SlideShare a Scribd company logo
Upholding
Confidentiality
It is your ethical responsibility
       Theresa Tapley
MHA690: Health Care Capstone
     Ashford University
       Dr. David Cole
        April 23, 2013
Objectives
 Understanding    of HIPAA
 Ethical Responsibility to keep each and
  every patient’s PHI confidential
 Patient Privacy Rule and Security Rules
 Identification of what PHI is
 Ways to protect PHI
 Tips for electronic confidentiality
  protections
 Consequences if confidentiality or PHI
  mishandlement
What is Health Insurance Portability and
     Accountability Act (HIPAA)?
 HIPPA  is a federal law that gives an
  individual the right of protection of their
  personal health information (PHI).
 PHI includes all medical and personal
  information and must be protected
  whether communication is
  verbal, written, or electronic.

(U.S. Department HHS, 2012)
Forms of Sensitive Information
          Sensitive Information exists in various forms




Printed                  Spoken                Electronic

       It is the responsibility of every employee to
 protect the privacy and security of sensitive information
                         in ALL forms
What Information is Considered Confidential
         and must be Protected?
                          Personal billing information

                          All medical records

                          Conversations between
                           physician and other
                           medical staff regarding a
                           patient

                          Information about a
                           patient within their
                           Insurance carrier’s
                           database
Patient Privacy Rule Rights
            The right to see and obtain a copy of
             their health record

            The right to have corrections added to
             their personal health record

            The right to receive notice about how
             their health information will be used or
             shared for certain purposes

            The right to get a report of when and
             why their health information was shared

            The right to file a complaint with the
             provider or health insurer

            The right to file a complaint with the U. S.
             Government
Personal Health Information
How to keep it confidential
                 Never leave medical
                  records where others can
                  gain access to them

                 PHI should be guarded and
                  kept confidential, shared
                  only with healthcare
                  providers involved in their
                  healthcare

                 PHI is confidential and
                  should not be viewed on
                  paper or on computer by
                  unauthorized staff
Ways to Protect Confidentiality of PHI
   PHI should only be shared with other healthcare
    professionals directly involved in an individual’s
    care
    Records are kept locked and only people with a
    need to see information about patients have
    access to them
   Employees who use computerized patient records
    to not leave their computers logged in to the
    patient information system while they are not at
    their workstations. Computer screens containing
    patient information are turned away from the view
    of the public or people passing by.
More Ways to Protect Confidentiality of PHI
   Posted or written patient information maintained in
    work areas such as nurses’ stations or front desk is
    kept covered from the public.
   Discussions about patient care are kept private to
    reduce the likelihood that those who do not need
    to know will overhear.
   Electronic records are kept secure, and the facility
    monitors who gains access to records to ensure
    that they are being used appropriately.
   Paper records are always shredded or placed in
    closed receptacles for delivery to a company that
    destroys records for the facility. They must never
    be left in the garbage.
Understanding the Security Rule
   Specifies a series of administrative, physical, and technical
    safeguards for covered entities to use to assure the
    confidentiality, integrity, and availability of electronic
    protected health information

   The Security Rule defines “confidentiality” to mean that e-PHI is
    not available or disclosed to unauthorized persons. The Security
    Rule's confidentiality requirements support the Privacy Rule's
    prohibitions against improper uses and disclosures of PHI

   The Security rule also promotes the two additional goals of
    maintaining the integrity and availability of e-PHI

   Designation of a security official who is responsible for
    developing and implement its security policies and procedures
Electronic confidentiality protections
                       Keep passwords and
                        other security
                        features that restrict
                        access to your
                        computer private
                       Never share
                        password access or
                        log in to the health
                        information system
                        using a borrowed
                        credential
More steps for protecting
         electronic information
   Point computer screen away from the public
   Never walk away from your computer with
    PHI up and in view of a passerby
   Never remove computer equipment, disks, or
    software unless instructed to do so by your
    supervisor
   Never send confidential patient information in
    an e-mail unless it is encrypted
   Always double-check the address line of an
    email before you send it.
Penalties for Breaches

Breaches of the HIPAA Privacy and Security Rules have
serious ramifications for all involved. In addition to
sanctions imposed by this organization, such breaches
may result in civil and criminal penalties.

   Statutory and regulatory penalties for breaches may
                         include:

Civil: $50,000 per incident, up to $1.5 million per calendar
year for violations that are not corrected

Criminal: $50,000 to $250,000 in fines and up to 10 years in
prison

In addition, institutions that fail to correct a HIPAA violation
may be fined up to $50,000 per violation.
Best Practice Reminders

   DO keep computer sign-on codes and passwords secret, and DO NOT allow unauthorized
   persons access to your computer. Also, use locked screensavers for added privacy.
   DO keep notes, files, memory sticks, and computers in a secure place, and be careful to NOT
   leave them in open areas outside your workplace, such as a library, cafeteria, or airport.
   DO NOT place PHI or PII on a mobile device without required approval. DO encrypt mobile
   devices that contain PHI or PII.
   DO hold discussions of PHI in private areas and for job-related reasons only. Also, be aware of
   places where others might overhear conversations, such as in reception areas.
   DO make certain when mailing documents that no sensitive information is shown on postcards or
   through envelope windows, and that envelopes are closed securely.
   DO NOT use unsealed campus mail envelopes when sending sensitive information to another
   employee.
   DO follow procedures for the proper disposal of sensitive information, such as shredding
   documents or using locked recycling drop boxes.
   When sending an e-mail, DO NOT include PHI or other sensitive information such as Social
   Security numbers, unless you have the proper written approval to store the information and
   encrypted your computer or e-mail.

(UNC, 2013)
References
HIPAA (n.d.) HIPAA training handbook for the healthcare staff: An
    introduction to confidentiality and privacy under HIPAA. Retrieved from
    website: http://www.regalmed.com/pdfs/HIPAA_Handbook.pdf

Kongstvedt, P.R. (2007). Essentials of managed health care (5th ed.). MA:
    Jones and Bartlett Publishers.

U.S. Department of Health & Human Services (2012). Health Information
      Privacy. Retrieved form U.S. Department of Health and Human Services
      website:
      http://www.hhs.gov/ocr/privacy/hipaa/understanding/consumers/ind
      ex.html

University of North Carolina (UNC) (2013). HIPAA, privacy, & security.
     Retrieved from website:
     http://www.unc.edu/hipaa/Annual%20HIPAA%20Training%20current.p
     df

More Related Content

What's hot

The Basics of HIPAA
The Basics of HIPAA The Basics of HIPAA
The Basics of HIPAA
DamianKnowles1
 
HIPAA & PHI Training
HIPAA & PHI TrainingHIPAA & PHI Training
HIPAA & PHI Training
Hatch Compliance, Inc.
 
Confidentiality in the Workplace
Confidentiality in the WorkplaceConfidentiality in the Workplace
Confidentiality in the Workplacesalvarez63
 
Confidentiality
Confidentiality Confidentiality
Confidentiality
pcsamuels10
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
maggie_Platt
 
Protecting patient privacy and confidentiality
Protecting patient privacy and confidentialityProtecting patient privacy and confidentiality
Protecting patient privacy and confidentialityTiffany Cochran
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
DeniseMHA
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
Justina Gee
 
Protecting patients confidentiality slide presentation
Protecting patients confidentiality slide presentationProtecting patients confidentiality slide presentation
Protecting patients confidentiality slide presentation
plunkk
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentiality
MOTHOM0556
 
Patients’ privacy and confidentiality
Patients’ privacy and confidentialityPatients’ privacy and confidentiality
Patients’ privacy and confidentiality
bernardsanch
 
Confidentiality New Employee Training (First-Week)
Confidentiality New Employee Training (First-Week)Confidentiality New Employee Training (First-Week)
Confidentiality New Employee Training (First-Week)
ChildrensHomeIllinois
 
MODULE 8 - PRIVACY AND CONFIDENTIALITY
MODULE 8 - PRIVACY AND CONFIDENTIALITYMODULE 8 - PRIVACY AND CONFIDENTIALITY
MODULE 8 - PRIVACY AND CONFIDENTIALITY
Dr Ghaiath Hussein
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)bholmes
 
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...
Nawanan Theera-Ampornpunt
 
Health Information Privacy and Security
Health Information Privacy and SecurityHealth Information Privacy and Security
Health Information Privacy and Security
Nawanan Theera-Ampornpunt
 
Privacy & confedentiality
Privacy & confedentialityPrivacy & confedentiality
Privacy & confedentiality
Hemang Patel
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcarekmasterson
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
Sierra Swain
 

What's hot (20)

The Basics of HIPAA
The Basics of HIPAA The Basics of HIPAA
The Basics of HIPAA
 
HIPAA & PHI Training
HIPAA & PHI TrainingHIPAA & PHI Training
HIPAA & PHI Training
 
Confidentiality in the Workplace
Confidentiality in the WorkplaceConfidentiality in the Workplace
Confidentiality in the Workplace
 
Confidentiality
Confidentiality Confidentiality
Confidentiality
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
Protecting patient privacy and confidentiality
Protecting patient privacy and confidentialityProtecting patient privacy and confidentiality
Protecting patient privacy and confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Protecting patients confidentiality slide presentation
Protecting patients confidentiality slide presentationProtecting patients confidentiality slide presentation
Protecting patients confidentiality slide presentation
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentiality
 
Patients’ privacy and confidentiality
Patients’ privacy and confidentialityPatients’ privacy and confidentiality
Patients’ privacy and confidentiality
 
Confidentiality New Employee Training (First-Week)
Confidentiality New Employee Training (First-Week)Confidentiality New Employee Training (First-Week)
Confidentiality New Employee Training (First-Week)
 
MODULE 8 - PRIVACY AND CONFIDENTIALITY
MODULE 8 - PRIVACY AND CONFIDENTIALITYMODULE 8 - PRIVACY AND CONFIDENTIALITY
MODULE 8 - PRIVACY AND CONFIDENTIALITY
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)
 
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...
 
Health Information Privacy and Security
Health Information Privacy and SecurityHealth Information Privacy and Security
Health Information Privacy and Security
 
Privacy & confedentiality
Privacy & confedentialityPrivacy & confedentiality
Privacy & confedentiality
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcare
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 

Similar to Upholding confidentiality

Confidentiality
ConfidentialityConfidentiality
Confidentialityloletawoo
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informatics
kmcanty
 
Patient Confidentiality Training Presentation (1)
Patient Confidentiality Training Presentation (1)Patient Confidentiality Training Presentation (1)
Patient Confidentiality Training Presentation (1)
DonnaShockley
 
Patient confidentiality MHA 690
Patient confidentiality MHA 690Patient confidentiality MHA 690
Patient confidentiality MHA 690
AMSIMM9932
 
Wk1 discussion 2
Wk1 discussion 2Wk1 discussion 2
Wk1 discussion 2jodimw
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
RamiAboali
 
Hipaa basics pp2
Hipaa basics pp2Hipaa basics pp2
Hipaa basics pp2martykoepke
 
Hippa training for healthcare employees
Hippa training for healthcare employeesHippa training for healthcare employees
Hippa training for healthcare employees
aminahallen
 
2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training
Cynthia Holland
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)bholmes
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcherEmed32
 
Hipaa education
Hipaa educationHipaa education
Hipaa educationeklundc
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentation
MarcEtienne6
 
Confidentiality 9.26.13
Confidentiality 9.26.13Confidentiality 9.26.13
Confidentiality 9.26.13pneville0629
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small Practices
Nisos Health
 
Tiffany hall mha 690 week 1 discussion 2
Tiffany hall mha 690 week 1   discussion 2Tiffany hall mha 690 week 1   discussion 2
Tiffany hall mha 690 week 1 discussion 2tiffhall
 
Tiffany hall mha 690 week 1 discussion 2
Tiffany hall mha 690 week 1   discussion 2Tiffany hall mha 690 week 1   discussion 2
Tiffany hall mha 690 week 1 discussion 2
tiffhall
 

Similar to Upholding confidentiality (20)

Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informatics
 
Patient Confidentiality Training Presentation (1)
Patient Confidentiality Training Presentation (1)Patient Confidentiality Training Presentation (1)
Patient Confidentiality Training Presentation (1)
 
Patient confidentiality MHA 690
Patient confidentiality MHA 690Patient confidentiality MHA 690
Patient confidentiality MHA 690
 
Wk1 discussion 2
Wk1 discussion 2Wk1 discussion 2
Wk1 discussion 2
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Hipaa basics pp2
Hipaa basics pp2Hipaa basics pp2
Hipaa basics pp2
 
Hippa training for healthcare employees
Hippa training for healthcare employeesHippa training for healthcare employees
Hippa training for healthcare employees
 
2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcher
 
Hipaa education
Hipaa educationHipaa education
Hipaa education
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentation
 
Confidentiality 9.26.13
Confidentiality 9.26.13Confidentiality 9.26.13
Confidentiality 9.26.13
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small Practices
 
Tiffany hall mha 690 week 1 discussion 2
Tiffany hall mha 690 week 1   discussion 2Tiffany hall mha 690 week 1   discussion 2
Tiffany hall mha 690 week 1 discussion 2
 
Tiffany hall mha 690 week 1 discussion 2
Tiffany hall mha 690 week 1   discussion 2Tiffany hall mha 690 week 1   discussion 2
Tiffany hall mha 690 week 1 discussion 2
 

Recently uploaded

Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 

Recently uploaded (20)

Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 

Upholding confidentiality

  • 1. Upholding Confidentiality It is your ethical responsibility Theresa Tapley MHA690: Health Care Capstone Ashford University Dr. David Cole April 23, 2013
  • 2. Objectives  Understanding of HIPAA  Ethical Responsibility to keep each and every patient’s PHI confidential  Patient Privacy Rule and Security Rules  Identification of what PHI is  Ways to protect PHI  Tips for electronic confidentiality protections  Consequences if confidentiality or PHI mishandlement
  • 3. What is Health Insurance Portability and Accountability Act (HIPAA)?  HIPPA is a federal law that gives an individual the right of protection of their personal health information (PHI).  PHI includes all medical and personal information and must be protected whether communication is verbal, written, or electronic. (U.S. Department HHS, 2012)
  • 4. Forms of Sensitive Information Sensitive Information exists in various forms Printed Spoken Electronic It is the responsibility of every employee to protect the privacy and security of sensitive information in ALL forms
  • 5. What Information is Considered Confidential and must be Protected?  Personal billing information  All medical records  Conversations between physician and other medical staff regarding a patient  Information about a patient within their Insurance carrier’s database
  • 6. Patient Privacy Rule Rights  The right to see and obtain a copy of their health record  The right to have corrections added to their personal health record  The right to receive notice about how their health information will be used or shared for certain purposes  The right to get a report of when and why their health information was shared  The right to file a complaint with the provider or health insurer  The right to file a complaint with the U. S. Government
  • 7. Personal Health Information How to keep it confidential  Never leave medical records where others can gain access to them  PHI should be guarded and kept confidential, shared only with healthcare providers involved in their healthcare  PHI is confidential and should not be viewed on paper or on computer by unauthorized staff
  • 8. Ways to Protect Confidentiality of PHI  PHI should only be shared with other healthcare professionals directly involved in an individual’s care  Records are kept locked and only people with a need to see information about patients have access to them  Employees who use computerized patient records to not leave their computers logged in to the patient information system while they are not at their workstations. Computer screens containing patient information are turned away from the view of the public or people passing by.
  • 9. More Ways to Protect Confidentiality of PHI  Posted or written patient information maintained in work areas such as nurses’ stations or front desk is kept covered from the public.  Discussions about patient care are kept private to reduce the likelihood that those who do not need to know will overhear.  Electronic records are kept secure, and the facility monitors who gains access to records to ensure that they are being used appropriately.  Paper records are always shredded or placed in closed receptacles for delivery to a company that destroys records for the facility. They must never be left in the garbage.
  • 10. Understanding the Security Rule  Specifies a series of administrative, physical, and technical safeguards for covered entities to use to assure the confidentiality, integrity, and availability of electronic protected health information  The Security Rule defines “confidentiality” to mean that e-PHI is not available or disclosed to unauthorized persons. The Security Rule's confidentiality requirements support the Privacy Rule's prohibitions against improper uses and disclosures of PHI  The Security rule also promotes the two additional goals of maintaining the integrity and availability of e-PHI  Designation of a security official who is responsible for developing and implement its security policies and procedures
  • 11. Electronic confidentiality protections  Keep passwords and other security features that restrict access to your computer private  Never share password access or log in to the health information system using a borrowed credential
  • 12. More steps for protecting electronic information  Point computer screen away from the public  Never walk away from your computer with PHI up and in view of a passerby  Never remove computer equipment, disks, or software unless instructed to do so by your supervisor  Never send confidential patient information in an e-mail unless it is encrypted  Always double-check the address line of an email before you send it.
  • 13. Penalties for Breaches Breaches of the HIPAA Privacy and Security Rules have serious ramifications for all involved. In addition to sanctions imposed by this organization, such breaches may result in civil and criminal penalties. Statutory and regulatory penalties for breaches may include: Civil: $50,000 per incident, up to $1.5 million per calendar year for violations that are not corrected Criminal: $50,000 to $250,000 in fines and up to 10 years in prison In addition, institutions that fail to correct a HIPAA violation may be fined up to $50,000 per violation.
  • 14. Best Practice Reminders  DO keep computer sign-on codes and passwords secret, and DO NOT allow unauthorized  persons access to your computer. Also, use locked screensavers for added privacy.  DO keep notes, files, memory sticks, and computers in a secure place, and be careful to NOT  leave them in open areas outside your workplace, such as a library, cafeteria, or airport.  DO NOT place PHI or PII on a mobile device without required approval. DO encrypt mobile  devices that contain PHI or PII.  DO hold discussions of PHI in private areas and for job-related reasons only. Also, be aware of  places where others might overhear conversations, such as in reception areas.  DO make certain when mailing documents that no sensitive information is shown on postcards or  through envelope windows, and that envelopes are closed securely.  DO NOT use unsealed campus mail envelopes when sending sensitive information to another  employee.  DO follow procedures for the proper disposal of sensitive information, such as shredding  documents or using locked recycling drop boxes.  When sending an e-mail, DO NOT include PHI or other sensitive information such as Social  Security numbers, unless you have the proper written approval to store the information and  encrypted your computer or e-mail. (UNC, 2013)
  • 15. References HIPAA (n.d.) HIPAA training handbook for the healthcare staff: An introduction to confidentiality and privacy under HIPAA. Retrieved from website: http://www.regalmed.com/pdfs/HIPAA_Handbook.pdf Kongstvedt, P.R. (2007). Essentials of managed health care (5th ed.). MA: Jones and Bartlett Publishers. U.S. Department of Health & Human Services (2012). Health Information Privacy. Retrieved form U.S. Department of Health and Human Services website: http://www.hhs.gov/ocr/privacy/hipaa/understanding/consumers/ind ex.html University of North Carolina (UNC) (2013). HIPAA, privacy, & security. Retrieved from website: http://www.unc.edu/hipaa/Annual%20HIPAA%20Training%20current.p df