SlideShare a Scribd company logo
1 of 10
Confidential Healthcare and
HIPPAcracies
Makena Lei Byers
MHA 690

Dr. Hwang-Ji Lu
November 14th 2013
November 14, 2013
Why trainings in confidentiality are extremely important:
"All professionals are prone to boundary transgressions; explicit training
about and the maintenance of appropriate role balance will help to ensure
high-functioning relationships and maximize the quality of patient care,
resident education, faculty and resident satisfaction, and modeling of
professional behavior to improve competencies as clinicians and
educators."(Reitz, 2013)

It is crucial that we inform ourselves and others on the HIPAA laws and
regulations. Breach of contract, indiscretion, Informed consent, “Do no
harm”, the threat of self-destruction are just a few of the great
understandings which we must take into account.
Why and how we must protect patient information
When determining eligibility for certain services and providing needed
and appropriate resources, human service agencies and education
institutions often require that children and families share very private
information about themselves. Laws and statutes are in place to protect
the privacy of these individuals and to ensure that this information is
released only when necessary."(California Univ., 2002)

All employees must be made aware of the imperative significance of
safeguarding every patient’s confidential material.
The reasons for observing ethical behavior:
"Most primary care training programs have a behavioral science
professional on faculty. Despite more similarities than differences among
the roles filled by behavioral health professionals within primary care
medicine residencies, each professional guild has a distinct set of ethical
principles." (Reitz, 2013)
Patients have individual privacy rights. There may be multifarious ethical
codes postulate at each hospital and every other health care facility.
Overall, in omniscience, The law requires that we provide and bear the
human rights of privacy to our patients.
Training: Behaving Unethically is Punishable. Please inform others.
“Among the threats to the four information security aspects:
confidentiality, integrity, availability, and quality; confidentiality threats
were identified as most serious, with one threat given an unacceptable
level of High risk." (Henrickson, 2013)
The Misconduct that occurred at UCLA in regards to the abusive
speculation of private medical records, (some may have been those who
were in the limelight with the media), must be carefully analyzed and born
into retrospect as a greater lesson on what virtue is versus indelicate
“MYOB” patterns which only afford abrasiveness, and are far from the
vicinities of healing.
Adopting a higher security system &
Making all aware of the risks of technological escapades(!):
“
Because of the creation and use of information online and the widespread
use of the internet and Web 2.0 platforms, physicians and others are
increasingly required to consider how best to protect patient interests
and apply principles of professionalism to new settings" (Farnan, 2013)
It then becomes vital that information which is privy to the patient and
their honorable confidantes is never ever shared or speculated
or…heaven forbid, stolen from any Health Care System
Confidentiality

"Confidentiality Risks in home are different from those in a more
controlled environment, such as a hospital and electronic equipment
located in private homes and commuting via internet is a more exposed
unauthorized access. By implementing certain measures it has been
possible to design a home based service which ensures the necessary
level of information and security privacy." (Henrickson, 2013)
Even when a facility is established out of a residence, confidentiality and
security must be cardinal.
In Conclusion: Safeguarding
"The Health Information Trust Alliance (HITRUST) was born out of the belief that
information security should be a core pillar of, rather than an obstacle to, the
broad adoption of health information systems and exchanges. HITRUST, in
collaboration with healthcare, business, technology and information security
leaders, has established the Common Security Framework (CSF), a certifiable
framework that can be used by any and all organizations that create, access,
store, or exchange personal health and financial information. The CSF is an
information security framework that harmonizes the requirements of existing
standards and regulations, including federal (HIPAA, HITECH), third party (PCI,
COBIT), and government (NIST, FTC). www.hitrustalliance.net." (Accretive Health,
2013)

The law condones powerful training measures and heightened security systems.
In this way, the law empowers patients, employees and Health Care
Establishments by blocking or legally refining those who disregard the veritable
conduction of safe and Top Quality Management.
References

Accretive Health, I. c. (3). Accretive Health Achieves Industry-Leading HITRUST
Certification for Data Security and Protection of Private Patient Health Information.
Business Wire (English).

Aronovitz, L. G. (1999). Medicare: HCFA Needs to Better Protect Beneficiaries'
Confidential Health Information: T-HEHS-99-172. GAO Reports, 1.

California Univ., L. s. (2002). Confidentiality. A Center Quick Training Aid.

Farnan, J. M., Sulmasy, L., Worster, B. K., Chaudhry, H. J., Rhyne, J. A., & Arora, V. M.
(2013). Online Medical Professionalism: Patient and Public Relationships: Policy
Statement From the American College of Physicians and the Federation of State
Medical Boards. Annals Of Internal Medicine, 158(8)
References (Continued)

Henrickson, Eva. (2013) BMC Medical Informatics & Decision Making. 2013, Vol. 13
Issue 1, p1-13. 13p. 3 Charts.

http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=90292245&site=edslive
Reitz, Randall, St. Mary’s Family Medicine Residency, 2698 Patterson Road, Grand
Junction, CO, US, 81506, reitz.randall@gmail.com

Wolper, L.F. (2011). Health care administration: Managing organized delivery
systems (5th ed.). Boston: Jones and Bartlett.

More Related Content

What's hot

B johnson unit 3 final project completion
B johnson unit 3 final project completionB johnson unit 3 final project completion
B johnson unit 3 final project completionBrittany Johnson
 
Patient-Centric Privacy: Envisioning Collaboration Between Payers, Providers...
Patient-Centric Privacy:  Envisioning Collaboration Between Payers, Providers...Patient-Centric Privacy:  Envisioning Collaboration Between Payers, Providers...
Patient-Centric Privacy: Envisioning Collaboration Between Payers, Providers...Tyrone Grandison
 
Confidentiality week 1 discussion 2 mha690 healthcare capstone
Confidentiality  week 1 discussion 2 mha690 healthcare capstoneConfidentiality  week 1 discussion 2 mha690 healthcare capstone
Confidentiality week 1 discussion 2 mha690 healthcare capstoneRachelMargrave5
 
Security Best Practices for Health Information Exchange
Security Best Practices for Health Information ExchangeSecurity Best Practices for Health Information Exchange
Security Best Practices for Health Information ExchangeTrend Micro
 
Healthcare evolves with Data Interoperability
Healthcare evolves with Data InteroperabilityHealthcare evolves with Data Interoperability
Healthcare evolves with Data InteroperabilityDinesh V
 
Over 750 Healthcare Organizations to Participate in CyberRX 2.0
Over 750 Healthcare Organizations to Participate in CyberRX 2.0Over 750 Healthcare Organizations to Participate in CyberRX 2.0
Over 750 Healthcare Organizations to Participate in CyberRX 2.0gentleformula9025
 
Confidentiality
ConfidentialityConfidentiality
ConfidentialityDeniseMHA
 
Priv&security&profin electrcommunicationsrev9 23
Priv&security&profin electrcommunicationsrev9 23Priv&security&profin electrcommunicationsrev9 23
Priv&security&profin electrcommunicationsrev9 23Deven McGraw
 

What's hot (20)

Legal Aspects in Health Informatics
Legal Aspects in Health InformaticsLegal Aspects in Health Informatics
Legal Aspects in Health Informatics
 
B johnson unit 3 final project completion
B johnson unit 3 final project completionB johnson unit 3 final project completion
B johnson unit 3 final project completion
 
Brent Mittelstadt, "From Protecting Individuals to Groups in Biomedical Big D...
Brent Mittelstadt, "From Protecting Individuals to Groups in Biomedical Big D...Brent Mittelstadt, "From Protecting Individuals to Groups in Biomedical Big D...
Brent Mittelstadt, "From Protecting Individuals to Groups in Biomedical Big D...
 
Patient-Centric Privacy: Envisioning Collaboration Between Payers, Providers...
Patient-Centric Privacy:  Envisioning Collaboration Between Payers, Providers...Patient-Centric Privacy:  Envisioning Collaboration Between Payers, Providers...
Patient-Centric Privacy: Envisioning Collaboration Between Payers, Providers...
 
DVHIMSS Ensuring Privacy and Security of HIEs in PA
DVHIMSS Ensuring Privacy and Security of HIEs in PADVHIMSS Ensuring Privacy and Security of HIEs in PA
DVHIMSS Ensuring Privacy and Security of HIEs in PA
 
A12_Beyond_HIPAA_PPT1
A12_Beyond_HIPAA_PPT1A12_Beyond_HIPAA_PPT1
A12_Beyond_HIPAA_PPT1
 
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
 
Data Protection In Ghana
Data Protection In GhanaData Protection In Ghana
Data Protection In Ghana
 
Confidentiality week 1 discussion 2 mha690 healthcare capstone
Confidentiality  week 1 discussion 2 mha690 healthcare capstoneConfidentiality  week 1 discussion 2 mha690 healthcare capstone
Confidentiality week 1 discussion 2 mha690 healthcare capstone
 
Mha690 wk1 dis2
Mha690 wk1 dis2Mha690 wk1 dis2
Mha690 wk1 dis2
 
Margaret Foster Riley, "Big Data, HIPAA, and the Common Rule: Time for Big Ch...
Margaret Foster Riley, "Big Data, HIPAA, and the Common Rule: Time for Big Ch...Margaret Foster Riley, "Big Data, HIPAA, and the Common Rule: Time for Big Ch...
Margaret Foster Riley, "Big Data, HIPAA, and the Common Rule: Time for Big Ch...
 
Security Best Practices for Health Information Exchange
Security Best Practices for Health Information ExchangeSecurity Best Practices for Health Information Exchange
Security Best Practices for Health Information Exchange
 
EHLP - July 2015 pg 6-8
EHLP - July 2015 pg 6-8EHLP - July 2015 pg 6-8
EHLP - July 2015 pg 6-8
 
Healthcare evolves with Data Interoperability
Healthcare evolves with Data InteroperabilityHealthcare evolves with Data Interoperability
Healthcare evolves with Data Interoperability
 
Over 750 Healthcare Organizations to Participate in CyberRX 2.0
Over 750 Healthcare Organizations to Participate in CyberRX 2.0Over 750 Healthcare Organizations to Participate in CyberRX 2.0
Over 750 Healthcare Organizations to Participate in CyberRX 2.0
 
Developing A Privacy Culture In Health Care Oganizations
Developing A Privacy Culture In Health Care OganizationsDeveloping A Privacy Culture In Health Care Oganizations
Developing A Privacy Culture In Health Care Oganizations
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Legal Aspects in Health Informatics
Legal Aspects in Health InformaticsLegal Aspects in Health Informatics
Legal Aspects in Health Informatics
 
Timo Minssen, "Big Data and Intellectual Property Rights in the Health and Li...
Timo Minssen, "Big Data and Intellectual Property Rights in the Health and Li...Timo Minssen, "Big Data and Intellectual Property Rights in the Health and Li...
Timo Minssen, "Big Data and Intellectual Property Rights in the Health and Li...
 
Priv&security&profin electrcommunicationsrev9 23
Priv&security&profin electrcommunicationsrev9 23Priv&security&profin electrcommunicationsrev9 23
Priv&security&profin electrcommunicationsrev9 23
 

Viewers also liked

Wooden Mahogany models
Wooden Mahogany modelsWooden Mahogany models
Wooden Mahogany modelsDavid Joe
 
2013 10-03 3-4-природные_территории
2013 10-03 3-4-природные_территории2013 10-03 3-4-природные_территории
2013 10-03 3-4-природные_территорииIlay Evteev
 
shutter island product research
shutter island product research shutter island product research
shutter island product research ladanjm
 
2013 10-03 3-8-план_реализации
2013 10-03 3-8-план_реализации2013 10-03 3-8-план_реализации
2013 10-03 3-8-план_реализацииIlay Evteev
 
Presentacion calistro hernandez
Presentacion calistro hernandezPresentacion calistro hernandez
Presentacion calistro hernandez265478
 
Surviving the dry
Surviving the drySurviving the dry
Surviving the dryagreenville
 
Resumania
ResumaniaResumania
Resumaniakl jkl
 
презентация центра
презентация центрапрезентация центра
презентация центраIlay Evteev
 
My sql and jdbc tutorial
My sql and jdbc tutorialMy sql and jdbc tutorial
My sql and jdbc tutorialManoj Kumar
 
Research for documentary
Research for documentaryResearch for documentary
Research for documentarymorgi_fearnz
 
Out of depth evaluation
Out of depth evaluation Out of depth evaluation
Out of depth evaluation ladanjm
 
R.d.sinel nikov,t4 uchenie_o_nervnoj_sisteme_i_organax_chuvstv
R.d.sinel nikov,t4 uchenie_o_nervnoj_sisteme_i_organax_chuvstvR.d.sinel nikov,t4 uchenie_o_nervnoj_sisteme_i_organax_chuvstv
R.d.sinel nikov,t4 uchenie_o_nervnoj_sisteme_i_organax_chuvstvВладимир Волошин
 
Клуб генподрядчиков 2012
Клуб генподрядчиков   2012Клуб генподрядчиков   2012
Клуб генподрядчиков 2012Senur
 
το πράσινο στον πλανήτη
το πράσινο στον πλανήτητο πράσινο στον πλανήτη
το πράσινο στον πλανήτηMaria Nyfoudi
 
παναγιώτης αθανασόπουλος
παναγιώτης αθανασόπουλοςπαναγιώτης αθανασόπουλος
παναγιώτης αθανασόπουλοςMaria Nyfoudi
 

Viewers also liked (20)

Wooden Mahogany models
Wooden Mahogany modelsWooden Mahogany models
Wooden Mahogany models
 
2013 10-03 3-4-природные_территории
2013 10-03 3-4-природные_территории2013 10-03 3-4-природные_территории
2013 10-03 3-4-природные_территории
 
Yoga
YogaYoga
Yoga
 
shutter island product research
shutter island product research shutter island product research
shutter island product research
 
2013 10-03 3-8-план_реализации
2013 10-03 3-8-план_реализации2013 10-03 3-8-план_реализации
2013 10-03 3-8-план_реализации
 
Presentacion calistro hernandez
Presentacion calistro hernandezPresentacion calistro hernandez
Presentacion calistro hernandez
 
Surviving the dry
Surviving the drySurviving the dry
Surviving the dry
 
Mystic rudraksh
Mystic rudrakshMystic rudraksh
Mystic rudraksh
 
Resumania
ResumaniaResumania
Resumania
 
презентация центра
презентация центрапрезентация центра
презентация центра
 
My sql and jdbc tutorial
My sql and jdbc tutorialMy sql and jdbc tutorial
My sql and jdbc tutorial
 
Research for documentary
Research for documentaryResearch for documentary
Research for documentary
 
what is a car wrap?
what is a car wrap?what is a car wrap?
what is a car wrap?
 
Out of depth evaluation
Out of depth evaluation Out of depth evaluation
Out of depth evaluation
 
Spdy protocol
Spdy protocolSpdy protocol
Spdy protocol
 
R.d.sinel nikov,t4 uchenie_o_nervnoj_sisteme_i_organax_chuvstv
R.d.sinel nikov,t4 uchenie_o_nervnoj_sisteme_i_organax_chuvstvR.d.sinel nikov,t4 uchenie_o_nervnoj_sisteme_i_organax_chuvstv
R.d.sinel nikov,t4 uchenie_o_nervnoj_sisteme_i_organax_chuvstv
 
Клуб генподрядчиков 2012
Клуб генподрядчиков   2012Клуб генподрядчиков   2012
Клуб генподрядчиков 2012
 
Tendelta measurement
Tendelta measurementTendelta measurement
Tendelta measurement
 
το πράσινο στον πλανήτη
το πράσινο στον πλανήτητο πράσινο στον πλανήτη
το πράσινο στον πλανήτη
 
παναγιώτης αθανασόπουλος
παναγιώτης αθανασόπουλοςπαναγιώτης αθανασόπουλος
παναγιώτης αθανασόπουλος
 

Similar to Power point project for submission ppt (2)

Implementing The Affordable Care Act Essay
Implementing The Affordable Care Act EssayImplementing The Affordable Care Act Essay
Implementing The Affordable Care Act EssayMichelle Love
 
1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docx1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docxteresehearn
 
Virtual Mentor American Medical Association Journal of Ethi.docx
Virtual Mentor  American Medical Association Journal of Ethi.docxVirtual Mentor  American Medical Association Journal of Ethi.docx
Virtual Mentor American Medical Association Journal of Ethi.docxsheronlewthwaite
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Patient Confidentiality wk1_dq2_mha690
Patient Confidentiality wk1_dq2_mha690Patient Confidentiality wk1_dq2_mha690
Patient Confidentiality wk1_dq2_mha690BrooklynRose1267
 
Confidentiality Of Health Information Essays
Confidentiality Of Health Information EssaysConfidentiality Of Health Information Essays
Confidentiality Of Health Information EssaysJessica Tanner
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippamaggie_Platt
 
Confidentiality training initiatives
Confidentiality training initiativesConfidentiality training initiatives
Confidentiality training initiativeslycbask
 
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boroEhr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla borokayla_ann_30
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcarekmasterson
 
Mha 690 week 1 discussion
Mha 690 week 1 discussionMha 690 week 1 discussion
Mha 690 week 1 discussionMoeHamdan5
 
A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )Tasha Holloway
 
International Journal of Telerehabilitation • telere.docx
International Journal of Telerehabilitation • telere.docxInternational Journal of Telerehabilitation • telere.docx
International Journal of Telerehabilitation • telere.docxtarifarmarie
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxkarlhennesey
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxhoney690131
 

Similar to Power point project for submission ppt (2) (20)

Implementing The Affordable Care Act Essay
Implementing The Affordable Care Act EssayImplementing The Affordable Care Act Essay
Implementing The Affordable Care Act Essay
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docx1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docx
 
Virtual Mentor American Medical Association Journal of Ethi.docx
Virtual Mentor  American Medical Association Journal of Ethi.docxVirtual Mentor  American Medical Association Journal of Ethi.docx
Virtual Mentor American Medical Association Journal of Ethi.docx
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Patient Confidentiality wk1_dq2_mha690
Patient Confidentiality wk1_dq2_mha690Patient Confidentiality wk1_dq2_mha690
Patient Confidentiality wk1_dq2_mha690
 
HIPAA
HIPAAHIPAA
HIPAA
 
Confidentiality Of Health Information Essays
Confidentiality Of Health Information EssaysConfidentiality Of Health Information Essays
Confidentiality Of Health Information Essays
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
Confidentiality training initiatives
Confidentiality training initiativesConfidentiality training initiatives
Confidentiality training initiatives
 
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boroEhr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcare
 
Confidentiality Training
Confidentiality Training Confidentiality Training
Confidentiality Training
 
Mha 690 week 1 discussion
Mha 690 week 1 discussionMha 690 week 1 discussion
Mha 690 week 1 discussion
 
A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )
 
International Journal of Telerehabilitation • telere.docx
International Journal of Telerehabilitation • telere.docxInternational Journal of Telerehabilitation • telere.docx
International Journal of Telerehabilitation • telere.docx
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
 

Recently uploaded

Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxtrishalcan8
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docxRodelinaLaud
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 

Recently uploaded (20)

Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docx
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 

Power point project for submission ppt (2)

  • 1. Confidential Healthcare and HIPPAcracies Makena Lei Byers MHA 690 Dr. Hwang-Ji Lu November 14th 2013 November 14, 2013
  • 2. Why trainings in confidentiality are extremely important: "All professionals are prone to boundary transgressions; explicit training about and the maintenance of appropriate role balance will help to ensure high-functioning relationships and maximize the quality of patient care, resident education, faculty and resident satisfaction, and modeling of professional behavior to improve competencies as clinicians and educators."(Reitz, 2013) It is crucial that we inform ourselves and others on the HIPAA laws and regulations. Breach of contract, indiscretion, Informed consent, “Do no harm”, the threat of self-destruction are just a few of the great understandings which we must take into account.
  • 3. Why and how we must protect patient information When determining eligibility for certain services and providing needed and appropriate resources, human service agencies and education institutions often require that children and families share very private information about themselves. Laws and statutes are in place to protect the privacy of these individuals and to ensure that this information is released only when necessary."(California Univ., 2002) All employees must be made aware of the imperative significance of safeguarding every patient’s confidential material.
  • 4. The reasons for observing ethical behavior: "Most primary care training programs have a behavioral science professional on faculty. Despite more similarities than differences among the roles filled by behavioral health professionals within primary care medicine residencies, each professional guild has a distinct set of ethical principles." (Reitz, 2013) Patients have individual privacy rights. There may be multifarious ethical codes postulate at each hospital and every other health care facility. Overall, in omniscience, The law requires that we provide and bear the human rights of privacy to our patients.
  • 5. Training: Behaving Unethically is Punishable. Please inform others. “Among the threats to the four information security aspects: confidentiality, integrity, availability, and quality; confidentiality threats were identified as most serious, with one threat given an unacceptable level of High risk." (Henrickson, 2013) The Misconduct that occurred at UCLA in regards to the abusive speculation of private medical records, (some may have been those who were in the limelight with the media), must be carefully analyzed and born into retrospect as a greater lesson on what virtue is versus indelicate “MYOB” patterns which only afford abrasiveness, and are far from the vicinities of healing.
  • 6. Adopting a higher security system & Making all aware of the risks of technological escapades(!): “ Because of the creation and use of information online and the widespread use of the internet and Web 2.0 platforms, physicians and others are increasingly required to consider how best to protect patient interests and apply principles of professionalism to new settings" (Farnan, 2013) It then becomes vital that information which is privy to the patient and their honorable confidantes is never ever shared or speculated or…heaven forbid, stolen from any Health Care System
  • 7. Confidentiality "Confidentiality Risks in home are different from those in a more controlled environment, such as a hospital and electronic equipment located in private homes and commuting via internet is a more exposed unauthorized access. By implementing certain measures it has been possible to design a home based service which ensures the necessary level of information and security privacy." (Henrickson, 2013) Even when a facility is established out of a residence, confidentiality and security must be cardinal.
  • 8. In Conclusion: Safeguarding "The Health Information Trust Alliance (HITRUST) was born out of the belief that information security should be a core pillar of, rather than an obstacle to, the broad adoption of health information systems and exchanges. HITRUST, in collaboration with healthcare, business, technology and information security leaders, has established the Common Security Framework (CSF), a certifiable framework that can be used by any and all organizations that create, access, store, or exchange personal health and financial information. The CSF is an information security framework that harmonizes the requirements of existing standards and regulations, including federal (HIPAA, HITECH), third party (PCI, COBIT), and government (NIST, FTC). www.hitrustalliance.net." (Accretive Health, 2013) The law condones powerful training measures and heightened security systems. In this way, the law empowers patients, employees and Health Care Establishments by blocking or legally refining those who disregard the veritable conduction of safe and Top Quality Management.
  • 9. References Accretive Health, I. c. (3). Accretive Health Achieves Industry-Leading HITRUST Certification for Data Security and Protection of Private Patient Health Information. Business Wire (English). Aronovitz, L. G. (1999). Medicare: HCFA Needs to Better Protect Beneficiaries' Confidential Health Information: T-HEHS-99-172. GAO Reports, 1. California Univ., L. s. (2002). Confidentiality. A Center Quick Training Aid. Farnan, J. M., Sulmasy, L., Worster, B. K., Chaudhry, H. J., Rhyne, J. A., & Arora, V. M. (2013). Online Medical Professionalism: Patient and Public Relationships: Policy Statement From the American College of Physicians and the Federation of State Medical Boards. Annals Of Internal Medicine, 158(8)
  • 10. References (Continued) Henrickson, Eva. (2013) BMC Medical Informatics & Decision Making. 2013, Vol. 13 Issue 1, p1-13. 13p. 3 Charts. http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=90292245&site=edslive Reitz, Randall, St. Mary’s Family Medicine Residency, 2698 Patterson Road, Grand Junction, CO, US, 81506, reitz.randall@gmail.com Wolper, L.F. (2011). Health care administration: Managing organized delivery systems (5th ed.). Boston: Jones and Bartlett.