Prevent Training
Introduction
• There should never be a case where nurses or
  any other hospital worker are looking at
  patients records other than there patient they
  are working on. If anyone are found in
  violation of this law they should have
  immediate action taken against them. Just
  because a person is a celebrity that doesn’t
  mean their personal lives should be violated
HIPPA
• “The Health Insurance Portability and Accountability
  Act of 1996 (HIPAA; Pub.L. 104-191, 110 Stat. 1936,
  enacted August 21, 1996) was enacted by the United
  States Congress and signed by President Bill Clinton in
  1996. Title I of HIPAA protects health
  insurance coverage for workers and their families when
  they change or lose their jobs. Title II of HIPAA, known
  as the Administrative Simplification (AS) provisions,
  requires the establishment of national standards
  for electronic health care transactions and national
  identifiers for providers, health insurance plans, and
  employers”.
Hitech
• “The Health Information Technology for
  Economic and Clinical Health (HITECH) Act,
  enacted as part of the American Recovery and
  Reinvestment Act of 2009, was signed into law
  on February 17, 2009, to promote the
  adoption and meaningful use of health
  information technology”.
Security Rule
• “The HIPAA Security Rule establishes national
  standards to protect individuals’ electronic
  personal health information that is created,
  received, used, or maintained by a covered
  entity”
Penalties
•   Fines
•   Jail time
•   Loss of license to practice
•   Public humiliation
•   Job loss
Training
• Making sure that people have read and signed
  the Privacy and security acts are step 1.
• Next having quarterly meetings to reinstate
  what was signed and make sure everyone is
  following rules is step 2
• Step 3 would be to set up monthly security
  checks on public use computers of patient
  records
Training
• You want people to understand that you are serious
  about the laws and will not take things lightly if laws
  are broken.
• Keeping accurate records on who works with each
  patient is a must.
• Doing checks to make sure everyone is where they
  should be is a must as well
• Finally creating pass codes for each patient that only
  the team that is working with them will know and use
  will be a great idea. If codes are used under another
  nurse or doctors name it should flag the system.
Preventive Methods
• For employees ways to make sure they are not in
  violation is to make sure they stay on only task
  assigned. If someone needs help make sure
  proper steps are taken. It is ok to ask questions
  to make sure you are in the right. Also logging off
  your computers properly will make sure that
  nobody else is working under your name. Also
  not sharing your pass words with anyone is a
  must. Every three months it is good to change
  your pass code to make sure nobody is using your
  account access.
References
• Wolper, L.F. (2011). Health care
  administration: Managing organized delivery
  systems (5th ed.). Sudbury, MA: Jones and
  Bartlett Publishers, Inc

• http://www.hhs.gov/ocr/privacy/hipaa/admin
  istrative/securityrule/index.html

Prevent training

  • 1.
  • 2.
    Introduction • There shouldnever be a case where nurses or any other hospital worker are looking at patients records other than there patient they are working on. If anyone are found in violation of this law they should have immediate action taken against them. Just because a person is a celebrity that doesn’t mean their personal lives should be violated
  • 3.
    HIPPA • “The HealthInsurance Portability and Accountability Act of 1996 (HIPAA; Pub.L. 104-191, 110 Stat. 1936, enacted August 21, 1996) was enacted by the United States Congress and signed by President Bill Clinton in 1996. Title I of HIPAA protects health insurance coverage for workers and their families when they change or lose their jobs. Title II of HIPAA, known as the Administrative Simplification (AS) provisions, requires the establishment of national standards for electronic health care transactions and national identifiers for providers, health insurance plans, and employers”.
  • 4.
    Hitech • “The HealthInformation Technology for Economic and Clinical Health (HITECH) Act, enacted as part of the American Recovery and Reinvestment Act of 2009, was signed into law on February 17, 2009, to promote the adoption and meaningful use of health information technology”.
  • 5.
    Security Rule • “TheHIPAA Security Rule establishes national standards to protect individuals’ electronic personal health information that is created, received, used, or maintained by a covered entity”
  • 6.
    Penalties • Fines • Jail time • Loss of license to practice • Public humiliation • Job loss
  • 7.
    Training • Making surethat people have read and signed the Privacy and security acts are step 1. • Next having quarterly meetings to reinstate what was signed and make sure everyone is following rules is step 2 • Step 3 would be to set up monthly security checks on public use computers of patient records
  • 8.
    Training • You wantpeople to understand that you are serious about the laws and will not take things lightly if laws are broken. • Keeping accurate records on who works with each patient is a must. • Doing checks to make sure everyone is where they should be is a must as well • Finally creating pass codes for each patient that only the team that is working with them will know and use will be a great idea. If codes are used under another nurse or doctors name it should flag the system.
  • 9.
    Preventive Methods • Foremployees ways to make sure they are not in violation is to make sure they stay on only task assigned. If someone needs help make sure proper steps are taken. It is ok to ask questions to make sure you are in the right. Also logging off your computers properly will make sure that nobody else is working under your name. Also not sharing your pass words with anyone is a must. Every three months it is good to change your pass code to make sure nobody is using your account access.
  • 10.
    References • Wolper, L.F.(2011). Health care administration: Managing organized delivery systems (5th ed.). Sudbury, MA: Jones and Bartlett Publishers, Inc • http://www.hhs.gov/ocr/privacy/hipaa/admin istrative/securityrule/index.html