SlideShare une entreprise Scribd logo
HIPAA and Confidentiality
December 19, 2013
Purpose
The purpose of this presentation is to
review the Health Insurance
Portability and Accountability Act and
its application to our organization.
Objectives


To understand the patient privacy laws



Understand your role in protecting and maintaining patient privacy



Protect patient health information (PHI)



Understand what information must be protected



Understand when it is necessary to access PHI
HIPAA Privacy Rule
The HIPAA Privacy Rule protects
health information held or
transmitted by a covered entity or its
business associate, whether
electronic, on paper, or oral.
Protected health information includes:
 Name
 Address
 Birth date
 Social security number
 Any information that can be
associated with a patient’s identity
including demographic information.
Protected Health Information Identifiers as
defined by HIPAA include:


Name

Geographic information



Address
Telephone number
Fax number

Certificate/license number
Vehicle identifiers and serial numbers
Device identifiers and serial numbers

Email address
Social security number
Account numbers

Finger and voice prints
Full-face photographs
Internet Protocol (IP) addresses

License number
Medical record number
Health plan beneficiary
Zip code

Dates directly related to an individualincluding birth date, admission,
discharge, death date












1.

2.
3.

Protected health information (PHI) is
information which relates to:
an individual’s past, present, or
future physical or mental health or
condition.
healthcare provided to an individual
past, present, or future payment for
the provision of healthcare for the
individual.
A medical record, a laboratory report,
or hospital bill is considered PHI
because it contains patient
information or other associated
information that can identify the
patient.
When to access PHI
Patients’ health information can be accessed if
needed:
 To provide continuity of patient care
 To provide information to further evaluate
patient care
 For charting or documentation purposes
HIPAA requires users to access the least
amount of information necessary to
perform their duties.
Ways to Protect PHI








Dispose of documents properly in shred
bins
Never discuss patient information where
it can be heard by others who do not
have a need to know the information
Speak to patients privately about health
issues or concerns
Ensure patient information cannot be
seen by others
The Final Rule and HITECH
The HIPAA Final Rule and Health
Information Technology for Economic
and Clinical Health (HITECH) protects
patient information from business
associates, contractors and
subcontractors that receive PHI. It
also protects when using social
medial or email.
Breach of HIPAA
There are penalties and fines associated
with HIPAA breach.
Any unlawful access, use, or disclosure
of a patient’s medical information
must be reported.
It is everyone’s responsibility to protect
PHI. Report any known or suspected
improper disclosures of Protected
Health Information.
References

Cascardo, D. (2013). The final rule: the final
omnibus HIPAA rules. The Journal of
Medical Practice Management: MPM. 28(6),
359-62. Retrieved from
http://search.proquest.com/docview/141284809
Health Information Privacy. Retrieved
December 18, 2013 from
www.hhs.gov/ocr/privacy/hipaa

Contenu connexe

Tendances

Hippa slide show
Hippa slide showHippa slide show
Hippa slide show
heathercool
 
Hipaa basics
Hipaa basicsHipaa basics
Hipaa basics
mlireton
 
HIPPA Compliance
HIPPA ComplianceHIPPA Compliance
HIPPA Compliance
dixibee
 
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingWeek 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
vrgill22
 

Tendances (19)

Abc hospital
Abc hospitalAbc hospital
Abc hospital
 
Hippa slide show
Hippa slide showHippa slide show
Hippa slide show
 
Hipaa basics
Hipaa basicsHipaa basics
Hipaa basics
 
Hippa laws
Hippa lawsHippa laws
Hippa laws
 
HIPPA Compliance
HIPPA ComplianceHIPPA Compliance
HIPPA Compliance
 
HIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of ComplianceHIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of Compliance
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Training
 
HIPAA Complaince
HIPAA ComplainceHIPAA Complaince
HIPAA Complaince
 
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingWeek 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
 
What is hipaa
What is hipaaWhat is hipaa
What is hipaa
 
Hipaa privacy rule
Hipaa privacy ruleHipaa privacy rule
Hipaa privacy rule
 
Mha 690 ppt hipaa for healthcare professionals
Mha 690 ppt hipaa for healthcare professionalsMha 690 ppt hipaa for healthcare professionals
Mha 690 ppt hipaa for healthcare professionals
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentation
 
HIPAA Compliance for Developers
HIPAA Compliance for DevelopersHIPAA Compliance for Developers
HIPAA Compliance for Developers
 
Joint Commission Inservice Hipaa
Joint Commission Inservice HipaaJoint Commission Inservice Hipaa
Joint Commission Inservice Hipaa
 
HIPAA for Dummies
HIPAA for DummiesHIPAA for Dummies
HIPAA for Dummies
 
Mha690 w1 d2
Mha690 w1 d2Mha690 w1 d2
Mha690 w1 d2
 
HIPAA and How it Applies to You
HIPAA and How it Applies to YouHIPAA and How it Applies to You
HIPAA and How it Applies to You
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Training
 

En vedette

Textual analysis american horror story
Textual analysis  american horror storyTextual analysis  american horror story
Textual analysis american horror story
courtney1998
 
Hong kong names
Hong kong namesHong kong names
Hong kong names
birahe2oo3
 
Poster Consumer Alert
Poster Consumer AlertPoster Consumer Alert
Poster Consumer Alert
Daniel Lowry
 

En vedette (20)

Таргетированная реклама Вконтакте.
Таргетированная реклама Вконтакте. Таргетированная реклама Вконтакте.
Таргетированная реклама Вконтакте.
 
sitNL 2015 algorithm programming made easy (Marcel de Bruin, Sander de Wildt)
sitNL 2015 algorithm programming made easy (Marcel de Bruin, Sander de Wildt)sitNL 2015 algorithm programming made easy (Marcel de Bruin, Sander de Wildt)
sitNL 2015 algorithm programming made easy (Marcel de Bruin, Sander de Wildt)
 
Panteó d'Agripa (Història de l'art)
Panteó d'Agripa (Història de l'art)Panteó d'Agripa (Història de l'art)
Panteó d'Agripa (Història de l'art)
 
Marry Christmas
Marry ChristmasMarry Christmas
Marry Christmas
 
Merry Christmas
Merry ChristmasMerry Christmas
Merry Christmas
 
Cara memasang visitor di blog atau website
Cara memasang visitor di blog atau websiteCara memasang visitor di blog atau website
Cara memasang visitor di blog atau website
 
Wozer Dance Resume
Wozer Dance Resume Wozer Dance Resume
Wozer Dance Resume
 
Christmasaryulai
ChristmasaryulaiChristmasaryulai
Christmasaryulai
 
Textual analysis american horror story
Textual analysis  american horror storyTextual analysis  american horror story
Textual analysis american horror story
 
Karta śiąteczna 4
Karta śiąteczna 4Karta śiąteczna 4
Karta śiąteczna 4
 
Merry Christmas
Merry ChristmasMerry Christmas
Merry Christmas
 
Hong kong names
Hong kong namesHong kong names
Hong kong names
 
Poster Consumer Alert
Poster Consumer AlertPoster Consumer Alert
Poster Consumer Alert
 
sitNL 2015 Lean Data Management (Frank Gundlich)
sitNL 2015 Lean Data Management (Frank Gundlich)sitNL 2015 Lean Data Management (Frank Gundlich)
sitNL 2015 Lean Data Management (Frank Gundlich)
 
Eva
EvaEva
Eva
 
Buku Pedoman MUI ttg Syiah 4
Buku  Pedoman MUI ttg Syiah 4Buku  Pedoman MUI ttg Syiah 4
Buku Pedoman MUI ttg Syiah 4
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Calida de vida
Calida de vidaCalida de vida
Calida de vida
 
2015 MOVE Agents Events organization toolkit
2015 MOVE Agents Events organization toolkit 2015 MOVE Agents Events organization toolkit
2015 MOVE Agents Events organization toolkit
 
Afogamento e choques eletricos
Afogamento e choques eletricosAfogamento e choques eletricos
Afogamento e choques eletricos
 

Similaire à Hippa and Confidentiality

HIPPA---Chantel Artis Spencer
HIPPA---Chantel Artis SpencerHIPPA---Chantel Artis Spencer
HIPPA---Chantel Artis Spencer
shay1234
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
Karna *
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)
bholmes
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion ii
beleza1669
 
Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)
bholmes
 

Similaire à Hippa and Confidentiality (20)

HIPAA Audio Presentation
HIPAA  Audio PresentationHIPAA  Audio Presentation
HIPAA Audio Presentation
 
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
 
HIPPA---Chantel Artis Spencer
HIPPA---Chantel Artis SpencerHIPPA---Chantel Artis Spencer
HIPPA---Chantel Artis Spencer
 
Hipaa training
Hipaa trainingHipaa training
Hipaa training
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
Health Insurance Portability & Accountability Act (HIPAA).pptx
Health Insurance Portability & Accountability Act (HIPAA).pptxHealth Insurance Portability & Accountability Act (HIPAA).pptx
Health Insurance Portability & Accountability Act (HIPAA).pptx
 
HIPAA Training - 2011
HIPAA Training - 2011HIPAA Training - 2011
HIPAA Training - 2011
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
Basic HIPAA Training by CMU
Basic HIPAA Training by CMUBasic HIPAA Training by CMU
Basic HIPAA Training by CMU
 
Patient confidentiality MHA 690
Patient confidentiality MHA 690Patient confidentiality MHA 690
Patient confidentiality MHA 690
 
Hipaa.uo a
Hipaa.uo aHipaa.uo a
Hipaa.uo a
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)
 
Protected health information
Protected health informationProtected health information
Protected health information
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion ii
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion ii
 
Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)
 
HIPAA
HIPAAHIPAA
HIPAA
 
Confidentiality-Arlicia- mha 690-discussion 2
Confidentiality-Arlicia- mha 690-discussion 2 Confidentiality-Arlicia- mha 690-discussion 2
Confidentiality-Arlicia- mha 690-discussion 2
 
MEDICAL ANSWERING SERVICE
MEDICAL ANSWERING SERVICE MEDICAL ANSWERING SERVICE
MEDICAL ANSWERING SERVICE
 
Hipaa inservice
Hipaa inserviceHipaa inservice
Hipaa inservice
 

Dernier

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Dernier (20)

Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 

Hippa and Confidentiality

  • 2. Purpose The purpose of this presentation is to review the Health Insurance Portability and Accountability Act and its application to our organization.
  • 3. Objectives  To understand the patient privacy laws  Understand your role in protecting and maintaining patient privacy  Protect patient health information (PHI)  Understand what information must be protected  Understand when it is necessary to access PHI
  • 4. HIPAA Privacy Rule The HIPAA Privacy Rule protects health information held or transmitted by a covered entity or its business associate, whether electronic, on paper, or oral.
  • 5. Protected health information includes:  Name  Address  Birth date  Social security number  Any information that can be associated with a patient’s identity including demographic information.
  • 6. Protected Health Information Identifiers as defined by HIPAA include:  Name Geographic information  Address Telephone number Fax number Certificate/license number Vehicle identifiers and serial numbers Device identifiers and serial numbers Email address Social security number Account numbers Finger and voice prints Full-face photographs Internet Protocol (IP) addresses License number Medical record number Health plan beneficiary Zip code Dates directly related to an individualincluding birth date, admission, discharge, death date         
  • 7.  1. 2. 3. Protected health information (PHI) is information which relates to: an individual’s past, present, or future physical or mental health or condition. healthcare provided to an individual past, present, or future payment for the provision of healthcare for the individual.
  • 8. A medical record, a laboratory report, or hospital bill is considered PHI because it contains patient information or other associated information that can identify the patient.
  • 9. When to access PHI Patients’ health information can be accessed if needed:  To provide continuity of patient care  To provide information to further evaluate patient care  For charting or documentation purposes HIPAA requires users to access the least amount of information necessary to perform their duties.
  • 10. Ways to Protect PHI     Dispose of documents properly in shred bins Never discuss patient information where it can be heard by others who do not have a need to know the information Speak to patients privately about health issues or concerns Ensure patient information cannot be seen by others
  • 11. The Final Rule and HITECH The HIPAA Final Rule and Health Information Technology for Economic and Clinical Health (HITECH) protects patient information from business associates, contractors and subcontractors that receive PHI. It also protects when using social medial or email.
  • 12. Breach of HIPAA There are penalties and fines associated with HIPAA breach. Any unlawful access, use, or disclosure of a patient’s medical information must be reported.
  • 13. It is everyone’s responsibility to protect PHI. Report any known or suspected improper disclosures of Protected Health Information.
  • 14. References Cascardo, D. (2013). The final rule: the final omnibus HIPAA rules. The Journal of Medical Practice Management: MPM. 28(6), 359-62. Retrieved from http://search.proquest.com/docview/141284809 Health Information Privacy. Retrieved December 18, 2013 from www.hhs.gov/ocr/privacy/hipaa