SlideShare a Scribd company logo
1 of 10
Confidential Healthcare and
HIPPAcracies
Makena Lei Byers
MHA 690

Dr. Hwang-Ji Lu
November 14th 2013
November 14, 2013
Why trainings in confidentiality are extremely
important:
"All professionals are prone to boundary transgressions;
explicit training about and the maintenance of appropriate
role balance will help to ensure high-functioning
relationships and maximize the quality of patient care,
resident education, faculty and resident satisfaction, and
modeling of professional behavior to improve competencies
as clinicians and educators."(Reitz, 2013)

It is crucial that we inform ourselves and others on the HIPAA
laws and regulations. Breach of contract, indiscretion,
Informed consent, “Do no harm”, the threat of self-
Why and how we must protect patient information
When determining eligibility for certain services and
providing needed and appropriate resources, human service
agencies and education institutions often require that
children and families share very private information about
themselves. Laws and statutes are in place to protect the
privacy of these individuals and to ensure that this
information is released only when necessary."(California
Univ., 2002)

All employees must be made aware of the imperative
The reasons for observing ethical behavior:
"Most primary care training programs have a behavioral
science professional on faculty. Despite more similarities
than differences among the roles filled by behavioral health
professionals within primary care medicine residencies, each
professional guild has a distinct set of ethical principles."
(Reitz, 2013)

Patients have individual privacy rights. There may be
multifarious ethical codes postulate at each hospital and
every other health care facility. Overall, in omniscience, The
law requires that we provide and bear the human rights of
privacy to our patients.
Training: Behaving Unethically is Punishable.
Please inform others.
“Among the threats to the four information security aspects:
confidentiality, integrity, availability, and quality;
confidentiality threats were identified as most serious, with
one threat given an unacceptable level of High risk."
(Henrickson, 2013)

The Misconduct that occurred at UCLA in regards to the
abusive speculation of private medical records, (some may
have been those who were in the limelight with the media),
must be carefully analyzed and born into retrospect as a
greater lesson on what virtue is versus indelicate “MYOB”
patterns which only afford abrasiveness, and are far from the
Adopting a higher security system &
Making all aware of the risks of technological escapades(!):
“
Because of the creation and use of information online and the
widespread use of the internet and Web 2.0 platforms,
physicians and others are increasingly required to consider
how best to protect patient interests and apply principles of
professionalism to new settings" (Farnan, 2013)
It then becomes vital that information which is privy to the
patient and their honorable confidantes is never ever shared
or speculated or…heaven forbid, stolen from any Health Care
System
Confidentiality

"Confidentiality Risks in home are different from those in a
more controlled environment, such as a hospital and
electronic equipment located in private homes and
commuting via internet is a more exposed unauthorized
access. By implementing certain measures it has been
possible to design a home based service which ensures the
necessary level of information and security privacy."
(Henrickson, 2013)
Even when a facility is established out of a residence,
confidentiality and security must be cardinal.
In Conclusion: Safeguarding
"The Health Information Trust Alliance (HITRUST) was born out of the
belief that information security should be a core pillar of, rather than
an obstacle to, the broad adoption of health information systems and
exchanges. HITRUST, in collaboration with healthcare, business, technology
and information security leaders, has established the Common Security
Framework (CSF), a certifiable framework that can be used by any and all
organizations that create, access, store, or exchange personal health and
financial information. The CSF is an information security framework that
harmonizes the requirements of existing standards and regulations,
including federal (HIPAA, HITECH), third party (PCI, COBIT), and government
(NIST, FTC). www.hitrustalliance.net." (Accretive Health, 2013)
The law condones powerful training measures and heightened security
systems. In this way, the law empowers patients, employees and Health
Care Establishments by blocking or legally refining those who disregard
the veritable conduction of safe and Top Quality Management.
References

Accretive Health, I. c. (3). Accretive Health Achieves Industry-Leading HITRUST
Certification for Data Security and Protection of Private Patient Health Information.
Business Wire (English).

Aronovitz, L. G. (1999). Medicare: HCFA Needs to Better Protect Beneficiaries'
Confidential Health Information: T-HEHS-99-172. GAO Reports, 1.

California Univ., L. s. (2002). Confidentiality. A Center Quick Training Aid.

Farnan, J. M., Sulmasy, L., Worster, B. K., Chaudhry, H. J., Rhyne, J. A., & Arora, V. M.
(2013). Online Medical Professionalism: Patient and Public Relationships: Policy
Statement From the American College of Physicians and the Federation of State
Medical Boards. Annals Of Internal Medicine, 158(8)
References (Continued)

Henrickson, Eva. (2013) BMC Medical Informatics & Decision Making. 2013, Vol. 13
Issue 1, p1-13. 13p. 3 Charts.

http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=90292245&site=edslive
Reitz, Randall, St. Mary’s Family Medicine Residency, 2698 Patterson Road, Grand
Junction, CO, US, 81506, reitz.randall@gmail.com

Wolper, L.F. (2011). Health care administration: Managing organized delivery
systems (5th ed.). Boston: Jones and Bartlett.

More Related Content

What's hot

$4.8m HIPAA Breach
$4.8m HIPAA Breach$4.8m HIPAA Breach
$4.8m HIPAA BreachInfinisource
 
Patient-Centric Privacy: Envisioning Collaboration Between Payers, Providers...
Patient-Centric Privacy:  Envisioning Collaboration Between Payers, Providers...Patient-Centric Privacy:  Envisioning Collaboration Between Payers, Providers...
Patient-Centric Privacy: Envisioning Collaboration Between Payers, Providers...Tyrone Grandison
 
HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007Richard Moore
 
Confidentiality
ConfidentialityConfidentiality
ConfidentialityDeniseMHA
 
Security Best Practices for Health Information Exchange
Security Best Practices for Health Information ExchangeSecurity Best Practices for Health Information Exchange
Security Best Practices for Health Information ExchangeTrend Micro
 
HIPAA Enforcement Heats Up in the Coldest State
HIPAA Enforcement Heats Up in the Coldest StateHIPAA Enforcement Heats Up in the Coldest State
HIPAA Enforcement Heats Up in the Coldest StateRedspin, Inc.
 
Confidentiality: Effective Training for Healthcare Employees
Confidentiality: Effective Training for Healthcare EmployeesConfidentiality: Effective Training for Healthcare Employees
Confidentiality: Effective Training for Healthcare Employeesjacquelinecwinston
 
Priv&security&profin electrcommunicationsrev9 23
Priv&security&profin electrcommunicationsrev9 23Priv&security&profin electrcommunicationsrev9 23
Priv&security&profin electrcommunicationsrev9 23Deven McGraw
 

What's hot (19)

Mha690 wk1 dis2
Mha690 wk1 dis2Mha690 wk1 dis2
Mha690 wk1 dis2
 
Data Protection In Ghana
Data Protection In GhanaData Protection In Ghana
Data Protection In Ghana
 
Brent Mittelstadt, "From Protecting Individuals to Groups in Biomedical Big D...
Brent Mittelstadt, "From Protecting Individuals to Groups in Biomedical Big D...Brent Mittelstadt, "From Protecting Individuals to Groups in Biomedical Big D...
Brent Mittelstadt, "From Protecting Individuals to Groups in Biomedical Big D...
 
HIPAA
HIPAAHIPAA
HIPAA
 
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
 
$4.8m HIPAA Breach
$4.8m HIPAA Breach$4.8m HIPAA Breach
$4.8m HIPAA Breach
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Patient-Centric Privacy: Envisioning Collaboration Between Payers, Providers...
Patient-Centric Privacy:  Envisioning Collaboration Between Payers, Providers...Patient-Centric Privacy:  Envisioning Collaboration Between Payers, Providers...
Patient-Centric Privacy: Envisioning Collaboration Between Payers, Providers...
 
DVHIMSS Ensuring Privacy and Security of HIEs in PA
DVHIMSS Ensuring Privacy and Security of HIEs in PADVHIMSS Ensuring Privacy and Security of HIEs in PA
DVHIMSS Ensuring Privacy and Security of HIEs in PA
 
HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007
 
Standardization and Interoperability
Standardization and InteroperabilityStandardization and Interoperability
Standardization and Interoperability
 
Legal Aspects in Health Informatics
Legal Aspects in Health InformaticsLegal Aspects in Health Informatics
Legal Aspects in Health Informatics
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Security Best Practices for Health Information Exchange
Security Best Practices for Health Information ExchangeSecurity Best Practices for Health Information Exchange
Security Best Practices for Health Information Exchange
 
A12_Beyond_HIPAA_PPT1
A12_Beyond_HIPAA_PPT1A12_Beyond_HIPAA_PPT1
A12_Beyond_HIPAA_PPT1
 
HIPAA Enforcement Heats Up in the Coldest State
HIPAA Enforcement Heats Up in the Coldest StateHIPAA Enforcement Heats Up in the Coldest State
HIPAA Enforcement Heats Up in the Coldest State
 
Confidentiality: Effective Training for Healthcare Employees
Confidentiality: Effective Training for Healthcare EmployeesConfidentiality: Effective Training for Healthcare Employees
Confidentiality: Effective Training for Healthcare Employees
 
Priv&security&profin electrcommunicationsrev9 23
Priv&security&profin electrcommunicationsrev9 23Priv&security&profin electrcommunicationsrev9 23
Priv&security&profin electrcommunicationsrev9 23
 
EHLP - July 2015 pg 6-8
EHLP - July 2015 pg 6-8EHLP - July 2015 pg 6-8
EHLP - July 2015 pg 6-8
 

Similar to Power point project for submission.ppt

Implementing The Affordable Care Act Essay
Implementing The Affordable Care Act EssayImplementing The Affordable Care Act Essay
Implementing The Affordable Care Act EssayMichelle Love
 
1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docx1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docxteresehearn
 
Virtual Mentor American Medical Association Journal of Ethi.docx
Virtual Mentor  American Medical Association Journal of Ethi.docxVirtual Mentor  American Medical Association Journal of Ethi.docx
Virtual Mentor American Medical Association Journal of Ethi.docxsheronlewthwaite
 
Patient Confidentiality wk1_dq2_mha690
Patient Confidentiality wk1_dq2_mha690Patient Confidentiality wk1_dq2_mha690
Patient Confidentiality wk1_dq2_mha690BrooklynRose1267
 
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boroEhr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla borokayla_ann_30
 
Confidentiality Of Health Information Essays
Confidentiality Of Health Information EssaysConfidentiality Of Health Information Essays
Confidentiality Of Health Information EssaysJessica Tanner
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippamaggie_Platt
 
Confidentiality training initiatives
Confidentiality training initiativesConfidentiality training initiatives
Confidentiality training initiativeslycbask
 
A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )Tasha Holloway
 
Confidentiality week 1 discussion 2 mha690 healthcare capstone
Confidentiality  week 1 discussion 2 mha690 healthcare capstoneConfidentiality  week 1 discussion 2 mha690 healthcare capstone
Confidentiality week 1 discussion 2 mha690 healthcare capstoneRachelMargrave5
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Privacy and security of information Consider this scenario.docx
Privacy and security of information Consider this scenario.docxPrivacy and security of information Consider this scenario.docx
Privacy and security of information Consider this scenario.docxChantellPantoja184
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcarekmasterson
 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxwlynn1
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxkarlhennesey
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxhoney690131
 

Similar to Power point project for submission.ppt (20)

Implementing The Affordable Care Act Essay
Implementing The Affordable Care Act EssayImplementing The Affordable Care Act Essay
Implementing The Affordable Care Act Essay
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docx1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docx
 
Virtual Mentor American Medical Association Journal of Ethi.docx
Virtual Mentor  American Medical Association Journal of Ethi.docxVirtual Mentor  American Medical Association Journal of Ethi.docx
Virtual Mentor American Medical Association Journal of Ethi.docx
 
Patient Confidentiality wk1_dq2_mha690
Patient Confidentiality wk1_dq2_mha690Patient Confidentiality wk1_dq2_mha690
Patient Confidentiality wk1_dq2_mha690
 
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boroEhr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
 
Confidentiality Of Health Information Essays
Confidentiality Of Health Information EssaysConfidentiality Of Health Information Essays
Confidentiality Of Health Information Essays
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
Confidentiality training initiatives
Confidentiality training initiativesConfidentiality training initiatives
Confidentiality training initiatives
 
A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )
 
Confidentiality week 1 discussion 2 mha690 healthcare capstone
Confidentiality  week 1 discussion 2 mha690 healthcare capstoneConfidentiality  week 1 discussion 2 mha690 healthcare capstone
Confidentiality week 1 discussion 2 mha690 healthcare capstone
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Privacy and security of information Consider this scenario.docx
Privacy and security of information Consider this scenario.docxPrivacy and security of information Consider this scenario.docx
Privacy and security of information Consider this scenario.docx
 
Confidentiality ppt
Confidentiality pptConfidentiality ppt
Confidentiality ppt
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcare
 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docx
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
 

Recently uploaded

Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creationsnakalysalcedo61
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 

Recently uploaded (20)

Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creations
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 

Power point project for submission.ppt

  • 1. Confidential Healthcare and HIPPAcracies Makena Lei Byers MHA 690 Dr. Hwang-Ji Lu November 14th 2013 November 14, 2013
  • 2. Why trainings in confidentiality are extremely important: "All professionals are prone to boundary transgressions; explicit training about and the maintenance of appropriate role balance will help to ensure high-functioning relationships and maximize the quality of patient care, resident education, faculty and resident satisfaction, and modeling of professional behavior to improve competencies as clinicians and educators."(Reitz, 2013) It is crucial that we inform ourselves and others on the HIPAA laws and regulations. Breach of contract, indiscretion, Informed consent, “Do no harm”, the threat of self-
  • 3. Why and how we must protect patient information When determining eligibility for certain services and providing needed and appropriate resources, human service agencies and education institutions often require that children and families share very private information about themselves. Laws and statutes are in place to protect the privacy of these individuals and to ensure that this information is released only when necessary."(California Univ., 2002) All employees must be made aware of the imperative
  • 4. The reasons for observing ethical behavior: "Most primary care training programs have a behavioral science professional on faculty. Despite more similarities than differences among the roles filled by behavioral health professionals within primary care medicine residencies, each professional guild has a distinct set of ethical principles." (Reitz, 2013) Patients have individual privacy rights. There may be multifarious ethical codes postulate at each hospital and every other health care facility. Overall, in omniscience, The law requires that we provide and bear the human rights of privacy to our patients.
  • 5. Training: Behaving Unethically is Punishable. Please inform others. “Among the threats to the four information security aspects: confidentiality, integrity, availability, and quality; confidentiality threats were identified as most serious, with one threat given an unacceptable level of High risk." (Henrickson, 2013) The Misconduct that occurred at UCLA in regards to the abusive speculation of private medical records, (some may have been those who were in the limelight with the media), must be carefully analyzed and born into retrospect as a greater lesson on what virtue is versus indelicate “MYOB” patterns which only afford abrasiveness, and are far from the
  • 6. Adopting a higher security system & Making all aware of the risks of technological escapades(!): “ Because of the creation and use of information online and the widespread use of the internet and Web 2.0 platforms, physicians and others are increasingly required to consider how best to protect patient interests and apply principles of professionalism to new settings" (Farnan, 2013) It then becomes vital that information which is privy to the patient and their honorable confidantes is never ever shared or speculated or…heaven forbid, stolen from any Health Care System
  • 7. Confidentiality "Confidentiality Risks in home are different from those in a more controlled environment, such as a hospital and electronic equipment located in private homes and commuting via internet is a more exposed unauthorized access. By implementing certain measures it has been possible to design a home based service which ensures the necessary level of information and security privacy." (Henrickson, 2013) Even when a facility is established out of a residence, confidentiality and security must be cardinal.
  • 8. In Conclusion: Safeguarding "The Health Information Trust Alliance (HITRUST) was born out of the belief that information security should be a core pillar of, rather than an obstacle to, the broad adoption of health information systems and exchanges. HITRUST, in collaboration with healthcare, business, technology and information security leaders, has established the Common Security Framework (CSF), a certifiable framework that can be used by any and all organizations that create, access, store, or exchange personal health and financial information. The CSF is an information security framework that harmonizes the requirements of existing standards and regulations, including federal (HIPAA, HITECH), third party (PCI, COBIT), and government (NIST, FTC). www.hitrustalliance.net." (Accretive Health, 2013) The law condones powerful training measures and heightened security systems. In this way, the law empowers patients, employees and Health Care Establishments by blocking or legally refining those who disregard the veritable conduction of safe and Top Quality Management.
  • 9. References Accretive Health, I. c. (3). Accretive Health Achieves Industry-Leading HITRUST Certification for Data Security and Protection of Private Patient Health Information. Business Wire (English). Aronovitz, L. G. (1999). Medicare: HCFA Needs to Better Protect Beneficiaries' Confidential Health Information: T-HEHS-99-172. GAO Reports, 1. California Univ., L. s. (2002). Confidentiality. A Center Quick Training Aid. Farnan, J. M., Sulmasy, L., Worster, B. K., Chaudhry, H. J., Rhyne, J. A., & Arora, V. M. (2013). Online Medical Professionalism: Patient and Public Relationships: Policy Statement From the American College of Physicians and the Federation of State Medical Boards. Annals Of Internal Medicine, 158(8)
  • 10. References (Continued) Henrickson, Eva. (2013) BMC Medical Informatics & Decision Making. 2013, Vol. 13 Issue 1, p1-13. 13p. 3 Charts. http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=90292245&site=edslive Reitz, Randall, St. Mary’s Family Medicine Residency, 2698 Patterson Road, Grand Junction, CO, US, 81506, reitz.randall@gmail.com Wolper, L.F. (2011). Health care administration: Managing organized delivery systems (5th ed.). Boston: Jones and Bartlett.