SlideShare a Scribd company logo
1 of 7
Patient Privacy and
Confidentiality training
      Tony Robinson
Accessing patient’s information
• Access patient information as it pertains to
• the performance of your job
• Access the minimum amount of information
  needed to do the job
• Do Not access information you DO NOT need
  to complete the task
Systems Access
• Do not use clinical/business systems to look up
  phone numbers or addresses of patients, coworkers,
  friends, family, etc.

• Do not use the clinical/business systems to
  access information to satisfy curiosity about a patient
  or coworker such as age or birth date and such.

• Be especially careful with ALL PHI about other
  employees. Employees have expressed many
  concerns about the confidentiality of their PHI.
What is a breach of
           confidentiality?
A breach of confidentiality is a disclosure to a
third party, without patient consent or court
order, of private information that the physician
has learned within the patient-physician
relationship. Disclosure can be oral or written, by
telephone or fax, or electronically, for example,
via e-mail or health information networks. The
medium is irrelevant, although special security
requirements may apply to the electronic transfer
of information.
Consequences for
        breach of confidentiality?
• Dismissal/termination or loss of privileges

  Civil or criminal penalties andsanctions,
  including:
• Monetary fines
• Imprisonment
• Violation of HIPAA Privacy Rule may be
  reported to the Federal Office for Civil Rights.
Exceptions to authorization
              requirements
1. Medical emergencies
2. Reporting information on communicable
   diseases to the Health Department
3. Reporting child abuse, spousal abuse or elder
  adult abuse
4. Organ donation activities
5. Disclosures required or allowed by law
Who to Contact if Breach is suspected
•   Your Supervisor/Manager
•   Your Department Compliance Coordinator
•   The Privacy Officer
•   Information Security Officer
•   Compliance hot-line 1-800-hot-line

More Related Content

What's hot

Healthcare confidentiality training.2013bev
Healthcare confidentiality training.2013bevHealthcare confidentiality training.2013bev
Healthcare confidentiality training.2013bevblk70130
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentialityMOTHOM0556
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcarekmasterson
 
Confidentiality in the Workplace
Confidentiality in the WorkplaceConfidentiality in the Workplace
Confidentiality in the Workplacesalvarez63
 
Annual HIPAA Education
Annual HIPAA EducationAnnual HIPAA Education
Annual HIPAA EducationDirkRhodes
 
Health care confidentiality and privacy
Health care confidentiality and privacyHealth care confidentiality and privacy
Health care confidentiality and privacysawanda
 
MHA 690: Confidentiality
MHA 690: ConfidentialityMHA 690: Confidentiality
MHA 690: Confidentialityvpharoah
 
Confidentiality
ConfidentialityConfidentiality
ConfidentialityLLSS64
 
MHA690 Patient Confidentiality Training
MHA690 Patient Confidentiality TrainingMHA690 Patient Confidentiality Training
MHA690 Patient Confidentiality Trainingrgasaway
 
Confidentiality
ConfidentialityConfidentiality
Confidentialitymaejj
 
Confidentiality training
Confidentiality trainingConfidentiality training
Confidentiality trainingmaejj
 
Hippa health admin week 1 question 2
Hippa health admin week 1 question 2Hippa health admin week 1 question 2
Hippa health admin week 1 question 2Ashford Univeristy
 
Privacy training
Privacy trainingPrivacy training
Privacy trainingmrspaige07
 
Confidentiality
ConfidentialityConfidentiality
ConfidentialityDeniseMHA
 
William schuch week 1 mha690 capstone ppp
William schuch week 1 mha690 capstone pppWilliam schuch week 1 mha690 capstone ppp
William schuch week 1 mha690 capstone pppWilliam Schuch
 
hipaa privacy and confidentiality
hipaa privacy and confidentialityhipaa privacy and confidentiality
hipaa privacy and confidentialityariele91
 

What's hot (20)

Healthcare confidentiality training.2013bev
Healthcare confidentiality training.2013bevHealthcare confidentiality training.2013bev
Healthcare confidentiality training.2013bev
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentiality
 
Mha wk 1 dis 2
Mha wk 1 dis 2Mha wk 1 dis 2
Mha wk 1 dis 2
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcare
 
Confidentiality in the Workplace
Confidentiality in the WorkplaceConfidentiality in the Workplace
Confidentiality in the Workplace
 
Annual HIPAA Education
Annual HIPAA EducationAnnual HIPAA Education
Annual HIPAA Education
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Health care confidentiality and privacy
Health care confidentiality and privacyHealth care confidentiality and privacy
Health care confidentiality and privacy
 
MHA 690: Confidentiality
MHA 690: ConfidentialityMHA 690: Confidentiality
MHA 690: Confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
MHA690 Patient Confidentiality Training
MHA690 Patient Confidentiality TrainingMHA690 Patient Confidentiality Training
MHA690 Patient Confidentiality Training
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality training
Confidentiality trainingConfidentiality training
Confidentiality training
 
Hippa health admin week 1 question 2
Hippa health admin week 1 question 2Hippa health admin week 1 question 2
Hippa health admin week 1 question 2
 
Privacy training
Privacy trainingPrivacy training
Privacy training
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
William schuch week 1 mha690 capstone ppp
William schuch week 1 mha690 capstone pppWilliam schuch week 1 mha690 capstone ppp
William schuch week 1 mha690 capstone ppp
 
hipaa privacy and confidentiality
hipaa privacy and confidentialityhipaa privacy and confidentiality
hipaa privacy and confidentiality
 

Viewers also liked

Ethics of Certified Peer Recovery Specialists-Presentation-Vik Moore, MS
Ethics of Certified Peer Recovery Specialists-Presentation-Vik Moore, MSEthics of Certified Peer Recovery Specialists-Presentation-Vik Moore, MS
Ethics of Certified Peer Recovery Specialists-Presentation-Vik Moore, MSVik Moore
 
Breaching Boundaries Ethics 20101116 V3x
Breaching Boundaries   Ethics 20101116 V3xBreaching Boundaries   Ethics 20101116 V3x
Breaching Boundaries Ethics 20101116 V3xpdenayer
 
Distance is the Best Armor
Distance is the Best ArmorDistance is the Best Armor
Distance is the Best ArmorJohn Gavazzi
 
Lessons From Bad History and Good Sense
Lessons From Bad History and Good SenseLessons From Bad History and Good Sense
Lessons From Bad History and Good SenseJohn Gavazzi
 
Ethics and boundaries
Ethics and boundariesEthics and boundaries
Ethics and boundariesdrrspepper
 
Boundaries Crossing
Boundaries CrossingBoundaries Crossing
Boundaries CrossingJohn Gavazzi
 
Boundaries And Ethics In Residential Settings 2
Boundaries And Ethics In Residential Settings 2Boundaries And Ethics In Residential Settings 2
Boundaries And Ethics In Residential Settings 2skucklick
 
Confidentiality vs
Confidentiality vsConfidentiality vs
Confidentiality vsKayla
 
Ethical and Moral Foundations in Mental Health Treatment
Ethical and Moral Foundations in Mental Health TreatmentEthical and Moral Foundations in Mental Health Treatment
Ethical and Moral Foundations in Mental Health TreatmentJohn Gavazzi
 
Boundaries presentation p.l.
Boundaries presentation p.l.Boundaries presentation p.l.
Boundaries presentation p.l.Hannahmk12
 
Morals and ethics
Morals and ethicsMorals and ethics
Morals and ethicsPaul Irving
 
Ethical Boundaries
Ethical BoundariesEthical Boundaries
Ethical Boundariespayneje
 
Impact of culture on mental illness/ Transcultural Psychiatry
Impact of culture on mental illness/ Transcultural Psychiatry Impact of culture on mental illness/ Transcultural Psychiatry
Impact of culture on mental illness/ Transcultural Psychiatry Dr. Amit Chougule
 
Principles of ethics and code of professional conduct
Principles of ethics and code of professional conductPrinciples of ethics and code of professional conduct
Principles of ethics and code of professional conductOnessa Morante
 
Ethical issues in research
Ethical issues in researchEthical issues in research
Ethical issues in researchR.Harish Kumar
 

Viewers also liked (20)

Ethics of Certified Peer Recovery Specialists-Presentation-Vik Moore, MS
Ethics of Certified Peer Recovery Specialists-Presentation-Vik Moore, MSEthics of Certified Peer Recovery Specialists-Presentation-Vik Moore, MS
Ethics of Certified Peer Recovery Specialists-Presentation-Vik Moore, MS
 
Breaching Boundaries Ethics 20101116 V3x
Breaching Boundaries   Ethics 20101116 V3xBreaching Boundaries   Ethics 20101116 V3x
Breaching Boundaries Ethics 20101116 V3x
 
Distance is the Best Armor
Distance is the Best ArmorDistance is the Best Armor
Distance is the Best Armor
 
Lessons From Bad History and Good Sense
Lessons From Bad History and Good SenseLessons From Bad History and Good Sense
Lessons From Bad History and Good Sense
 
Ethics and boundaries
Ethics and boundariesEthics and boundaries
Ethics and boundaries
 
Chap1
Chap1Chap1
Chap1
 
Boundaries Crossing
Boundaries CrossingBoundaries Crossing
Boundaries Crossing
 
Ethics In Mental Health
Ethics In Mental HealthEthics In Mental Health
Ethics In Mental Health
 
Boundaries And Ethics In Residential Settings 2
Boundaries And Ethics In Residential Settings 2Boundaries And Ethics In Residential Settings 2
Boundaries And Ethics In Residential Settings 2
 
Confidentiality vs
Confidentiality vsConfidentiality vs
Confidentiality vs
 
Ethical and Moral Foundations in Mental Health Treatment
Ethical and Moral Foundations in Mental Health TreatmentEthical and Moral Foundations in Mental Health Treatment
Ethical and Moral Foundations in Mental Health Treatment
 
Boundaries presentation p.l.
Boundaries presentation p.l.Boundaries presentation p.l.
Boundaries presentation p.l.
 
Just ethics
Just ethicsJust ethics
Just ethics
 
Ethics issues and boundaries training
Ethics issues and boundaries trainingEthics issues and boundaries training
Ethics issues and boundaries training
 
Ethical Considerations for Christian Mental Health Clinicians
Ethical Considerations for Christian Mental Health CliniciansEthical Considerations for Christian Mental Health Clinicians
Ethical Considerations for Christian Mental Health Clinicians
 
Morals and ethics
Morals and ethicsMorals and ethics
Morals and ethics
 
Ethical Boundaries
Ethical BoundariesEthical Boundaries
Ethical Boundaries
 
Impact of culture on mental illness/ Transcultural Psychiatry
Impact of culture on mental illness/ Transcultural Psychiatry Impact of culture on mental illness/ Transcultural Psychiatry
Impact of culture on mental illness/ Transcultural Psychiatry
 
Principles of ethics and code of professional conduct
Principles of ethics and code of professional conductPrinciples of ethics and code of professional conduct
Principles of ethics and code of professional conduct
 
Ethical issues in research
Ethical issues in researchEthical issues in research
Ethical issues in research
 

Similar to Patient privacy and confidentiality training

Welcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityWelcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityveve1728
 
Are You HIPAA Safe?
Are You HIPAA Safe?Are You HIPAA Safe?
Are You HIPAA Safe?TriageLogic
 
Data Security and Privacy Practices
Data Security and Privacy PracticesData Security and Privacy Practices
Data Security and Privacy PracticesSpringfield Clinic
 
Hipaa basics.pp2
Hipaa basics.pp2Hipaa basics.pp2
Hipaa basics.pp2martykoepke
 
Annual HIPAA Education
Annual HIPAA EducationAnnual HIPAA Education
Annual HIPAA EducationDirkRhodes
 
2018-HIPAA-Renewal-Training.pptx
2018-HIPAA-Renewal-Training.pptx2018-HIPAA-Renewal-Training.pptx
2018-HIPAA-Renewal-Training.pptxFariida Osman
 
Hipaa101 training2020
Hipaa101 training2020Hipaa101 training2020
Hipaa101 training2020VicHaight
 
Mha 690 week 1 discussion 2 patient privacy
Mha 690 week 1 discussion 2 patient privacyMha 690 week 1 discussion 2 patient privacy
Mha 690 week 1 discussion 2 patient privacyJacquelyn Treadway
 
Ruggiero.hipaa training
Ruggiero.hipaa trainingRuggiero.hipaa training
Ruggiero.hipaa trainingGina Ruggiero
 
Hipaa
HipaaHipaa
Hipaawcmc
 
Phi presentation week one
Phi presentation week onePhi presentation week one
Phi presentation week oneChelleEast
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcaresrwindon
 
Healthcare Compliance and Privacy/Security Training by UCONN
Healthcare Compliance and Privacy/Security Training by UCONNHealthcare Compliance and Privacy/Security Training by UCONN
Healthcare Compliance and Privacy/Security Training by UCONNAtlantic Training, LLC.
 

Similar to Patient privacy and confidentiality training (20)

5 hipaa training
5 hipaa training5 hipaa training
5 hipaa training
 
Welcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityWelcome to the hippa, privacy and security
Welcome to the hippa, privacy and security
 
Hipaa
HipaaHipaa
Hipaa
 
Are You HIPAA Safe?
Are You HIPAA Safe?Are You HIPAA Safe?
Are You HIPAA Safe?
 
Data Security and Privacy Practices
Data Security and Privacy PracticesData Security and Privacy Practices
Data Security and Privacy Practices
 
5 hipaa training
5 hipaa training5 hipaa training
5 hipaa training
 
Hipaa basics.pp2
Hipaa basics.pp2Hipaa basics.pp2
Hipaa basics.pp2
 
Hipaa 2012
Hipaa 2012Hipaa 2012
Hipaa 2012
 
Annual HIPAA Education
Annual HIPAA EducationAnnual HIPAA Education
Annual HIPAA Education
 
2018-HIPAA-Renewal-Training.pptx
2018-HIPAA-Renewal-Training.pptx2018-HIPAA-Renewal-Training.pptx
2018-HIPAA-Renewal-Training.pptx
 
UNA HIPAA Training 8-13
UNA HIPAA Training   8-13UNA HIPAA Training   8-13
UNA HIPAA Training 8-13
 
Hipaa101 training2020
Hipaa101 training2020Hipaa101 training2020
Hipaa101 training2020
 
Mha 690 week 1 discussion 2 patient privacy
Mha 690 week 1 discussion 2 patient privacyMha 690 week 1 discussion 2 patient privacy
Mha 690 week 1 discussion 2 patient privacy
 
Ruggiero.hipaa training
Ruggiero.hipaa trainingRuggiero.hipaa training
Ruggiero.hipaa training
 
Understanding hipaa
Understanding hipaaUnderstanding hipaa
Understanding hipaa
 
Hipaa
HipaaHipaa
Hipaa
 
Phi presentation week one
Phi presentation week onePhi presentation week one
Phi presentation week one
 
Hipaa pesentation
Hipaa pesentationHipaa pesentation
Hipaa pesentation
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcare
 
Healthcare Compliance and Privacy/Security Training by UCONN
Healthcare Compliance and Privacy/Security Training by UCONNHealthcare Compliance and Privacy/Security Training by UCONN
Healthcare Compliance and Privacy/Security Training by UCONN
 

Recently uploaded

Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 

Recently uploaded (20)

Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 

Patient privacy and confidentiality training

  • 1. Patient Privacy and Confidentiality training Tony Robinson
  • 2. Accessing patient’s information • Access patient information as it pertains to • the performance of your job • Access the minimum amount of information needed to do the job • Do Not access information you DO NOT need to complete the task
  • 3. Systems Access • Do not use clinical/business systems to look up phone numbers or addresses of patients, coworkers, friends, family, etc. • Do not use the clinical/business systems to access information to satisfy curiosity about a patient or coworker such as age or birth date and such. • Be especially careful with ALL PHI about other employees. Employees have expressed many concerns about the confidentiality of their PHI.
  • 4. What is a breach of confidentiality? A breach of confidentiality is a disclosure to a third party, without patient consent or court order, of private information that the physician has learned within the patient-physician relationship. Disclosure can be oral or written, by telephone or fax, or electronically, for example, via e-mail or health information networks. The medium is irrelevant, although special security requirements may apply to the electronic transfer of information.
  • 5. Consequences for breach of confidentiality? • Dismissal/termination or loss of privileges Civil or criminal penalties andsanctions, including: • Monetary fines • Imprisonment • Violation of HIPAA Privacy Rule may be reported to the Federal Office for Civil Rights.
  • 6. Exceptions to authorization requirements 1. Medical emergencies 2. Reporting information on communicable diseases to the Health Department 3. Reporting child abuse, spousal abuse or elder adult abuse 4. Organ donation activities 5. Disclosures required or allowed by law
  • 7. Who to Contact if Breach is suspected • Your Supervisor/Manager • Your Department Compliance Coordinator • The Privacy Officer • Information Security Officer • Compliance hot-line 1-800-hot-line