SlideShare una empresa de Scribd logo
1 de 17
• Welcome to the ITC training module for confidentiality
  awareness. This program will present a brief overview of
  ITC’s policies and the federal HIPAA regulations that
  deal with privacy and data security.

• ITC is committed to compliance with federal and state
  laws that protect the privacy of our consumers’ health
  information. There are federal and state laws and
  standards that pertain to any individual that enters a
  health care organization and may directly or indirectly
  impact the quality and safety of consumer care.
• Caregivers who will have access or potential access to
  consumers, health information, or other sensitive
  information are required to know how to handle and
  protect consumer privacy and data security.

• If you have any questions about privacy issues, please
  contact your ITC Supervisor.
• HIPAA is the acronym for the Health Insurance
  Portability and Accountability Act passed by Congress in
  1996.
• The purpose of HIPAA regulations is to establish
  national standards for safeguarding an individual’s
  privacy and their Protected Health Information (PHI).
• All ITC facilities, employees, and caregivers must comply
  with federal HIPAA regulations.
• HIPAA includes:
   – Privacy Rules that keep Protected Health Information
     (PHI) confidential, and provide penalties for
     individuals who fail to keep consumer information
     confidential.
   – Security Rules to ensure the confidentiality and
     integrity of all electronic Protected Health Information.
• There are also other federal and state laws that protect
  PHI and provide penalties for individuals who violate
  these laws.
• The HIPAA Privacy Rule gives consumers
  important rights over their Protected Health
  Information (PHI)
   – Maintain the consumer’s basic right to respect,
     dignity and privacy.
   – Never share any consumer sensitive information
     with anyone not associated with the consumer.
   – Never discuss consumer sensitive information in
     hallways, elevators or public spaces.
   – Never post consumer information anywhere in or
     out of the ITC office where it can be viewed by
     others.
   – Access the medical record only when necessary
     for the care of the consumer .
   – Comply with all HIPPA rules and regulations.
• Protected Health Information (PHI) is any health
  information created, received, transmitted, or maintained
  that:

   – Relates to part, present or future physical or mental health, the
     provision of health care, or payment for health care.
   – Identifies the consumer, or could reasonably be expected to
     identify the consumer.
• PHI includes all kinds of identifying
  information including:
   – Name: a consumer , relatives, employers,
     caregivers, etc.
   – Personal Data: date of birth, date of death,
     address, phone number, etc.
   – Numbers: Social Security number, medical
     record, account, telephone, passport, health
     insurance, etc.
   – Graphics: photographs, videos, radiographs,
     voice prints, fingerprints, etc.
   – A document does not have to include a
     consumer’s name to be considered PHI. It is
     considered PHI if it includes any information
     that can identify an individual.
• (PHI) comes in many forms:
   – Paper records of all types
       • Documents and forms
       • Labels on consumer care items
       • Photos and graphics
   – Electronic records
       • computer-based records
       • portable storage media
       • video recordings
   – Verbal/Oral communications
   – Observation
• Access to PHI is Limited to persons
  who:
   – Have a valid medical need for the
     information
   – Have a valid business need for the
     information
   – Are authorized to know the information


• There are multiple safeguards in
  place to limit access to PHI and
  confidential information.
   – Attempts to bypass these safeguards is a
     violation of HIPAA laws and ITC’s policies.
• The Professional Need to Know Rule limits
  use, disclosures and requests for PHI to the
  “professional need to know” to accomplish the task for
  which the information is needed.
• Some examples of privacy violations:

   – Accessing consumer information outside of
     your “professional need to know”
     activity, either from personal curiosity or for
     any other unauthorized purpose.
   – Removing an original or a copy of any
     Protected Health Information from an ITC
     office without authorization.
   – Selling or inappropriately giving consumer
     information to the news media.
• Some examples of privacy violations:

   – Discussing consumer information in a
     public area without taking reasonable
     precautions.
   – If in the course of your job duties you
     observe or overhear information about
     someone you know, you are responsible
     to keep the information confidential, and
     not share it with anyone.
   – PHI or confidential documents should
     never be discarded in the garbage. Place
     in a secure shred bin or use a shredder.
• Violating federal Privacy and Security Rules can result in
  personal liability, either civil or criminal sanctions,
  including fines, jail time or both.

• Violating some state privacy and security laws can result
  in personal liability, either civil or criminal sanctions,
  including fines, jail time or both
   – law allows consumers to seek damages as a result of
     privacy/security incidents.
   – law places liability directly on the individual who knowingly,
     willfully or negligently obtains discloses or uses medical
     information inappropriately.
• You are responsible for protecting your consumer or
  other sensitive information that you have access to,
  whether it is in a document, electronic, transmitted, or
  received.

• You are responsible for protecting consumers or other
  sensitive information that you may overhear or observe.
• Limit use, disclosure or requests for Protected Health
  Information (PHI) to the “minimum necessary” to get your
  work done.

• You are responsible for reporting a known or suspected
  privacy incident.
• A breach of privacy that is known to any caregiver is to
  be reported immediately.
• Some examples of situations that require reporting:
   – Anyone accessing or removing PHI without authorization.
   – A lost print job that you are unable to locate (containing PHI or
     sensitive Information)
   – Misdirected faxes
   – If you observe or overhear inappropriate disclosure of PHI.
   – A consumer who receives information about an unrelated
     consumer.
• Report known or possible privacy incidents to your
  immediate supervisor.

Más contenido relacionado

La actualidad más candente

Confidentiality and Data Protection
Confidentiality and Data ProtectionConfidentiality and Data Protection
Confidentiality and Data ProtectionEd Horowicz
 
Safeguarding Of Vulnerable Adults (At Risk)
Safeguarding Of Vulnerable Adults (At Risk)Safeguarding Of Vulnerable Adults (At Risk)
Safeguarding Of Vulnerable Adults (At Risk)neilleetraining
 
Legal issues in nursing practice
Legal  issues in nursing practiceLegal  issues in nursing practice
Legal issues in nursing practiceNursing Crusade
 
Safeguarding Adults at Risk from Scams: A collaborative approach
Safeguarding Adults at Risk from Scams: A collaborative approach Safeguarding Adults at Risk from Scams: A collaborative approach
Safeguarding Adults at Risk from Scams: A collaborative approach Professor Priscilla Harries
 
Legal issues in nursing
Legal issues in nursingLegal issues in nursing
Legal issues in nursingRuppaMercy
 
5. job management skills and self‐care
5. job management skills and self‐care5. job management skills and self‐care
5. job management skills and self‐careitchomecare
 
Protection of vulnerable adults presentation
Protection of vulnerable adults presentationProtection of vulnerable adults presentation
Protection of vulnerable adults presentationammz1
 
Legal System: Type of law, Torts and Liabilities
Legal System: Type of law, Torts and Liabilities Legal System: Type of law, Torts and Liabilities
Legal System: Type of law, Torts and Liabilities Ajeshkumar Tk
 
Legal issues in nursing ppt
Legal issues in nursing pptLegal issues in nursing ppt
Legal issues in nursing pptLinda Sapam
 

La actualidad más candente (10)

Confidentiality and Data Protection
Confidentiality and Data ProtectionConfidentiality and Data Protection
Confidentiality and Data Protection
 
Safeguarding Of Vulnerable Adults (At Risk)
Safeguarding Of Vulnerable Adults (At Risk)Safeguarding Of Vulnerable Adults (At Risk)
Safeguarding Of Vulnerable Adults (At Risk)
 
Legal issues in nursing practice
Legal  issues in nursing practiceLegal  issues in nursing practice
Legal issues in nursing practice
 
Safeguarding Adults at Risk from Scams: A collaborative approach
Safeguarding Adults at Risk from Scams: A collaborative approach Safeguarding Adults at Risk from Scams: A collaborative approach
Safeguarding Adults at Risk from Scams: A collaborative approach
 
Legal issues in nursing
Legal issues in nursingLegal issues in nursing
Legal issues in nursing
 
LEGAL & PROFESSIONAL ISSUES
LEGAL & PROFESSIONAL ISSUESLEGAL & PROFESSIONAL ISSUES
LEGAL & PROFESSIONAL ISSUES
 
5. job management skills and self‐care
5. job management skills and self‐care5. job management skills and self‐care
5. job management skills and self‐care
 
Protection of vulnerable adults presentation
Protection of vulnerable adults presentationProtection of vulnerable adults presentation
Protection of vulnerable adults presentation
 
Legal System: Type of law, Torts and Liabilities
Legal System: Type of law, Torts and Liabilities Legal System: Type of law, Torts and Liabilities
Legal System: Type of law, Torts and Liabilities
 
Legal issues in nursing ppt
Legal issues in nursing pptLegal issues in nursing ppt
Legal issues in nursing ppt
 

Destacado

Positive teaching techniques pt 1
Positive teaching techniques pt 1Positive teaching techniques pt 1
Positive teaching techniques pt 1itchomecare
 
Job management skills
Job management skillsJob management skills
Job management skillsitchomecare
 
Emergencys & safety
Emergencys & safetyEmergencys & safety
Emergencys & safetyitchomecare
 
Positive teaching techniques pt 2
Positive teaching techniques pt 2Positive teaching techniques pt 2
Positive teaching techniques pt 2itchomecare
 
Level 1 Fundamentals
Level 1 FundamentalsLevel 1 Fundamentals
Level 1 Fundamentalsitchomecare
 
Level 2 Developmental Disabilties
Level 2 Developmental DisabiltiesLevel 2 Developmental Disabilties
Level 2 Developmental Disabiltiesitchomecare
 
6. infection control
6. infection control6. infection control
6. infection controlitchomecare
 
2.knowledge of developmental disabilities
2.knowledge of developmental disabilities2.knowledge of developmental disabilities
2.knowledge of developmental disabilitiesitchomecare
 
7.incident reporting
7.incident reporting7.incident reporting
7.incident reportingitchomecare
 
Developmental disabilities skills
Developmental disabilities skillsDevelopmental disabilities skills
Developmental disabilities skillsitchomecare
 
Developmental disabilities competencies
Developmental disabilities competenciesDevelopmental disabilities competencies
Developmental disabilities competenciesitchomecare
 
1.working with people with developmental disabilities
1.working with people with developmental disabilities1.working with people with developmental disabilities
1.working with people with developmental disabilitiesitchomecare
 
2. ethical and legal issues
2. ethical and legal issues2. ethical and legal issues
2. ethical and legal issuesitchomecare
 

Destacado (20)

Positive teaching techniques pt 1
Positive teaching techniques pt 1Positive teaching techniques pt 1
Positive teaching techniques pt 1
 
Job management skills
Job management skillsJob management skills
Job management skills
 
Communication
CommunicationCommunication
Communication
 
Emergencys & safety
Emergencys & safetyEmergencys & safety
Emergencys & safety
 
Positive teaching techniques pt 2
Positive teaching techniques pt 2Positive teaching techniques pt 2
Positive teaching techniques pt 2
 
G tube training
G tube trainingG tube training
G tube training
 
Level 1 Fundamentals
Level 1 FundamentalsLevel 1 Fundamentals
Level 1 Fundamentals
 
Level 2 Developmental Disabilties
Level 2 Developmental DisabiltiesLevel 2 Developmental Disabilties
Level 2 Developmental Disabilties
 
Skills workbook
Skills workbookSkills workbook
Skills workbook
 
6. infection control
6. infection control6. infection control
6. infection control
 
2.knowledge of developmental disabilities
2.knowledge of developmental disabilities2.knowledge of developmental disabilities
2.knowledge of developmental disabilities
 
7.incident reporting
7.incident reporting7.incident reporting
7.incident reporting
 
Driving Safety
Driving SafetyDriving Safety
Driving Safety
 
Did you know #1
Did you know #1Did you know #1
Did you know #1
 
Abuse & neglect
Abuse & neglectAbuse & neglect
Abuse & neglect
 
ABA
ABAABA
ABA
 
Developmental disabilities skills
Developmental disabilities skillsDevelopmental disabilities skills
Developmental disabilities skills
 
Developmental disabilities competencies
Developmental disabilities competenciesDevelopmental disabilities competencies
Developmental disabilities competencies
 
1.working with people with developmental disabilities
1.working with people with developmental disabilities1.working with people with developmental disabilities
1.working with people with developmental disabilities
 
2. ethical and legal issues
2. ethical and legal issues2. ethical and legal issues
2. ethical and legal issues
 

Similar a Confidentiality Awareness

Hipaa training new_staff_december 2018 - compatibility mode
Hipaa training new_staff_december 2018  -  compatibility modeHipaa training new_staff_december 2018  -  compatibility mode
Hipaa training new_staff_december 2018 - compatibility moderobint2125
 
Are You HIPAA Safe?
Are You HIPAA Safe?Are You HIPAA Safe?
Are You HIPAA Safe?TriageLogic
 
Hipaa overview 073118
Hipaa overview 073118Hipaa overview 073118
Hipaa overview 073118robint2125
 
Hipaa basics.pp2
Hipaa basics.pp2Hipaa basics.pp2
Hipaa basics.pp2martykoepke
 
MHA690 confidentiality training
MHA690 confidentiality trainingMHA690 confidentiality training
MHA690 confidentiality trainingsdavis49
 
Health Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - KloudlearnHealth Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - KloudlearnKloudLearn
 
2018-HIPAA-Renewal-Training.pptx
2018-HIPAA-Renewal-Training.pptx2018-HIPAA-Renewal-Training.pptx
2018-HIPAA-Renewal-Training.pptxFariida Osman
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentialityJake Facer
 
HIPAA Rights Privacy and Enforcements RD.pptx
HIPAA Rights  Privacy and Enforcements RD.pptxHIPAA Rights  Privacy and Enforcements RD.pptx
HIPAA Rights Privacy and Enforcements RD.pptxRAJIV RANJAN DAS
 
How to avoid being caught out by HIPAA compliance?
How to avoid being caught out by HIPAA compliance?How to avoid being caught out by HIPAA compliance?
How to avoid being caught out by HIPAA compliance?Lepide USA Inc
 
2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research TrainingCynthia Holland
 
CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014 CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014 Jason Karn
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxamartya2087
 
Ruggiero.hipaa training
Ruggiero.hipaa trainingRuggiero.hipaa training
Ruggiero.hipaa trainingGina Ruggiero
 

Similar a Confidentiality Awareness (20)

Hipaa training new_staff_december 2018 - compatibility mode
Hipaa training new_staff_december 2018  -  compatibility modeHipaa training new_staff_december 2018  -  compatibility mode
Hipaa training new_staff_december 2018 - compatibility mode
 
Are You HIPAA Safe?
Are You HIPAA Safe?Are You HIPAA Safe?
Are You HIPAA Safe?
 
Hipaa overview 073118
Hipaa overview 073118Hipaa overview 073118
Hipaa overview 073118
 
Hipaa basics.pp2
Hipaa basics.pp2Hipaa basics.pp2
Hipaa basics.pp2
 
MHA690 confidentiality training
MHA690 confidentiality trainingMHA690 confidentiality training
MHA690 confidentiality training
 
Hippa training 2017
Hippa training 2017Hippa training 2017
Hippa training 2017
 
Health Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - KloudlearnHealth Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
 
2018-HIPAA-Renewal-Training.pptx
2018-HIPAA-Renewal-Training.pptx2018-HIPAA-Renewal-Training.pptx
2018-HIPAA-Renewal-Training.pptx
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
HIPAA Rights Privacy and Enforcements RD.pptx
HIPAA Rights  Privacy and Enforcements RD.pptxHIPAA Rights  Privacy and Enforcements RD.pptx
HIPAA Rights Privacy and Enforcements RD.pptx
 
How to avoid being caught out by HIPAA compliance?
How to avoid being caught out by HIPAA compliance?How to avoid being caught out by HIPAA compliance?
How to avoid being caught out by HIPAA compliance?
 
2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training
 
CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014 CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014
 
Hipaa 2012
Hipaa 2012Hipaa 2012
Hipaa 2012
 
Hipaa training
Hipaa trainingHipaa training
Hipaa training
 
UNA HIPAA Training 8-13
UNA HIPAA Training   8-13UNA HIPAA Training   8-13
UNA HIPAA Training 8-13
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
 
Ruggiero.hipaa training
Ruggiero.hipaa trainingRuggiero.hipaa training
Ruggiero.hipaa training
 
5 hipaa training
5 hipaa training5 hipaa training
5 hipaa training
 
Dustin HIPAA
Dustin HIPAADustin HIPAA
Dustin HIPAA
 

Más de itchomecare

Positive teaching techniques pt 2
Positive teaching techniques pt 2Positive teaching techniques pt 2
Positive teaching techniques pt 2itchomecare
 
Positive teaching techniques pt 2
Positive teaching techniques pt 2Positive teaching techniques pt 2
Positive teaching techniques pt 2itchomecare
 
9. home environment maintenance
9. home environment maintenance9. home environment maintenance
9. home environment maintenanceitchomecare
 
8. nutrition and food preparation
8. nutrition and food preparation8. nutrition and food preparation
8. nutrition and food preparationitchomecare
 
7. safety and emergencies
7. safety and emergencies7. safety and emergencies
7. safety and emergenciesitchomecare
 
4. communication and cultural competency
4. communication and cultural competency4. communication and cultural competency
4. communication and cultural competencyitchomecare
 
8.positive behavior supports
8.positive behavior supports8.positive behavior supports
8.positive behavior supportsitchomecare
 
3.abuse and neglect
3.abuse and neglect3.abuse and neglect
3.abuse and neglectitchomecare
 
Fundementals skills
Fundementals   skillsFundementals   skills
Fundementals skillsitchomecare
 

Más de itchomecare (11)

6.daily living
6.daily living6.daily living
6.daily living
 
Positive teaching techniques pt 2
Positive teaching techniques pt 2Positive teaching techniques pt 2
Positive teaching techniques pt 2
 
Positive teaching techniques pt 2
Positive teaching techniques pt 2Positive teaching techniques pt 2
Positive teaching techniques pt 2
 
9. home environment maintenance
9. home environment maintenance9. home environment maintenance
9. home environment maintenance
 
8. nutrition and food preparation
8. nutrition and food preparation8. nutrition and food preparation
8. nutrition and food preparation
 
7. safety and emergencies
7. safety and emergencies7. safety and emergencies
7. safety and emergencies
 
4. communication and cultural competency
4. communication and cultural competency4. communication and cultural competency
4. communication and cultural competency
 
8.positive behavior supports
8.positive behavior supports8.positive behavior supports
8.positive behavior supports
 
6.daily living
6.daily living6.daily living
6.daily living
 
3.abuse and neglect
3.abuse and neglect3.abuse and neglect
3.abuse and neglect
 
Fundementals skills
Fundementals   skillsFundementals   skills
Fundementals skills
 

Confidentiality Awareness

  • 1.
  • 2. • Welcome to the ITC training module for confidentiality awareness. This program will present a brief overview of ITC’s policies and the federal HIPAA regulations that deal with privacy and data security. • ITC is committed to compliance with federal and state laws that protect the privacy of our consumers’ health information. There are federal and state laws and standards that pertain to any individual that enters a health care organization and may directly or indirectly impact the quality and safety of consumer care.
  • 3. • Caregivers who will have access or potential access to consumers, health information, or other sensitive information are required to know how to handle and protect consumer privacy and data security. • If you have any questions about privacy issues, please contact your ITC Supervisor.
  • 4. • HIPAA is the acronym for the Health Insurance Portability and Accountability Act passed by Congress in 1996. • The purpose of HIPAA regulations is to establish national standards for safeguarding an individual’s privacy and their Protected Health Information (PHI). • All ITC facilities, employees, and caregivers must comply with federal HIPAA regulations.
  • 5. • HIPAA includes: – Privacy Rules that keep Protected Health Information (PHI) confidential, and provide penalties for individuals who fail to keep consumer information confidential. – Security Rules to ensure the confidentiality and integrity of all electronic Protected Health Information. • There are also other federal and state laws that protect PHI and provide penalties for individuals who violate these laws.
  • 6. • The HIPAA Privacy Rule gives consumers important rights over their Protected Health Information (PHI) – Maintain the consumer’s basic right to respect, dignity and privacy. – Never share any consumer sensitive information with anyone not associated with the consumer. – Never discuss consumer sensitive information in hallways, elevators or public spaces. – Never post consumer information anywhere in or out of the ITC office where it can be viewed by others. – Access the medical record only when necessary for the care of the consumer . – Comply with all HIPPA rules and regulations.
  • 7. • Protected Health Information (PHI) is any health information created, received, transmitted, or maintained that: – Relates to part, present or future physical or mental health, the provision of health care, or payment for health care. – Identifies the consumer, or could reasonably be expected to identify the consumer.
  • 8. • PHI includes all kinds of identifying information including: – Name: a consumer , relatives, employers, caregivers, etc. – Personal Data: date of birth, date of death, address, phone number, etc. – Numbers: Social Security number, medical record, account, telephone, passport, health insurance, etc. – Graphics: photographs, videos, radiographs, voice prints, fingerprints, etc. – A document does not have to include a consumer’s name to be considered PHI. It is considered PHI if it includes any information that can identify an individual.
  • 9. • (PHI) comes in many forms: – Paper records of all types • Documents and forms • Labels on consumer care items • Photos and graphics – Electronic records • computer-based records • portable storage media • video recordings – Verbal/Oral communications – Observation
  • 10. • Access to PHI is Limited to persons who: – Have a valid medical need for the information – Have a valid business need for the information – Are authorized to know the information • There are multiple safeguards in place to limit access to PHI and confidential information. – Attempts to bypass these safeguards is a violation of HIPAA laws and ITC’s policies.
  • 11. • The Professional Need to Know Rule limits use, disclosures and requests for PHI to the “professional need to know” to accomplish the task for which the information is needed.
  • 12. • Some examples of privacy violations: – Accessing consumer information outside of your “professional need to know” activity, either from personal curiosity or for any other unauthorized purpose. – Removing an original or a copy of any Protected Health Information from an ITC office without authorization. – Selling or inappropriately giving consumer information to the news media.
  • 13. • Some examples of privacy violations: – Discussing consumer information in a public area without taking reasonable precautions. – If in the course of your job duties you observe or overhear information about someone you know, you are responsible to keep the information confidential, and not share it with anyone. – PHI or confidential documents should never be discarded in the garbage. Place in a secure shred bin or use a shredder.
  • 14. • Violating federal Privacy and Security Rules can result in personal liability, either civil or criminal sanctions, including fines, jail time or both. • Violating some state privacy and security laws can result in personal liability, either civil or criminal sanctions, including fines, jail time or both – law allows consumers to seek damages as a result of privacy/security incidents. – law places liability directly on the individual who knowingly, willfully or negligently obtains discloses or uses medical information inappropriately.
  • 15. • You are responsible for protecting your consumer or other sensitive information that you have access to, whether it is in a document, electronic, transmitted, or received. • You are responsible for protecting consumers or other sensitive information that you may overhear or observe.
  • 16. • Limit use, disclosure or requests for Protected Health Information (PHI) to the “minimum necessary” to get your work done. • You are responsible for reporting a known or suspected privacy incident.
  • 17. • A breach of privacy that is known to any caregiver is to be reported immediately. • Some examples of situations that require reporting: – Anyone accessing or removing PHI without authorization. – A lost print job that you are unable to locate (containing PHI or sensitive Information) – Misdirected faxes – If you observe or overhear inappropriate disclosure of PHI. – A consumer who receives information about an unrelated consumer. • Report known or possible privacy incidents to your immediate supervisor.