SlideShare a Scribd company logo
PRIVACY AND CONFIDENTIALITY
ANGELA PALACIOS
MHA690: HEALTH CARE CAPSTONE
PROFESSOR HWANG-JI LU
SEPTEMBER 26, 2013
TRAINING MANUAL
When it comes to health care, providing patient-centered and quality
care is the number one goal. There are many factors that are involved
in this process and patient privacy and confidentiality is prominent. In
the era of new technology and electronic medical records (EMR)
systems, health care professionals and all staff must actively practice
the obligation to keep patient health information private. All staff
members are to ensure the integrity and confidentiality patient
information. Why is this important?
• Protects individuals from discriminatory or wrongful use of their
protected health information (PHI)
• Protect against any reasonably anticipated threats or hazards to
the security of the information
• Protect against unauthorized use or disclosure of the information
PROTECTED HEALTH
INFORMATION (PHI)
• PHI is health information that recorded, stored, retrieved
and processed for medical decision-making purposes.
• It is important to understand that PHI must be protected
not only from outsiders, patient information must be
protected from individuals who have no direct care (whether
clinical or administrative) with the patient.
• With EMRs, all activity by users is monitored and an audit
trail is readily available to keep track of who is accessing
any given patient’s medical records.
Patient information is easy to access
through EMR. This is why it can be
deceiving to employees because if you
have the access, why can’t you use it
to access any patient chart? This is
where patient privacy is questioned.
NO EMPLOYEE CAN ACCESS A
PATIENT’S CHART THAT HE/SHE IS
NOT DIRECTLY WORKING WITH.
• The designation of a privacy
officer
• Privacy training for all employees
• Reasonable safeguards to prevent
intentional or incidental disclosure
or misuse of protected health
information
• Formal sanctions for employee
violations of any privacy rule
requirement
If an employee shares information
pertaining to a patient with anyone who is
not involved in the care of the patient, this
is considered a violation of patient privacy
and confidentiality.
Keep in mind that there are consequences
and disciplinary actions if a patient’s
privacy is breached. These include:
Termination of employment
Suspension
Write-ups
APPROPRIATE POLICIES, PROCEDURES,
AND SYSTEMS
HIPAA
• HIPAA is the acronym for the Health Insurance Portability and Accountability Act of
1996. HIPAA is one of the most significant aspects of Federal legislation affecting the
health care industry since the creation of the Medicare and Medicaid programs in
1965. Under Title II of HIPAA, Congress passed the Administrative Simplification
provisions of HIPAA, to protect the privacy and security of protected health
information (PHI), and to promote efficiency in the health care industry through the
use of standardized electronic transactions. The main stimulus behind these rules is
to protect the confidentiality, integrity, and availability of PHI in any form: written,
verbal, or electronic.
• The Privacy rule protects individuals from discriminatory or wrongful use of their
protected health information (PHI). An example of discriminatory or wrongful use is:
• Nosy neighbors, family members or reporters using PHI for any number of
unnecessary or exploitive purposes
WAYS TO KEEP PATIENT INFORMATION
SAFE:
• Using lowered voices at the reception, registration or any other
common area so PHI cannot be overheard
• Setting up curtains or temporary wall dividers to create semi-
private spaces in common areas for discussion
• Not mentioning names when taking a phone call from another
physician in the presence of another patient
• Dictating notes in a private location such as an office rather
than in a hall or other common area
• Properly disposing of records on paper if not maintained in
paper medical records (such as patient name, results,
treatment plans, medical history)
CONCLUSION
• We place the highest priority on a patient’s right to privacy. We
are committed to providing patients and their families with
exceptional care and forming a relationship that is built on trust.
This means that we respect a patient’s right to privacy and will
endeavor to protect the confidentiality of all health information–
whether this information is stored on paper or electronically. If
you are uncertain of what a potential privacy
breach is, talk to your supervisor or manager.
IF YOU DON’T KNOW, ASK!
JUSTIFICATION
• A slideshow with pictures and pertinent, overall information about what patient health
information is and how their privacy is important will provide a background for
understanding how imperative patient privacy and confidentiality is.
• This will help because it is in an order where each component is addressed separately
while always tying back to the importance of accessing patient information with discretion.
• Staff reading this will be able to understand what privacy is, how HIPPA applies, and how
EMRs must be navigated with caution.
• Understanding how much information EMRs hold and how easy it is for any staff member
to access PHI, enables staff to take responsibility is patient privacy and confidentiality is
breached. Consequences are demanded if there is a breach.

More Related Content

What's hot

MODULE 8 - PRIVACY AND CONFIDENTIALITY
MODULE 8 - PRIVACY AND CONFIDENTIALITYMODULE 8 - PRIVACY AND CONFIDENTIALITY
MODULE 8 - PRIVACY AND CONFIDENTIALITY
Dr Ghaiath Hussein
 
Health information confidentiality
Health information confidentialityHealth information confidentiality
Health information confidentiality
James Noon
 
MHA690 wk 1 disc 2
MHA690 wk 1 disc 2MHA690 wk 1 disc 2
MHA690 wk 1 disc 2
EffiongOkon2
 
SCHS Topic 5: Privacy, Confidentiality and Medical Records
SCHS Topic 5: Privacy, Confidentiality and Medical RecordsSCHS Topic 5: Privacy, Confidentiality and Medical Records
SCHS Topic 5: Privacy, Confidentiality and Medical Records
Dr Ghaiath Hussein
 
Welcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityWelcome to the hippa, privacy and security
Welcome to the hippa, privacy and security
veve1728
 
Hippa training 2017
Hippa training 2017Hippa training 2017
Hippa training 2017
Ashley Valenzuela
 
Privacy & confedentiality
Privacy & confedentialityPrivacy & confedentiality
Privacy & confedentiality
Hemang Patel
 
Maintain patient confidentiality.ppt mha690
Maintain patient confidentiality.ppt mha690Maintain patient confidentiality.ppt mha690
Maintain patient confidentiality.ppt mha690
Josefina Calderon
 
Hot materials hippa
Hot materials hippaHot materials hippa
Hot materials hippa
Work Aholic
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
12ort
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
maggie_Platt
 
Confidentially in the workplace
Confidentially in the workplaceConfidentially in the workplace
Confidentially in the workplace
Knighten
 
Patient privacy 2.0 slides
Patient privacy 2.0 slidesPatient privacy 2.0 slides
Patient privacy 2.0 slides
andibear
 
Hippa privacy and security awareness
Hippa privacy and security awarenessHippa privacy and security awareness
Hippa privacy and security awareness
Charles Taft
 
Patient confidentiality training
Patient confidentiality trainingPatient confidentiality training
Patient confidentiality training
Sheena705
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
Toni Meeks
 
Patient Privacy and Safety in Healthcare
Patient Privacy and Safety in HealthcarePatient Privacy and Safety in Healthcare
Patient Privacy and Safety in Healthcare
Queen Myers
 
Dustin HIPAA
Dustin HIPAADustin HIPAA
Dustin HIPAA
Dustin Kinzinger
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)
bholmes
 
Week 1 discussion 2
Week 1 discussion 2Week 1 discussion 2
Week 1 discussion 2
girly12
 

What's hot (20)

MODULE 8 - PRIVACY AND CONFIDENTIALITY
MODULE 8 - PRIVACY AND CONFIDENTIALITYMODULE 8 - PRIVACY AND CONFIDENTIALITY
MODULE 8 - PRIVACY AND CONFIDENTIALITY
 
Health information confidentiality
Health information confidentialityHealth information confidentiality
Health information confidentiality
 
MHA690 wk 1 disc 2
MHA690 wk 1 disc 2MHA690 wk 1 disc 2
MHA690 wk 1 disc 2
 
SCHS Topic 5: Privacy, Confidentiality and Medical Records
SCHS Topic 5: Privacy, Confidentiality and Medical RecordsSCHS Topic 5: Privacy, Confidentiality and Medical Records
SCHS Topic 5: Privacy, Confidentiality and Medical Records
 
Welcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityWelcome to the hippa, privacy and security
Welcome to the hippa, privacy and security
 
Hippa training 2017
Hippa training 2017Hippa training 2017
Hippa training 2017
 
Privacy & confedentiality
Privacy & confedentialityPrivacy & confedentiality
Privacy & confedentiality
 
Maintain patient confidentiality.ppt mha690
Maintain patient confidentiality.ppt mha690Maintain patient confidentiality.ppt mha690
Maintain patient confidentiality.ppt mha690
 
Hot materials hippa
Hot materials hippaHot materials hippa
Hot materials hippa
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
Confidentially in the workplace
Confidentially in the workplaceConfidentially in the workplace
Confidentially in the workplace
 
Patient privacy 2.0 slides
Patient privacy 2.0 slidesPatient privacy 2.0 slides
Patient privacy 2.0 slides
 
Hippa privacy and security awareness
Hippa privacy and security awarenessHippa privacy and security awareness
Hippa privacy and security awareness
 
Patient confidentiality training
Patient confidentiality trainingPatient confidentiality training
Patient confidentiality training
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
Patient Privacy and Safety in Healthcare
Patient Privacy and Safety in HealthcarePatient Privacy and Safety in Healthcare
Patient Privacy and Safety in Healthcare
 
Dustin HIPAA
Dustin HIPAADustin HIPAA
Dustin HIPAA
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)
 
Week 1 discussion 2
Week 1 discussion 2Week 1 discussion 2
Week 1 discussion 2
 

Viewers also liked

R merge-tutorial
R merge-tutorialR merge-tutorial
R merge-tutorial
Wayne Lee
 
Make Fat Loss Easier With One Of These Recommendations
Make Fat Loss Easier With One Of These RecommendationsMake Fat Loss Easier With One Of These Recommendations
Make Fat Loss Easier With One Of These Recommendations
dhayase
 
Gold Crown Resorts by Real Vacations
Gold Crown Resorts by Real VacationsGold Crown Resorts by Real Vacations
Gold Crown Resorts by Real Vacations
realvacations
 
Crash Course in A/B testing
Crash Course in A/B testingCrash Course in A/B testing
Crash Course in A/B testing
Wayne Lee
 
Explaining the Basics of Mean Field Variational Approximation for Statisticians
Explaining the Basics of Mean Field Variational Approximation for StatisticiansExplaining the Basics of Mean Field Variational Approximation for Statisticians
Explaining the Basics of Mean Field Variational Approximation for Statisticians
Wayne Lee
 
Ota presentation
Ota presentationOta presentation
Ota presentation
Hyatt Regency DFW
 
The Key to Blind Dates - Data Snooping
The Key to Blind Dates - Data SnoopingThe Key to Blind Dates - Data Snooping
The Key to Blind Dates - Data Snooping
Wayne Lee
 
Introduction to Bag of Little Bootstrap
Introduction to Bag of Little Bootstrap Introduction to Bag of Little Bootstrap
Introduction to Bag of Little Bootstrap
Wayne Lee
 
What is bayesian statistics and how is it different?
What is bayesian statistics and how is it different?What is bayesian statistics and how is it different?
What is bayesian statistics and how is it different?
Wayne Lee
 
Administrative safeguards
Administrative safeguardsAdministrative safeguards
Administrative safeguards
Melissa President
 
LDA Beginner's Tutorial
LDA Beginner's TutorialLDA Beginner's Tutorial
LDA Beginner's Tutorial
Wayne Lee
 
quality7
quality7quality7
quality7
EQUIPE MRP
 
closenaTv
closenaTvclosenaTv
closenaTv
EQUIPE MRP
 
evoolbusiness
evoolbusinessevoolbusiness
evoolbusiness
EQUIPE MRP
 
Gejala gejala xeroftalmia
Gejala gejala xeroftalmiaGejala gejala xeroftalmia
Gejala gejala xeroftalmia
Innaa Fitri
 

Viewers also liked (15)

R merge-tutorial
R merge-tutorialR merge-tutorial
R merge-tutorial
 
Make Fat Loss Easier With One Of These Recommendations
Make Fat Loss Easier With One Of These RecommendationsMake Fat Loss Easier With One Of These Recommendations
Make Fat Loss Easier With One Of These Recommendations
 
Gold Crown Resorts by Real Vacations
Gold Crown Resorts by Real VacationsGold Crown Resorts by Real Vacations
Gold Crown Resorts by Real Vacations
 
Crash Course in A/B testing
Crash Course in A/B testingCrash Course in A/B testing
Crash Course in A/B testing
 
Explaining the Basics of Mean Field Variational Approximation for Statisticians
Explaining the Basics of Mean Field Variational Approximation for StatisticiansExplaining the Basics of Mean Field Variational Approximation for Statisticians
Explaining the Basics of Mean Field Variational Approximation for Statisticians
 
Ota presentation
Ota presentationOta presentation
Ota presentation
 
The Key to Blind Dates - Data Snooping
The Key to Blind Dates - Data SnoopingThe Key to Blind Dates - Data Snooping
The Key to Blind Dates - Data Snooping
 
Introduction to Bag of Little Bootstrap
Introduction to Bag of Little Bootstrap Introduction to Bag of Little Bootstrap
Introduction to Bag of Little Bootstrap
 
What is bayesian statistics and how is it different?
What is bayesian statistics and how is it different?What is bayesian statistics and how is it different?
What is bayesian statistics and how is it different?
 
Administrative safeguards
Administrative safeguardsAdministrative safeguards
Administrative safeguards
 
LDA Beginner's Tutorial
LDA Beginner's TutorialLDA Beginner's Tutorial
LDA Beginner's Tutorial
 
quality7
quality7quality7
quality7
 
closenaTv
closenaTvclosenaTv
closenaTv
 
evoolbusiness
evoolbusinessevoolbusiness
evoolbusiness
 
Gejala gejala xeroftalmia
Gejala gejala xeroftalmiaGejala gejala xeroftalmia
Gejala gejala xeroftalmia
 

Similar to Week 1 discussion patient confidentiality

Patient confidentiality training
Patient confidentiality  trainingPatient confidentiality  training
Patient confidentiality training
twhit0623
 
Patient privacy wsanders
Patient privacy wsandersPatient privacy wsanders
Patient privacy wsanders
michellewand
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
LeRoy Ulibarri
 
Are You HIPAA Safe?
Are You HIPAA Safe?Are You HIPAA Safe?
Are You HIPAA Safe?
TriageLogic
 
Mha 690 week 1 discussion presentation
Mha 690 week 1 discussion presentationMha 690 week 1 discussion presentation
Mha 690 week 1 discussion presentation
falane
 
HIPAA Presentation
HIPAA PresentationHIPAA Presentation
HIPAA Presentation
LyubovKarnaukh
 
Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...
Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...
Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...
Rennessa Jackson
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
DeniseMHA
 
Health Insurance and Portability and Accountability Act
Health Insurance and Portability and Accountability ActHealth Insurance and Portability and Accountability Act
Health Insurance and Portability and Accountability Act
সারন দাস
 
HIPAA and Privacy Training
HIPAA and Privacy TrainingHIPAA and Privacy Training
HIPAA and Privacy Training
JasAmataga
 
Hipaa training
Hipaa trainingHipaa training
Hipaa training
schmoikel987
 
01 law and_ethics
01 law and_ethics01 law and_ethics
01 law and_ethics
kdcsdross
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentation
MarcEtienne6
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
JOANNARANTONIO
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
DonnaDudley
 
DVHIMSS Ensuring Privacy and Security of HIEs in PA
DVHIMSS Ensuring Privacy and Security of HIEs in PADVHIMSS Ensuring Privacy and Security of HIEs in PA
DVHIMSS Ensuring Privacy and Security of HIEs in PA
William Buddy Gillespie ITIL Certified
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
Jada Norris
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
Beautie1
 

Similar to Week 1 discussion patient confidentiality (20)

Patient confidentiality training
Patient confidentiality  trainingPatient confidentiality  training
Patient confidentiality training
 
Patient privacy wsanders
Patient privacy wsandersPatient privacy wsanders
Patient privacy wsanders
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Are You HIPAA Safe?
Are You HIPAA Safe?Are You HIPAA Safe?
Are You HIPAA Safe?
 
Mha 690 week 1 discussion presentation
Mha 690 week 1 discussion presentationMha 690 week 1 discussion presentation
Mha 690 week 1 discussion presentation
 
HIPAA Presentation
HIPAA PresentationHIPAA Presentation
HIPAA Presentation
 
Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...
Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...
Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Health Insurance and Portability and Accountability Act
Health Insurance and Portability and Accountability ActHealth Insurance and Portability and Accountability Act
Health Insurance and Portability and Accountability Act
 
HIPAA and Privacy Training
HIPAA and Privacy TrainingHIPAA and Privacy Training
HIPAA and Privacy Training
 
Hipaa training
Hipaa trainingHipaa training
Hipaa training
 
01 law and_ethics
01 law and_ethics01 law and_ethics
01 law and_ethics
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentation
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
DVHIMSS Ensuring Privacy and Security of HIEs in PA
DVHIMSS Ensuring Privacy and Security of HIEs in PADVHIMSS Ensuring Privacy and Security of HIEs in PA
DVHIMSS Ensuring Privacy and Security of HIEs in PA
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 

Recently uploaded

Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
aragme
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
Aggregage
 
The Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb PlatformThe Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb Platform
SabaaSudozai
 
Part 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 SlowdownPart 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 Slowdown
jeffkluth1
 
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
Stephen Cashman
 
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
APCO
 
Digital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on SustainabilityDigital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on Sustainability
sssourabhsharma
 
3 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 20243 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 2024
SEOSMMEARTH
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
NZSG
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
taqyea
 
Structural Design Process: Step-by-Step Guide for Buildings
Structural Design Process: Step-by-Step Guide for BuildingsStructural Design Process: Step-by-Step Guide for Buildings
Structural Design Process: Step-by-Step Guide for Buildings
Chandresh Chudasama
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
bosssp10
 
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
Aleksey Savkin
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
AnnySerafinaLove
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
Top Forex Brokers Review
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
FelixPerez547899
 

Recently uploaded (20)

Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
 
2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
 
The Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb PlatformThe Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb Platform
 
Part 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 SlowdownPart 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 Slowdown
 
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
 
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
 
Digital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on SustainabilityDigital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on Sustainability
 
3 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 20243 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 2024
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
 
Structural Design Process: Step-by-Step Guide for Buildings
Structural Design Process: Step-by-Step Guide for BuildingsStructural Design Process: Step-by-Step Guide for Buildings
Structural Design Process: Step-by-Step Guide for Buildings
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
 
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
 

Week 1 discussion patient confidentiality

  • 1. PRIVACY AND CONFIDENTIALITY ANGELA PALACIOS MHA690: HEALTH CARE CAPSTONE PROFESSOR HWANG-JI LU SEPTEMBER 26, 2013
  • 2. TRAINING MANUAL When it comes to health care, providing patient-centered and quality care is the number one goal. There are many factors that are involved in this process and patient privacy and confidentiality is prominent. In the era of new technology and electronic medical records (EMR) systems, health care professionals and all staff must actively practice the obligation to keep patient health information private. All staff members are to ensure the integrity and confidentiality patient information. Why is this important? • Protects individuals from discriminatory or wrongful use of their protected health information (PHI) • Protect against any reasonably anticipated threats or hazards to the security of the information • Protect against unauthorized use or disclosure of the information
  • 3. PROTECTED HEALTH INFORMATION (PHI) • PHI is health information that recorded, stored, retrieved and processed for medical decision-making purposes. • It is important to understand that PHI must be protected not only from outsiders, patient information must be protected from individuals who have no direct care (whether clinical or administrative) with the patient. • With EMRs, all activity by users is monitored and an audit trail is readily available to keep track of who is accessing any given patient’s medical records.
  • 4. Patient information is easy to access through EMR. This is why it can be deceiving to employees because if you have the access, why can’t you use it to access any patient chart? This is where patient privacy is questioned. NO EMPLOYEE CAN ACCESS A PATIENT’S CHART THAT HE/SHE IS NOT DIRECTLY WORKING WITH.
  • 5. • The designation of a privacy officer • Privacy training for all employees • Reasonable safeguards to prevent intentional or incidental disclosure or misuse of protected health information • Formal sanctions for employee violations of any privacy rule requirement If an employee shares information pertaining to a patient with anyone who is not involved in the care of the patient, this is considered a violation of patient privacy and confidentiality. Keep in mind that there are consequences and disciplinary actions if a patient’s privacy is breached. These include: Termination of employment Suspension Write-ups APPROPRIATE POLICIES, PROCEDURES, AND SYSTEMS
  • 6. HIPAA • HIPAA is the acronym for the Health Insurance Portability and Accountability Act of 1996. HIPAA is one of the most significant aspects of Federal legislation affecting the health care industry since the creation of the Medicare and Medicaid programs in 1965. Under Title II of HIPAA, Congress passed the Administrative Simplification provisions of HIPAA, to protect the privacy and security of protected health information (PHI), and to promote efficiency in the health care industry through the use of standardized electronic transactions. The main stimulus behind these rules is to protect the confidentiality, integrity, and availability of PHI in any form: written, verbal, or electronic. • The Privacy rule protects individuals from discriminatory or wrongful use of their protected health information (PHI). An example of discriminatory or wrongful use is: • Nosy neighbors, family members or reporters using PHI for any number of unnecessary or exploitive purposes
  • 7. WAYS TO KEEP PATIENT INFORMATION SAFE: • Using lowered voices at the reception, registration or any other common area so PHI cannot be overheard • Setting up curtains or temporary wall dividers to create semi- private spaces in common areas for discussion • Not mentioning names when taking a phone call from another physician in the presence of another patient • Dictating notes in a private location such as an office rather than in a hall or other common area • Properly disposing of records on paper if not maintained in paper medical records (such as patient name, results, treatment plans, medical history)
  • 8. CONCLUSION • We place the highest priority on a patient’s right to privacy. We are committed to providing patients and their families with exceptional care and forming a relationship that is built on trust. This means that we respect a patient’s right to privacy and will endeavor to protect the confidentiality of all health information– whether this information is stored on paper or electronically. If you are uncertain of what a potential privacy breach is, talk to your supervisor or manager. IF YOU DON’T KNOW, ASK!
  • 9. JUSTIFICATION • A slideshow with pictures and pertinent, overall information about what patient health information is and how their privacy is important will provide a background for understanding how imperative patient privacy and confidentiality is. • This will help because it is in an order where each component is addressed separately while always tying back to the importance of accessing patient information with discretion. • Staff reading this will be able to understand what privacy is, how HIPPA applies, and how EMRs must be navigated with caution. • Understanding how much information EMRs hold and how easy it is for any staff member to access PHI, enables staff to take responsibility is patient privacy and confidentiality is breached. Consequences are demanded if there is a breach.