SlideShare a Scribd company logo
1 of 8
By: Ashley Gavin
            MHA 690
Dr. David Shawn Cole
                4/5/12
   Workplace confidentiality can be defined as
    keeping the employee, customer and client
    information private

   Confidentiality is a fundamental part of
    professional practice that protects human
    rights
    The HIPAA Privacy Rule provides federal protections
    for personal health information held by covered entities
    and gives patients an array of rights with respect to that
    information

   The Privacy Rule is balanced so that it permits the
    disclosure of personal health information needed for
    patient care and other important purposes

   The Security Rule specifies a series of
    administrative, physical, and technical safeguards for
    covered entities to use to assure the
    confidentiality, integrity, and availability of electronic
    protected health information
   More than 120 workers at a UCLA hospital
    viewed celebrities medical records and other
    personal information without permission

   Supervisors’ passwords were compromised by
    employees in order to obtain the information

   This was a breach of confidentiality between
    patient-employee privileges and rights
   Patient information should not be discussed among
    employees on the clock nor off of the clock

   Staff should always log off, turn off, or lock their
    computers

   Sensitive information should have security controls
    that are only accessible to management

   Passwords should regularly be changed to ensure
    security
   The human resource professionals should take
    necessary steps to prevent the misuse of
    information that is personal

   Once the policies are devised, the next thing to
    do is to communicate the same to all the
    employees, supervisors and managers
   Training them about the confidentiality issues by
    giving them printouts of the policy or holding
    meetings and seminars in the office which teach
    the importance of confidentiality to the
    employees, should be done on a regular basis

   Employees are informed of what is considered as
    a breach of confidentiality and what the
    consequences of their actions will lead to in forms
    of disciplinary measures
   What is HIPAA. Implementation of HIPAA and the
    privacy rule of the IRB. Retrieved April 5, 2012, from
    http://www.research.uci.edu

   120 UCLA Hospital Staff Saw Celebrity Health
    Records. Retrieved April 5, 2012, from
    http://www.foxnews.com

More Related Content

What's hot

susanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2ppsusanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2ppPrayerful
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1mesaunders
 
Hippa compliance training
Hippa compliance trainingHippa compliance training
Hippa compliance trainingscapoccia
 
Confidentiality mha 690
Confidentiality mha 690Confidentiality mha 690
Confidentiality mha 690tohoty6719
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1mesaunders
 
Patient Privacy Training
Patient Privacy TrainingPatient Privacy Training
Patient Privacy Trainingcarenanichole
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentialityToni Meeks
 
Introduction hippaa
Introduction hippaaIntroduction hippaa
Introduction hippaaTina Peña
 
MHA690 Week 1 Patient Privacy and Confidentiality
MHA690 Week 1 Patient Privacy and ConfidentialityMHA690 Week 1 Patient Privacy and Confidentiality
MHA690 Week 1 Patient Privacy and ConfidentialityRitaJackson81
 
Patient confidentiality training
Patient confidentiality trainingPatient confidentiality training
Patient confidentiality trainingSheena705
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentialityptamayo1958
 
Hipaa and patient medical record confidentiality
Hipaa and patient medical record confidentialityHipaa and patient medical record confidentiality
Hipaa and patient medical record confidentialityvflores007
 
Healthcare Confidentiality
Healthcare ConfidentialityHealthcare Confidentiality
Healthcare Confidentialityljbroshious
 

What's hot (14)

susanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2ppsusanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2pp
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1
 
Hippa compliance training
Hippa compliance trainingHippa compliance training
Hippa compliance training
 
Confidentiality mha 690
Confidentiality mha 690Confidentiality mha 690
Confidentiality mha 690
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1
 
Patient Privacy Training
Patient Privacy TrainingPatient Privacy Training
Patient Privacy Training
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
Introduction hippaa
Introduction hippaaIntroduction hippaa
Introduction hippaa
 
MHA690 Week 1 Patient Privacy and Confidentiality
MHA690 Week 1 Patient Privacy and ConfidentialityMHA690 Week 1 Patient Privacy and Confidentiality
MHA690 Week 1 Patient Privacy and Confidentiality
 
Patient confidentiality training
Patient confidentiality trainingPatient confidentiality training
Patient confidentiality training
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
Tasia Confidentiality PPT
Tasia Confidentiality PPTTasia Confidentiality PPT
Tasia Confidentiality PPT
 
Hipaa and patient medical record confidentiality
Hipaa and patient medical record confidentialityHipaa and patient medical record confidentiality
Hipaa and patient medical record confidentiality
 
Healthcare Confidentiality
Healthcare ConfidentialityHealthcare Confidentiality
Healthcare Confidentiality
 

Viewers also liked

Viewers also liked (11)

Global warming
Global warmingGlobal warming
Global warming
 
Digitális lábnyom i.
Digitális lábnyom i.Digitális lábnyom i.
Digitális lábnyom i.
 
Accelerated tissue repair
Accelerated tissue repairAccelerated tissue repair
Accelerated tissue repair
 
Portfolio Buro Gom
Portfolio Buro GomPortfolio Buro Gom
Portfolio Buro Gom
 
What is confidentiality
What is confidentialityWhat is confidentiality
What is confidentiality
 
Msproject
MsprojectMsproject
Msproject
 
W.E.B. Dubois
W.E.B. DuboisW.E.B. Dubois
W.E.B. Dubois
 
Your Life, Your Legacy
Your Life, Your LegacyYour Life, Your Legacy
Your Life, Your Legacy
 
Diagramming.
Diagramming.Diagramming.
Diagramming.
 
Google in china
Google in chinaGoogle in china
Google in china
 
Okislitelno vosstanovitelnye reakcii_720[3]
Okislitelno vosstanovitelnye reakcii_720[3]Okislitelno vosstanovitelnye reakcii_720[3]
Okislitelno vosstanovitelnye reakcii_720[3]
 

Similar to What is confidentiality

Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentialityToni Meeks
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentialityToni Meeks
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1mesaunders
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1mesaunders
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1mesaunders
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1mesaunders
 
Week 1 discussion 2
Week 1 discussion 2Week 1 discussion 2
Week 1 discussion 2girly12
 
Confidentiality training mha 690
Confidentiality training mha 690Confidentiality training mha 690
Confidentiality training mha 690KenyaPoole
 
Discussion2
Discussion2 Discussion2
Discussion2 amberlinn
 
Upholding confidentiality
Upholding confidentialityUpholding confidentiality
Upholding confidentialityTheresa Tapley
 
Patient confedentiality ppt
Patient confedentiality pptPatient confedentiality ppt
Patient confedentiality pptYuli Vargas
 
Patient confidentiality 9.26.13
Patient confidentiality 9.26.13Patient confidentiality 9.26.13
Patient confidentiality 9.26.13pneville0629
 
Confidentiality
ConfidentialityConfidentiality
Confidentialitylucia2764
 
How can the info listed here be written into 2�3-page paper with APA.pdf
How can the info listed here be written into 2�3-page paper with APA.pdfHow can the info listed here be written into 2�3-page paper with APA.pdf
How can the info listed here be written into 2�3-page paper with APA.pdffmac5
 
Confidentiality of Health Care
Confidentiality of Health CareConfidentiality of Health Care
Confidentiality of Health Carekmcgrew1219
 

Similar to What is confidentiality (20)

Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1
 
Week 1 discussion 2
Week 1 discussion 2Week 1 discussion 2
Week 1 discussion 2
 
Confidentiality training mha 690
Confidentiality training mha 690Confidentiality training mha 690
Confidentiality training mha 690
 
Discussion2
Discussion2 Discussion2
Discussion2
 
Upholding confidentiality
Upholding confidentialityUpholding confidentiality
Upholding confidentiality
 
Patient confedentiality ppt
Patient confedentiality pptPatient confedentiality ppt
Patient confedentiality ppt
 
Patient confidentiality 9.26.13
Patient confidentiality 9.26.13Patient confidentiality 9.26.13
Patient confidentiality 9.26.13
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
How can the info listed here be written into 2�3-page paper with APA.pdf
How can the info listed here be written into 2�3-page paper with APA.pdfHow can the info listed here be written into 2�3-page paper with APA.pdf
How can the info listed here be written into 2�3-page paper with APA.pdf
 
Confidentiality of Health Care
Confidentiality of Health CareConfidentiality of Health Care
Confidentiality of Health Care
 
Mha.690
Mha.690Mha.690
Mha.690
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 

Recently uploaded

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

What is confidentiality

  • 1. By: Ashley Gavin MHA 690 Dr. David Shawn Cole 4/5/12
  • 2. Workplace confidentiality can be defined as keeping the employee, customer and client information private  Confidentiality is a fundamental part of professional practice that protects human rights
  • 3. The HIPAA Privacy Rule provides federal protections for personal health information held by covered entities and gives patients an array of rights with respect to that information  The Privacy Rule is balanced so that it permits the disclosure of personal health information needed for patient care and other important purposes  The Security Rule specifies a series of administrative, physical, and technical safeguards for covered entities to use to assure the confidentiality, integrity, and availability of electronic protected health information
  • 4. More than 120 workers at a UCLA hospital viewed celebrities medical records and other personal information without permission  Supervisors’ passwords were compromised by employees in order to obtain the information  This was a breach of confidentiality between patient-employee privileges and rights
  • 5. Patient information should not be discussed among employees on the clock nor off of the clock  Staff should always log off, turn off, or lock their computers  Sensitive information should have security controls that are only accessible to management  Passwords should regularly be changed to ensure security
  • 6. The human resource professionals should take necessary steps to prevent the misuse of information that is personal  Once the policies are devised, the next thing to do is to communicate the same to all the employees, supervisors and managers
  • 7. Training them about the confidentiality issues by giving them printouts of the policy or holding meetings and seminars in the office which teach the importance of confidentiality to the employees, should be done on a regular basis  Employees are informed of what is considered as a breach of confidentiality and what the consequences of their actions will lead to in forms of disciplinary measures
  • 8. What is HIPAA. Implementation of HIPAA and the privacy rule of the IRB. Retrieved April 5, 2012, from http://www.research.uci.edu  120 UCLA Hospital Staff Saw Celebrity Health Records. Retrieved April 5, 2012, from http://www.foxnews.com