education training.
  • 9. Conclusion A breach of patient confidential information, whether intentional or unintentional needs to be subject to disciplinary actions. UCLA like so many health care organizations have little real information on the number of people within their organizations that have access to electronic medical records, and even less information on those who might have actually accessed those records. This is a major problem and the case against UCLA personnel in 2008 created organizations to implement role-based access control measures and processes for ensuring compliance to maintaining confidentiality of patient information. As shared by Wolper (2011), “In general, the Privacy Rule comprises five key principles: (1) consumer control, (2) the setting of boundaries, (3) accountability, (4) public responsibility, and (5) security’ (p. 390).
  • 10. References Health Insurance Portability and Accountability Act. (2013). Retrieved September 24, 2013, from http://www.dhcs.ca.gov/formsandpubs/laws/hipaa/Pages/1.00% 20WhatisHIPAA.aspx Patient Confidentiality. (“n.d.”). Retrieved September 25, 2013, from http://www.ama-assn.org/ama/pub/physician- resources/legal-topics/patient-physician-relationship- topics/patient-confidentiality.page Wolper, L.F. (2011). Health care administration: Managing organized delivery systems (5th ed.). Sudbury, MA: Jones and Bartlett Publishers

Editor's Notes

  1. Draft (only two rounds with one pick in each round per team) is the exclusive process for players to enter the league .Includes all emerging players, including international stars Drafted players who have exhausted their collegiate eligibility are reserved one year by the teams that drafted them .If a player sits out and enters the draft again, the player is reserved one year by the team that drafted him in this subsequent draft. If not drafted, a player is an unrestricted free agent.