SlideShare une entreprise Scribd logo
1  sur  19
The Health Insurance Portability and Accountability
Act of 1996 (HIPAA)
What is HIPAA?
 A government mandated rule to protect access to and
use of patient personal health information
 Gives patient certain individual rights
What Type of Information Do
HIPAA Cover?
 Identifiable Protected Health Information (PHI)
 Information that Identifies a Patient or Individual
Privacy Information
 What are Identifiable Information?
Answer
 Pictures
 Names
 Birthdates
 Phone Numbers
 SSN (social security number)
 Medical Record Information
Patient’s Rights
 May review medical record
 Request correction of any noticeable errors
 File grievance with provider
Responsibility to Patient
 Protect and secure PHI (personal health information)
 Institute policies and procedures for managing PHI
Principles of the Privacy Rule
 Customer Control
 Set Boundaries
 Answerability
 Civic Accountability
 Safety
Protected Health Information
Policies
 Guide access to and use of personal health information
Assess to Personal Health
Information
 Is based on who needs to know and minimum
necessary information
 By health care providers
 By payment activity
Use of Protected Health
Information
 When Providing Patient Health Care Treatment or
Services Such as:
 Verification of insurance
 Medical treatments
How to Protect Privacy
 Do not share PHI with non clinical staff
 Utilize the minimum necessary standard with
protected health information
 Avoid public discussion of patient information
 Avoid public viewing and access of patient information
When is it allowed to reveal PHI?
 In court processes (subpoena)
 Law enforcement processes (criminal investigation)
When is Patient Authorization
Required?
 Receiving Medical Treatment
 Conducting Medical-Related Tests (AIDS, Drug)
What to Do When Requests are
Made for an Individual’s Personal
Information
 Verify who is requesting the information
 Verify photo (if available)
 Document the information being given
What Technological System Make It
Easy to Access, Copy, and
Distribute PHI
 Computerized Medical Records
Organizations that Enforce HIPAA’S
Regulations
 FBI (federal bureau of investigation)
 Office for Civil Rights
 Joint Commission on Accreditation of Healthcare
Organization
For Non-Compliance to HIPAA
Security of Privacy rules
 Civil-Enforced by Office of Civil Rights
 Criminal-Enforced by Department of Justice
 Intentionally exposing PHI-1yr sentence & $50,000 fine
 Falsely accessing PHI-5yr sentence & $100,000 fine
 Giving PHI to someone with criminal intent-10yr
sentence & $250,000 fine
References
 Mir, S.S. (2011, March). HIPAA Privacy Rule: Maintaining the
confidentiality of medical records, Part I. Journal of Health Care
Compliance, 13(2), 5-14. Retrieved August 17, 2011, from
ABI/INFORM Global
 Protecting patients privacy. (n. d.). Retrieved August 17, 2011
from http://cnhs.fiu.edu/ot/pdf/HIPAA_Regulations.ppt
 Protecting patient privacy. (n. d.). Retrieved August 17, 2011 from
http://www.westernu.edu/bin/nursing/hipaa.pps
 Wolper, L.F. (2011). Health care administration: Managing
organized delivery systems (5th ed.). Boston: Jones and Bartlett.

Contenu connexe

Tendances

Patient confidentiality training
Patient confidentiality trainingPatient confidentiality training
Patient confidentiality trainingSheena705
 
Welcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityWelcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityveve1728
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentialityLily Isaacson
 
Patient confidentiality seminar
Patient confidentiality seminarPatient confidentiality seminar
Patient confidentiality seminarLakisha M. Moore
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)bholmes
 
Hippa training for healthcare employees
Hippa training for healthcare employeesHippa training for healthcare employees
Hippa training for healthcare employeesaminahallen
 
Healthcare confidentiality training.2013bev
Healthcare confidentiality training.2013bevHealthcare confidentiality training.2013bev
Healthcare confidentiality training.2013bevblk70130
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Trainingndejesus4
 
Confidentiality in the Workplace
Confidentiality in the WorkplaceConfidentiality in the Workplace
Confidentiality in the Workplacesalvarez63
 
Hippa slide show
Hippa slide showHippa slide show
Hippa slide showheathercool
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Trainingridley27
 

Tendances (20)

Patient confidentiality training
Patient confidentiality trainingPatient confidentiality training
Patient confidentiality training
 
HIPAA 2010
HIPAA  2010HIPAA  2010
HIPAA 2010
 
Welcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityWelcome to the hippa, privacy and security
Welcome to the hippa, privacy and security
 
Hippa training 2017
Hippa training 2017Hippa training 2017
Hippa training 2017
 
Hipaa slideshow
Hipaa slideshowHipaa slideshow
Hipaa slideshow
 
Hipaa training
Hipaa trainingHipaa training
Hipaa training
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
Patient confidentiality seminar
Patient confidentiality seminarPatient confidentiality seminar
Patient confidentiality seminar
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)
 
Hippa
HippaHippa
Hippa
 
Hippa laws
Hippa lawsHippa laws
Hippa laws
 
Mha wk 1 dis 2
Mha wk 1 dis 2Mha wk 1 dis 2
Mha wk 1 dis 2
 
HIPAA Complaince
HIPAA ComplainceHIPAA Complaince
HIPAA Complaince
 
Hippa training for healthcare employees
Hippa training for healthcare employeesHippa training for healthcare employees
Hippa training for healthcare employees
 
Healthcare confidentiality training.2013bev
Healthcare confidentiality training.2013bevHealthcare confidentiality training.2013bev
Healthcare confidentiality training.2013bev
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Training
 
Confidentiality in the Workplace
Confidentiality in the WorkplaceConfidentiality in the Workplace
Confidentiality in the Workplace
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Hippa slide show
Hippa slide showHippa slide show
Hippa slide show
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Training
 

En vedette

3 ways fragmented clinical communication is compromising patient care
3 ways fragmented clinical communication is compromising patient care3 ways fragmented clinical communication is compromising patient care
3 ways fragmented clinical communication is compromising patient carePatientSafe Solutions
 
Improved Applications with IPv6: an overview
Improved Applications with IPv6: an overviewImproved Applications with IPv6: an overview
Improved Applications with IPv6: an overviewCisco DevNet
 
Social media to Social Business
Social media to Social BusinessSocial media to Social Business
Social media to Social BusinessTuan Anh Nguyen
 
Newest products summer
Newest products summerNewest products summer
Newest products summerPattye255
 
2016 09-12 Europe Biobanking Week, Vienna, Alain van Gool
2016 09-12 Europe Biobanking Week, Vienna, Alain van Gool2016 09-12 Europe Biobanking Week, Vienna, Alain van Gool
2016 09-12 Europe Biobanking Week, Vienna, Alain van GoolAlain van Gool
 
Sviesuva vaizdine medziaga svietiejams 1 dalis 2013
Sviesuva vaizdine medziaga svietiejams 1 dalis 2013Sviesuva vaizdine medziaga svietiejams 1 dalis 2013
Sviesuva vaizdine medziaga svietiejams 1 dalis 2013valentina valentina
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk Endcode_org
 
DJ Hay Landscape Architecture
DJ Hay Landscape ArchitectureDJ Hay Landscape Architecture
DJ Hay Landscape ArchitectureDavid James Hay
 
Final Powerpoint
Final PowerpointFinal Powerpoint
Final Powerpointtlc6996
 
How to keep pace with mobile consumer expectations
How to keep pace with mobile consumer expectationsHow to keep pace with mobile consumer expectations
How to keep pace with mobile consumer expectationsTuan Anh Nguyen
 
DEVNET-1186 Harnessing the Power of the Cloud to Detect Advanced Threats: Cog...
DEVNET-1186	Harnessing the Power of the Cloud to Detect Advanced Threats: Cog...DEVNET-1186	Harnessing the Power of the Cloud to Detect Advanced Threats: Cog...
DEVNET-1186 Harnessing the Power of the Cloud to Detect Advanced Threats: Cog...Cisco DevNet
 
Modales y comportamiento social para tener una buena personalidad.
Modales  y comportamiento social para tener una buena personalidad.Modales  y comportamiento social para tener una buena personalidad.
Modales y comportamiento social para tener una buena personalidad.Catherin Morillo
 
Vaizdine metodine medziaga svietejams 8 dalis sveiki ir laimingi vaikai
Vaizdine metodine medziaga svietejams 8 dalis sveiki ir laimingi vaikaiVaizdine metodine medziaga svietejams 8 dalis sveiki ir laimingi vaikai
Vaizdine metodine medziaga svietejams 8 dalis sveiki ir laimingi vaikaivalentina valentina
 
2015 11-13 Radboud Technology Centers DTL Partner Advisory Committee
2015 11-13 Radboud Technology Centers DTL Partner Advisory Committee2015 11-13 Radboud Technology Centers DTL Partner Advisory Committee
2015 11-13 Radboud Technology Centers DTL Partner Advisory CommitteeAlain van Gool
 
Manual SEO IDS Soluciones eCommerce
Manual SEO IDS Soluciones eCommerceManual SEO IDS Soluciones eCommerce
Manual SEO IDS Soluciones eCommerceDario Schilman
 
La netiqueta
La netiquetaLa netiqueta
La netiquetaJonannis
 
state_of_app_downloads_and_monetization_2015_global
state_of_app_downloads_and_monetization_2015_globalstate_of_app_downloads_and_monetization_2015_global
state_of_app_downloads_and_monetization_2015_globalTuan Anh Nguyen
 
Relatoio contas sgu 2
Relatoio contas sgu 2Relatoio contas sgu 2
Relatoio contas sgu 2macoesapo
 
Presentation of scenes of The Descent
Presentation of scenes of The DescentPresentation of scenes of The Descent
Presentation of scenes of The Descentalexjr1996
 

En vedette (20)

3 ways fragmented clinical communication is compromising patient care
3 ways fragmented clinical communication is compromising patient care3 ways fragmented clinical communication is compromising patient care
3 ways fragmented clinical communication is compromising patient care
 
Improved Applications with IPv6: an overview
Improved Applications with IPv6: an overviewImproved Applications with IPv6: an overview
Improved Applications with IPv6: an overview
 
Perfect 360
Perfect 360Perfect 360
Perfect 360
 
Social media to Social Business
Social media to Social BusinessSocial media to Social Business
Social media to Social Business
 
Newest products summer
Newest products summerNewest products summer
Newest products summer
 
2016 09-12 Europe Biobanking Week, Vienna, Alain van Gool
2016 09-12 Europe Biobanking Week, Vienna, Alain van Gool2016 09-12 Europe Biobanking Week, Vienna, Alain van Gool
2016 09-12 Europe Biobanking Week, Vienna, Alain van Gool
 
Sviesuva vaizdine medziaga svietiejams 1 dalis 2013
Sviesuva vaizdine medziaga svietiejams 1 dalis 2013Sviesuva vaizdine medziaga svietiejams 1 dalis 2013
Sviesuva vaizdine medziaga svietiejams 1 dalis 2013
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk
 
DJ Hay Landscape Architecture
DJ Hay Landscape ArchitectureDJ Hay Landscape Architecture
DJ Hay Landscape Architecture
 
Final Powerpoint
Final PowerpointFinal Powerpoint
Final Powerpoint
 
How to keep pace with mobile consumer expectations
How to keep pace with mobile consumer expectationsHow to keep pace with mobile consumer expectations
How to keep pace with mobile consumer expectations
 
DEVNET-1186 Harnessing the Power of the Cloud to Detect Advanced Threats: Cog...
DEVNET-1186	Harnessing the Power of the Cloud to Detect Advanced Threats: Cog...DEVNET-1186	Harnessing the Power of the Cloud to Detect Advanced Threats: Cog...
DEVNET-1186 Harnessing the Power of the Cloud to Detect Advanced Threats: Cog...
 
Modales y comportamiento social para tener una buena personalidad.
Modales  y comportamiento social para tener una buena personalidad.Modales  y comportamiento social para tener una buena personalidad.
Modales y comportamiento social para tener una buena personalidad.
 
Vaizdine metodine medziaga svietejams 8 dalis sveiki ir laimingi vaikai
Vaizdine metodine medziaga svietejams 8 dalis sveiki ir laimingi vaikaiVaizdine metodine medziaga svietejams 8 dalis sveiki ir laimingi vaikai
Vaizdine metodine medziaga svietejams 8 dalis sveiki ir laimingi vaikai
 
2015 11-13 Radboud Technology Centers DTL Partner Advisory Committee
2015 11-13 Radboud Technology Centers DTL Partner Advisory Committee2015 11-13 Radboud Technology Centers DTL Partner Advisory Committee
2015 11-13 Radboud Technology Centers DTL Partner Advisory Committee
 
Manual SEO IDS Soluciones eCommerce
Manual SEO IDS Soluciones eCommerceManual SEO IDS Soluciones eCommerce
Manual SEO IDS Soluciones eCommerce
 
La netiqueta
La netiquetaLa netiqueta
La netiqueta
 
state_of_app_downloads_and_monetization_2015_global
state_of_app_downloads_and_monetization_2015_globalstate_of_app_downloads_and_monetization_2015_global
state_of_app_downloads_and_monetization_2015_global
 
Relatoio contas sgu 2
Relatoio contas sgu 2Relatoio contas sgu 2
Relatoio contas sgu 2
 
Presentation of scenes of The Descent
Presentation of scenes of The DescentPresentation of scenes of The Descent
Presentation of scenes of The Descent
 

Similaire à Patient confidentiality training

Protecting patients privacy slide presentation
Protecting patients privacy slide presentationProtecting patients privacy slide presentation
Protecting patients privacy slide presentationplunkk
 
Mha690 week 1 disc2 10 3-2019
Mha690 week 1 disc2 10 3-2019Mha690 week 1 disc2 10 3-2019
Mha690 week 1 disc2 10 3-2019TTD001
 
HIPPA---Chantel Artis Spencer
HIPPA---Chantel Artis SpencerHIPPA---Chantel Artis Spencer
HIPPA---Chantel Artis Spencershay1234
 
Hipaa basics pp2
Hipaa basics pp2Hipaa basics pp2
Hipaa basics pp2martykoepke
 
HIPAA and RHIOs
HIPAA and RHIOsHIPAA and RHIOs
HIPAA and RHIOsnobumoto
 
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)Sanjeev Bharwan
 
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingWeek 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingvrgill22
 
HIPAA INSERVICE 2017
HIPAA INSERVICE 2017 HIPAA INSERVICE 2017
HIPAA INSERVICE 2017 Meg Oser
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
 
HIPAA Laws
HIPAA LawsHIPAA Laws
HIPAA Lawscitinfo
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion iibeleza1669
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion iibeleza1669
 
Patient confidentiality MHA 690
Patient confidentiality MHA 690Patient confidentiality MHA 690
Patient confidentiality MHA 690AMSIMM9932
 
Confidentiality and you
Confidentiality and youConfidentiality and you
Confidentiality and youyola121
 
Tiffany hall mha 690 week 1 discussion 2
Tiffany hall mha 690 week 1   discussion 2Tiffany hall mha 690 week 1   discussion 2
Tiffany hall mha 690 week 1 discussion 2tiffhall
 

Similaire à Patient confidentiality training (20)

Protecting patients privacy slide presentation
Protecting patients privacy slide presentationProtecting patients privacy slide presentation
Protecting patients privacy slide presentation
 
Patient confidentiality training
Patient confidentiality trainingPatient confidentiality training
Patient confidentiality training
 
Mha690 week 1 disc2 10 3-2019
Mha690 week 1 disc2 10 3-2019Mha690 week 1 disc2 10 3-2019
Mha690 week 1 disc2 10 3-2019
 
HIPPA---Chantel Artis Spencer
HIPPA---Chantel Artis SpencerHIPPA---Chantel Artis Spencer
HIPPA---Chantel Artis Spencer
 
Hipaa inservice
Hipaa inserviceHipaa inservice
Hipaa inservice
 
Hipaa basics pp2
Hipaa basics pp2Hipaa basics pp2
Hipaa basics pp2
 
HIPAA and RHIOs
HIPAA and RHIOsHIPAA and RHIOs
HIPAA and RHIOs
 
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
 
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingWeek 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
 
HIPAA INSERVICE 2017
HIPAA INSERVICE 2017 HIPAA INSERVICE 2017
HIPAA INSERVICE 2017
 
HIPAA
HIPAAHIPAA
HIPAA
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
HIPAA Laws
HIPAA LawsHIPAA Laws
HIPAA Laws
 
HIPAA
HIPAAHIPAA
HIPAA
 
HIPAA
HIPAAHIPAA
HIPAA
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion ii
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion ii
 
Patient confidentiality MHA 690
Patient confidentiality MHA 690Patient confidentiality MHA 690
Patient confidentiality MHA 690
 
Confidentiality and you
Confidentiality and youConfidentiality and you
Confidentiality and you
 
Tiffany hall mha 690 week 1 discussion 2
Tiffany hall mha 690 week 1   discussion 2Tiffany hall mha 690 week 1   discussion 2
Tiffany hall mha 690 week 1 discussion 2
 

Dernier

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Dernier (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Patient confidentiality training

  • 1. The Health Insurance Portability and Accountability Act of 1996 (HIPAA)
  • 2. What is HIPAA?  A government mandated rule to protect access to and use of patient personal health information  Gives patient certain individual rights
  • 3. What Type of Information Do HIPAA Cover?  Identifiable Protected Health Information (PHI)  Information that Identifies a Patient or Individual
  • 4. Privacy Information  What are Identifiable Information?
  • 5. Answer  Pictures  Names  Birthdates  Phone Numbers  SSN (social security number)  Medical Record Information
  • 6. Patient’s Rights  May review medical record  Request correction of any noticeable errors  File grievance with provider
  • 7. Responsibility to Patient  Protect and secure PHI (personal health information)  Institute policies and procedures for managing PHI
  • 8. Principles of the Privacy Rule  Customer Control  Set Boundaries  Answerability  Civic Accountability  Safety
  • 9. Protected Health Information Policies  Guide access to and use of personal health information
  • 10. Assess to Personal Health Information  Is based on who needs to know and minimum necessary information  By health care providers  By payment activity
  • 11. Use of Protected Health Information  When Providing Patient Health Care Treatment or Services Such as:  Verification of insurance  Medical treatments
  • 12. How to Protect Privacy  Do not share PHI with non clinical staff  Utilize the minimum necessary standard with protected health information  Avoid public discussion of patient information  Avoid public viewing and access of patient information
  • 13. When is it allowed to reveal PHI?  In court processes (subpoena)  Law enforcement processes (criminal investigation)
  • 14. When is Patient Authorization Required?  Receiving Medical Treatment  Conducting Medical-Related Tests (AIDS, Drug)
  • 15. What to Do When Requests are Made for an Individual’s Personal Information  Verify who is requesting the information  Verify photo (if available)  Document the information being given
  • 16. What Technological System Make It Easy to Access, Copy, and Distribute PHI  Computerized Medical Records
  • 17. Organizations that Enforce HIPAA’S Regulations  FBI (federal bureau of investigation)  Office for Civil Rights  Joint Commission on Accreditation of Healthcare Organization
  • 18. For Non-Compliance to HIPAA Security of Privacy rules  Civil-Enforced by Office of Civil Rights  Criminal-Enforced by Department of Justice  Intentionally exposing PHI-1yr sentence & $50,000 fine  Falsely accessing PHI-5yr sentence & $100,000 fine  Giving PHI to someone with criminal intent-10yr sentence & $250,000 fine
  • 19. References  Mir, S.S. (2011, March). HIPAA Privacy Rule: Maintaining the confidentiality of medical records, Part I. Journal of Health Care Compliance, 13(2), 5-14. Retrieved August 17, 2011, from ABI/INFORM Global  Protecting patients privacy. (n. d.). Retrieved August 17, 2011 from http://cnhs.fiu.edu/ot/pdf/HIPAA_Regulations.ppt  Protecting patient privacy. (n. d.). Retrieved August 17, 2011 from http://www.westernu.edu/bin/nursing/hipaa.pps  Wolper, L.F. (2011). Health care administration: Managing organized delivery systems (5th ed.). Boston: Jones and Bartlett.