SlideShare a Scribd company logo
Jodi M. Watkowski
MHA690- Health Care Capstone
Dr. Hwang-Ji Lu
February 2, 2012
   Ways to protect the privacy and security of
    confidential and protected health
    information
   To recognize situations in which confidential
    and protected health information can be
    mishandled
   That employees are held responsible for their
    actions
   HIPPA identifiers which create protected
    health information (PHI)
   It is the responsibility of every employee to
    protect the privacy and security of sensitive
    information in all forms.
   Sensitive information comes in several forms:
     Electronic
     Spoken
     Printed
   Examples of sensitive information include the
    following:
       Personnel information
       Computer Passwords
       Driver’s License Numbers
       Credit Card Numbers
       Social Security Numbers

   Without protection of the above, the risk of
    identity theft and invasion of privacy is greater.
   Access to medical records must be
    authorized.
   If an employee accesses or discloses PHI
    without a patient’s written authorization or
    without a job-related reason of doing so, the
    employee violates HIPPA.
   An employee may only access or disclose a
    patient’s PHI when this access is part of the
    employee’s job duties.
   An employee can never look at PHI for
    curiosity reasons.
   It also makes no difference if the person is a
    family member or close friend; all
    information is entitled to the same
    protection.
   Employees must report HIPPA breaches as
    part of their responsibility as an employee.
   Privacy or security breaches involving PHI
    should be reported to your supervisor.
   There are serious ramifications for all
    breaches.
   The cost is $50,000 per incident, $50,000 to
    $250,000 in fines and up to 10 years in prison.
   Individual rights for each patient includes:
     Receiving a copy of the practice’s Notice of
      Privacy Practices
     Request restrictions and confidential
      communications of their PHI
     Inspect their healthcare records
     To file a complaint
   Patients must sign an authorization form
    before their PHI may be released by the
    practice to outside parties such as a life
    insurer, a bank or a marketing firm.
   HIPPA permits use of PHI for
     Providing medical treatment
     Processing healthcare payments
     Conducting healthcare business operations
   CCHS is required to have safeguards to
    protect the privacy of PHI.
     Safeguards protect PHI from accidental or
      intentional unauthorized use.
     Limit accidental disclosures (discussions in
      hallways)
     Include document shredding, locking doors,
      locking file storage areas and use passwords and
      codes for access.
   CCHS safeguards sensitive information by
    ensuring the following:
     Keeps browser updated and uses security settings
     Uses security software
     Takes extra precaution when downloading
     software
   Many security breaches come from within the
    organization and many of these occur
    because of poor password habits.
     Use strong passwords (at least 8 characters with
      combination of letters and numbers)
     Change password frequently
   Be aware of your surroundings and use
    caution.
   Do not discuss sensitive information or PHI in
    public areas.
 Keep passwords secret and don’t allow others access
  to your computer.
 Keep notes in a secure place and don’t leave them in
  open areas.
 Hold discussions of PHI in private areas and for job-
  related reasons only.
 Ensure that sensitive information is secure in mailings.
 Follow procedures for proper disposal of PHI such as
  shredding.
 When sending emails, do not include PHI unless
  written approval is received and the computer is
  encrypted.
   Hjort, B. (2002). HIPAA Privacy and Security
      Training. Journal Of AHIMA, 73(4), 60A-g.
   Kongstvedt, P.(2007). Essentials of Managed
      Care. (5th Edition). Sudbury, Mass: Jones
      and Bartlett Publishers.

More Related Content

What's hot

Hippa presentation2
Hippa presentation2Hippa presentation2
Hippa presentation2
Katherine Smith , MHA
 
Patient Confidentiality
Patient ConfidentialityPatient Confidentiality
Patient Confidentiality
Nadia Rowell
 
Patient Confidentiality
Patient Confidentiality Patient Confidentiality
Patient Confidentiality
Nadia Rowell
 
Biometric Privacy In The Workplace - Attorney Todd M. Friedman
Biometric Privacy In The Workplace - Attorney Todd M. FriedmanBiometric Privacy In The Workplace - Attorney Todd M. Friedman
Biometric Privacy In The Workplace - Attorney Todd M. Friedman
The Law Buzz
 
8.2 Demonstration Health - IT benifits - Bagmishika Puhan ( Session 8)
8.2   Demonstration Health - IT benifits - Bagmishika Puhan ( Session 8)8.2   Demonstration Health - IT benifits - Bagmishika Puhan ( Session 8)
8.2 Demonstration Health - IT benifits - Bagmishika Puhan ( Session 8)
Apollo Hospitals Group and ATNF
 
HIPAA Compliance Checklist for Medical Practices
HIPAA Compliance Checklist for Medical PracticesHIPAA Compliance Checklist for Medical Practices
HIPAA Compliance Checklist for Medical Practices
Medical Transcription Service Company
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
tomasztopa
 
Hipaa presentation
Hipaa presentationHipaa presentation
Hipaa presentationcjkonsella
 
The standard for email communications
The standard for email communicationsThe standard for email communications
The standard for email communications
Oregon Law Practice Management
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informatics
kmcanty
 
Managing It Security
Managing It SecurityManaging It Security
Managing It Security
Bruce Sundeen
 
HIPAA 101 for Startups
HIPAA 101 for StartupsHIPAA 101 for Startups
HIPAA 101 for Startups
Obaa, Inc.
 

What's hot (13)

Hippa presentation2
Hippa presentation2Hippa presentation2
Hippa presentation2
 
Patient Confidentiality
Patient ConfidentialityPatient Confidentiality
Patient Confidentiality
 
Patient Confidentiality
Patient Confidentiality Patient Confidentiality
Patient Confidentiality
 
Biometric Privacy In The Workplace - Attorney Todd M. Friedman
Biometric Privacy In The Workplace - Attorney Todd M. FriedmanBiometric Privacy In The Workplace - Attorney Todd M. Friedman
Biometric Privacy In The Workplace - Attorney Todd M. Friedman
 
8.2 Demonstration Health - IT benifits - Bagmishika Puhan ( Session 8)
8.2   Demonstration Health - IT benifits - Bagmishika Puhan ( Session 8)8.2   Demonstration Health - IT benifits - Bagmishika Puhan ( Session 8)
8.2 Demonstration Health - IT benifits - Bagmishika Puhan ( Session 8)
 
HIPAA Compliance Checklist for Medical Practices
HIPAA Compliance Checklist for Medical PracticesHIPAA Compliance Checklist for Medical Practices
HIPAA Compliance Checklist for Medical Practices
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Hipaa presentation
Hipaa presentationHipaa presentation
Hipaa presentation
 
HIPAA
HIPAAHIPAA
HIPAA
 
The standard for email communications
The standard for email communicationsThe standard for email communications
The standard for email communications
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informatics
 
Managing It Security
Managing It SecurityManaging It Security
Managing It Security
 
HIPAA 101 for Startups
HIPAA 101 for StartupsHIPAA 101 for Startups
HIPAA 101 for Startups
 

Viewers also liked

HIPPA: How to protect your information....
HIPPA: How to protect your information....HIPPA: How to protect your information....
HIPPA: How to protect your information....
Jeannie Joseph
 
Redspin Report - Protected Health Information 2010 Breach Report
Redspin Report - Protected Health Information 2010 Breach ReportRedspin Report - Protected Health Information 2010 Breach Report
Redspin Report - Protected Health Information 2010 Breach Report
Redspin, Inc.
 
Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...
Lumension
 
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013
RightScale
 
BREACH REPORT 2013: Protected Health Information (PHI)
BREACH REPORT 2013: Protected Health Information (PHI)BREACH REPORT 2013: Protected Health Information (PHI)
BREACH REPORT 2013: Protected Health Information (PHI)
- Mark - Fullbright
 
What is health information?
What is health information? What is health information?
What is health information?
Bedirhan Ustun
 
Protecting patients confidentiality slide presentation
Protecting patients confidentiality slide presentationProtecting patients confidentiality slide presentation
Protecting patients confidentiality slide presentation
plunkk
 

Viewers also liked (9)

HIPPA: How to protect your information....
HIPPA: How to protect your information....HIPPA: How to protect your information....
HIPPA: How to protect your information....
 
6 (1)
6 (1)6 (1)
6 (1)
 
Redspin Report - Protected Health Information 2010 Breach Report
Redspin Report - Protected Health Information 2010 Breach ReportRedspin Report - Protected Health Information 2010 Breach Report
Redspin Report - Protected Health Information 2010 Breach Report
 
Steve Nash
Steve NashSteve Nash
Steve Nash
 
Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...
 
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013
 
BREACH REPORT 2013: Protected Health Information (PHI)
BREACH REPORT 2013: Protected Health Information (PHI)BREACH REPORT 2013: Protected Health Information (PHI)
BREACH REPORT 2013: Protected Health Information (PHI)
 
What is health information?
What is health information? What is health information?
What is health information?
 
Protecting patients confidentiality slide presentation
Protecting patients confidentiality slide presentationProtecting patients confidentiality slide presentation
Protecting patients confidentiality slide presentation
 

Similar to Wk1 discussion 2

Upholding confidentiality
Upholding confidentialityUpholding confidentiality
Upholding confidentialityTheresa Tapley
 
2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training
Cynthia Holland
 
Hipaa education
Hipaa educationHipaa education
Hipaa educationeklundc
 
Hipaa basics pp2
Hipaa basics pp2Hipaa basics pp2
Hipaa basics pp2martykoepke
 
Patient confidentiality MHA 690
Patient confidentiality MHA 690Patient confidentiality MHA 690
Patient confidentiality MHA 690
AMSIMM9932
 
Hippa and Confidentiality
Hippa and ConfidentialityHippa and Confidentiality
Hippa and Confidentialityramonapage
 
Week 1 discussion 2 hipaa
Week 1 discussion 2 hipaaWeek 1 discussion 2 hipaa
Week 1 discussion 2 hipaa
MADOZI4671
 
Basic HIPAA Training by CMU
Basic HIPAA Training by CMUBasic HIPAA Training by CMU
Basic HIPAA Training by CMU
Atlantic Training, LLC.
 
HIPPA
HIPPAHIPPA
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Haydenhaydens
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
ridley27
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Training
ridley27
 
Chapter 5HIPAA and HITECHLearning ObjectivesUnde
Chapter 5HIPAA and HITECHLearning ObjectivesUndeChapter 5HIPAA and HITECHLearning ObjectivesUnde
Chapter 5HIPAA and HITECHLearning ObjectivesUnde
WilheminaRossi174
 
Legal and ethical considerations in nursing informatics
Legal and ethical considerations in nursing informaticsLegal and ethical considerations in nursing informatics
Legal and ethical considerations in nursing informatics
AHMED ZINHOM
 
Annual HIPAA Education
Annual HIPAA EducationAnnual HIPAA Education
Annual HIPAA EducationDirkRhodes
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
maggie_Platt
 
HIPAA Training - 2011
HIPAA Training - 2011HIPAA Training - 2011
HIPAA Training - 2011
darichardson
 
Tiffany hall mha 690 week 1 discussion 2
Tiffany hall mha 690 week 1   discussion 2Tiffany hall mha 690 week 1   discussion 2
Tiffany hall mha 690 week 1 discussion 2tiffhall
 
Tiffany hall mha 690 week 1 discussion 2
Tiffany hall mha 690 week 1   discussion 2Tiffany hall mha 690 week 1   discussion 2
Tiffany hall mha 690 week 1 discussion 2
tiffhall
 

Similar to Wk1 discussion 2 (20)

Upholding confidentiality
Upholding confidentialityUpholding confidentiality
Upholding confidentiality
 
2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training
 
Hipaa education
Hipaa educationHipaa education
Hipaa education
 
Hipaa basics pp2
Hipaa basics pp2Hipaa basics pp2
Hipaa basics pp2
 
Patient confidentiality MHA 690
Patient confidentiality MHA 690Patient confidentiality MHA 690
Patient confidentiality MHA 690
 
Hippa
HippaHippa
Hippa
 
Hippa and Confidentiality
Hippa and ConfidentialityHippa and Confidentiality
Hippa and Confidentiality
 
Week 1 discussion 2 hipaa
Week 1 discussion 2 hipaaWeek 1 discussion 2 hipaa
Week 1 discussion 2 hipaa
 
Basic HIPAA Training by CMU
Basic HIPAA Training by CMUBasic HIPAA Training by CMU
Basic HIPAA Training by CMU
 
HIPPA
HIPPAHIPPA
HIPPA
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Hayden
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Training
 
Chapter 5HIPAA and HITECHLearning ObjectivesUnde
Chapter 5HIPAA and HITECHLearning ObjectivesUndeChapter 5HIPAA and HITECHLearning ObjectivesUnde
Chapter 5HIPAA and HITECHLearning ObjectivesUnde
 
Legal and ethical considerations in nursing informatics
Legal and ethical considerations in nursing informaticsLegal and ethical considerations in nursing informatics
Legal and ethical considerations in nursing informatics
 
Annual HIPAA Education
Annual HIPAA EducationAnnual HIPAA Education
Annual HIPAA Education
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
HIPAA Training - 2011
HIPAA Training - 2011HIPAA Training - 2011
HIPAA Training - 2011
 
Tiffany hall mha 690 week 1 discussion 2
Tiffany hall mha 690 week 1   discussion 2Tiffany hall mha 690 week 1   discussion 2
Tiffany hall mha 690 week 1 discussion 2
 
Tiffany hall mha 690 week 1 discussion 2
Tiffany hall mha 690 week 1   discussion 2Tiffany hall mha 690 week 1   discussion 2
Tiffany hall mha 690 week 1 discussion 2
 

Recently uploaded

Ozempic: Preoperative Management of Patients on GLP-1 Receptor Agonists
Ozempic: Preoperative Management of Patients on GLP-1 Receptor Agonists  Ozempic: Preoperative Management of Patients on GLP-1 Receptor Agonists
Ozempic: Preoperative Management of Patients on GLP-1 Receptor Agonists
Saeid Safari
 
Dehradun #ℂall #gIRLS Oyo Hotel 9719300533 #ℂall #gIRL in Dehradun
Dehradun #ℂall #gIRLS Oyo Hotel 9719300533 #ℂall #gIRL in DehradunDehradun #ℂall #gIRLS Oyo Hotel 9719300533 #ℂall #gIRL in Dehradun
Dehradun #ℂall #gIRLS Oyo Hotel 9719300533 #ℂall #gIRL in Dehradun
chandankumarsmartiso
 
Basavarajeeyam - Ayurvedic heritage book of Andhra pradesh
Basavarajeeyam - Ayurvedic heritage book of Andhra pradeshBasavarajeeyam - Ayurvedic heritage book of Andhra pradesh
Basavarajeeyam - Ayurvedic heritage book of Andhra pradesh
Dr. Madduru Muni Haritha
 
KDIGO 2024 guidelines for diabetologists
KDIGO 2024 guidelines for diabetologistsKDIGO 2024 guidelines for diabetologists
KDIGO 2024 guidelines for diabetologists
د.محمود نجيب
 
BRACHYTHERAPY OVERVIEW AND APPLICATORS
BRACHYTHERAPY OVERVIEW  AND  APPLICATORSBRACHYTHERAPY OVERVIEW  AND  APPLICATORS
BRACHYTHERAPY OVERVIEW AND APPLICATORS
Krishan Murari
 
Colonic and anorectal physiology with surgical implications
Colonic and anorectal physiology with surgical implicationsColonic and anorectal physiology with surgical implications
Colonic and anorectal physiology with surgical implications
Dr Maria Tamanna
 
Hemodialysis: Chapter 4, Dialysate Circuit - Dr.Gawad
Hemodialysis: Chapter 4, Dialysate Circuit - Dr.GawadHemodialysis: Chapter 4, Dialysate Circuit - Dr.Gawad
Hemodialysis: Chapter 4, Dialysate Circuit - Dr.Gawad
NephroTube - Dr.Gawad
 
Light House Retreats: Plant Medicine Retreat Europe
Light House Retreats: Plant Medicine Retreat EuropeLight House Retreats: Plant Medicine Retreat Europe
Light House Retreats: Plant Medicine Retreat Europe
Lighthouse Retreat
 
Effective-Soaps-for-Fungal-Skin-Infections.pptx
Effective-Soaps-for-Fungal-Skin-Infections.pptxEffective-Soaps-for-Fungal-Skin-Infections.pptx
Effective-Soaps-for-Fungal-Skin-Infections.pptx
SwisschemDerma
 
Maxilla, Mandible & Hyoid Bone & Clinical Correlations by Dr. RIG.pptx
Maxilla, Mandible & Hyoid Bone & Clinical Correlations by Dr. RIG.pptxMaxilla, Mandible & Hyoid Bone & Clinical Correlations by Dr. RIG.pptx
Maxilla, Mandible & Hyoid Bone & Clinical Correlations by Dr. RIG.pptx
Dr. Rabia Inam Gandapore
 
basicmodesofventilation2022-220313203758.pdf
basicmodesofventilation2022-220313203758.pdfbasicmodesofventilation2022-220313203758.pdf
basicmodesofventilation2022-220313203758.pdf
aljamhori teaching hospital
 
How STIs Influence the Development of Pelvic Inflammatory Disease.pptx
How STIs Influence the Development of Pelvic Inflammatory Disease.pptxHow STIs Influence the Development of Pelvic Inflammatory Disease.pptx
How STIs Influence the Development of Pelvic Inflammatory Disease.pptx
FFragrant
 
Ophthalmology Clinical Tests for OSCE exam
Ophthalmology Clinical Tests for OSCE examOphthalmology Clinical Tests for OSCE exam
Ophthalmology Clinical Tests for OSCE exam
KafrELShiekh University
 
Best Ayurvedic medicine for Gas and Indigestion
Best Ayurvedic medicine for Gas and IndigestionBest Ayurvedic medicine for Gas and Indigestion
Best Ayurvedic medicine for Gas and Indigestion
SwastikAyurveda
 
Thyroid Gland- Gross Anatomy by Dr. Rabia Inam Gandapore.pptx
Thyroid Gland- Gross Anatomy by Dr. Rabia Inam Gandapore.pptxThyroid Gland- Gross Anatomy by Dr. Rabia Inam Gandapore.pptx
Thyroid Gland- Gross Anatomy by Dr. Rabia Inam Gandapore.pptx
Dr. Rabia Inam Gandapore
 
Novas diretrizes da OMS para os cuidados perinatais de mais qualidade
Novas diretrizes da OMS para os cuidados perinatais de mais qualidadeNovas diretrizes da OMS para os cuidados perinatais de mais qualidade
Novas diretrizes da OMS para os cuidados perinatais de mais qualidade
Prof. Marcus Renato de Carvalho
 
SURGICAL ANATOMY OF THE RETROPERITONEUM, ADRENALS, KIDNEYS AND URETERS.pptx
SURGICAL ANATOMY OF THE RETROPERITONEUM, ADRENALS, KIDNEYS AND URETERS.pptxSURGICAL ANATOMY OF THE RETROPERITONEUM, ADRENALS, KIDNEYS AND URETERS.pptx
SURGICAL ANATOMY OF THE RETROPERITONEUM, ADRENALS, KIDNEYS AND URETERS.pptx
Bright Chipili
 
Top-Vitamin-Supplement-Brands-in-India.pptx
Top-Vitamin-Supplement-Brands-in-India.pptxTop-Vitamin-Supplement-Brands-in-India.pptx
Top-Vitamin-Supplement-Brands-in-India.pptx
SwisschemDerma
 
New Drug Discovery and Development .....
New Drug Discovery and Development .....New Drug Discovery and Development .....
New Drug Discovery and Development .....
NEHA GUPTA
 
Superficial & Deep Fascia of the NECK.pptx
Superficial & Deep Fascia of the NECK.pptxSuperficial & Deep Fascia of the NECK.pptx
Superficial & Deep Fascia of the NECK.pptx
Dr. Rabia Inam Gandapore
 

Recently uploaded (20)

Ozempic: Preoperative Management of Patients on GLP-1 Receptor Agonists
Ozempic: Preoperative Management of Patients on GLP-1 Receptor Agonists  Ozempic: Preoperative Management of Patients on GLP-1 Receptor Agonists
Ozempic: Preoperative Management of Patients on GLP-1 Receptor Agonists
 
Dehradun #ℂall #gIRLS Oyo Hotel 9719300533 #ℂall #gIRL in Dehradun
Dehradun #ℂall #gIRLS Oyo Hotel 9719300533 #ℂall #gIRL in DehradunDehradun #ℂall #gIRLS Oyo Hotel 9719300533 #ℂall #gIRL in Dehradun
Dehradun #ℂall #gIRLS Oyo Hotel 9719300533 #ℂall #gIRL in Dehradun
 
Basavarajeeyam - Ayurvedic heritage book of Andhra pradesh
Basavarajeeyam - Ayurvedic heritage book of Andhra pradeshBasavarajeeyam - Ayurvedic heritage book of Andhra pradesh
Basavarajeeyam - Ayurvedic heritage book of Andhra pradesh
 
KDIGO 2024 guidelines for diabetologists
KDIGO 2024 guidelines for diabetologistsKDIGO 2024 guidelines for diabetologists
KDIGO 2024 guidelines for diabetologists
 
BRACHYTHERAPY OVERVIEW AND APPLICATORS
BRACHYTHERAPY OVERVIEW  AND  APPLICATORSBRACHYTHERAPY OVERVIEW  AND  APPLICATORS
BRACHYTHERAPY OVERVIEW AND APPLICATORS
 
Colonic and anorectal physiology with surgical implications
Colonic and anorectal physiology with surgical implicationsColonic and anorectal physiology with surgical implications
Colonic and anorectal physiology with surgical implications
 
Hemodialysis: Chapter 4, Dialysate Circuit - Dr.Gawad
Hemodialysis: Chapter 4, Dialysate Circuit - Dr.GawadHemodialysis: Chapter 4, Dialysate Circuit - Dr.Gawad
Hemodialysis: Chapter 4, Dialysate Circuit - Dr.Gawad
 
Light House Retreats: Plant Medicine Retreat Europe
Light House Retreats: Plant Medicine Retreat EuropeLight House Retreats: Plant Medicine Retreat Europe
Light House Retreats: Plant Medicine Retreat Europe
 
Effective-Soaps-for-Fungal-Skin-Infections.pptx
Effective-Soaps-for-Fungal-Skin-Infections.pptxEffective-Soaps-for-Fungal-Skin-Infections.pptx
Effective-Soaps-for-Fungal-Skin-Infections.pptx
 
Maxilla, Mandible & Hyoid Bone & Clinical Correlations by Dr. RIG.pptx
Maxilla, Mandible & Hyoid Bone & Clinical Correlations by Dr. RIG.pptxMaxilla, Mandible & Hyoid Bone & Clinical Correlations by Dr. RIG.pptx
Maxilla, Mandible & Hyoid Bone & Clinical Correlations by Dr. RIG.pptx
 
basicmodesofventilation2022-220313203758.pdf
basicmodesofventilation2022-220313203758.pdfbasicmodesofventilation2022-220313203758.pdf
basicmodesofventilation2022-220313203758.pdf
 
How STIs Influence the Development of Pelvic Inflammatory Disease.pptx
How STIs Influence the Development of Pelvic Inflammatory Disease.pptxHow STIs Influence the Development of Pelvic Inflammatory Disease.pptx
How STIs Influence the Development of Pelvic Inflammatory Disease.pptx
 
Ophthalmology Clinical Tests for OSCE exam
Ophthalmology Clinical Tests for OSCE examOphthalmology Clinical Tests for OSCE exam
Ophthalmology Clinical Tests for OSCE exam
 
Best Ayurvedic medicine for Gas and Indigestion
Best Ayurvedic medicine for Gas and IndigestionBest Ayurvedic medicine for Gas and Indigestion
Best Ayurvedic medicine for Gas and Indigestion
 
Thyroid Gland- Gross Anatomy by Dr. Rabia Inam Gandapore.pptx
Thyroid Gland- Gross Anatomy by Dr. Rabia Inam Gandapore.pptxThyroid Gland- Gross Anatomy by Dr. Rabia Inam Gandapore.pptx
Thyroid Gland- Gross Anatomy by Dr. Rabia Inam Gandapore.pptx
 
Novas diretrizes da OMS para os cuidados perinatais de mais qualidade
Novas diretrizes da OMS para os cuidados perinatais de mais qualidadeNovas diretrizes da OMS para os cuidados perinatais de mais qualidade
Novas diretrizes da OMS para os cuidados perinatais de mais qualidade
 
SURGICAL ANATOMY OF THE RETROPERITONEUM, ADRENALS, KIDNEYS AND URETERS.pptx
SURGICAL ANATOMY OF THE RETROPERITONEUM, ADRENALS, KIDNEYS AND URETERS.pptxSURGICAL ANATOMY OF THE RETROPERITONEUM, ADRENALS, KIDNEYS AND URETERS.pptx
SURGICAL ANATOMY OF THE RETROPERITONEUM, ADRENALS, KIDNEYS AND URETERS.pptx
 
Top-Vitamin-Supplement-Brands-in-India.pptx
Top-Vitamin-Supplement-Brands-in-India.pptxTop-Vitamin-Supplement-Brands-in-India.pptx
Top-Vitamin-Supplement-Brands-in-India.pptx
 
New Drug Discovery and Development .....
New Drug Discovery and Development .....New Drug Discovery and Development .....
New Drug Discovery and Development .....
 
Superficial & Deep Fascia of the NECK.pptx
Superficial & Deep Fascia of the NECK.pptxSuperficial & Deep Fascia of the NECK.pptx
Superficial & Deep Fascia of the NECK.pptx
 

Wk1 discussion 2

  • 1. Jodi M. Watkowski MHA690- Health Care Capstone Dr. Hwang-Ji Lu February 2, 2012
  • 2. Ways to protect the privacy and security of confidential and protected health information  To recognize situations in which confidential and protected health information can be mishandled  That employees are held responsible for their actions  HIPPA identifiers which create protected health information (PHI)
  • 3. It is the responsibility of every employee to protect the privacy and security of sensitive information in all forms.  Sensitive information comes in several forms:  Electronic  Spoken  Printed
  • 4. Examples of sensitive information include the following:  Personnel information  Computer Passwords  Driver’s License Numbers  Credit Card Numbers  Social Security Numbers  Without protection of the above, the risk of identity theft and invasion of privacy is greater.
  • 5. Access to medical records must be authorized.  If an employee accesses or discloses PHI without a patient’s written authorization or without a job-related reason of doing so, the employee violates HIPPA.  An employee may only access or disclose a patient’s PHI when this access is part of the employee’s job duties.
  • 6. An employee can never look at PHI for curiosity reasons.  It also makes no difference if the person is a family member or close friend; all information is entitled to the same protection.
  • 7. Employees must report HIPPA breaches as part of their responsibility as an employee.  Privacy or security breaches involving PHI should be reported to your supervisor.  There are serious ramifications for all breaches.  The cost is $50,000 per incident, $50,000 to $250,000 in fines and up to 10 years in prison.
  • 8. Individual rights for each patient includes:  Receiving a copy of the practice’s Notice of Privacy Practices  Request restrictions and confidential communications of their PHI  Inspect their healthcare records  To file a complaint
  • 9. Patients must sign an authorization form before their PHI may be released by the practice to outside parties such as a life insurer, a bank or a marketing firm.  HIPPA permits use of PHI for  Providing medical treatment  Processing healthcare payments  Conducting healthcare business operations
  • 10. CCHS is required to have safeguards to protect the privacy of PHI.  Safeguards protect PHI from accidental or intentional unauthorized use.  Limit accidental disclosures (discussions in hallways)  Include document shredding, locking doors, locking file storage areas and use passwords and codes for access.
  • 11. CCHS safeguards sensitive information by ensuring the following:  Keeps browser updated and uses security settings  Uses security software  Takes extra precaution when downloading software
  • 12. Many security breaches come from within the organization and many of these occur because of poor password habits.  Use strong passwords (at least 8 characters with combination of letters and numbers)  Change password frequently
  • 13. Be aware of your surroundings and use caution.  Do not discuss sensitive information or PHI in public areas.
  • 14.  Keep passwords secret and don’t allow others access to your computer.  Keep notes in a secure place and don’t leave them in open areas.  Hold discussions of PHI in private areas and for job- related reasons only.  Ensure that sensitive information is secure in mailings.  Follow procedures for proper disposal of PHI such as shredding.  When sending emails, do not include PHI unless written approval is received and the computer is encrypted.
  • 15. Hjort, B. (2002). HIPAA Privacy and Security Training. Journal Of AHIMA, 73(4), 60A-g.  Kongstvedt, P.(2007). Essentials of Managed Care. (5th Edition). Sudbury, Mass: Jones and Bartlett Publishers.