SlideShare a Scribd company logo
Patient
Confidentiality
Training
Patricia Burton
MHA 690: Health Care Capstone
Kathy Wood
July 10, 2014
Health Insurance Portability &
Accountability Act- HIPAA
• HIPAA (1996) was enforced to protect the privacy of health
information. This act also set rules and national standards for
the security of electronic protected health information. With
the HIPAA Breach Notification Rule, it requires business
associates to notify those affected following a breach of
unsecured protected health information. Patient Safety Rule
protects identifiable information from being used to analyze
patient safety events and improve patient safety. The Act
includes punishment for those in violation of patient privacy.
With the proper training and education, patients can be
educated as well as employees. Patients will be able to trust
their providers with the access of their health information.
HIPAA Training
• With this training, it includes educational courses, hands on
training, computer training, as well as agreements in the
workplace.
• The training can be conducted in person or online
computerized training.
• The training will cover ways to protect patient health
information, privacy policy and procedure, methods for
resolving breaches, and the consequence of HIPAA violations.
HIPAA Training
• Employees will also go through a series of systems training for
the health care system used to access patient information.
• Also as a part of the HIPAA training, each employee is required
to have a user name and receive a password for direct access
to patient information.
• Throughout training, it will be demonstrated as to what is
considered a HIPAA violation as well as ways in which a HIPAA
violation may be avoided.
Certification, Renewal, and
Outcomes
• Upon completion of the HIPAA training and computer system
training, employees will receive a certification of patient
confidentiality training.
• The HIPAA training is to be renewed annually and the system
computer training can be done with significant changes within
the computer system, system updates, or change in systems.
• It is important for employers to make sure that the staff within
the organization who have access to patient information have
fulfilled the requirements of training.
• Training can lessen the occurrence of violations in patient
privacy and confidentially as well as realm proof of the proper
employee training if such issues were to arise.
Reference
• Health Information Privacy. (2014). Retrieved from
http://www.hhs.gov/ocr/privacy/

More Related Content

What's hot

UCLA compliance training
UCLA compliance trainingUCLA compliance training
UCLA compliance training
TCromwell01
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentation
MarcEtienne6
 
Mha 690 wk1_db2_V2
Mha 690 wk1_db2_V2Mha 690 wk1_db2_V2
Mha 690 wk1_db2_V2
Amber Capello-Jones
 
HIPAA
HIPAA HIPAA
HIPAA
ravelo1212
 
Patient privacy
Patient privacyPatient privacy
Patient privacy
Eunice Brown, MHA
 
Confidentiality training mha 690
Confidentiality training mha 690Confidentiality training mha 690
Confidentiality training mha 690
KenyaPoole
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Training
Suezqrdh
 
Marlene brooks week 1 discussion 2 - confidentiality
Marlene brooks   week 1 discussion 2 - confidentialityMarlene brooks   week 1 discussion 2 - confidentiality
Marlene brooks week 1 discussion 2 - confidentiality
bablot33
 
How good we are in adhering HIPAA rules
How good we are in adhering HIPAA rulesHow good we are in adhering HIPAA rules
How good we are in adhering HIPAA rules
Medical Transcriptions Service
 
E/M Coding Updates for 2015
E/M Coding Updates for 2015E/M Coding Updates for 2015
E/M Coding Updates for 2015
AudioEducator
 
Mha690 confidentiality training-week 1, discussion 2
Mha690 confidentiality training-week 1, discussion 2Mha690 confidentiality training-week 1, discussion 2
Mha690 confidentiality training-week 1, discussion 2
Kristen Zimmer
 
MHA690 confidentiality training
MHA690 confidentiality trainingMHA690 confidentiality training
MHA690 confidentiality training
sdavis49
 
Mha690 healthcare confidentiality
Mha690 healthcare confidentialityMha690 healthcare confidentiality
Mha690 healthcare confidentiality
asharp625
 
Mha 690 presentation hippa
Mha 690 presentation hippaMha 690 presentation hippa
Mha 690 presentation hippa
belle0508
 
Authentication Best Practices
Authentication Best PracticesAuthentication Best Practices
Authentication Best Practices
Texas Medical Liability Trust
 
Discussion2 week1
Discussion2 week1Discussion2 week1
Discussion2 week1
akei13sha
 
Emr policies and procedures ppt
Emr policies and procedures pptEmr policies and procedures ppt
Emr policies and procedures ppt
Shannon Hullum
 

What's hot (17)

UCLA compliance training
UCLA compliance trainingUCLA compliance training
UCLA compliance training
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentation
 
Mha 690 wk1_db2_V2
Mha 690 wk1_db2_V2Mha 690 wk1_db2_V2
Mha 690 wk1_db2_V2
 
HIPAA
HIPAA HIPAA
HIPAA
 
Patient privacy
Patient privacyPatient privacy
Patient privacy
 
Confidentiality training mha 690
Confidentiality training mha 690Confidentiality training mha 690
Confidentiality training mha 690
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Training
 
Marlene brooks week 1 discussion 2 - confidentiality
Marlene brooks   week 1 discussion 2 - confidentialityMarlene brooks   week 1 discussion 2 - confidentiality
Marlene brooks week 1 discussion 2 - confidentiality
 
How good we are in adhering HIPAA rules
How good we are in adhering HIPAA rulesHow good we are in adhering HIPAA rules
How good we are in adhering HIPAA rules
 
E/M Coding Updates for 2015
E/M Coding Updates for 2015E/M Coding Updates for 2015
E/M Coding Updates for 2015
 
Mha690 confidentiality training-week 1, discussion 2
Mha690 confidentiality training-week 1, discussion 2Mha690 confidentiality training-week 1, discussion 2
Mha690 confidentiality training-week 1, discussion 2
 
MHA690 confidentiality training
MHA690 confidentiality trainingMHA690 confidentiality training
MHA690 confidentiality training
 
Mha690 healthcare confidentiality
Mha690 healthcare confidentialityMha690 healthcare confidentiality
Mha690 healthcare confidentiality
 
Mha 690 presentation hippa
Mha 690 presentation hippaMha 690 presentation hippa
Mha 690 presentation hippa
 
Authentication Best Practices
Authentication Best PracticesAuthentication Best Practices
Authentication Best Practices
 
Discussion2 week1
Discussion2 week1Discussion2 week1
Discussion2 week1
 
Emr policies and procedures ppt
Emr policies and procedures pptEmr policies and procedures ppt
Emr policies and procedures ppt
 

Viewers also liked

ATS Company Reports: Puravankara projects ltd.
ATS Company Reports: Puravankara projects ltd.ATS Company Reports: Puravankara projects ltd.
ATS Company Reports: Puravankara projects ltd.
Aditya Trading Solutions Pvt Ltd
 
Sidas
SidasSidas
Sidas
koizora45
 
0514 luke 21 the entire roman world power point church sermon
0514 luke 21 the entire roman world power point church sermon0514 luke 21 the entire roman world power point church sermon
0514 luke 21 the entire roman world power point church sermon
PowerPoint_Sermons
 
Sport Science Unit 27 Task 3 1/7
Sport Science Unit 27 Task 3 1/7Sport Science Unit 27 Task 3 1/7
Sport Science Unit 27 Task 3 1/7
sammurray2014
 
0514 luke 141 he was being carefully watched power point church sermon
0514 luke 141 he was being carefully watched power point church sermon0514 luke 141 he was being carefully watched power point church sermon
0514 luke 141 he was being carefully watched power point church sermon
PowerPoint_Sermons
 
0514 luke 135 the power of the most high power point church sermon
0514 luke 135 the power of the most high power point church sermon0514 luke 135 the power of the most high power point church sermon
0514 luke 135 the power of the most high power point church sermon
PowerPoint_Sermons
 
Tutkijapalveluiden ajankohtaista, Jussi Heino
Tutkijapalveluiden ajankohtaista, Jussi HeinoTutkijapalveluiden ajankohtaista, Jussi Heino
Tutkijapalveluiden ajankohtaista, Jussi Heino
Tilastokeskus
 
Presentació 7a sessió de treball poe
Presentació 7a sessió de treball poePresentació 7a sessió de treball poe
Presentació 7a sessió de treball poe
UPC-BarcelonaTech - Innovació i Comunitat
 
Curriculum Vitae
Curriculum VitaeCurriculum Vitae
Curriculum Vitae
vinod maurya
 
0514 luke 14 the certainty of the things you power point church sermon
0514 luke 14 the certainty of the things you power point church sermon0514 luke 14 the certainty of the things you power point church sermon
0514 luke 14 the certainty of the things you power point church sermon
PowerPoint_Sermons
 
Evaluation q1
Evaluation q1Evaluation q1
Evaluation q1
bellaorwin
 
0514 luke 126 god sent the angel gabriel power point church sermon
0514 luke 126 god sent the angel gabriel power point church sermon0514 luke 126 god sent the angel gabriel power point church sermon
0514 luke 126 god sent the angel gabriel power point church sermon
PowerPoint_Sermons
 
Differentiating the message
Differentiating the messageDifferentiating the message
Differentiating the message
Creative New Zealand
 
0514 luke 418 he has anointed me to proclaim power point church sermon
0514 luke 418 he has anointed me to proclaim power point church sermon0514 luke 418 he has anointed me to proclaim power point church sermon
0514 luke 418 he has anointed me to proclaim power point church sermon
PowerPoint_Sermons
 
KPT 6054 - Tugasan 1 Analisis Jurnal
KPT 6054 - Tugasan 1 Analisis JurnalKPT 6054 - Tugasan 1 Analisis Jurnal
KPT 6054 - Tugasan 1 Analisis Jurnal
Hui
 
0514 luke 1619 there was a rich man power point church sermon
0514 luke 1619 there was a rich man power point church sermon0514 luke 1619 there was a rich man power point church sermon
0514 luke 1619 there was a rich man power point church sermon
PowerPoint_Sermons
 
Pascualcha el zoro
Pascualcha el zoroPascualcha el zoro
Pascualcha el zoro
jhoselyndac
 
Sociedada anonima
Sociedada anonimaSociedada anonima
Sociedada anonima
cristopher abad
 
Getting started
Getting startedGetting started
Getting started
Samantha L. Plesser, Esq.
 

Viewers also liked (20)

ATS Company Reports: Puravankara projects ltd.
ATS Company Reports: Puravankara projects ltd.ATS Company Reports: Puravankara projects ltd.
ATS Company Reports: Puravankara projects ltd.
 
Sidas
SidasSidas
Sidas
 
0514 luke 21 the entire roman world power point church sermon
0514 luke 21 the entire roman world power point church sermon0514 luke 21 the entire roman world power point church sermon
0514 luke 21 the entire roman world power point church sermon
 
Sport Science Unit 27 Task 3 1/7
Sport Science Unit 27 Task 3 1/7Sport Science Unit 27 Task 3 1/7
Sport Science Unit 27 Task 3 1/7
 
0514 luke 141 he was being carefully watched power point church sermon
0514 luke 141 he was being carefully watched power point church sermon0514 luke 141 he was being carefully watched power point church sermon
0514 luke 141 he was being carefully watched power point church sermon
 
0514 luke 135 the power of the most high power point church sermon
0514 luke 135 the power of the most high power point church sermon0514 luke 135 the power of the most high power point church sermon
0514 luke 135 the power of the most high power point church sermon
 
Tutkijapalveluiden ajankohtaista, Jussi Heino
Tutkijapalveluiden ajankohtaista, Jussi HeinoTutkijapalveluiden ajankohtaista, Jussi Heino
Tutkijapalveluiden ajankohtaista, Jussi Heino
 
Presentació 7a sessió de treball poe
Presentació 7a sessió de treball poePresentació 7a sessió de treball poe
Presentació 7a sessió de treball poe
 
Curriculum Vitae
Curriculum VitaeCurriculum Vitae
Curriculum Vitae
 
0514 luke 14 the certainty of the things you power point church sermon
0514 luke 14 the certainty of the things you power point church sermon0514 luke 14 the certainty of the things you power point church sermon
0514 luke 14 the certainty of the things you power point church sermon
 
michele creazzi
michele creazzimichele creazzi
michele creazzi
 
Evaluation q1
Evaluation q1Evaluation q1
Evaluation q1
 
0514 luke 126 god sent the angel gabriel power point church sermon
0514 luke 126 god sent the angel gabriel power point church sermon0514 luke 126 god sent the angel gabriel power point church sermon
0514 luke 126 god sent the angel gabriel power point church sermon
 
Differentiating the message
Differentiating the messageDifferentiating the message
Differentiating the message
 
0514 luke 418 he has anointed me to proclaim power point church sermon
0514 luke 418 he has anointed me to proclaim power point church sermon0514 luke 418 he has anointed me to proclaim power point church sermon
0514 luke 418 he has anointed me to proclaim power point church sermon
 
KPT 6054 - Tugasan 1 Analisis Jurnal
KPT 6054 - Tugasan 1 Analisis JurnalKPT 6054 - Tugasan 1 Analisis Jurnal
KPT 6054 - Tugasan 1 Analisis Jurnal
 
0514 luke 1619 there was a rich man power point church sermon
0514 luke 1619 there was a rich man power point church sermon0514 luke 1619 there was a rich man power point church sermon
0514 luke 1619 there was a rich man power point church sermon
 
Pascualcha el zoro
Pascualcha el zoroPascualcha el zoro
Pascualcha el zoro
 
Sociedada anonima
Sociedada anonimaSociedada anonima
Sociedada anonima
 
Getting started
Getting startedGetting started
Getting started
 

Similar to Patient confidentiality training

Hipaa Compliance Training.docx
Hipaa Compliance Training.docxHipaa Compliance Training.docx
Hipaa Compliance Training.docx
emPower eLearning
 
Privacy Compliance
Privacy CompliancePrivacy Compliance
Privacy Compliance
mghuff
 
Patient confidentiality training
Patient confidentiality trainingPatient confidentiality training
Patient confidentiality training
Sheena705
 
Confidentiality in the healthcare system
Confidentiality in the healthcare systemConfidentiality in the healthcare system
Confidentiality in the healthcare system
pfor2012
 
The Ultimate Guide to HIPAA Training Course Online Everything You Need to Kno...
The Ultimate Guide to HIPAA Training Course Online Everything You Need to Kno...The Ultimate Guide to HIPAA Training Course Online Everything You Need to Kno...
The Ultimate Guide to HIPAA Training Course Online Everything You Need to Kno...
Learn2Prevent
 
Confidentiality in health care
Confidentiality in health careConfidentiality in health care
Confidentiality in health care
Amy04Lynn
 
Navigating Healthcare Compliance: A Guide to HIPAA Certification
Navigating Healthcare Compliance: A Guide to HIPAA CertificationNavigating Healthcare Compliance: A Guide to HIPAA Certification
Navigating Healthcare Compliance: A Guide to HIPAA Certification
ShyamMishra72
 
C427 Technology Applications in Healthcare Performance Assessment.docx
C427 Technology Applications in Healthcare Performance Assessment.docxC427 Technology Applications in Healthcare Performance Assessment.docx
C427 Technology Applications in Healthcare Performance Assessment.docx
write22
 
C427 Technology Applications in Healthcare Performance Assessment.docx
C427 Technology Applications in Healthcare Performance Assessment.docxC427 Technology Applications in Healthcare Performance Assessment.docx
C427 Technology Applications in Healthcare Performance Assessment.docx
write31
 
Confidentiality training mha 690
Confidentiality training mha 690Confidentiality training mha 690
Confidentiality training mha 690
KenyaPoole
 
Healthcare Privacy and Confidentiality
Healthcare Privacy and ConfidentialityHealthcare Privacy and Confidentiality
Healthcare Privacy and Confidentiality
jamaciald
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
amartya2087
 
Essential Components of an Effective HIPAA Safeguard Program
Essential Components of an Effective HIPAA Safeguard ProgramEssential Components of an Effective HIPAA Safeguard Program
Essential Components of an Effective HIPAA Safeguard Program
Colington Consulting
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
12ort
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
robyn42
 
Hippa laws
Hippa lawsHippa laws
Hippa laws
Becky Bauer
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
Tabbi Reefer
 
Patient confedentiality ppt
Patient confedentiality pptPatient confedentiality ppt
Patient confedentiality ppt
Yuli Vargas
 
Everlyn moore health care capstone
Everlyn moore health care capstoneEverlyn moore health care capstone
Everlyn moore health care capstone
evelynmoore
 
Is your billing partner hipaa compliant
Is your billing partner hipaa compliantIs your billing partner hipaa compliant
Is your billing partner hipaa compliant
jennyvergeese
 

Similar to Patient confidentiality training (20)

Hipaa Compliance Training.docx
Hipaa Compliance Training.docxHipaa Compliance Training.docx
Hipaa Compliance Training.docx
 
Privacy Compliance
Privacy CompliancePrivacy Compliance
Privacy Compliance
 
Patient confidentiality training
Patient confidentiality trainingPatient confidentiality training
Patient confidentiality training
 
Confidentiality in the healthcare system
Confidentiality in the healthcare systemConfidentiality in the healthcare system
Confidentiality in the healthcare system
 
The Ultimate Guide to HIPAA Training Course Online Everything You Need to Kno...
The Ultimate Guide to HIPAA Training Course Online Everything You Need to Kno...The Ultimate Guide to HIPAA Training Course Online Everything You Need to Kno...
The Ultimate Guide to HIPAA Training Course Online Everything You Need to Kno...
 
Confidentiality in health care
Confidentiality in health careConfidentiality in health care
Confidentiality in health care
 
Navigating Healthcare Compliance: A Guide to HIPAA Certification
Navigating Healthcare Compliance: A Guide to HIPAA CertificationNavigating Healthcare Compliance: A Guide to HIPAA Certification
Navigating Healthcare Compliance: A Guide to HIPAA Certification
 
C427 Technology Applications in Healthcare Performance Assessment.docx
C427 Technology Applications in Healthcare Performance Assessment.docxC427 Technology Applications in Healthcare Performance Assessment.docx
C427 Technology Applications in Healthcare Performance Assessment.docx
 
C427 Technology Applications in Healthcare Performance Assessment.docx
C427 Technology Applications in Healthcare Performance Assessment.docxC427 Technology Applications in Healthcare Performance Assessment.docx
C427 Technology Applications in Healthcare Performance Assessment.docx
 
Confidentiality training mha 690
Confidentiality training mha 690Confidentiality training mha 690
Confidentiality training mha 690
 
Healthcare Privacy and Confidentiality
Healthcare Privacy and ConfidentialityHealthcare Privacy and Confidentiality
Healthcare Privacy and Confidentiality
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
 
Essential Components of an Effective HIPAA Safeguard Program
Essential Components of an Effective HIPAA Safeguard ProgramEssential Components of an Effective HIPAA Safeguard Program
Essential Components of an Effective HIPAA Safeguard Program
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Hippa laws
Hippa lawsHippa laws
Hippa laws
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Patient confedentiality ppt
Patient confedentiality pptPatient confedentiality ppt
Patient confedentiality ppt
 
Everlyn moore health care capstone
Everlyn moore health care capstoneEverlyn moore health care capstone
Everlyn moore health care capstone
 
Is your billing partner hipaa compliant
Is your billing partner hipaa compliantIs your billing partner hipaa compliant
Is your billing partner hipaa compliant
 

Recently uploaded

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 

Recently uploaded (20)

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 

Patient confidentiality training

  • 1. Patient Confidentiality Training Patricia Burton MHA 690: Health Care Capstone Kathy Wood July 10, 2014
  • 2. Health Insurance Portability & Accountability Act- HIPAA • HIPAA (1996) was enforced to protect the privacy of health information. This act also set rules and national standards for the security of electronic protected health information. With the HIPAA Breach Notification Rule, it requires business associates to notify those affected following a breach of unsecured protected health information. Patient Safety Rule protects identifiable information from being used to analyze patient safety events and improve patient safety. The Act includes punishment for those in violation of patient privacy. With the proper training and education, patients can be educated as well as employees. Patients will be able to trust their providers with the access of their health information.
  • 3. HIPAA Training • With this training, it includes educational courses, hands on training, computer training, as well as agreements in the workplace. • The training can be conducted in person or online computerized training. • The training will cover ways to protect patient health information, privacy policy and procedure, methods for resolving breaches, and the consequence of HIPAA violations.
  • 4. HIPAA Training • Employees will also go through a series of systems training for the health care system used to access patient information. • Also as a part of the HIPAA training, each employee is required to have a user name and receive a password for direct access to patient information. • Throughout training, it will be demonstrated as to what is considered a HIPAA violation as well as ways in which a HIPAA violation may be avoided.
  • 5. Certification, Renewal, and Outcomes • Upon completion of the HIPAA training and computer system training, employees will receive a certification of patient confidentiality training. • The HIPAA training is to be renewed annually and the system computer training can be done with significant changes within the computer system, system updates, or change in systems. • It is important for employers to make sure that the staff within the organization who have access to patient information have fulfilled the requirements of training. • Training can lessen the occurrence of violations in patient privacy and confidentially as well as realm proof of the proper employee training if such issues were to arise.
  • 6. Reference • Health Information Privacy. (2014). Retrieved from http://www.hhs.gov/ocr/privacy/