SlideShare a Scribd company logo
HIPPA PRIVACY & SECURITY TRAINING Tamekia Foley Dr. Jeanette Pack June 9, 2011
Table of Contents What does HIPPA means Purpose of HIPPA Why is this important Who does it pertain to What are the training requirements
HIPPA and its Purpose Health Insurance Portability and Accountability Act of 1996 (Public Law 104-191) This act was created to improve the efficiency and effectiveness of a health care system, and protect the rights and privacy of the patients
HIPPA PRIVACY & SECURITY RULE HIPPA Privacy HIPPA Security A set of national standards for the protection of certain health information. The Privacy rule address the use and disclosure of individual ‘ health information, called protected health information. Operationalizes the protection contained in the Privacy Rule by addressing the technical and non-technical safeguards that organizations called :”covered entities”.
HIPPA IMPORTANCE To protect the right of the patients. The incident that happen at UCLA is a prime example of why we need to take HIPPA more serious.  This will decrease the number of violations and law suits that are happening within the healthcare organization. It will also increase the quality of the system as a whole.
HIPPA REQUIREMENTS Any and every healthcare professional in an organizations must watch the PowerPoint presentations and answer the questions after it scoring an 80 % or above They must then sign a consent form saying that they have read , understand and agree with the requirements If a violation of any type occur they will be terminated and prosecuted
References U.S. Department of Health and Human Services. Retrieved June 9, 2011 from http://www.hhs.gov Wolper,L.2011. Healthcare Administration Managing Organized delivery System (5th edition).Sudbury, MA, Jones and Bartlett Publishers

More Related Content

What's hot

Mha690 hipaa minimum necessary week 1
Mha690 hipaa minimum necessary week 1Mha690 hipaa minimum necessary week 1
Mha690 hipaa minimum necessary week 1
CynthiaRaccio
 
Maintaining patient confidentiality
Maintaining patient confidentialityMaintaining patient confidentiality
Maintaining patient confidentialityLooney47
 
Mha690 healthcare confidentiality
Mha690 healthcare confidentialityMha690 healthcare confidentiality
Mha690 healthcare confidentialityasharp625
 
Hi271 infographic
Hi271 infographicHi271 infographic
Hi271 infographic
Lisa Traboco
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Training
Suezqrdh
 
Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2
9535814851
 
Mha690 presentation by rachael javidan
Mha690 presentation by rachael javidanMha690 presentation by rachael javidan
Mha690 presentation by rachael javidanRachaelJavidan
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion ii
beleza1669
 
Hippa slide show
Hippa slide showHippa slide show
Hippa slide showheathercool
 
Health Technology And Information Standards - Peter Lennon
Health Technology And Information Standards - Peter LennonHealth Technology And Information Standards - Peter Lennon
Health Technology And Information Standards - Peter Lennonhealthcareisi
 
HIPAA
HIPAAHIPAA
HIPAA
tayvincent
 
Understanding the HIPPA Act
Understanding the HIPPA ActUnderstanding the HIPPA Act
Understanding the HIPPA Act
Alice Bell, M.B.A.
 
Hippa Powerpoint
Hippa PowerpointHippa Powerpoint
Hippa Powerpointkvanrandall
 
Mha 690 wk1 d2 confidentiality
Mha 690 wk1 d2 confidentialityMha 690 wk1 d2 confidentiality
Mha 690 wk1 d2 confidentiality
solifen2
 
Effective Privacy Training
Effective Privacy TrainingEffective Privacy Training
Effective Privacy Training
Lida Penerdzhyan
 
Healthcare captstone mha690
Healthcare captstone   mha690Healthcare captstone   mha690
Healthcare captstone mha690
amiddleton5
 

What's hot (17)

Mha690 hipaa minimum necessary week 1
Mha690 hipaa minimum necessary week 1Mha690 hipaa minimum necessary week 1
Mha690 hipaa minimum necessary week 1
 
Maintaining patient confidentiality
Maintaining patient confidentialityMaintaining patient confidentiality
Maintaining patient confidentiality
 
Mha690 healthcare confidentiality
Mha690 healthcare confidentialityMha690 healthcare confidentiality
Mha690 healthcare confidentiality
 
Hi271 infographic
Hi271 infographicHi271 infographic
Hi271 infographic
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Training
 
Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2
 
Mha690 presentation by rachael javidan
Mha690 presentation by rachael javidanMha690 presentation by rachael javidan
Mha690 presentation by rachael javidan
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion ii
 
Hippa slide show
Hippa slide showHippa slide show
Hippa slide show
 
Health Technology And Information Standards - Peter Lennon
Health Technology And Information Standards - Peter LennonHealth Technology And Information Standards - Peter Lennon
Health Technology And Information Standards - Peter Lennon
 
HIPAA
HIPAAHIPAA
HIPAA
 
Understanding the HIPPA Act
Understanding the HIPPA ActUnderstanding the HIPPA Act
Understanding the HIPPA Act
 
Hippa Powerpoint
Hippa PowerpointHippa Powerpoint
Hippa Powerpoint
 
Mha 690 wk1 d2 confidentiality
Mha 690 wk1 d2 confidentialityMha 690 wk1 d2 confidentiality
Mha 690 wk1 d2 confidentiality
 
Effective Privacy Training
Effective Privacy TrainingEffective Privacy Training
Effective Privacy Training
 
Healthcare captstone mha690
Healthcare captstone   mha690Healthcare captstone   mha690
Healthcare captstone mha690
 

Viewers also liked

HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
 
Patron conduct handout
Patron conduct handoutPatron conduct handout
Patron conduct handout
Andrea Boehme
 
Medidas y Aspectos Legales para Proteger la Integridad y Confidencialidad de ...
Medidas y Aspectos Legales para Proteger la Integridad y Confidencialidad de ...Medidas y Aspectos Legales para Proteger la Integridad y Confidencialidad de ...
Medidas y Aspectos Legales para Proteger la Integridad y Confidencialidad de ...
CCNatalia
 
Wk 1 dq 2 hippa confidentiality-privacy_ new employee orientation_karene su...
Wk 1 dq 2   hippa confidentiality-privacy_ new employee orientation_karene su...Wk 1 dq 2   hippa confidentiality-privacy_ new employee orientation_karene su...
Wk 1 dq 2 hippa confidentiality-privacy_ new employee orientation_karene su...Karene Sutherland
 
Employee misconduct and discipline
Employee misconduct and disciplineEmployee misconduct and discipline
Employee misconduct and discipline
Self-employed
 
Employee Orientation Ppt Final
Employee Orientation Ppt FinalEmployee Orientation Ppt Final
Employee Orientation Ppt Final
Shruthi Choudary
 
Mobile Cloud
Mobile CloudMobile Cloud
Mobile Cloud
Yana Nikandrova
 
Wanita atau pun isteri muslim
Wanita atau pun isteri muslimWanita atau pun isteri muslim
Wanita atau pun isteri muslim
hassand bindin
 
SugarCRM - What's New in Version 7.7
SugarCRM - What's New in Version 7.7SugarCRM - What's New in Version 7.7
SugarCRM - What's New in Version 7.7
BrainSell Technologies
 
Making telephone calls
Making telephone callsMaking telephone calls
Making telephone callsbusinesspuig
 
The battle of hastings грехов сарваров
The battle of hastings грехов сарваровThe battle of hastings грехов сарваров
The battle of hastings грехов сарваров
kapitoliy
 
Lentera news ed. #21 Januari 2016
Lentera news  ed. #21 Januari 2016Lentera news  ed. #21 Januari 2016
Lentera news ed. #21 Januari 2016
Ananta Bangun
 
James Lowery, Latitude Client Summit 2013: How to Make Friends and Influence ...
James Lowery, Latitude Client Summit 2013: How to Make Friends and Influence ...James Lowery, Latitude Client Summit 2013: How to Make Friends and Influence ...
James Lowery, Latitude Client Summit 2013: How to Make Friends and Influence ...
yrewol
 
Businness Preview WBC-21 Oleh TeamWBC-21.com
Businness Preview WBC-21 Oleh TeamWBC-21.comBusinness Preview WBC-21 Oleh TeamWBC-21.com
Businness Preview WBC-21 Oleh TeamWBC-21.com
arisbudiman.com
 
La+verdadera+amistad
La+verdadera+amistadLa+verdadera+amistad
La+verdadera+amistad
jessysalazar31
 

Viewers also liked (20)

HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
Patron conduct handout
Patron conduct handoutPatron conduct handout
Patron conduct handout
 
Medidas y Aspectos Legales para Proteger la Integridad y Confidencialidad de ...
Medidas y Aspectos Legales para Proteger la Integridad y Confidencialidad de ...Medidas y Aspectos Legales para Proteger la Integridad y Confidencialidad de ...
Medidas y Aspectos Legales para Proteger la Integridad y Confidencialidad de ...
 
Wk 1 dq 2 hippa confidentiality-privacy_ new employee orientation_karene su...
Wk 1 dq 2   hippa confidentiality-privacy_ new employee orientation_karene su...Wk 1 dq 2   hippa confidentiality-privacy_ new employee orientation_karene su...
Wk 1 dq 2 hippa confidentiality-privacy_ new employee orientation_karene su...
 
Employee misconduct and discipline
Employee misconduct and disciplineEmployee misconduct and discipline
Employee misconduct and discipline
 
Employee Orientation Ppt Final
Employee Orientation Ppt FinalEmployee Orientation Ppt Final
Employee Orientation Ppt Final
 
Ppt test
Ppt testPpt test
Ppt test
 
Mobile Cloud
Mobile CloudMobile Cloud
Mobile Cloud
 
Wanita atau pun isteri muslim
Wanita atau pun isteri muslimWanita atau pun isteri muslim
Wanita atau pun isteri muslim
 
The universe
The universeThe universe
The universe
 
SugarCRM - What's New in Version 7.7
SugarCRM - What's New in Version 7.7SugarCRM - What's New in Version 7.7
SugarCRM - What's New in Version 7.7
 
Folhas anatomia
Folhas   anatomiaFolhas   anatomia
Folhas anatomia
 
Evaluasi
EvaluasiEvaluasi
Evaluasi
 
Making telephone calls
Making telephone callsMaking telephone calls
Making telephone calls
 
The battle of hastings грехов сарваров
The battle of hastings грехов сарваровThe battle of hastings грехов сарваров
The battle of hastings грехов сарваров
 
Lentera news ed. #21 Januari 2016
Lentera news  ed. #21 Januari 2016Lentera news  ed. #21 Januari 2016
Lentera news ed. #21 Januari 2016
 
James Lowery, Latitude Client Summit 2013: How to Make Friends and Influence ...
James Lowery, Latitude Client Summit 2013: How to Make Friends and Influence ...James Lowery, Latitude Client Summit 2013: How to Make Friends and Influence ...
James Lowery, Latitude Client Summit 2013: How to Make Friends and Influence ...
 
Businness Preview WBC-21 Oleh TeamWBC-21.com
Businness Preview WBC-21 Oleh TeamWBC-21.comBusinness Preview WBC-21 Oleh TeamWBC-21.com
Businness Preview WBC-21 Oleh TeamWBC-21.com
 
Final powerpoint
Final powerpointFinal powerpoint
Final powerpoint
 
La+verdadera+amistad
La+verdadera+amistadLa+verdadera+amistad
La+verdadera+amistad
 

Similar to Tamekia foley hippa powerpoint

Hipaa
HipaaHipaa
Hipaa
belziebub
 
Confidentiality training
Confidentiality trainingConfidentiality training
Confidentiality trainingSuezqrdh
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
LeRoy Ulibarri
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Haydenhaydens
 
HIPPA---Chantel Artis Spencer
HIPPA---Chantel Artis SpencerHIPPA---Chantel Artis Spencer
HIPPA---Chantel Artis Spencershay1234
 
How to Build HIPAA Compliant Healthcare Apps: Everything You Should Know!
How to Build HIPAA Compliant Healthcare Apps: Everything You Should Know!How to Build HIPAA Compliant Healthcare Apps: Everything You Should Know!
How to Build HIPAA Compliant Healthcare Apps: Everything You Should Know!
default default
 
Mha690week1discussion2
Mha690week1discussion2Mha690week1discussion2
Mha690week1discussion2MrC2_
 
The Health Insurance Portability And Accountability Act Essay
The Health Insurance Portability And Accountability Act EssayThe Health Insurance Portability And Accountability Act Essay
The Health Insurance Portability And Accountability Act Essay
Jamie Boyd
 
Patients Privacy and Confidentiality
Patients Privacy and ConfidentialityPatients Privacy and Confidentiality
Patients Privacy and Confidentiality
Oluseyi Ilesanmi
 
THCS Workforce HIPAA Training
THCS Workforce HIPAA TrainingTHCS Workforce HIPAA Training
THCS Workforce HIPAA Training
kerbertx
 
Hipaa journal com - HIPAA compliance guide
Hipaa journal com - HIPAA compliance guideHipaa journal com - HIPAA compliance guide
Hipaa journal com - HIPAA compliance guide
Felipe Prado
 
Health Insurance Portability And Accountability Act (HIPAA
Health Insurance Portability And Accountability Act (HIPAAHealth Insurance Portability And Accountability Act (HIPAA
Health Insurance Portability And Accountability Act (HIPAA
Katie Gulley
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion iibeleza1669
 
Confidentiality
ConfidentialityConfidentiality
Confidentialitygebrow9764
 
Sample HIPAA Training
Sample HIPAA Training Sample HIPAA Training
Sample HIPAA Training
Tara Goodwin
 
In 2013, the Health Insurance Portability and Accountability Act (HI.pdf
In 2013, the Health Insurance Portability and Accountability Act (HI.pdfIn 2013, the Health Insurance Portability and Accountability Act (HI.pdf
In 2013, the Health Insurance Portability and Accountability Act (HI.pdf
bharatchawla141
 
DVHIMSS Ensuring Privacy and Security of HIEs in PA
DVHIMSS Ensuring Privacy and Security of HIEs in PADVHIMSS Ensuring Privacy and Security of HIEs in PA
DVHIMSS Ensuring Privacy and Security of HIEs in PA
William Buddy Gillespie ITIL Certified
 

Similar to Tamekia foley hippa powerpoint (20)

Hipaa
HipaaHipaa
Hipaa
 
Confidentiality training
Confidentiality trainingConfidentiality training
Confidentiality training
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Hayden
 
HIPPA---Chantel Artis Spencer
HIPPA---Chantel Artis SpencerHIPPA---Chantel Artis Spencer
HIPPA---Chantel Artis Spencer
 
How to Build HIPAA Compliant Healthcare Apps: Everything You Should Know!
How to Build HIPAA Compliant Healthcare Apps: Everything You Should Know!How to Build HIPAA Compliant Healthcare Apps: Everything You Should Know!
How to Build HIPAA Compliant Healthcare Apps: Everything You Should Know!
 
Mha690week1discussion2
Mha690week1discussion2Mha690week1discussion2
Mha690week1discussion2
 
The Health Insurance Portability And Accountability Act Essay
The Health Insurance Portability And Accountability Act EssayThe Health Insurance Portability And Accountability Act Essay
The Health Insurance Portability And Accountability Act Essay
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Patients Privacy and Confidentiality
Patients Privacy and ConfidentialityPatients Privacy and Confidentiality
Patients Privacy and Confidentiality
 
THCS Workforce HIPAA Training
THCS Workforce HIPAA TrainingTHCS Workforce HIPAA Training
THCS Workforce HIPAA Training
 
Hipaa journal com - HIPAA compliance guide
Hipaa journal com - HIPAA compliance guideHipaa journal com - HIPAA compliance guide
Hipaa journal com - HIPAA compliance guide
 
Hippa laws
Hippa lawsHippa laws
Hippa laws
 
Health Insurance Portability And Accountability Act (HIPAA
Health Insurance Portability And Accountability Act (HIPAAHealth Insurance Portability And Accountability Act (HIPAA
Health Insurance Portability And Accountability Act (HIPAA
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion ii
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Sample HIPAA Training
Sample HIPAA Training Sample HIPAA Training
Sample HIPAA Training
 
In 2013, the Health Insurance Portability and Accountability Act (HI.pdf
In 2013, the Health Insurance Portability and Accountability Act (HI.pdfIn 2013, the Health Insurance Portability and Accountability Act (HI.pdf
In 2013, the Health Insurance Portability and Accountability Act (HI.pdf
 
DVHIMSS Ensuring Privacy and Security of HIEs in PA
DVHIMSS Ensuring Privacy and Security of HIEs in PADVHIMSS Ensuring Privacy and Security of HIEs in PA
DVHIMSS Ensuring Privacy and Security of HIEs in PA
 

Recently uploaded

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 

Recently uploaded (20)

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 

Tamekia foley hippa powerpoint

  • 1. HIPPA PRIVACY & SECURITY TRAINING Tamekia Foley Dr. Jeanette Pack June 9, 2011
  • 2. Table of Contents What does HIPPA means Purpose of HIPPA Why is this important Who does it pertain to What are the training requirements
  • 3. HIPPA and its Purpose Health Insurance Portability and Accountability Act of 1996 (Public Law 104-191) This act was created to improve the efficiency and effectiveness of a health care system, and protect the rights and privacy of the patients
  • 4. HIPPA PRIVACY & SECURITY RULE HIPPA Privacy HIPPA Security A set of national standards for the protection of certain health information. The Privacy rule address the use and disclosure of individual ‘ health information, called protected health information. Operationalizes the protection contained in the Privacy Rule by addressing the technical and non-technical safeguards that organizations called :”covered entities”.
  • 5. HIPPA IMPORTANCE To protect the right of the patients. The incident that happen at UCLA is a prime example of why we need to take HIPPA more serious. This will decrease the number of violations and law suits that are happening within the healthcare organization. It will also increase the quality of the system as a whole.
  • 6. HIPPA REQUIREMENTS Any and every healthcare professional in an organizations must watch the PowerPoint presentations and answer the questions after it scoring an 80 % or above They must then sign a consent form saying that they have read , understand and agree with the requirements If a violation of any type occur they will be terminated and prosecuted
  • 7. References U.S. Department of Health and Human Services. Retrieved June 9, 2011 from http://www.hhs.gov Wolper,L.2011. Healthcare Administration Managing Organized delivery System (5th edition).Sudbury, MA, Jones and Bartlett Publishers