SlideShare a Scribd company logo
1 of 10
Safeguarding of
 Personally Identifying
       Information
a.k.a. Privacy Act Data –
     It is Your Duty!
Patient Confidentiality

 For knowingly and willfully disclosing Privacy Act protected
  data to any person not entitled to access:
    Misdemeanor criminal charge, and a fine of up to $5,000 per
     incident

 For maintaining a System of Records without meeting the
  public notice requirements:
    Misdemeanor criminal charge, and a fine of up to $5,000


 For knowingly and willfully requesting or obtaining records
  under false pretenses:
    Misdemeanor criminal charge, and a fine of up to $5,000
Patient Confidentiality

 The Privacy Act also imposes civil penalties on violators (normally
  the agency) who:
    Unlawfully refuse to amend a record
    Unlawfully refuse to grant access to records
    Fail to maintain accurate, relevant, timely
     and complete data
    Fail to comply with any Privacy Act provision
     or agency rule that results in an adverse
     effect

 Penalties include:
    Payment of actual damages
    Payment of reasonable attorney’s fees
    Removal from employment
Patient Confidentiality

   Three Levels of Safeguards are Required:
      Administrative
      Physical
      Technical


   These individuals are responsible for establishing safeguards:
      Information Technology System Designers
      Privacy Act System Managers
      Local Privacy Act Officials
      And you (all Airman)…
Patient Confidentiality


 Protect it at all times
 Do not share it with anyone unless:
    The recipient is listed in Section (b) of the Privacy Act
    The subject of the record has given you written permission to
      disclose it to the recipient
 Password protect personal data placed on shared drives, the
  Internet, or the Intranet
 Monitor your actions: For example, “If I do this, will I increase
  the risk of unauthorized access?”
Patient Confidentiality



 Take privacy protection seriously

 Respect the privacy of others

 Report to your supervisor or other management
  official when you see personal data left
 unattended
Patient Confidentiality

 Use any reasonable means that prevents inadvertent compromise!
 A disposal method is considered adequate if it renders the
  information unrecognizable or beyond reconstruction

 Disposal methods may include:
    Tearing, burning, melting, chemical decomposition, pulping,
     pulverizing, shredding (GSA-approved shredder), and mutilation
    Recycling contracts are acceptable, if the documents are properly
     protected while in a destruction bin, protected in transit, and one of
     the above destruction methods is used by the contractor
Patient Confidentiality


 Follow the “need-to-know” principle. Share only with those specific DoD
  employees who need the data to perform official, assigned duties

     Share only with those individuals and entities outside DoD that are
      listed in the “Routine Use” clause of the governing Privacy Act System of
      Records Notice.

 If you have doubts about sharing data, consult with your supervisor, the
  Privacy Act system manager, or your local Privacy Act Officer
Patient Confidentiality

 Paper Records:
    Place Privacy Act protected data in locked drawers, locked briefcases, or
      other secure areas where family/household members, visitors, or intruders
      cannot access it
 Electronic Records:
    Use password protection protocols. Do not share your password
    Do not store Privacy Act protected data on disks, CDs, USB flashdrives,
      memory sticks, flashcards, or other media without proper security
      protections or authorization
Patient Confidentiality
 Immediately notify:
    Your supervisor
    Your local Privacy Act Officer
    The Privacy Act System Manager
    And any other appropriate official of the occurrence


 For World Wide Web postings - make a note of where the
  information was posted by copying the Uniform Resource Locator
  (URL)
    The URL is the address listed at the top of the screen. Most URLs
     begin http://www

More Related Content

What's hot

WK 1, DQ 1 (MHA 690)
WK 1, DQ 1 (MHA 690)WK 1, DQ 1 (MHA 690)
WK 1, DQ 1 (MHA 690)
s_cole82
 

What's hot (11)

HIPAA Training Basics
HIPAA Training BasicsHIPAA Training Basics
HIPAA Training Basics
 
ICSA Irish Region General Data Protection Regulation event, 10 October 2017
ICSA Irish Region General Data Protection Regulation event, 10 October 2017ICSA Irish Region General Data Protection Regulation event, 10 October 2017
ICSA Irish Region General Data Protection Regulation event, 10 October 2017
 
Patient Confidentiality Training Presentation (1)
Patient Confidentiality Training Presentation (1)Patient Confidentiality Training Presentation (1)
Patient Confidentiality Training Presentation (1)
 
susanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2ppsusanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2pp
 
WK 1, DQ 1 (MHA 690)
WK 1, DQ 1 (MHA 690)WK 1, DQ 1 (MHA 690)
WK 1, DQ 1 (MHA 690)
 
IT Staff NDA Template Employee Confidentiality Agreement
IT Staff NDA Template Employee Confidentiality AgreementIT Staff NDA Template Employee Confidentiality Agreement
IT Staff NDA Template Employee Confidentiality Agreement
 
Confidentiality & HIPAA Training Week 1 Discussion 2
Confidentiality & HIPAA Training Week 1 Discussion 2Confidentiality & HIPAA Training Week 1 Discussion 2
Confidentiality & HIPAA Training Week 1 Discussion 2
 
HIPAA Compliance Dangers for Digital Doctors
HIPAA Compliance Dangers for Digital DoctorsHIPAA Compliance Dangers for Digital Doctors
HIPAA Compliance Dangers for Digital Doctors
 
$4.8m HIPAA Breach
$4.8m HIPAA Breach$4.8m HIPAA Breach
$4.8m HIPAA Breach
 
Prevent million dollar fines - preparing for the EU General Data Regulation
Prevent million dollar fines - preparing for the EU General Data RegulationPrevent million dollar fines - preparing for the EU General Data Regulation
Prevent million dollar fines - preparing for the EU General Data Regulation
 
Clare Sanderon, IG Solutions
Clare Sanderon, IG SolutionsClare Sanderon, IG Solutions
Clare Sanderon, IG Solutions
 

Similar to Patient confidentiality training

Sec af pa slides
Sec af pa slidesSec af pa slides
Sec af pa slides
wrightjr02
 
Hipaa education
Hipaa educationHipaa education
Hipaa education
eklundc
 
Week 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityWeek 1 discussion 2 confidentiality
Week 1 discussion 2 confidentiality
Lucy Lacy
 
Week 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityWeek 1 discussion 2 confidentiality
Week 1 discussion 2 confidentiality
Lucy Lacy
 
Week 1 discussion 2 confidentiality final
Week 1 discussion 2 confidentiality finalWeek 1 discussion 2 confidentiality final
Week 1 discussion 2 confidentiality final
Lucy Lacy
 

Similar to Patient confidentiality training (20)

Sec af pa slides
Sec af pa slidesSec af pa slides
Sec af pa slides
 
Lasa European NFP Technology Conference 2010 - Data protection and the cloud
Lasa European NFP Technology Conference 2010 - Data protection and the cloudLasa European NFP Technology Conference 2010 - Data protection and the cloud
Lasa European NFP Technology Conference 2010 - Data protection and the cloud
 
Data privacy & social media
Data privacy & social mediaData privacy & social media
Data privacy & social media
 
Tech Matrix 20080523
Tech Matrix 20080523Tech Matrix 20080523
Tech Matrix 20080523
 
Privacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishPrivacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or Perish
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
 
Mass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy LawMass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy Law
 
Hipaa education
Hipaa educationHipaa education
Hipaa education
 
CEU DPA
CEU DPACEU DPA
CEU DPA
 
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdfAll_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
 
Week 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityWeek 1 discussion 2 confidentiality
Week 1 discussion 2 confidentiality
 
Week 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityWeek 1 discussion 2 confidentiality
Week 1 discussion 2 confidentiality
 
Week 1 discussion 2 confidentiality final
Week 1 discussion 2 confidentiality finalWeek 1 discussion 2 confidentiality final
Week 1 discussion 2 confidentiality final
 
Cyber Risks
Cyber RisksCyber Risks
Cyber Risks
 
Cyber
CyberCyber
Cyber
 
Data security
Data securityData security
Data security
 
EU GDPR (training)
EU GDPR (training)  EU GDPR (training)
EU GDPR (training)
 
Information Asset Classification .pptx
Information Asset Classification .pptxInformation Asset Classification .pptx
Information Asset Classification .pptx
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Patient confidentiality training

  • 1. Safeguarding of Personally Identifying Information a.k.a. Privacy Act Data – It is Your Duty!
  • 2. Patient Confidentiality  For knowingly and willfully disclosing Privacy Act protected data to any person not entitled to access:  Misdemeanor criminal charge, and a fine of up to $5,000 per incident  For maintaining a System of Records without meeting the public notice requirements:  Misdemeanor criminal charge, and a fine of up to $5,000  For knowingly and willfully requesting or obtaining records under false pretenses:  Misdemeanor criminal charge, and a fine of up to $5,000
  • 3. Patient Confidentiality  The Privacy Act also imposes civil penalties on violators (normally the agency) who:  Unlawfully refuse to amend a record  Unlawfully refuse to grant access to records  Fail to maintain accurate, relevant, timely and complete data  Fail to comply with any Privacy Act provision or agency rule that results in an adverse effect  Penalties include:  Payment of actual damages  Payment of reasonable attorney’s fees  Removal from employment
  • 4. Patient Confidentiality  Three Levels of Safeguards are Required:  Administrative  Physical  Technical  These individuals are responsible for establishing safeguards:  Information Technology System Designers  Privacy Act System Managers  Local Privacy Act Officials  And you (all Airman)…
  • 5. Patient Confidentiality  Protect it at all times  Do not share it with anyone unless:  The recipient is listed in Section (b) of the Privacy Act  The subject of the record has given you written permission to disclose it to the recipient  Password protect personal data placed on shared drives, the Internet, or the Intranet  Monitor your actions: For example, “If I do this, will I increase the risk of unauthorized access?”
  • 6. Patient Confidentiality  Take privacy protection seriously  Respect the privacy of others  Report to your supervisor or other management official when you see personal data left unattended
  • 7. Patient Confidentiality  Use any reasonable means that prevents inadvertent compromise!  A disposal method is considered adequate if it renders the information unrecognizable or beyond reconstruction  Disposal methods may include:  Tearing, burning, melting, chemical decomposition, pulping, pulverizing, shredding (GSA-approved shredder), and mutilation  Recycling contracts are acceptable, if the documents are properly protected while in a destruction bin, protected in transit, and one of the above destruction methods is used by the contractor
  • 8. Patient Confidentiality  Follow the “need-to-know” principle. Share only with those specific DoD employees who need the data to perform official, assigned duties  Share only with those individuals and entities outside DoD that are listed in the “Routine Use” clause of the governing Privacy Act System of Records Notice.  If you have doubts about sharing data, consult with your supervisor, the Privacy Act system manager, or your local Privacy Act Officer
  • 9. Patient Confidentiality  Paper Records:  Place Privacy Act protected data in locked drawers, locked briefcases, or other secure areas where family/household members, visitors, or intruders cannot access it  Electronic Records:  Use password protection protocols. Do not share your password  Do not store Privacy Act protected data on disks, CDs, USB flashdrives, memory sticks, flashcards, or other media without proper security protections or authorization
  • 10. Patient Confidentiality  Immediately notify:  Your supervisor  Your local Privacy Act Officer  The Privacy Act System Manager  And any other appropriate official of the occurrence  For World Wide Web postings - make a note of where the information was posted by copying the Uniform Resource Locator (URL)  The URL is the address listed at the top of the screen. Most URLs begin http://www