SlideShare a Scribd company logo
1 of 9
Tanika Glenn
Health Care Capstone MHA 690
Instructor Lu
June 26, 2014
• Confidentiality is the right of an individual patient to
have personal, identifiable medical information kept
private; such information should be available only to
the physician of record and other health care and
insurance personnel as necessary
• As healthcare providers, maintaining a patient’s
confidentiality, human dignity and privacy is expected
at all times. Nurses are faced with maintaining patient
confidentiality on a daily basis. The Coded of Ethics
for Nurses is the framework of nonnegotiable ethical
standards and obligations that all nurses are to uphold.
Nurses are to be accountable for their actions and are
expected to advocate and strive to protect the rights,
health and safety of patients.
• Patient confidentiality is defined as medical and personal
information when given to a healthcare provider will not be
disclosed without their permission to others unless they have
given permission for a release.
• Health care professionals and nursing staff who will be working
regularly with their patients along with their medical records that
should be kept Confidential should be able to comply with the
development of any standards, laws and policies that are in place
to protect their patient’s privacy (HIPAA) and the Confidentiality
of their information/health records.
• EMR’s or Electronic Medical Records, Tele-health and the
Internet, this has all helped to open the doors to unintentional or
potential breaches in our patients confidential/private information
about their health
• HIPAA is the Health Insurance Portability and
Accountability Act of 1996 (HIPAA)
• • The HIPAA Privacy Rule provides protections
for personal health information held by covered
entities and gives patients an array of rights
with respect to that information.
• • The HIPAA Privacy Rule provides federal
protections for personal health information held
by covered entities and gives patients an array
of rights with respect to that information. At the
same time, the Privacy Rule is balanced so that
it permits the disclosure of personal health
information needed for patient care and other
important purposes.
• Protect the security, confidentiality and integrity of health information
• Protect against threats or hazards that jeopardize patient care
• Portability of health insurance
• Encourage the use of electronic technology
• If individuals didn’t know they violated HIPAA
they would be fined a minimum violation of $100
per violation and a maximum violation of $50,000
per violation.
•
If an individual violates HIPAA due to reasonable
cause and not willful neglect then they would be
fined a minimum violation of $1000 per violation
and a maximum violation of $50,000 per violation.
• Take all reasonable steps to make sure that individuals
without the need to know do not overhear conversations
about PHI.
• DO NOT discussion about PHI in public areas to
include but not limited to elevators or cafeterias.
• Do not let others see your computer screen while you
are working. Be sure to log out when done with any
computer file.
Protecting a patient’s private health information is an ethical practice
that helps to maintain the trusting relationship between patient and
nurse. The professional nurse is obligated to do so not only by the
professional code of ethics but also by government mandates related
to Health Insurance Portability and Accountability Act (HIPAA).
There are instances when the best interests of the patient or
community safety provide good cause for breaking patient
confidentiality. It is important for the nurse to use an ethical decision
making process either alone or in collaboration with the healthcare
team to determine the appropriate course of action (Purtilo &
Dougherty, 2010).
• Confidentiality (2012). American Medical Association. Retrieved
15 Feb 2012 from: http://www.ama-assn.org/ama/pub/physician-
resources/legal-topics/patient-physician- relationship-topics/patient-
confidentiality.page
• HIPAA (2011). What is HIPAA. Retrieved from
http://www.hhs.gov/ocr/privacy/hipaa/understanding/index.html.
• HIPAA (2011). HIPAA Violation and Enforcement. Retrieved
from http://www.ama-assn.org/ama/pub/physician-
resources/solutions-managing-your-practice/coding-billing-
insurance/hipaahealth-insurance-portability-accountability-
act/hipaa-violations-enforcement.page.
• Purtilo, Ruth M., Doherty, Regina (112010). Ethical Dimensions
in the Health Professions [5] (VitalSource Bookshelf), Retrieved
from http://pageburstls.elsevier.com/books/978-1-4377-0896-
7/id/B9781437708967000126_f5010

More Related Content

What's hot

Patients’ privacy and confidentiality
Patients’ privacy and confidentialityPatients’ privacy and confidentiality
Patients’ privacy and confidentialitybernardsanch
 
Health Information Technology_272_Presentation_CookDaryle.docx.
Health Information Technology_272_Presentation_CookDaryle.docx.Health Information Technology_272_Presentation_CookDaryle.docx.
Health Information Technology_272_Presentation_CookDaryle.docx.Daryle Cook
 
TaylorWk1d2assignment
TaylorWk1d2assignmentTaylorWk1d2assignment
TaylorWk1d2assignmentmya1743
 
Confidentiality
ConfidentialityConfidentiality
ConfidentialityDeniseMHA
 
Health information confidentiality
Health information confidentialityHealth information confidentiality
Health information confidentialityJames Noon
 
HIPAA and Privacy Training
HIPAA and Privacy TrainingHIPAA and Privacy Training
HIPAA and Privacy TrainingJasAmataga
 
Your role in confidentiality
Your role in confidentialityYour role in confidentiality
Your role in confidentialityTrisha Ballard
 
Patient privacy 2.0 slides
Patient privacy 2.0 slidesPatient privacy 2.0 slides
Patient privacy 2.0 slidesandibear
 
Protecting patients confidentiality slide presentation
Protecting patients confidentiality slide presentationProtecting patients confidentiality slide presentation
Protecting patients confidentiality slide presentationplunkk
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentialityjaredbrady
 
susanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2ppsusanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2ppPrayerful
 
Patient Confidentiality
Patient ConfidentialityPatient Confidentiality
Patient Confidentialitymarosemond
 
Upholding confidentiality
Upholding confidentialityUpholding confidentiality
Upholding confidentialityTheresa Tapley
 
Mha690 week 1 discusssion 2
Mha690 week 1 discusssion 2 Mha690 week 1 discusssion 2
Mha690 week 1 discusssion 2 Aletha Ratcliff
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Trainingridley27
 
Hippa training on confidentiality
Hippa training on confidentialityHippa training on confidentiality
Hippa training on confidentialitycraig45365
 

What's hot (20)

Patients’ privacy and confidentiality
Patients’ privacy and confidentialityPatients’ privacy and confidentiality
Patients’ privacy and confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Health Information Technology_272_Presentation_CookDaryle.docx.
Health Information Technology_272_Presentation_CookDaryle.docx.Health Information Technology_272_Presentation_CookDaryle.docx.
Health Information Technology_272_Presentation_CookDaryle.docx.
 
TaylorWk1d2assignment
TaylorWk1d2assignmentTaylorWk1d2assignment
TaylorWk1d2assignment
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality
Confidentiality Confidentiality
Confidentiality
 
Health information confidentiality
Health information confidentialityHealth information confidentiality
Health information confidentiality
 
HIPAA and Privacy Training
HIPAA and Privacy TrainingHIPAA and Privacy Training
HIPAA and Privacy Training
 
Tasia Confidentiality PPT
Tasia Confidentiality PPTTasia Confidentiality PPT
Tasia Confidentiality PPT
 
Confidentiality-Arlicia- mha 690-discussion 2
Confidentiality-Arlicia- mha 690-discussion 2 Confidentiality-Arlicia- mha 690-discussion 2
Confidentiality-Arlicia- mha 690-discussion 2
 
Your role in confidentiality
Your role in confidentialityYour role in confidentiality
Your role in confidentiality
 
Patient privacy 2.0 slides
Patient privacy 2.0 slidesPatient privacy 2.0 slides
Patient privacy 2.0 slides
 
Protecting patients confidentiality slide presentation
Protecting patients confidentiality slide presentationProtecting patients confidentiality slide presentation
Protecting patients confidentiality slide presentation
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentiality
 
susanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2ppsusanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2pp
 
Patient Confidentiality
Patient ConfidentialityPatient Confidentiality
Patient Confidentiality
 
Upholding confidentiality
Upholding confidentialityUpholding confidentiality
Upholding confidentiality
 
Mha690 week 1 discusssion 2
Mha690 week 1 discusssion 2 Mha690 week 1 discusssion 2
Mha690 week 1 discusssion 2
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Training
 
Hippa training on confidentiality
Hippa training on confidentialityHippa training on confidentiality
Hippa training on confidentiality
 

Viewers also liked

Intro to hipaa
Intro to hipaaIntro to hipaa
Intro to hipaaroadhog
 
Presentation on patient confidentality training
Presentation on patient confidentality trainingPresentation on patient confidentality training
Presentation on patient confidentality trainingchymiak
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentialityjohnzinn
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcarekmasterson
 

Viewers also liked (6)

Intro to hipaa
Intro to hipaaIntro to hipaa
Intro to hipaa
 
DVice
DViceDVice
DVice
 
Presentation on patient confidentality training
Presentation on patient confidentality trainingPresentation on patient confidentality training
Presentation on patient confidentality training
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcare
 

Similar to Patient confidentiality training

01 law and_ethics
01 law and_ethics01 law and_ethics
01 law and_ethicskdcsdross
 
Week 1 discussion patient confidentiality
Week 1 discussion  patient confidentialityWeek 1 discussion  patient confidentiality
Week 1 discussion patient confidentialityapalaciosy
 
Hot materials hippa
Hot materials hippaHot materials hippa
Hot materials hippaWork Aholic
 
Are You HIPAA Safe?
Are You HIPAA Safe?Are You HIPAA Safe?
Are You HIPAA Safe?TriageLogic
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Welcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityWelcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityveve1728
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarcEtienne6
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentialityswilson0050
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxamartya2087
 
Confidentiality and hipaa
Confidentiality and hipaaConfidentiality and hipaa
Confidentiality and hipaabrandypsmith
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality12ort
 
Health Insurance and Portability and Accountability Act
Health Insurance and Portability and Accountability ActHealth Insurance and Portability and Accountability Act
Health Insurance and Portability and Accountability Actসারন দাস
 
Confidentiality
ConfidentialityConfidentiality
Confidentialityshydoll414
 
Confidentiality
ConfidentialityConfidentiality
Confidentialityshydoll414
 

Similar to Patient confidentiality training (20)

01 law and_ethics
01 law and_ethics01 law and_ethics
01 law and_ethics
 
Dustin HIPAA
Dustin HIPAADustin HIPAA
Dustin HIPAA
 
DVHIMSS Ensuring Privacy and Security of HIEs in PA
DVHIMSS Ensuring Privacy and Security of HIEs in PADVHIMSS Ensuring Privacy and Security of HIEs in PA
DVHIMSS Ensuring Privacy and Security of HIEs in PA
 
Week 1 discussion patient confidentiality
Week 1 discussion  patient confidentialityWeek 1 discussion  patient confidentiality
Week 1 discussion patient confidentiality
 
Hot materials hippa
Hot materials hippaHot materials hippa
Hot materials hippa
 
Mha 690 week 1 dq 2
Mha 690 week 1 dq 2Mha 690 week 1 dq 2
Mha 690 week 1 dq 2
 
Are You HIPAA Safe?
Are You HIPAA Safe?Are You HIPAA Safe?
Are You HIPAA Safe?
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Welcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityWelcome to the hippa, privacy and security
Welcome to the hippa, privacy and security
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentation
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentiality
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
 
Confidentiality and hipaa
Confidentiality and hipaaConfidentiality and hipaa
Confidentiality and hipaa
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Health Insurance and Portability and Accountability Act
Health Insurance and Portability and Accountability ActHealth Insurance and Portability and Accountability Act
Health Insurance and Portability and Accountability Act
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 

Recently uploaded

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Patient confidentiality training

  • 1. Tanika Glenn Health Care Capstone MHA 690 Instructor Lu June 26, 2014
  • 2. • Confidentiality is the right of an individual patient to have personal, identifiable medical information kept private; such information should be available only to the physician of record and other health care and insurance personnel as necessary • As healthcare providers, maintaining a patient’s confidentiality, human dignity and privacy is expected at all times. Nurses are faced with maintaining patient confidentiality on a daily basis. The Coded of Ethics for Nurses is the framework of nonnegotiable ethical standards and obligations that all nurses are to uphold. Nurses are to be accountable for their actions and are expected to advocate and strive to protect the rights, health and safety of patients.
  • 3. • Patient confidentiality is defined as medical and personal information when given to a healthcare provider will not be disclosed without their permission to others unless they have given permission for a release. • Health care professionals and nursing staff who will be working regularly with their patients along with their medical records that should be kept Confidential should be able to comply with the development of any standards, laws and policies that are in place to protect their patient’s privacy (HIPAA) and the Confidentiality of their information/health records. • EMR’s or Electronic Medical Records, Tele-health and the Internet, this has all helped to open the doors to unintentional or potential breaches in our patients confidential/private information about their health
  • 4. • HIPAA is the Health Insurance Portability and Accountability Act of 1996 (HIPAA) • • The HIPAA Privacy Rule provides protections for personal health information held by covered entities and gives patients an array of rights with respect to that information. • • The HIPAA Privacy Rule provides federal protections for personal health information held by covered entities and gives patients an array of rights with respect to that information. At the same time, the Privacy Rule is balanced so that it permits the disclosure of personal health information needed for patient care and other important purposes.
  • 5. • Protect the security, confidentiality and integrity of health information • Protect against threats or hazards that jeopardize patient care • Portability of health insurance • Encourage the use of electronic technology
  • 6. • If individuals didn’t know they violated HIPAA they would be fined a minimum violation of $100 per violation and a maximum violation of $50,000 per violation. • If an individual violates HIPAA due to reasonable cause and not willful neglect then they would be fined a minimum violation of $1000 per violation and a maximum violation of $50,000 per violation.
  • 7. • Take all reasonable steps to make sure that individuals without the need to know do not overhear conversations about PHI. • DO NOT discussion about PHI in public areas to include but not limited to elevators or cafeterias. • Do not let others see your computer screen while you are working. Be sure to log out when done with any computer file.
  • 8. Protecting a patient’s private health information is an ethical practice that helps to maintain the trusting relationship between patient and nurse. The professional nurse is obligated to do so not only by the professional code of ethics but also by government mandates related to Health Insurance Portability and Accountability Act (HIPAA). There are instances when the best interests of the patient or community safety provide good cause for breaking patient confidentiality. It is important for the nurse to use an ethical decision making process either alone or in collaboration with the healthcare team to determine the appropriate course of action (Purtilo & Dougherty, 2010).
  • 9. • Confidentiality (2012). American Medical Association. Retrieved 15 Feb 2012 from: http://www.ama-assn.org/ama/pub/physician- resources/legal-topics/patient-physician- relationship-topics/patient- confidentiality.page • HIPAA (2011). What is HIPAA. Retrieved from http://www.hhs.gov/ocr/privacy/hipaa/understanding/index.html. • HIPAA (2011). HIPAA Violation and Enforcement. Retrieved from http://www.ama-assn.org/ama/pub/physician- resources/solutions-managing-your-practice/coding-billing- insurance/hipaahealth-insurance-portability-accountability- act/hipaa-violations-enforcement.page. • Purtilo, Ruth M., Doherty, Regina (112010). Ethical Dimensions in the Health Professions [5] (VitalSource Bookshelf), Retrieved from http://pageburstls.elsevier.com/books/978-1-4377-0896- 7/id/B9781437708967000126_f5010