SlideShare a Scribd company logo
Patient Confidentiality
HIPAA Guidelines
New Omnibus HIPAA Rule
New rights for patient
Tighter definition of HIPAA violations (breaches)
New emphasis by Office of Civil Rights (OCR)
Government to audit HIPAA compliance
New emphasis to on sanctions and fines when HIPAA breaches are
serious
The HIPAA Law
HIPAA, which stand for the America Health Insurance Portability and
Accountability Act, is a set of rules to be followed by doctors, hospital
and other health care providers. HIPAA helps ensure that all medical
records, medical billing, and patient accounts meet certain consistent
standards with regard to documentation, handling and privacy.
Ref: www.hippa-101.com
Your Facility HIPAA
Compliant for 2014?
Any healthcare provider that electronically stores, processes or transmits
medical records, medical remittances, or certificates must comply with HIPAA
regulations. HIPAA does not require a practice to purchase a computer-based
system as it applies only to electronic medical transactions.
Ref: www.hippa-101.com
Why do I care?
• Once you are a part of a covered entity, you are responsible to
safeguard all Protected Health Information (PHI). Whether it is
transmitted electronically, in paper format or transmitted orally. As an
employee one is responsible to protect PHI.
Minimum Necessary PHI
• An organization may share only minimum amount of PHI necessary, except for request made:
• By the patient or as requested by the patient to others
• By the Secretary of the Department of Health & Human Services (DHHS)
• As required by law
• To complete standardized electronic transactions as required by HIPAA
But
• An organization is a covered entity and may share PHI for:
• Treatment, payment and health care operation
• Disclosures required by law
• Public health and other governmental reporting
When can you use PHI?
Only to do your job! And on a
“NEED To KNOW BASIS?
Ref:
www:images.search.yahoo.com/images/view
For many other uses and disclosures of PHI…
An organization must get a sign consent of release from the patient to release any PHI set by the guidelines
by the organization.
It is very important for all employees to know “When in doubt ask!”
Disciplinary Actions
Sanctions policy
Individuals who breach HIPAA policies for any organization will be subjected to the appropriate
discipline. Including termination, loss of job. As a reminder it is not worth it.
HIPAA Changes in 2013
• Updated notices of Privacy Practices
• Patients can request an accounting of all access to their records
• Patients can change their visitation requests as often as they like
• We can use some PHI for fundraising as long as the patient can opt out
• Allowed to disclose student immunizations
• PHI can’t be sold unless patients are told
• Changes in fines for breaches
What are some steps I can
take to ensure I am
safeguarding PHI?
• Do not remove PHI from the office, except as necessary to perform you job
• Use caution when faxing information, including verifying the receiver, double-
checking the fax number, use a cover sheet, and calling to confirm that the fax was
sent.
• When discussion PHI, talk with a low voice to ensure that no other than the
intended can here what you are discussing.
Workstation procedures
• When walking away from you workstation “Do not leave the screen open with patient information on”.
• Log – off or lock work stations when not in use
• Do not share passwords or work on someone else’s computer
• Keep offices secure
• Keep all portable storages locked up
• When sending PHI out side of the facility use encryption
When in doubt
Ask management, supervisor
or compliance officer.
References
Hilo Medical Center, Education Department, 5, September, 2013, 2013 HIPAA Omnibus Rule Training, Retrieved September 30, 2013
from handout
www:hipaa-101.com
www:images.search.yahoo.com/images/view

More Related Content

What's hot

Dustin HIPAA
Dustin HIPAADustin HIPAA
Dustin HIPAA
Dustin Kinzinger
 
Hippa training 2017
Hippa training 2017Hippa training 2017
Hippa training 2017
Ashley Valenzuela
 
Welcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityWelcome to the hippa, privacy and security
Welcome to the hippa, privacy and security
veve1728
 
HIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowHIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to know
Compliancy Group
 
What is hipaa
What is hipaaWhat is hipaa
What is hipaa
digitalpractice
 
Hipaa basics
Hipaa basicsHipaa basics
Hipaa basicsmlireton
 
MHA690 confidentiality training
MHA690 confidentiality trainingMHA690 confidentiality training
MHA690 confidentiality trainingsdavis49
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentation
MarcEtienne6
 
Confidentiality slide
Confidentiality slideConfidentiality slide
Confidentiality slidewongy12
 
Keys To HIPAA Compliance
Keys To HIPAA ComplianceKeys To HIPAA Compliance
Keys To HIPAA Compliance
CBIZ, Inc.
 
Application Developers Guide to HIPAA Compliance
Application Developers Guide to HIPAA ComplianceApplication Developers Guide to HIPAA Compliance
Application Developers Guide to HIPAA Compliance
TrueVault
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)bholmes
 
HIPPA-Health Insurance Portability and Accountability Act
HIPPA-Health Insurance Portability and Accountability ActHIPPA-Health Insurance Portability and Accountability Act
HIPPA-Health Insurance Portability and Accountability ActHarshit Trivedi
 
Hippa 2021
Hippa 2021Hippa 2021
Hippa 2021
John Reardon
 
HIPAA Audio Presentation
HIPAA  Audio PresentationHIPAA  Audio Presentation
HIPAA Audio Presentation
Lisa Shannon, RN, BSN, JD.
 
Healthcare IT: Security Risks & Regulations
Healthcare IT: Security Risks & RegulationsHealthcare IT: Security Risks & Regulations
Healthcare IT: Security Risks & Regulations
CHIPS Technology Group
 
Hippa training on confidentiality
Hippa training on confidentialityHippa training on confidentiality
Hippa training on confidentialitycraig45365
 
Hippa presentation2
Hippa presentation2Hippa presentation2
Hippa presentation2
Katherine Smith , MHA
 

What's hot (19)

Dustin HIPAA
Dustin HIPAADustin HIPAA
Dustin HIPAA
 
Hippa training 2017
Hippa training 2017Hippa training 2017
Hippa training 2017
 
Welcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityWelcome to the hippa, privacy and security
Welcome to the hippa, privacy and security
 
HIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowHIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to know
 
What is hipaa
What is hipaaWhat is hipaa
What is hipaa
 
Hipaa basics
Hipaa basicsHipaa basics
Hipaa basics
 
Mha690 w1 d2
Mha690 w1 d2Mha690 w1 d2
Mha690 w1 d2
 
MHA690 confidentiality training
MHA690 confidentiality trainingMHA690 confidentiality training
MHA690 confidentiality training
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentation
 
Confidentiality slide
Confidentiality slideConfidentiality slide
Confidentiality slide
 
Keys To HIPAA Compliance
Keys To HIPAA ComplianceKeys To HIPAA Compliance
Keys To HIPAA Compliance
 
Application Developers Guide to HIPAA Compliance
Application Developers Guide to HIPAA ComplianceApplication Developers Guide to HIPAA Compliance
Application Developers Guide to HIPAA Compliance
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)
 
HIPPA-Health Insurance Portability and Accountability Act
HIPPA-Health Insurance Portability and Accountability ActHIPPA-Health Insurance Portability and Accountability Act
HIPPA-Health Insurance Portability and Accountability Act
 
Hippa 2021
Hippa 2021Hippa 2021
Hippa 2021
 
HIPAA Audio Presentation
HIPAA  Audio PresentationHIPAA  Audio Presentation
HIPAA Audio Presentation
 
Healthcare IT: Security Risks & Regulations
Healthcare IT: Security Risks & RegulationsHealthcare IT: Security Risks & Regulations
Healthcare IT: Security Risks & Regulations
 
Hippa training on confidentiality
Hippa training on confidentialityHippa training on confidentiality
Hippa training on confidentiality
 
Hippa presentation2
Hippa presentation2Hippa presentation2
Hippa presentation2
 

Similar to Patient confidentiality power point

Are You HIPAA Safe?
Are You HIPAA Safe?Are You HIPAA Safe?
Are You HIPAA Safe?
TriageLogic
 
5 hipaa training
5 hipaa training5 hipaa training
5 hipaa training
JasonPickerill1
 
Data Security and Privacy Practices
Data Security and Privacy PracticesData Security and Privacy Practices
Data Security and Privacy Practices
Springfield Clinic
 
5 hipaa training
5 hipaa training5 hipaa training
5 hipaa training
JasonPickerill1
 
Hipaa basics.pp2
Hipaa basics.pp2Hipaa basics.pp2
Hipaa basics.pp2martykoepke
 
2018-HIPAA-Renewal-Training.pptx
2018-HIPAA-Renewal-Training.pptx2018-HIPAA-Renewal-Training.pptx
2018-HIPAA-Renewal-Training.pptx
Fariida Osman
 
Hipaa.ppt3
Hipaa.ppt3Hipaa.ppt3
Hipaa.ppt3akwei2
 
Hipaa.ppt5
Hipaa.ppt5Hipaa.ppt5
Hipaa.ppt5akwei2
 
Hipaa.ppt4
Hipaa.ppt4Hipaa.ppt4
Hipaa.ppt4akwei2
 
Hipaa.ppt6
Hipaa.ppt6Hipaa.ppt6
Hipaa.ppt6akwei2
 
Hipaa.ppt1
Hipaa.ppt1Hipaa.ppt1
Hipaa.ppt1akwei2
 
Hipaa.ppt2
Hipaa.ppt2Hipaa.ppt2
Hipaa.ppt2akwei2
 
HNI U: HIPAA Essentials
HNI U: HIPAA EssentialsHNI U: HIPAA Essentials
HNI U: HIPAA Essentials
HNI Risk Services
 
Hipaa-2015
Hipaa-2015Hipaa-2015
Hipaa-2015
pssurgery
 
What You Don’t Know About the HIPAA Security Rule
What You Don’t Know About the HIPAA Security RuleWhat You Don’t Know About the HIPAA Security Rule
What You Don’t Know About the HIPAA Security Rule
Cooperative of American Physicians, Inc.
 
Ruggiero.hipaa training
Ruggiero.hipaa trainingRuggiero.hipaa training
Ruggiero.hipaa training
Gina Ruggiero
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
 
Phi masella
Phi masellaPhi masella
Phi masella
Denise Masella
 
PROTECTED HEALTH INFORMATION_PATIENT PRIVACY
PROTECTED HEALTH INFORMATION_PATIENT PRIVACYPROTECTED HEALTH INFORMATION_PATIENT PRIVACY
PROTECTED HEALTH INFORMATION_PATIENT PRIVACY
Denise Masella
 

Similar to Patient confidentiality power point (20)

Are You HIPAA Safe?
Are You HIPAA Safe?Are You HIPAA Safe?
Are You HIPAA Safe?
 
5 hipaa training
5 hipaa training5 hipaa training
5 hipaa training
 
HIPAA HITECH training 7-9-12
HIPAA HITECH training 7-9-12HIPAA HITECH training 7-9-12
HIPAA HITECH training 7-9-12
 
Data Security and Privacy Practices
Data Security and Privacy PracticesData Security and Privacy Practices
Data Security and Privacy Practices
 
5 hipaa training
5 hipaa training5 hipaa training
5 hipaa training
 
Hipaa basics.pp2
Hipaa basics.pp2Hipaa basics.pp2
Hipaa basics.pp2
 
2018-HIPAA-Renewal-Training.pptx
2018-HIPAA-Renewal-Training.pptx2018-HIPAA-Renewal-Training.pptx
2018-HIPAA-Renewal-Training.pptx
 
Hipaa.ppt3
Hipaa.ppt3Hipaa.ppt3
Hipaa.ppt3
 
Hipaa.ppt5
Hipaa.ppt5Hipaa.ppt5
Hipaa.ppt5
 
Hipaa.ppt4
Hipaa.ppt4Hipaa.ppt4
Hipaa.ppt4
 
Hipaa.ppt6
Hipaa.ppt6Hipaa.ppt6
Hipaa.ppt6
 
Hipaa.ppt1
Hipaa.ppt1Hipaa.ppt1
Hipaa.ppt1
 
Hipaa.ppt2
Hipaa.ppt2Hipaa.ppt2
Hipaa.ppt2
 
HNI U: HIPAA Essentials
HNI U: HIPAA EssentialsHNI U: HIPAA Essentials
HNI U: HIPAA Essentials
 
Hipaa-2015
Hipaa-2015Hipaa-2015
Hipaa-2015
 
What You Don’t Know About the HIPAA Security Rule
What You Don’t Know About the HIPAA Security RuleWhat You Don’t Know About the HIPAA Security Rule
What You Don’t Know About the HIPAA Security Rule
 
Ruggiero.hipaa training
Ruggiero.hipaa trainingRuggiero.hipaa training
Ruggiero.hipaa training
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
Phi masella
Phi masellaPhi masella
Phi masella
 
PROTECTED HEALTH INFORMATION_PATIENT PRIVACY
PROTECTED HEALTH INFORMATION_PATIENT PRIVACYPROTECTED HEALTH INFORMATION_PATIENT PRIVACY
PROTECTED HEALTH INFORMATION_PATIENT PRIVACY
 

Recently uploaded

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 

Recently uploaded (20)

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 

Patient confidentiality power point

  • 2. New Omnibus HIPAA Rule New rights for patient Tighter definition of HIPAA violations (breaches) New emphasis by Office of Civil Rights (OCR) Government to audit HIPAA compliance New emphasis to on sanctions and fines when HIPAA breaches are serious
  • 3. The HIPAA Law HIPAA, which stand for the America Health Insurance Portability and Accountability Act, is a set of rules to be followed by doctors, hospital and other health care providers. HIPAA helps ensure that all medical records, medical billing, and patient accounts meet certain consistent standards with regard to documentation, handling and privacy. Ref: www.hippa-101.com
  • 4. Your Facility HIPAA Compliant for 2014? Any healthcare provider that electronically stores, processes or transmits medical records, medical remittances, or certificates must comply with HIPAA regulations. HIPAA does not require a practice to purchase a computer-based system as it applies only to electronic medical transactions. Ref: www.hippa-101.com
  • 5. Why do I care? • Once you are a part of a covered entity, you are responsible to safeguard all Protected Health Information (PHI). Whether it is transmitted electronically, in paper format or transmitted orally. As an employee one is responsible to protect PHI.
  • 6. Minimum Necessary PHI • An organization may share only minimum amount of PHI necessary, except for request made: • By the patient or as requested by the patient to others • By the Secretary of the Department of Health & Human Services (DHHS) • As required by law • To complete standardized electronic transactions as required by HIPAA But • An organization is a covered entity and may share PHI for: • Treatment, payment and health care operation • Disclosures required by law • Public health and other governmental reporting
  • 7. When can you use PHI? Only to do your job! And on a “NEED To KNOW BASIS? Ref: www:images.search.yahoo.com/images/view
  • 8. For many other uses and disclosures of PHI… An organization must get a sign consent of release from the patient to release any PHI set by the guidelines by the organization. It is very important for all employees to know “When in doubt ask!” Disciplinary Actions Sanctions policy Individuals who breach HIPAA policies for any organization will be subjected to the appropriate discipline. Including termination, loss of job. As a reminder it is not worth it.
  • 9. HIPAA Changes in 2013 • Updated notices of Privacy Practices • Patients can request an accounting of all access to their records • Patients can change their visitation requests as often as they like • We can use some PHI for fundraising as long as the patient can opt out • Allowed to disclose student immunizations • PHI can’t be sold unless patients are told • Changes in fines for breaches
  • 10. What are some steps I can take to ensure I am safeguarding PHI? • Do not remove PHI from the office, except as necessary to perform you job • Use caution when faxing information, including verifying the receiver, double- checking the fax number, use a cover sheet, and calling to confirm that the fax was sent. • When discussion PHI, talk with a low voice to ensure that no other than the intended can here what you are discussing.
  • 11. Workstation procedures • When walking away from you workstation “Do not leave the screen open with patient information on”. • Log – off or lock work stations when not in use • Do not share passwords or work on someone else’s computer • Keep offices secure • Keep all portable storages locked up • When sending PHI out side of the facility use encryption
  • 12. When in doubt Ask management, supervisor or compliance officer.
  • 13. References Hilo Medical Center, Education Department, 5, September, 2013, 2013 HIPAA Omnibus Rule Training, Retrieved September 30, 2013 from handout www:hipaa-101.com www:images.search.yahoo.com/images/view