SlideShare a Scribd company logo
Privacy and
Confidentiality;
Education Module
Jared Brady
MHA 690
Instructor Hwang-Ji Lu
August 6, 2014
Table of Contents
 Introduction to privacy and confidentiality
 Healthcare providers role
 What is information needs to be protected
 Definition of breach
 Factors to confirm when breach is suspected
 Tools providers can use to keep information safe
 Most common breach types in the US
 How to report a breach
 You don’t know what you don’t know
 References
Privacy and Confidentiality
As healthcare professionals privacy and
confidentiality of patient information should be one
of our top priorities. Protecting patient health
information is a critical and pivotal role in providing
high quality care. Understanding how to protect
patient information is a very important skill set that
every healthcare provider must understand and
master. This training module it aimed to assist
healthcare professionals in protecting private patient
health information.
What is considered private information?
 Name and Address
 Health Background
 Previous Healthcare Providers
 Birthday
 Social Security Number
 Medical Records
 Ethical Origin
 Test results and X-rays
 Notes Taken by a Doctor or Nurse
 Medical Diagnosis
(US Department of Health and Human Services, 2005)
Information breach definition
 A breach is, generally, an impermissible use or
disclosure under the Privacy Rule that
compromises the security or privacy of the
protected health information.
(U.S Department of Health and Human Services, 2013)
Factors to confirm
 The nature and extent of the protected health
information involved.
 The unauthorized person who used the protected health
information or to whom the disclosure was made.
 Whether the protected health information was actually
acquired or viewed.
 The extent to which the risk to the protected health
information has been mitigated.
(U.S Department of Health and Human Services, 2013)
Tools to keeping information save
(The Office of National Coordinator, 2012)
Most common breach types in the U.S.
(The Office of National Coordinator, 2012)
How to report a potential breach
 All healthcare organizations have an internal
compliance and legal department that is available for
employees to access when they have suspected a breach
in patient protected information.
 Potential breaches should be reported to immediate
supervisors and then pushed up the correct internal
chain of command.
 Investigations will be launched by internal compliance
team.
 Breaches will then be reported to the appropriate state
and federal regulatory agencies.
You don’t know what you don’t know
Effective understanding and adequate training for
all employees and clinicians with annual training is
critical. Healthcare organizations must ensure annual
training programs exist from within the company to
educate all new and existing employees on safe and
protected activities related to private patient information.
Effective training and education around privacy and
confidentiality will protect the patient, the organization,
and the employees from potential breaches of private
information, legal risks, loss of employment and even
criminal charges.
References
 The Office of the National Coordinator Health Information Technologies.
(2012). Keeping Health Information Private and Secure New Initiatives and
Tools. Retrieved from
www.healthit.gov/.../KeepingHealthInformationPrivateSecure.pdf
 U.S. Department of Health and Human Services. (2005). Information for
Patients. National Institutes for Health. Retrieved from
http://privacyruleandresearch.nih.gov/patients.asp
 U.S. Department of Health and Human Services. (2013). Health Information
Privacy. Breach Notification Rule. Retrieved from
http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule/

More Related Content

What's hot

Patient Confidentiality
Patient ConfidentialityPatient Confidentiality
Patient Confidentialitymarosemond
 
SCHS Topic 5: Privacy, Confidentiality and Medical Records
SCHS Topic 5: Privacy, Confidentiality and Medical RecordsSCHS Topic 5: Privacy, Confidentiality and Medical Records
SCHS Topic 5: Privacy, Confidentiality and Medical Records
Dr Ghaiath Hussein
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
LLSS64
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
RamiAboali
 
Patients’ privacy and confidentiality
Patients’ privacy and confidentialityPatients’ privacy and confidentiality
Patients’ privacy and confidentiality
bernardsanch
 
Health care confidentiality and privacy
Health care confidentiality and privacyHealth care confidentiality and privacy
Health care confidentiality and privacysawanda
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcarekmasterson
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
DeniseMHA
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
Sierra Swain
 
MODULE 8 - PRIVACY AND CONFIDENTIALITY
MODULE 8 - PRIVACY AND CONFIDENTIALITYMODULE 8 - PRIVACY AND CONFIDENTIALITY
MODULE 8 - PRIVACY AND CONFIDENTIALITY
Dr Ghaiath Hussein
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentialityswilson0050
 
Confidentiality
Confidentiality Confidentiality
Confidentiality
Rhonda Williams
 
Med ethics by dr najeeb
Med ethics by dr najeebMed ethics by dr najeeb
Med ethics by dr najeeb
muhammed najeeb
 
Protecting patient privacy and confidentiality
Protecting patient privacy and confidentialityProtecting patient privacy and confidentiality
Protecting patient privacy and confidentialityTiffany Cochran
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
Justina Gee
 
Ethics in the medical field
Ethics in the medical fieldEthics in the medical field
Ethics in the medical field
JaniyaHill
 
Ethics for Introduction to Health Care
Ethics for Introduction to Health CareEthics for Introduction to Health Care
Ethics for Introduction to Health Care
RHSHealthScience
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
maggie_Platt
 
Confidentiality in the Workplace
Confidentiality in the WorkplaceConfidentiality in the Workplace
Confidentiality in the Workplacesalvarez63
 

What's hot (20)

Patient Confidentiality
Patient ConfidentialityPatient Confidentiality
Patient Confidentiality
 
SCHS Topic 5: Privacy, Confidentiality and Medical Records
SCHS Topic 5: Privacy, Confidentiality and Medical RecordsSCHS Topic 5: Privacy, Confidentiality and Medical Records
SCHS Topic 5: Privacy, Confidentiality and Medical Records
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Patients’ privacy and confidentiality
Patients’ privacy and confidentialityPatients’ privacy and confidentiality
Patients’ privacy and confidentiality
 
Health care confidentiality and privacy
Health care confidentiality and privacyHealth care confidentiality and privacy
Health care confidentiality and privacy
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcare
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
MODULE 8 - PRIVACY AND CONFIDENTIALITY
MODULE 8 - PRIVACY AND CONFIDENTIALITYMODULE 8 - PRIVACY AND CONFIDENTIALITY
MODULE 8 - PRIVACY AND CONFIDENTIALITY
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentiality
 
Confidentiality
Confidentiality Confidentiality
Confidentiality
 
Med ethics by dr najeeb
Med ethics by dr najeebMed ethics by dr najeeb
Med ethics by dr najeeb
 
Protecting patient privacy and confidentiality
Protecting patient privacy and confidentialityProtecting patient privacy and confidentiality
Protecting patient privacy and confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Ethics in the medical field
Ethics in the medical fieldEthics in the medical field
Ethics in the medical field
 
Ethics for Introduction to Health Care
Ethics for Introduction to Health CareEthics for Introduction to Health Care
Ethics for Introduction to Health Care
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
Confidentiality in the Workplace
Confidentiality in the WorkplaceConfidentiality in the Workplace
Confidentiality in the Workplace
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 

Viewers also liked

Rcs no 332 98 (possession)
Rcs no 332 98  (possession)Rcs no 332 98  (possession)
Rcs no 332 98 (possession)Santosh Garad
 
Beyond the Library: Professional use of social media for nursing & midwifery ...
Beyond the Library: Professional use of social media for nursing & midwifery ...Beyond the Library: Professional use of social media for nursing & midwifery ...
Beyond the Library: Professional use of social media for nursing & midwifery ...CONUL Teaching & Learning
 
Confidentiality s lideshare
Confidentiality s lideshareConfidentiality s lideshare
Confidentiality s lideshareKolonir
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspectiveCraig Mullins
 
Lesson 2 confidentiality
Lesson 2 confidentialityLesson 2 confidentiality
Lesson 2 confidentiality
HCEfareham
 
Confidentail Avoidance
Confidentail AvoidanceConfidentail Avoidance
Confidentail Avoidance
Jason Hamm
 
JCI Internal Audit Checklist By-Dr.Mahboob Khan Phd
JCI Internal Audit Checklist  By-Dr.Mahboob Khan Phd JCI Internal Audit Checklist  By-Dr.Mahboob Khan Phd
JCI Internal Audit Checklist By-Dr.Mahboob Khan Phd
Healthcare consultant
 

Viewers also liked (7)

Rcs no 332 98 (possession)
Rcs no 332 98  (possession)Rcs no 332 98  (possession)
Rcs no 332 98 (possession)
 
Beyond the Library: Professional use of social media for nursing & midwifery ...
Beyond the Library: Professional use of social media for nursing & midwifery ...Beyond the Library: Professional use of social media for nursing & midwifery ...
Beyond the Library: Professional use of social media for nursing & midwifery ...
 
Confidentiality s lideshare
Confidentiality s lideshareConfidentiality s lideshare
Confidentiality s lideshare
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspective
 
Lesson 2 confidentiality
Lesson 2 confidentialityLesson 2 confidentiality
Lesson 2 confidentiality
 
Confidentail Avoidance
Confidentail AvoidanceConfidentail Avoidance
Confidentail Avoidance
 
JCI Internal Audit Checklist By-Dr.Mahboob Khan Phd
JCI Internal Audit Checklist  By-Dr.Mahboob Khan Phd JCI Internal Audit Checklist  By-Dr.Mahboob Khan Phd
JCI Internal Audit Checklist By-Dr.Mahboob Khan Phd
 

Similar to Privacy and confidentiality

Confidentiality Training
Confidentiality Training Confidentiality Training
Confidentiality Training
Kendra Guyton-Sheppard
 
Ensuring Patient Confidentiality[1]
Ensuring Patient Confidentiality[1]Ensuring Patient Confidentiality[1]
Ensuring Patient Confidentiality[1]
romill0700
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Haydenhaydens
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
karlhennesey
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
honey690131
 
Virtual Mentor American Medical Association Journal of Ethi.docx
Virtual Mentor  American Medical Association Journal of Ethi.docxVirtual Mentor  American Medical Association Journal of Ethi.docx
Virtual Mentor American Medical Association Journal of Ethi.docx
sheronlewthwaite
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
DonnaDudley
 
Confidentiality training in healthcare organizations
Confidentiality training in healthcare organizationsConfidentiality training in healthcare organizations
Confidentiality training in healthcare organizations
karmatu000
 
Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)bholmes
 
Sample HIPAA Training
Sample HIPAA Training Sample HIPAA Training
Sample HIPAA Training
Tara Goodwin
 
Patient Confidentiality wk1_dq2_mha690
Patient Confidentiality wk1_dq2_mha690Patient Confidentiality wk1_dq2_mha690
Patient Confidentiality wk1_dq2_mha690
BrooklynRose1267
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Why is data privacy a crucial aspect of using Electronic Records.pptx
Why is data privacy a crucial aspect of using Electronic Records.pptxWhy is data privacy a crucial aspect of using Electronic Records.pptx
Why is data privacy a crucial aspect of using Electronic Records.pptx
MocDoc
 
Hcc week 1dq2
Hcc week 1dq2Hcc week 1dq2
Hcc week 1dq2
tanisha808
 
Hcc week 1dq2
Hcc week 1dq2Hcc week 1dq2
Hcc week 1dq2
tanisha808
 
Confidentiality
ConfidentialityConfidentiality
Confidentialitycpryor52
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)bholmes
 

Similar to Privacy and confidentiality (20)

Confidentiality Training
Confidentiality Training Confidentiality Training
Confidentiality Training
 
Ensuring Patient Confidentiality[1]
Ensuring Patient Confidentiality[1]Ensuring Patient Confidentiality[1]
Ensuring Patient Confidentiality[1]
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Hayden
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
 
Virtual Mentor American Medical Association Journal of Ethi.docx
Virtual Mentor  American Medical Association Journal of Ethi.docxVirtual Mentor  American Medical Association Journal of Ethi.docx
Virtual Mentor American Medical Association Journal of Ethi.docx
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality training in healthcare organizations
Confidentiality training in healthcare organizationsConfidentiality training in healthcare organizations
Confidentiality training in healthcare organizations
 
Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)
 
Sample HIPAA Training
Sample HIPAA Training Sample HIPAA Training
Sample HIPAA Training
 
Patient Confidentiality wk1_dq2_mha690
Patient Confidentiality wk1_dq2_mha690Patient Confidentiality wk1_dq2_mha690
Patient Confidentiality wk1_dq2_mha690
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Why is data privacy a crucial aspect of using Electronic Records.pptx
Why is data privacy a crucial aspect of using Electronic Records.pptxWhy is data privacy a crucial aspect of using Electronic Records.pptx
Why is data privacy a crucial aspect of using Electronic Records.pptx
 
Hcc week 1dq2
Hcc week 1dq2Hcc week 1dq2
Hcc week 1dq2
 
Hcc week 1dq2
Hcc week 1dq2Hcc week 1dq2
Hcc week 1dq2
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)
 

Recently uploaded

Haridwar ❤CALL Girls 🔝 89011★83002 🔝 ❤ℂall Girls IN Haridwar ESCORT SERVICE❤
Haridwar ❤CALL Girls 🔝 89011★83002 🔝 ❤ℂall Girls IN Haridwar ESCORT SERVICE❤Haridwar ❤CALL Girls 🔝 89011★83002 🔝 ❤ℂall Girls IN Haridwar ESCORT SERVICE❤
Haridwar ❤CALL Girls 🔝 89011★83002 🔝 ❤ℂall Girls IN Haridwar ESCORT SERVICE❤
ranishasharma67
 
The Importance of Community Nursing Care.pdf
The Importance of Community Nursing Care.pdfThe Importance of Community Nursing Care.pdf
The Importance of Community Nursing Care.pdf
AD Healthcare
 
Telehealth Psychology Building Trust with Clients.pptx
Telehealth Psychology Building Trust with Clients.pptxTelehealth Psychology Building Trust with Clients.pptx
Telehealth Psychology Building Trust with Clients.pptx
The Harvest Clinic
 
How many patients does case series should have In comparison to case reports.pdf
How many patients does case series should have In comparison to case reports.pdfHow many patients does case series should have In comparison to case reports.pdf
How many patients does case series should have In comparison to case reports.pdf
pubrica101
 
.Metabolic.disordersYYSSSFFSSSSSSSSSSDDD
.Metabolic.disordersYYSSSFFSSSSSSSSSSDDD.Metabolic.disordersYYSSSFFSSSSSSSSSSDDD
.Metabolic.disordersYYSSSFFSSSSSSSSSSDDD
samahesh1
 
Empowering ACOs: Leveraging Quality Management Tools for MIPS and Beyond
Empowering ACOs: Leveraging Quality Management Tools for MIPS and BeyondEmpowering ACOs: Leveraging Quality Management Tools for MIPS and Beyond
Empowering ACOs: Leveraging Quality Management Tools for MIPS and Beyond
Health Catalyst
 
Navigating Challenges: Mental Health, Legislation, and the Prison System in B...
Navigating Challenges: Mental Health, Legislation, and the Prison System in B...Navigating Challenges: Mental Health, Legislation, and the Prison System in B...
Navigating Challenges: Mental Health, Legislation, and the Prison System in B...
Guillermo Rivera
 
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
rajkumar669520
 
Neuro Saphirex Cranial Brochure
Neuro Saphirex Cranial BrochureNeuro Saphirex Cranial Brochure
Neuro Saphirex Cranial Brochure
RXOOM Healthcare Pvt. Ltd. ​
 
Dimensions of Healthcare Quality
Dimensions of Healthcare QualityDimensions of Healthcare Quality
Dimensions of Healthcare Quality
Naeemshahzad51
 
Surgery-Mini-OSCE-All-Past-Years-Questions-Modified.
Surgery-Mini-OSCE-All-Past-Years-Questions-Modified.Surgery-Mini-OSCE-All-Past-Years-Questions-Modified.
Surgery-Mini-OSCE-All-Past-Years-Questions-Modified.
preciousstephanie75
 
Essential Metrics for Palliative Care Management
Essential Metrics for Palliative Care ManagementEssential Metrics for Palliative Care Management
Essential Metrics for Palliative Care Management
Care Coordinations
 
Global launch of the Healthy Ageing and Prevention Index 2nd wave – alongside...
Global launch of the Healthy Ageing and Prevention Index 2nd wave – alongside...Global launch of the Healthy Ageing and Prevention Index 2nd wave – alongside...
Global launch of the Healthy Ageing and Prevention Index 2nd wave – alongside...
ILC- UK
 
Medical Technology Tackles New Health Care Demand - Research Report - March 2...
Medical Technology Tackles New Health Care Demand - Research Report - March 2...Medical Technology Tackles New Health Care Demand - Research Report - March 2...
Medical Technology Tackles New Health Care Demand - Research Report - March 2...
pchutichetpong
 
The Docs PPG - 30.05.2024.pptx..........
The Docs PPG - 30.05.2024.pptx..........The Docs PPG - 30.05.2024.pptx..........
The Docs PPG - 30.05.2024.pptx..........
TheDocs
 
A Community health , health for prisoners
A Community health  , health for prisonersA Community health  , health for prisoners
A Community health , health for prisoners
Ahmed Elmi
 
Artificial Intelligence to Optimize Cardiovascular Therapy
Artificial Intelligence to Optimize Cardiovascular TherapyArtificial Intelligence to Optimize Cardiovascular Therapy
Artificial Intelligence to Optimize Cardiovascular Therapy
Iris Thiele Isip-Tan
 
Navigating Women's Health: Understanding Prenatal Care and Beyond
Navigating Women's Health: Understanding Prenatal Care and BeyondNavigating Women's Health: Understanding Prenatal Care and Beyond
Navigating Women's Health: Understanding Prenatal Care and Beyond
Aboud Health Group
 
CONSTRUCTION OF TEST IN MANAGEMENT .docx
CONSTRUCTION OF TEST IN MANAGEMENT .docxCONSTRUCTION OF TEST IN MANAGEMENT .docx
CONSTRUCTION OF TEST IN MANAGEMENT .docx
PGIMS Rohtak
 
Navigating Healthcare with Telemedicine
Navigating Healthcare with  TelemedicineNavigating Healthcare with  Telemedicine
Navigating Healthcare with Telemedicine
Iris Thiele Isip-Tan
 

Recently uploaded (20)

Haridwar ❤CALL Girls 🔝 89011★83002 🔝 ❤ℂall Girls IN Haridwar ESCORT SERVICE❤
Haridwar ❤CALL Girls 🔝 89011★83002 🔝 ❤ℂall Girls IN Haridwar ESCORT SERVICE❤Haridwar ❤CALL Girls 🔝 89011★83002 🔝 ❤ℂall Girls IN Haridwar ESCORT SERVICE❤
Haridwar ❤CALL Girls 🔝 89011★83002 🔝 ❤ℂall Girls IN Haridwar ESCORT SERVICE❤
 
The Importance of Community Nursing Care.pdf
The Importance of Community Nursing Care.pdfThe Importance of Community Nursing Care.pdf
The Importance of Community Nursing Care.pdf
 
Telehealth Psychology Building Trust with Clients.pptx
Telehealth Psychology Building Trust with Clients.pptxTelehealth Psychology Building Trust with Clients.pptx
Telehealth Psychology Building Trust with Clients.pptx
 
How many patients does case series should have In comparison to case reports.pdf
How many patients does case series should have In comparison to case reports.pdfHow many patients does case series should have In comparison to case reports.pdf
How many patients does case series should have In comparison to case reports.pdf
 
.Metabolic.disordersYYSSSFFSSSSSSSSSSDDD
.Metabolic.disordersYYSSSFFSSSSSSSSSSDDD.Metabolic.disordersYYSSSFFSSSSSSSSSSDDD
.Metabolic.disordersYYSSSFFSSSSSSSSSSDDD
 
Empowering ACOs: Leveraging Quality Management Tools for MIPS and Beyond
Empowering ACOs: Leveraging Quality Management Tools for MIPS and BeyondEmpowering ACOs: Leveraging Quality Management Tools for MIPS and Beyond
Empowering ACOs: Leveraging Quality Management Tools for MIPS and Beyond
 
Navigating Challenges: Mental Health, Legislation, and the Prison System in B...
Navigating Challenges: Mental Health, Legislation, and the Prison System in B...Navigating Challenges: Mental Health, Legislation, and the Prison System in B...
Navigating Challenges: Mental Health, Legislation, and the Prison System in B...
 
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
 
Neuro Saphirex Cranial Brochure
Neuro Saphirex Cranial BrochureNeuro Saphirex Cranial Brochure
Neuro Saphirex Cranial Brochure
 
Dimensions of Healthcare Quality
Dimensions of Healthcare QualityDimensions of Healthcare Quality
Dimensions of Healthcare Quality
 
Surgery-Mini-OSCE-All-Past-Years-Questions-Modified.
Surgery-Mini-OSCE-All-Past-Years-Questions-Modified.Surgery-Mini-OSCE-All-Past-Years-Questions-Modified.
Surgery-Mini-OSCE-All-Past-Years-Questions-Modified.
 
Essential Metrics for Palliative Care Management
Essential Metrics for Palliative Care ManagementEssential Metrics for Palliative Care Management
Essential Metrics for Palliative Care Management
 
Global launch of the Healthy Ageing and Prevention Index 2nd wave – alongside...
Global launch of the Healthy Ageing and Prevention Index 2nd wave – alongside...Global launch of the Healthy Ageing and Prevention Index 2nd wave – alongside...
Global launch of the Healthy Ageing and Prevention Index 2nd wave – alongside...
 
Medical Technology Tackles New Health Care Demand - Research Report - March 2...
Medical Technology Tackles New Health Care Demand - Research Report - March 2...Medical Technology Tackles New Health Care Demand - Research Report - March 2...
Medical Technology Tackles New Health Care Demand - Research Report - March 2...
 
The Docs PPG - 30.05.2024.pptx..........
The Docs PPG - 30.05.2024.pptx..........The Docs PPG - 30.05.2024.pptx..........
The Docs PPG - 30.05.2024.pptx..........
 
A Community health , health for prisoners
A Community health  , health for prisonersA Community health  , health for prisoners
A Community health , health for prisoners
 
Artificial Intelligence to Optimize Cardiovascular Therapy
Artificial Intelligence to Optimize Cardiovascular TherapyArtificial Intelligence to Optimize Cardiovascular Therapy
Artificial Intelligence to Optimize Cardiovascular Therapy
 
Navigating Women's Health: Understanding Prenatal Care and Beyond
Navigating Women's Health: Understanding Prenatal Care and BeyondNavigating Women's Health: Understanding Prenatal Care and Beyond
Navigating Women's Health: Understanding Prenatal Care and Beyond
 
CONSTRUCTION OF TEST IN MANAGEMENT .docx
CONSTRUCTION OF TEST IN MANAGEMENT .docxCONSTRUCTION OF TEST IN MANAGEMENT .docx
CONSTRUCTION OF TEST IN MANAGEMENT .docx
 
Navigating Healthcare with Telemedicine
Navigating Healthcare with  TelemedicineNavigating Healthcare with  Telemedicine
Navigating Healthcare with Telemedicine
 

Privacy and confidentiality

  • 1. Privacy and Confidentiality; Education Module Jared Brady MHA 690 Instructor Hwang-Ji Lu August 6, 2014
  • 2. Table of Contents  Introduction to privacy and confidentiality  Healthcare providers role  What is information needs to be protected  Definition of breach  Factors to confirm when breach is suspected  Tools providers can use to keep information safe  Most common breach types in the US  How to report a breach  You don’t know what you don’t know  References
  • 3. Privacy and Confidentiality As healthcare professionals privacy and confidentiality of patient information should be one of our top priorities. Protecting patient health information is a critical and pivotal role in providing high quality care. Understanding how to protect patient information is a very important skill set that every healthcare provider must understand and master. This training module it aimed to assist healthcare professionals in protecting private patient health information.
  • 4. What is considered private information?  Name and Address  Health Background  Previous Healthcare Providers  Birthday  Social Security Number  Medical Records  Ethical Origin  Test results and X-rays  Notes Taken by a Doctor or Nurse  Medical Diagnosis (US Department of Health and Human Services, 2005)
  • 5. Information breach definition  A breach is, generally, an impermissible use or disclosure under the Privacy Rule that compromises the security or privacy of the protected health information. (U.S Department of Health and Human Services, 2013)
  • 6. Factors to confirm  The nature and extent of the protected health information involved.  The unauthorized person who used the protected health information or to whom the disclosure was made.  Whether the protected health information was actually acquired or viewed.  The extent to which the risk to the protected health information has been mitigated. (U.S Department of Health and Human Services, 2013)
  • 7. Tools to keeping information save (The Office of National Coordinator, 2012)
  • 8. Most common breach types in the U.S. (The Office of National Coordinator, 2012)
  • 9. How to report a potential breach  All healthcare organizations have an internal compliance and legal department that is available for employees to access when they have suspected a breach in patient protected information.  Potential breaches should be reported to immediate supervisors and then pushed up the correct internal chain of command.  Investigations will be launched by internal compliance team.  Breaches will then be reported to the appropriate state and federal regulatory agencies.
  • 10. You don’t know what you don’t know Effective understanding and adequate training for all employees and clinicians with annual training is critical. Healthcare organizations must ensure annual training programs exist from within the company to educate all new and existing employees on safe and protected activities related to private patient information. Effective training and education around privacy and confidentiality will protect the patient, the organization, and the employees from potential breaches of private information, legal risks, loss of employment and even criminal charges.
  • 11. References  The Office of the National Coordinator Health Information Technologies. (2012). Keeping Health Information Private and Secure New Initiatives and Tools. Retrieved from www.healthit.gov/.../KeepingHealthInformationPrivateSecure.pdf  U.S. Department of Health and Human Services. (2005). Information for Patients. National Institutes for Health. Retrieved from http://privacyruleandresearch.nih.gov/patients.asp  U.S. Department of Health and Human Services. (2013). Health Information Privacy. Breach Notification Rule. Retrieved from http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule/