SlideShare a Scribd company logo
1 of 10
Confidential Healthcare and
HIPPAcracies
Makena Lei Byers
MHA 690

Dr. Hwang-Ji Lu
November 14th 2013
November 14, 2013
Why trainings in confidentiality are extremely
important:
"All professionals are prone to boundary transgressions;
explicit training about and the maintenance of appropriate
role balance will help to ensure high-functioning
relationships and maximize the quality of patient care,
resident education, faculty and resident satisfaction, and
modeling of professional behavior to improve competencies
as clinicians and educators."(Reitz, 2013)

It is crucial that we inform ourselves and others on the HIPAA
laws and regulations. Breach of contract, indiscretion,
Informed consent, “Do no harm”, the threat of self-
Why and how we must protect patient information
When determining eligibility for certain services and
providing needed and appropriate resources, human service
agencies and education institutions often require that
children and families share very private information about
themselves. Laws and statutes are in place to protect the
privacy of these individuals and to ensure that this
information is released only when necessary."(California
Univ., 2002)

All employees must be made aware of the imperative
The reasons for observing ethical behavior:
"Most primary care training programs have a behavioral
science professional on faculty. Despite more similarities
than differences among the roles filled by behavioral health
professionals within primary care medicine residencies, each
professional guild has a distinct set of ethical principles."
(Reitz, 2013)

Patients have individual privacy rights. There may be
multifarious ethical codes postulate at each hospital and
every other health care facility. Overall, in omniscience, The
law requires that we provide and bear the human rights of
privacy to our patients.
Training: Behaving Unethically is Punishable.
Please inform others.
“Among the threats to the four information security aspects:
confidentiality, integrity, availability, and quality;
confidentiality threats were identified as most serious, with
one threat given an unacceptable level of High risk."
(Henrickson, 2013)

The Misconduct that occurred at UCLA in regards to the
abusive speculation of private medical records, (some may
have been those who were in the limelight with the media),
must be carefully analyzed and born into retrospect as a
greater lesson on what virtue is versus indelicate “MYOB”
patterns which only afford abrasiveness, and are far from the
Adopting a higher security system &
Making all aware of the risks of technological escapades(!):
“
Because of the creation and use of information online and the
widespread use of the internet and Web 2.0 platforms,
physicians and others are increasingly required to consider
how best to protect patient interests and apply principles of
professionalism to new settings" (Farnan, 2013)
It then becomes vital that information which is privy to the
patient and their honorable confidantes is never ever shared
or speculated or…heaven forbid, stolen from any Health Care
System
Confidentiality

"Confidentiality Risks in home are different from those in a
more controlled environment, such as a hospital and
electronic equipment located in private homes and
commuting via internet is a more exposed unauthorized
access. By implementing certain measures it has been
possible to design a home based service which ensures the
necessary level of information and security privacy."
(Henrickson, 2013)
Even when a facility is established out of a residence,
confidentiality and security must be cardinal.
In Conclusion: Safeguarding
"The Health Information Trust Alliance (HITRUST) was born out of the
belief that information security should be a core pillar of, rather than
an obstacle to, the broad adoption of health information systems and
exchanges. HITRUST, in collaboration with healthcare, business, technology
and information security leaders, has established the Common Security
Framework (CSF), a certifiable framework that can be used by any and all
organizations that create, access, store, or exchange personal health and
financial information. The CSF is an information security framework that
harmonizes the requirements of existing standards and regulations,
including federal (HIPAA, HITECH), third party (PCI, COBIT), and government
(NIST, FTC). www.hitrustalliance.net." (Accretive Health, 2013)
The law condones powerful training measures and heightened security
systems. In this way, the law empowers patients, employees and Health
Care Establishments by blocking or legally refining those who disregard
the veritable conduction of safe and Top Quality Management.
References

Accretive Health, I. c. (3). Accretive Health Achieves Industry-Leading HITRUST
Certification for Data Security and Protection of Private Patient Health Information.
Business Wire (English).

Aronovitz, L. G. (1999). Medicare: HCFA Needs to Better Protect Beneficiaries'
Confidential Health Information: T-HEHS-99-172. GAO Reports, 1.

California Univ., L. s. (2002). Confidentiality. A Center Quick Training Aid.

Farnan, J. M., Sulmasy, L., Worster, B. K., Chaudhry, H. J., Rhyne, J. A., & Arora, V. M.
(2013). Online Medical Professionalism: Patient and Public Relationships: Policy
Statement From the American College of Physicians and the Federation of State
Medical Boards. Annals Of Internal Medicine, 158(8)
References (Continued)

Henrickson, Eva. (2013) BMC Medical Informatics & Decision Making. 2013, Vol. 13
Issue 1, p1-13. 13p. 3 Charts.

http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=90292245&site=edslive
Reitz, Randall, St. Mary’s Family Medicine Residency, 2698 Patterson Road, Grand
Junction, CO, US, 81506, reitz.randall@gmail.com

Wolper, L.F. (2011). Health care administration: Managing organized delivery
systems (5th ed.). Boston: Jones and Bartlett.

More Related Content

What's hot

Security Best Practices for Health Information Exchange
Security Best Practices for Health Information ExchangeSecurity Best Practices for Health Information Exchange
Security Best Practices for Health Information Exchange
Trend Micro
 
Confidentiality: Effective Training for Healthcare Employees
Confidentiality: Effective Training for Healthcare EmployeesConfidentiality: Effective Training for Healthcare Employees
Confidentiality: Effective Training for Healthcare Employees
jacquelinecwinston
 
Priv&security&profin electrcommunicationsrev9 23
Priv&security&profin electrcommunicationsrev9 23Priv&security&profin electrcommunicationsrev9 23
Priv&security&profin electrcommunicationsrev9 23
Deven McGraw
 

What's hot (19)

Mha690 wk1 dis2
Mha690 wk1 dis2Mha690 wk1 dis2
Mha690 wk1 dis2
 
Data Protection In Ghana
Data Protection In GhanaData Protection In Ghana
Data Protection In Ghana
 
Brent Mittelstadt, "From Protecting Individuals to Groups in Biomedical Big D...
Brent Mittelstadt, "From Protecting Individuals to Groups in Biomedical Big D...Brent Mittelstadt, "From Protecting Individuals to Groups in Biomedical Big D...
Brent Mittelstadt, "From Protecting Individuals to Groups in Biomedical Big D...
 
HIPAA
HIPAAHIPAA
HIPAA
 
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
 
$4.8m HIPAA Breach
$4.8m HIPAA Breach$4.8m HIPAA Breach
$4.8m HIPAA Breach
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Patient-Centric Privacy: Envisioning Collaboration Between Payers, Providers...
Patient-Centric Privacy:  Envisioning Collaboration Between Payers, Providers...Patient-Centric Privacy:  Envisioning Collaboration Between Payers, Providers...
Patient-Centric Privacy: Envisioning Collaboration Between Payers, Providers...
 
DVHIMSS Ensuring Privacy and Security of HIEs in PA
DVHIMSS Ensuring Privacy and Security of HIEs in PADVHIMSS Ensuring Privacy and Security of HIEs in PA
DVHIMSS Ensuring Privacy and Security of HIEs in PA
 
HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007
 
Standardization and Interoperability
Standardization and InteroperabilityStandardization and Interoperability
Standardization and Interoperability
 
Legal Aspects in Health Informatics
Legal Aspects in Health InformaticsLegal Aspects in Health Informatics
Legal Aspects in Health Informatics
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Security Best Practices for Health Information Exchange
Security Best Practices for Health Information ExchangeSecurity Best Practices for Health Information Exchange
Security Best Practices for Health Information Exchange
 
A12_Beyond_HIPAA_PPT1
A12_Beyond_HIPAA_PPT1A12_Beyond_HIPAA_PPT1
A12_Beyond_HIPAA_PPT1
 
HIPAA Enforcement Heats Up in the Coldest State
HIPAA Enforcement Heats Up in the Coldest StateHIPAA Enforcement Heats Up in the Coldest State
HIPAA Enforcement Heats Up in the Coldest State
 
Confidentiality: Effective Training for Healthcare Employees
Confidentiality: Effective Training for Healthcare EmployeesConfidentiality: Effective Training for Healthcare Employees
Confidentiality: Effective Training for Healthcare Employees
 
Priv&security&profin electrcommunicationsrev9 23
Priv&security&profin electrcommunicationsrev9 23Priv&security&profin electrcommunicationsrev9 23
Priv&security&profin electrcommunicationsrev9 23
 
EHLP - July 2015 pg 6-8
EHLP - July 2015 pg 6-8EHLP - July 2015 pg 6-8
EHLP - July 2015 pg 6-8
 

Similar to Power point project for submission.ppt

Implementing The Affordable Care Act Essay
Implementing The Affordable Care Act EssayImplementing The Affordable Care Act Essay
Implementing The Affordable Care Act Essay
Michelle Love
 
1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docx1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docx
teresehearn
 
Virtual Mentor American Medical Association Journal of Ethi.docx
Virtual Mentor  American Medical Association Journal of Ethi.docxVirtual Mentor  American Medical Association Journal of Ethi.docx
Virtual Mentor American Medical Association Journal of Ethi.docx
sheronlewthwaite
 
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boroEhr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
kayla_ann_30
 
Confidentiality Of Health Information Essays
Confidentiality Of Health Information EssaysConfidentiality Of Health Information Essays
Confidentiality Of Health Information Essays
Jessica Tanner
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
LeRoy Ulibarri
 
Privacy and security of information Consider this scenario.docx
Privacy and security of information Consider this scenario.docxPrivacy and security of information Consider this scenario.docx
Privacy and security of information Consider this scenario.docx
ChantellPantoja184
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcare
kmasterson
 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docx
wlynn1
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
karlhennesey
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
honey690131
 

Similar to Power point project for submission.ppt (20)

Implementing The Affordable Care Act Essay
Implementing The Affordable Care Act EssayImplementing The Affordable Care Act Essay
Implementing The Affordable Care Act Essay
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docx1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docx
 
Virtual Mentor American Medical Association Journal of Ethi.docx
Virtual Mentor  American Medical Association Journal of Ethi.docxVirtual Mentor  American Medical Association Journal of Ethi.docx
Virtual Mentor American Medical Association Journal of Ethi.docx
 
Patient Confidentiality wk1_dq2_mha690
Patient Confidentiality wk1_dq2_mha690Patient Confidentiality wk1_dq2_mha690
Patient Confidentiality wk1_dq2_mha690
 
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boroEhr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
 
Confidentiality Of Health Information Essays
Confidentiality Of Health Information EssaysConfidentiality Of Health Information Essays
Confidentiality Of Health Information Essays
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
Confidentiality training initiatives
Confidentiality training initiativesConfidentiality training initiatives
Confidentiality training initiatives
 
A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )
 
Confidentiality week 1 discussion 2 mha690 healthcare capstone
Confidentiality  week 1 discussion 2 mha690 healthcare capstoneConfidentiality  week 1 discussion 2 mha690 healthcare capstone
Confidentiality week 1 discussion 2 mha690 healthcare capstone
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Privacy and security of information Consider this scenario.docx
Privacy and security of information Consider this scenario.docxPrivacy and security of information Consider this scenario.docx
Privacy and security of information Consider this scenario.docx
 
Confidentiality ppt
Confidentiality pptConfidentiality ppt
Confidentiality ppt
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcare
 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docx
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
 

Recently uploaded

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
Matteo Carbone
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
lizamodels9
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 

Recently uploaded (20)

Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 

Power point project for submission.ppt

  • 1. Confidential Healthcare and HIPPAcracies Makena Lei Byers MHA 690 Dr. Hwang-Ji Lu November 14th 2013 November 14, 2013
  • 2. Why trainings in confidentiality are extremely important: "All professionals are prone to boundary transgressions; explicit training about and the maintenance of appropriate role balance will help to ensure high-functioning relationships and maximize the quality of patient care, resident education, faculty and resident satisfaction, and modeling of professional behavior to improve competencies as clinicians and educators."(Reitz, 2013) It is crucial that we inform ourselves and others on the HIPAA laws and regulations. Breach of contract, indiscretion, Informed consent, “Do no harm”, the threat of self-
  • 3. Why and how we must protect patient information When determining eligibility for certain services and providing needed and appropriate resources, human service agencies and education institutions often require that children and families share very private information about themselves. Laws and statutes are in place to protect the privacy of these individuals and to ensure that this information is released only when necessary."(California Univ., 2002) All employees must be made aware of the imperative
  • 4. The reasons for observing ethical behavior: "Most primary care training programs have a behavioral science professional on faculty. Despite more similarities than differences among the roles filled by behavioral health professionals within primary care medicine residencies, each professional guild has a distinct set of ethical principles." (Reitz, 2013) Patients have individual privacy rights. There may be multifarious ethical codes postulate at each hospital and every other health care facility. Overall, in omniscience, The law requires that we provide and bear the human rights of privacy to our patients.
  • 5. Training: Behaving Unethically is Punishable. Please inform others. “Among the threats to the four information security aspects: confidentiality, integrity, availability, and quality; confidentiality threats were identified as most serious, with one threat given an unacceptable level of High risk." (Henrickson, 2013) The Misconduct that occurred at UCLA in regards to the abusive speculation of private medical records, (some may have been those who were in the limelight with the media), must be carefully analyzed and born into retrospect as a greater lesson on what virtue is versus indelicate “MYOB” patterns which only afford abrasiveness, and are far from the
  • 6. Adopting a higher security system & Making all aware of the risks of technological escapades(!): “ Because of the creation and use of information online and the widespread use of the internet and Web 2.0 platforms, physicians and others are increasingly required to consider how best to protect patient interests and apply principles of professionalism to new settings" (Farnan, 2013) It then becomes vital that information which is privy to the patient and their honorable confidantes is never ever shared or speculated or…heaven forbid, stolen from any Health Care System
  • 7. Confidentiality "Confidentiality Risks in home are different from those in a more controlled environment, such as a hospital and electronic equipment located in private homes and commuting via internet is a more exposed unauthorized access. By implementing certain measures it has been possible to design a home based service which ensures the necessary level of information and security privacy." (Henrickson, 2013) Even when a facility is established out of a residence, confidentiality and security must be cardinal.
  • 8. In Conclusion: Safeguarding "The Health Information Trust Alliance (HITRUST) was born out of the belief that information security should be a core pillar of, rather than an obstacle to, the broad adoption of health information systems and exchanges. HITRUST, in collaboration with healthcare, business, technology and information security leaders, has established the Common Security Framework (CSF), a certifiable framework that can be used by any and all organizations that create, access, store, or exchange personal health and financial information. The CSF is an information security framework that harmonizes the requirements of existing standards and regulations, including federal (HIPAA, HITECH), third party (PCI, COBIT), and government (NIST, FTC). www.hitrustalliance.net." (Accretive Health, 2013) The law condones powerful training measures and heightened security systems. In this way, the law empowers patients, employees and Health Care Establishments by blocking or legally refining those who disregard the veritable conduction of safe and Top Quality Management.
  • 9. References Accretive Health, I. c. (3). Accretive Health Achieves Industry-Leading HITRUST Certification for Data Security and Protection of Private Patient Health Information. Business Wire (English). Aronovitz, L. G. (1999). Medicare: HCFA Needs to Better Protect Beneficiaries' Confidential Health Information: T-HEHS-99-172. GAO Reports, 1. California Univ., L. s. (2002). Confidentiality. A Center Quick Training Aid. Farnan, J. M., Sulmasy, L., Worster, B. K., Chaudhry, H. J., Rhyne, J. A., & Arora, V. M. (2013). Online Medical Professionalism: Patient and Public Relationships: Policy Statement From the American College of Physicians and the Federation of State Medical Boards. Annals Of Internal Medicine, 158(8)
  • 10. References (Continued) Henrickson, Eva. (2013) BMC Medical Informatics & Decision Making. 2013, Vol. 13 Issue 1, p1-13. 13p. 3 Charts. http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=90292245&site=edslive Reitz, Randall, St. Mary’s Family Medicine Residency, 2698 Patterson Road, Grand Junction, CO, US, 81506, reitz.randall@gmail.com Wolper, L.F. (2011). Health care administration: Managing organized delivery systems (5th ed.). Boston: Jones and Bartlett.