SlideShare une entreprise Scribd logo
1  sur  15
Télécharger pour lire hors ligne
Jodi M. Watkowski
MHA690- Health Care Capstone
Dr. Hwang-Ji Lu
February 2, 2012
   Ways to protect the privacy and security of
    confidential and protected health
    information
   To recognize situations in which confidential
    and protected health information can be
    mishandled
   That employees are held responsible for their
    actions
   HIPPA identifiers which create protected
    health information (PHI)
   It is the responsibility of every employee to
    protect the privacy and security of sensitive
    information in all forms.
   Sensitive information comes in several forms:
     Electronic
     Spoken
     Printed
   Examples of sensitive information include the
    following:
       Personnel information
       Computer Passwords
       Driver’s License Numbers
       Credit Card Numbers
       Social Security Numbers

   Without protection of the above, the risk of
    identity theft and invasion of privacy is greater.
   Access to medical records must be
    authorized.
   If an employee accesses or discloses PHI
    without a patient’s written authorization or
    without a job-related reason of doing so, the
    employee violates HIPPA.
   An employee may only access or disclose a
    patient’s PHI when this access is part of the
    employee’s job duties.
   An employee can never look at PHI for
    curiosity reasons.
   It also makes no difference if the person is a
    family member or close friend; all
    information is entitled to the same
    protection.
   Employees must report HIPPA breaches as
    part of their responsibility as an employee.
   Privacy or security breaches involving PHI
    should be reported to your supervisor.
   There are serious ramifications for all
    breaches.
   The cost is $50,000 per incident, $50,000 to
    $250,000 in fines and up to 10 years in prison.
   Individual rights for each patient includes:
     Receiving a copy of the practice’s Notice of
      Privacy Practices
     Request restrictions and confidential
      communications of their PHI
     Inspect their healthcare records
     To file a complaint
   Patients must sign an authorization form
    before their PHI may be released by the
    practice to outside parties such as a life
    insurer, a bank or a marketing firm.
   HIPPA permits use of PHI for
     Providing medical treatment
     Processing healthcare payments
     Conducting healthcare business operations
   CCHS is required to have safeguards to
    protect the privacy of PHI.
     Safeguards protect PHI from accidental or
      intentional unauthorized use.
     Limit accidental disclosures (discussions in
      hallways)
     Include document shredding, locking doors,
      locking file storage areas and use passwords and
      codes for access.
   CCHS safeguards sensitive information by
    ensuring the following:
     Keeps browser updated and uses security settings
     Uses security software
     Takes extra precaution when downloading
     software
   Many security breaches come from within the
    organization and many of these occur
    because of poor password habits.
     Use strong passwords (at least 8 characters with
      combination of letters and numbers)
     Change password frequently
   Be aware of your surroundings and use
    caution.
   Do not discuss sensitive information or PHI in
    public areas.
 Keep passwords secret and don’t allow others access
  to your computer.
 Keep notes in a secure place and don’t leave them in
  open areas.
 Hold discussions of PHI in private areas and for job-
  related reasons only.
 Ensure that sensitive information is secure in mailings.
 Follow procedures for proper disposal of PHI such as
  shredding.
 When sending emails, do not include PHI unless
  written approval is received and the computer is
  encrypted.
   Hjort, B. (2002). HIPAA Privacy and Security
      Training. Journal Of AHIMA, 73(4), 60A-g.
   Kongstvedt, P.(2007). Essentials of Managed
      Care. (5th Edition). Sudbury, Mass: Jones
      and Bartlett Publishers.

Contenu connexe

Tendances

Patient Confidentiality
Patient ConfidentialityPatient Confidentiality
Patient ConfidentialityNadia Rowell
 
Patient Confidentiality
Patient Confidentiality Patient Confidentiality
Patient Confidentiality Nadia Rowell
 
Biometric Privacy In The Workplace - Attorney Todd M. Friedman
Biometric Privacy In The Workplace - Attorney Todd M. FriedmanBiometric Privacy In The Workplace - Attorney Todd M. Friedman
Biometric Privacy In The Workplace - Attorney Todd M. FriedmanThe Law Buzz
 
8.2 Demonstration Health - IT benifits - Bagmishika Puhan ( Session 8)
8.2   Demonstration Health - IT benifits - Bagmishika Puhan ( Session 8)8.2   Demonstration Health - IT benifits - Bagmishika Puhan ( Session 8)
8.2 Demonstration Health - IT benifits - Bagmishika Puhan ( Session 8)Apollo Hospitals Group and ATNF
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation tomasztopa
 
Hipaa presentation
Hipaa presentationHipaa presentation
Hipaa presentationcjkonsella
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informaticskmcanty
 
Managing It Security
Managing It SecurityManaging It Security
Managing It SecurityBruce Sundeen
 
HIPAA 101 for Startups
HIPAA 101 for StartupsHIPAA 101 for Startups
HIPAA 101 for StartupsObaa, Inc.
 

Tendances (13)

Hippa presentation2
Hippa presentation2Hippa presentation2
Hippa presentation2
 
Patient Confidentiality
Patient ConfidentialityPatient Confidentiality
Patient Confidentiality
 
Patient Confidentiality
Patient Confidentiality Patient Confidentiality
Patient Confidentiality
 
Biometric Privacy In The Workplace - Attorney Todd M. Friedman
Biometric Privacy In The Workplace - Attorney Todd M. FriedmanBiometric Privacy In The Workplace - Attorney Todd M. Friedman
Biometric Privacy In The Workplace - Attorney Todd M. Friedman
 
8.2 Demonstration Health - IT benifits - Bagmishika Puhan ( Session 8)
8.2   Demonstration Health - IT benifits - Bagmishika Puhan ( Session 8)8.2   Demonstration Health - IT benifits - Bagmishika Puhan ( Session 8)
8.2 Demonstration Health - IT benifits - Bagmishika Puhan ( Session 8)
 
HIPAA Compliance Checklist for Medical Practices
HIPAA Compliance Checklist for Medical PracticesHIPAA Compliance Checklist for Medical Practices
HIPAA Compliance Checklist for Medical Practices
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Hipaa presentation
Hipaa presentationHipaa presentation
Hipaa presentation
 
HIPAA
HIPAAHIPAA
HIPAA
 
The standard for email communications
The standard for email communicationsThe standard for email communications
The standard for email communications
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informatics
 
Managing It Security
Managing It SecurityManaging It Security
Managing It Security
 
HIPAA 101 for Startups
HIPAA 101 for StartupsHIPAA 101 for Startups
HIPAA 101 for Startups
 

En vedette

HIPPA: How to protect your information....
HIPPA: How to protect your information....HIPPA: How to protect your information....
HIPPA: How to protect your information....Jeannie Joseph
 
Redspin Report - Protected Health Information 2010 Breach Report
Redspin Report - Protected Health Information 2010 Breach ReportRedspin Report - Protected Health Information 2010 Breach Report
Redspin Report - Protected Health Information 2010 Breach ReportRedspin, Inc.
 
Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...Lumension
 
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013RightScale
 
BREACH REPORT 2013: Protected Health Information (PHI)
BREACH REPORT 2013: Protected Health Information (PHI)BREACH REPORT 2013: Protected Health Information (PHI)
BREACH REPORT 2013: Protected Health Information (PHI)- Mark - Fullbright
 
What is health information?
What is health information? What is health information?
What is health information? Bedirhan Ustun
 
Protecting patients confidentiality slide presentation
Protecting patients confidentiality slide presentationProtecting patients confidentiality slide presentation
Protecting patients confidentiality slide presentationplunkk
 

En vedette (9)

HIPPA: How to protect your information....
HIPPA: How to protect your information....HIPPA: How to protect your information....
HIPPA: How to protect your information....
 
6 (1)
6 (1)6 (1)
6 (1)
 
Redspin Report - Protected Health Information 2010 Breach Report
Redspin Report - Protected Health Information 2010 Breach ReportRedspin Report - Protected Health Information 2010 Breach Report
Redspin Report - Protected Health Information 2010 Breach Report
 
Steve Nash
Steve NashSteve Nash
Steve Nash
 
Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...
 
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013
 
BREACH REPORT 2013: Protected Health Information (PHI)
BREACH REPORT 2013: Protected Health Information (PHI)BREACH REPORT 2013: Protected Health Information (PHI)
BREACH REPORT 2013: Protected Health Information (PHI)
 
What is health information?
What is health information? What is health information?
What is health information?
 
Protecting patients confidentiality slide presentation
Protecting patients confidentiality slide presentationProtecting patients confidentiality slide presentation
Protecting patients confidentiality slide presentation
 

Similaire à Wk1 discussion 2

Upholding confidentiality
Upholding confidentialityUpholding confidentiality
Upholding confidentialityTheresa Tapley
 
2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research TrainingCynthia Holland
 
Hipaa education
Hipaa educationHipaa education
Hipaa educationeklundc
 
Hipaa basics pp2
Hipaa basics pp2Hipaa basics pp2
Hipaa basics pp2martykoepke
 
Patient confidentiality MHA 690
Patient confidentiality MHA 690Patient confidentiality MHA 690
Patient confidentiality MHA 690AMSIMM9932
 
Hippa and Confidentiality
Hippa and ConfidentialityHippa and Confidentiality
Hippa and Confidentialityramonapage
 
Week 1 discussion 2 hipaa
Week 1 discussion 2 hipaaWeek 1 discussion 2 hipaa
Week 1 discussion 2 hipaaMADOZI4671
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Haydenhaydens
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Trainingridley27
 
Confidentiality
ConfidentialityConfidentiality
Confidentialityridley27
 
Chapter 5HIPAA and HITECHLearning ObjectivesUnde
Chapter 5HIPAA and HITECHLearning ObjectivesUndeChapter 5HIPAA and HITECHLearning ObjectivesUnde
Chapter 5HIPAA and HITECHLearning ObjectivesUndeWilheminaRossi174
 
Legal and ethical considerations in nursing informatics
Legal and ethical considerations in nursing informaticsLegal and ethical considerations in nursing informatics
Legal and ethical considerations in nursing informaticsAHMED ZINHOM
 
Annual HIPAA Education
Annual HIPAA EducationAnnual HIPAA Education
Annual HIPAA EducationDirkRhodes
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippamaggie_Platt
 
HIPAA Training - 2011
HIPAA Training - 2011HIPAA Training - 2011
HIPAA Training - 2011darichardson
 
Tiffany hall mha 690 week 1 discussion 2
Tiffany hall mha 690 week 1   discussion 2Tiffany hall mha 690 week 1   discussion 2
Tiffany hall mha 690 week 1 discussion 2tiffhall
 
Tiffany hall mha 690 week 1 discussion 2
Tiffany hall mha 690 week 1   discussion 2Tiffany hall mha 690 week 1   discussion 2
Tiffany hall mha 690 week 1 discussion 2tiffhall
 

Similaire à Wk1 discussion 2 (20)

Upholding confidentiality
Upholding confidentialityUpholding confidentiality
Upholding confidentiality
 
2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training
 
Hipaa education
Hipaa educationHipaa education
Hipaa education
 
Hipaa basics pp2
Hipaa basics pp2Hipaa basics pp2
Hipaa basics pp2
 
Patient confidentiality MHA 690
Patient confidentiality MHA 690Patient confidentiality MHA 690
Patient confidentiality MHA 690
 
Hippa and Confidentiality
Hippa and ConfidentialityHippa and Confidentiality
Hippa and Confidentiality
 
Hippa
HippaHippa
Hippa
 
Week 1 discussion 2 hipaa
Week 1 discussion 2 hipaaWeek 1 discussion 2 hipaa
Week 1 discussion 2 hipaa
 
Basic HIPAA Training by CMU
Basic HIPAA Training by CMUBasic HIPAA Training by CMU
Basic HIPAA Training by CMU
 
HIPPA
HIPPAHIPPA
HIPPA
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Hayden
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Training
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Chapter 5HIPAA and HITECHLearning ObjectivesUnde
Chapter 5HIPAA and HITECHLearning ObjectivesUndeChapter 5HIPAA and HITECHLearning ObjectivesUnde
Chapter 5HIPAA and HITECHLearning ObjectivesUnde
 
Legal and ethical considerations in nursing informatics
Legal and ethical considerations in nursing informaticsLegal and ethical considerations in nursing informatics
Legal and ethical considerations in nursing informatics
 
Annual HIPAA Education
Annual HIPAA EducationAnnual HIPAA Education
Annual HIPAA Education
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
HIPAA Training - 2011
HIPAA Training - 2011HIPAA Training - 2011
HIPAA Training - 2011
 
Tiffany hall mha 690 week 1 discussion 2
Tiffany hall mha 690 week 1   discussion 2Tiffany hall mha 690 week 1   discussion 2
Tiffany hall mha 690 week 1 discussion 2
 
Tiffany hall mha 690 week 1 discussion 2
Tiffany hall mha 690 week 1   discussion 2Tiffany hall mha 690 week 1   discussion 2
Tiffany hall mha 690 week 1 discussion 2
 

Dernier

EXERCISE PERFORMANCE.pptx, Lung function
EXERCISE PERFORMANCE.pptx, Lung functionEXERCISE PERFORMANCE.pptx, Lung function
EXERCISE PERFORMANCE.pptx, Lung functionkrishnareddy157915
 
CPR.nursingoutlook.pdf , Bsc nursing student
CPR.nursingoutlook.pdf , Bsc nursing studentCPR.nursingoutlook.pdf , Bsc nursing student
CPR.nursingoutlook.pdf , Bsc nursing studentsaileshpanda05
 
Moving Forward After Uterine Cancer Treatment: Surveillance Strategies, Testi...
Moving Forward After Uterine Cancer Treatment: Surveillance Strategies, Testi...Moving Forward After Uterine Cancer Treatment: Surveillance Strategies, Testi...
Moving Forward After Uterine Cancer Treatment: Surveillance Strategies, Testi...bkling
 
Different drug regularity bodies in different countries.
Different drug regularity bodies in different countries.Different drug regularity bodies in different countries.
Different drug regularity bodies in different countries.kishan singh tomar
 
Good Laboratory Practice (GLP) in Pharma-LikeWays.pptx
Good Laboratory Practice (GLP) in Pharma-LikeWays.pptxGood Laboratory Practice (GLP) in Pharma-LikeWays.pptx
Good Laboratory Practice (GLP) in Pharma-LikeWays.pptxLikeways
 
Unit I herbs as raw materials, biodynamic agriculture.ppt
Unit I herbs as raw materials, biodynamic agriculture.pptUnit I herbs as raw materials, biodynamic agriculture.ppt
Unit I herbs as raw materials, biodynamic agriculture.pptPradnya Wadekar
 
Generative AI in Health Care a scoping review and a persoanl experience.
Generative AI in Health Care a scoping review and a persoanl experience.Generative AI in Health Care a scoping review and a persoanl experience.
Generative AI in Health Care a scoping review and a persoanl experience.Vaikunthan Rajaratnam
 
Male Infertility Panel Discussion by Dr Sujoy Dasgupta
Male Infertility Panel Discussion by Dr Sujoy DasguptaMale Infertility Panel Discussion by Dr Sujoy Dasgupta
Male Infertility Panel Discussion by Dr Sujoy DasguptaSujoy Dasgupta
 
SGK LEUKEMIA KINH DÒNG BẠCH CÂU HẠT HAY.pdf
SGK LEUKEMIA KINH DÒNG BẠCH CÂU HẠT HAY.pdfSGK LEUKEMIA KINH DÒNG BẠCH CÂU HẠT HAY.pdf
SGK LEUKEMIA KINH DÒNG BẠCH CÂU HẠT HAY.pdfHongBiThi1
 
Breast cancer -ONCO IN MEDICAL AND SURGICAL NURSING.pptx
Breast cancer -ONCO IN MEDICAL AND SURGICAL NURSING.pptxBreast cancer -ONCO IN MEDICAL AND SURGICAL NURSING.pptx
Breast cancer -ONCO IN MEDICAL AND SURGICAL NURSING.pptxNaveenkumar267201
 
DNA nucleotides Blast in NCBI and Phylogeny using MEGA Xi.pptx
DNA nucleotides Blast in NCBI and Phylogeny using MEGA Xi.pptxDNA nucleotides Blast in NCBI and Phylogeny using MEGA Xi.pptx
DNA nucleotides Blast in NCBI and Phylogeny using MEGA Xi.pptxMAsifAhmad
 
MedMatch: Your Health, Our Mission. Pitch deck.
MedMatch: Your Health, Our Mission. Pitch deck.MedMatch: Your Health, Our Mission. Pitch deck.
MedMatch: Your Health, Our Mission. Pitch deck.whalesdesign
 
CONNECTIVE TISSUE (ANATOMY AND PHYSIOLOGY).pdf
CONNECTIVE TISSUE (ANATOMY AND PHYSIOLOGY).pdfCONNECTIVE TISSUE (ANATOMY AND PHYSIOLOGY).pdf
CONNECTIVE TISSUE (ANATOMY AND PHYSIOLOGY).pdfDolisha Warbi
 
Red Blood Cells_anemia & polycythemia.pdf
Red Blood Cells_anemia & polycythemia.pdfRed Blood Cells_anemia & polycythemia.pdf
Red Blood Cells_anemia & polycythemia.pdfMedicoseAcademics
 
The Importance of Mental Health: Why is Mental Health Important?
The Importance of Mental Health: Why is Mental Health Important?The Importance of Mental Health: Why is Mental Health Important?
The Importance of Mental Health: Why is Mental Health Important?Ryan Addison
 
How to cure cirrhosis and chronic hepatitis naturally
How to cure cirrhosis and chronic hepatitis naturallyHow to cure cirrhosis and chronic hepatitis naturally
How to cure cirrhosis and chronic hepatitis naturallyZurück zum Ursprung
 
Female Reproductive Physiology Before Pregnancy
Female Reproductive Physiology Before PregnancyFemale Reproductive Physiology Before Pregnancy
Female Reproductive Physiology Before PregnancyMedicoseAcademics
 
Bulimia nervosa ( Eating Disorders) Mental Health Nursing.
Bulimia nervosa ( Eating Disorders) Mental Health Nursing.Bulimia nervosa ( Eating Disorders) Mental Health Nursing.
Bulimia nervosa ( Eating Disorders) Mental Health Nursing.aarjukhadka22
 
Microbiology lecture presentation-1.pptx
Microbiology lecture presentation-1.pptxMicrobiology lecture presentation-1.pptx
Microbiology lecture presentation-1.pptxkitati1
 

Dernier (20)

EXERCISE PERFORMANCE.pptx, Lung function
EXERCISE PERFORMANCE.pptx, Lung functionEXERCISE PERFORMANCE.pptx, Lung function
EXERCISE PERFORMANCE.pptx, Lung function
 
CPR.nursingoutlook.pdf , Bsc nursing student
CPR.nursingoutlook.pdf , Bsc nursing studentCPR.nursingoutlook.pdf , Bsc nursing student
CPR.nursingoutlook.pdf , Bsc nursing student
 
Moving Forward After Uterine Cancer Treatment: Surveillance Strategies, Testi...
Moving Forward After Uterine Cancer Treatment: Surveillance Strategies, Testi...Moving Forward After Uterine Cancer Treatment: Surveillance Strategies, Testi...
Moving Forward After Uterine Cancer Treatment: Surveillance Strategies, Testi...
 
Different drug regularity bodies in different countries.
Different drug regularity bodies in different countries.Different drug regularity bodies in different countries.
Different drug regularity bodies in different countries.
 
Good Laboratory Practice (GLP) in Pharma-LikeWays.pptx
Good Laboratory Practice (GLP) in Pharma-LikeWays.pptxGood Laboratory Practice (GLP) in Pharma-LikeWays.pptx
Good Laboratory Practice (GLP) in Pharma-LikeWays.pptx
 
Unit I herbs as raw materials, biodynamic agriculture.ppt
Unit I herbs as raw materials, biodynamic agriculture.pptUnit I herbs as raw materials, biodynamic agriculture.ppt
Unit I herbs as raw materials, biodynamic agriculture.ppt
 
Generative AI in Health Care a scoping review and a persoanl experience.
Generative AI in Health Care a scoping review and a persoanl experience.Generative AI in Health Care a scoping review and a persoanl experience.
Generative AI in Health Care a scoping review and a persoanl experience.
 
Male Infertility Panel Discussion by Dr Sujoy Dasgupta
Male Infertility Panel Discussion by Dr Sujoy DasguptaMale Infertility Panel Discussion by Dr Sujoy Dasgupta
Male Infertility Panel Discussion by Dr Sujoy Dasgupta
 
SGK LEUKEMIA KINH DÒNG BẠCH CÂU HẠT HAY.pdf
SGK LEUKEMIA KINH DÒNG BẠCH CÂU HẠT HAY.pdfSGK LEUKEMIA KINH DÒNG BẠCH CÂU HẠT HAY.pdf
SGK LEUKEMIA KINH DÒNG BẠCH CÂU HẠT HAY.pdf
 
Breast cancer -ONCO IN MEDICAL AND SURGICAL NURSING.pptx
Breast cancer -ONCO IN MEDICAL AND SURGICAL NURSING.pptxBreast cancer -ONCO IN MEDICAL AND SURGICAL NURSING.pptx
Breast cancer -ONCO IN MEDICAL AND SURGICAL NURSING.pptx
 
Cone beam CT: concepts and applications.pptx
Cone beam CT: concepts and applications.pptxCone beam CT: concepts and applications.pptx
Cone beam CT: concepts and applications.pptx
 
DNA nucleotides Blast in NCBI and Phylogeny using MEGA Xi.pptx
DNA nucleotides Blast in NCBI and Phylogeny using MEGA Xi.pptxDNA nucleotides Blast in NCBI and Phylogeny using MEGA Xi.pptx
DNA nucleotides Blast in NCBI and Phylogeny using MEGA Xi.pptx
 
MedMatch: Your Health, Our Mission. Pitch deck.
MedMatch: Your Health, Our Mission. Pitch deck.MedMatch: Your Health, Our Mission. Pitch deck.
MedMatch: Your Health, Our Mission. Pitch deck.
 
CONNECTIVE TISSUE (ANATOMY AND PHYSIOLOGY).pdf
CONNECTIVE TISSUE (ANATOMY AND PHYSIOLOGY).pdfCONNECTIVE TISSUE (ANATOMY AND PHYSIOLOGY).pdf
CONNECTIVE TISSUE (ANATOMY AND PHYSIOLOGY).pdf
 
Red Blood Cells_anemia & polycythemia.pdf
Red Blood Cells_anemia & polycythemia.pdfRed Blood Cells_anemia & polycythemia.pdf
Red Blood Cells_anemia & polycythemia.pdf
 
The Importance of Mental Health: Why is Mental Health Important?
The Importance of Mental Health: Why is Mental Health Important?The Importance of Mental Health: Why is Mental Health Important?
The Importance of Mental Health: Why is Mental Health Important?
 
How to cure cirrhosis and chronic hepatitis naturally
How to cure cirrhosis and chronic hepatitis naturallyHow to cure cirrhosis and chronic hepatitis naturally
How to cure cirrhosis and chronic hepatitis naturally
 
Female Reproductive Physiology Before Pregnancy
Female Reproductive Physiology Before PregnancyFemale Reproductive Physiology Before Pregnancy
Female Reproductive Physiology Before Pregnancy
 
Bulimia nervosa ( Eating Disorders) Mental Health Nursing.
Bulimia nervosa ( Eating Disorders) Mental Health Nursing.Bulimia nervosa ( Eating Disorders) Mental Health Nursing.
Bulimia nervosa ( Eating Disorders) Mental Health Nursing.
 
Microbiology lecture presentation-1.pptx
Microbiology lecture presentation-1.pptxMicrobiology lecture presentation-1.pptx
Microbiology lecture presentation-1.pptx
 

Wk1 discussion 2

  • 1. Jodi M. Watkowski MHA690- Health Care Capstone Dr. Hwang-Ji Lu February 2, 2012
  • 2. Ways to protect the privacy and security of confidential and protected health information  To recognize situations in which confidential and protected health information can be mishandled  That employees are held responsible for their actions  HIPPA identifiers which create protected health information (PHI)
  • 3. It is the responsibility of every employee to protect the privacy and security of sensitive information in all forms.  Sensitive information comes in several forms:  Electronic  Spoken  Printed
  • 4. Examples of sensitive information include the following:  Personnel information  Computer Passwords  Driver’s License Numbers  Credit Card Numbers  Social Security Numbers  Without protection of the above, the risk of identity theft and invasion of privacy is greater.
  • 5. Access to medical records must be authorized.  If an employee accesses or discloses PHI without a patient’s written authorization or without a job-related reason of doing so, the employee violates HIPPA.  An employee may only access or disclose a patient’s PHI when this access is part of the employee’s job duties.
  • 6. An employee can never look at PHI for curiosity reasons.  It also makes no difference if the person is a family member or close friend; all information is entitled to the same protection.
  • 7. Employees must report HIPPA breaches as part of their responsibility as an employee.  Privacy or security breaches involving PHI should be reported to your supervisor.  There are serious ramifications for all breaches.  The cost is $50,000 per incident, $50,000 to $250,000 in fines and up to 10 years in prison.
  • 8. Individual rights for each patient includes:  Receiving a copy of the practice’s Notice of Privacy Practices  Request restrictions and confidential communications of their PHI  Inspect their healthcare records  To file a complaint
  • 9. Patients must sign an authorization form before their PHI may be released by the practice to outside parties such as a life insurer, a bank or a marketing firm.  HIPPA permits use of PHI for  Providing medical treatment  Processing healthcare payments  Conducting healthcare business operations
  • 10. CCHS is required to have safeguards to protect the privacy of PHI.  Safeguards protect PHI from accidental or intentional unauthorized use.  Limit accidental disclosures (discussions in hallways)  Include document shredding, locking doors, locking file storage areas and use passwords and codes for access.
  • 11. CCHS safeguards sensitive information by ensuring the following:  Keeps browser updated and uses security settings  Uses security software  Takes extra precaution when downloading software
  • 12. Many security breaches come from within the organization and many of these occur because of poor password habits.  Use strong passwords (at least 8 characters with combination of letters and numbers)  Change password frequently
  • 13. Be aware of your surroundings and use caution.  Do not discuss sensitive information or PHI in public areas.
  • 14.  Keep passwords secret and don’t allow others access to your computer.  Keep notes in a secure place and don’t leave them in open areas.  Hold discussions of PHI in private areas and for job- related reasons only.  Ensure that sensitive information is secure in mailings.  Follow procedures for proper disposal of PHI such as shredding.  When sending emails, do not include PHI unless written approval is received and the computer is encrypted.
  • 15. Hjort, B. (2002). HIPAA Privacy and Security Training. Journal Of AHIMA, 73(4), 60A-g.  Kongstvedt, P.(2007). Essentials of Managed Care. (5th Edition). Sudbury, Mass: Jones and Bartlett Publishers.