SlideShare una empresa de Scribd logo
1 de 10
Confidentiality
MHA690: Health Care Capstone
Ryan L. Ulibarri
9-26-2013
Report: Over 120 UCLA hospital staff saw celebrity health records (2008)
Introduction
Patient Confidentiality
Importance of Patient
Confidentiality
HIPAA
 Maintaining
Confidentiality
Display Actions
Conclusion
 In recent years, other
laws, especially the
Health Insurance
Portability and
Accountability Act
(HIPAA), have had
serious impact on the
administration of these
plans by, among other
things, implementing
privacy and related
requirements with
respect to personal
health information of
plan participants.
(Wolper 2011, p. 268)
Patient Confidentiality
 AMA's Code of Medical Ethics states that the information disclosed to a physician during the
course of the patient-physician relationship is confidential to the utmost degree.
 The legal basis for imposing liability for a breach of confidentiality is more extensive than
ethical guidelines, which dictate the morally right thing to do.
 This agreement allows the patient to feel free and easy no confidential medical information
will be disclosed or looked at without the patients express consent unless required to
disclose the information by law.
 A breach of confidentiality is a disclosure to a third party, without patient consent or court
order, of private information that the physician has learned within the patient-physician
relationship.
 Physicians should set up office procedures to prevent the release of medical records without
a copy of the patient's release.
 Do not release patients medical records to any 3rd parties in any case unless the patient has
the proper documents allowing to do that, this will can otherwise lead to breach of
confidentiality.
 Any breach in confidentiality—even one that seems minor—can result in mistrust and,
possibly, a lawsuit and/or disciplinary action.
Patient Confidentiality. (“n.d.”). Retrieved September 25, 2013, from http://www.ama-assn.org/ama/pub/physician-
resources/legal-topics/patient-physician-relationship-topics/patient-confidentiality.page
Importance of Confidentiality
Physicians have always had a duty to keep their
patients' medical records Confidential.
Physicians, Nurses, and office personal should
inform patients of the limits of confidentiality
protections and allow the patients to decide
whether treatment outweighs the risk of the
disclosure of sensitive information.
Protecting patients personal information needs to
be a mission to hospitals and all its staff to
provide the best patient experiences possible.
HIPAA
Health Insurance Portability and Accountability Act
Passed in 1996 by Congress
 The HIPAA Privacy regulations require health care providers and
organizations, as well as their business associates, develop and follow
procedures that ensure the confidentiality and security of protected
health information (PHI) when it is transferred, received, handled, or
shared.
 Mandates industry-wide standards for health care information on
electronic billing and other processes.
 Requires the protection and confidential handling of protected health
information.
 All personal who handles patient records of any kind need to be educated
on HIPPA compliances.
 HIPPA requirements are enforced by the Office for Civil Rights, an agency
within the US Department of Health and Human Services.
Health Insurance Portability and Accountability Act. (2013). Retrieved September 24, 2013, from
http://www.dhcs.ca.gov/formsandpubs/laws/hipaa/Pages/1.00%20WhatisHIPAA.aspx
Maintaining Confidentiality
Protection of Individually Identifiable Health Information (PHI)
 All information contained in patient medical and billing records is
confidential regardless of format; print, audio, electronic display or
storage.
 Hospitals need to inform patients of the current laws regarding Privacy
Practices.
 Violation of patient information and confidentiality standards, whether
intentional or unintentional, will be subject to disciplinary actions.
 All employees shall receive information and training concerning the
standards for Confidentiality of Patient Information and HIPAA in annual
mandatory education training.
 Healthcare organizations need to implement role-based access control
measures and processes for ensuring compliance measures within their
organizations to not allow medical records to be viewed by non authorized
personnel.
Maintaining Confidentiality
Continued
Safeguards
 Make sure you log off computer when leaving your area.
 Dispose paper in proper confidential bins to throw away.
 Position computer screens so patient information is not
visible to passerby
 Locate printers and fax machines in secure areas.
 Never take home patient information home unless it is
approved.
 Do not discuss a patients medical history to other
employees.
 A key thing to remember, patients need to feel confident
their medical records are confidential – ‘they trust you’.
Display Actions
 All personnel members need to trained on the Privacy and
Security Polices and Procedures to the level appropriate for
their job responsibilities and training must be documented.
 All new hires need to be provided training during their hiring
and orientation process.
 All employees need to sign a Confidentiality Agreement which
will be stored in their company Human Resource Department.
 All employees shall receive information and training
concerning the standards for Confidentiality of Patient
Information and HIPAA in annual mandatory education
training.
 All employees shall receive information and training
concerning the standards for Confidentiality of Patient
Information and HIPAA in annual mandatory education
training.
Conclusion
A breach of patient confidential information, whether
intentional or unintentional needs to be subject to
disciplinary actions. UCLA like so many health care
organizations have little real information on the number of
people within their organizations that have access to
electronic medical records, and even less information on
those who might have actually accessed those records.
This is a major problem and the case against UCLA
personnel in 2008 created organizations to implement
role-based access control measures and processes for
ensuring compliance to maintaining confidentiality of
patient information. As shared by Wolper (2011), “In
general, the Privacy Rule comprises five key principles: (1)
consumer control, (2) the setting of boundaries, (3)
accountability, (4) public responsibility, and (5) security’ (p.
390).
References
Health Insurance Portability and Accountability Act. (2013).
Retrieved September 24, 2013, from
http://www.dhcs.ca.gov/formsandpubs/laws/hipaa/Pages/1.00%
20WhatisHIPAA.aspx
Patient Confidentiality. (“n.d.”). Retrieved September 25, 2013,
from http://www.ama-assn.org/ama/pub/physician-
resources/legal-topics/patient-physician-relationship-
topics/patient-confidentiality.page
Wolper, L.F. (2011). Health care administration: Managing
organized delivery systems (5th ed.). Sudbury, MA: Jones and
Bartlett Publishers

Más contenido relacionado

La actualidad más candente

Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarcEtienne6
 
TaylorWk1d2assignment
TaylorWk1d2assignmentTaylorWk1d2assignment
TaylorWk1d2assignmentmya1743
 
susanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2ppsusanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2ppPrayerful
 
Hippa privacy and security awareness
Hippa privacy and security awarenessHippa privacy and security awareness
Hippa privacy and security awarenessCharles Taft
 
Employee confidentiality training
Employee confidentiality trainingEmployee confidentiality training
Employee confidentiality trainingJessi Morris
 
Patient confidentiality seminar
Patient confidentiality seminarPatient confidentiality seminar
Patient confidentiality seminarLakisha M. Moore
 
Keys To HIPAA Compliance
Keys To HIPAA ComplianceKeys To HIPAA Compliance
Keys To HIPAA ComplianceCBIZ, Inc.
 
HIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowHIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowCompliancy Group
 
HIPAA Training: Preventing Employees from Violating HIPAA
HIPAA Training: Preventing Employees from Violating HIPAAHIPAA Training: Preventing Employees from Violating HIPAA
HIPAA Training: Preventing Employees from Violating HIPAAjbhicks
 
Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)29535814851
 
Leading your HIPAA Compliance Culture in 2016
Leading your HIPAA Compliance Culture in 2016Leading your HIPAA Compliance Culture in 2016
Leading your HIPAA Compliance Culture in 2016Lance King
 
Mha 690 wk1 d2 confidentiality
Mha 690 wk1 d2 confidentialityMha 690 wk1 d2 confidentiality
Mha 690 wk1 d2 confidentialitysolifen2
 
HIPPA-Health Insurance Portability and Accountability Act
HIPPA-Health Insurance Portability and Accountability ActHIPPA-Health Insurance Portability and Accountability Act
HIPPA-Health Insurance Portability and Accountability ActHarshit Trivedi
 

La actualidad más candente (18)

Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentation
 
TaylorWk1d2assignment
TaylorWk1d2assignmentTaylorWk1d2assignment
TaylorWk1d2assignment
 
susanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2ppsusanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2pp
 
Hippa training 2017
Hippa training 2017Hippa training 2017
Hippa training 2017
 
Hippa privacy and security awareness
Hippa privacy and security awarenessHippa privacy and security awareness
Hippa privacy and security awareness
 
Hipaa
HipaaHipaa
Hipaa
 
Employee confidentiality training
Employee confidentiality trainingEmployee confidentiality training
Employee confidentiality training
 
Patient confidentiality seminar
Patient confidentiality seminarPatient confidentiality seminar
Patient confidentiality seminar
 
Keys To HIPAA Compliance
Keys To HIPAA ComplianceKeys To HIPAA Compliance
Keys To HIPAA Compliance
 
Hipaa
HipaaHipaa
Hipaa
 
HIPAA Audio Presentation
HIPAA  Audio PresentationHIPAA  Audio Presentation
HIPAA Audio Presentation
 
HIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowHIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to know
 
HIPAA Training: Preventing Employees from Violating HIPAA
HIPAA Training: Preventing Employees from Violating HIPAAHIPAA Training: Preventing Employees from Violating HIPAA
HIPAA Training: Preventing Employees from Violating HIPAA
 
Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2
 
HIPAA
HIPAAHIPAA
HIPAA
 
Leading your HIPAA Compliance Culture in 2016
Leading your HIPAA Compliance Culture in 2016Leading your HIPAA Compliance Culture in 2016
Leading your HIPAA Compliance Culture in 2016
 
Mha 690 wk1 d2 confidentiality
Mha 690 wk1 d2 confidentialityMha 690 wk1 d2 confidentiality
Mha 690 wk1 d2 confidentiality
 
HIPPA-Health Insurance Portability and Accountability Act
HIPPA-Health Insurance Portability and Accountability ActHIPPA-Health Insurance Portability and Accountability Act
HIPPA-Health Insurance Portability and Accountability Act
 

Destacado

Week 1 discussion on confidentiality
Week 1 discussion on confidentialityWeek 1 discussion on confidentiality
Week 1 discussion on confidentialitytjefferson81
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
CONFIDENTIALITY Week 1 discussion 2 presentation mha 690
CONFIDENTIALITY Week 1 discussion 2 presentation mha 690CONFIDENTIALITY Week 1 discussion 2 presentation mha 690
CONFIDENTIALITY Week 1 discussion 2 presentation mha 690Ricardo Rios
 
Patient Confidentiality
Patient ConfidentialityPatient Confidentiality
Patient ConfidentialityMike1fla
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02stanbridge
 
Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...
Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...
Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...Rennessa Jackson
 

Destacado (8)

Week 1 discussion on confidentiality
Week 1 discussion on confidentialityWeek 1 discussion on confidentiality
Week 1 discussion on confidentiality
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
CONFIDENTIALITY Week 1 discussion 2 presentation mha 690
CONFIDENTIALITY Week 1 discussion 2 presentation mha 690CONFIDENTIALITY Week 1 discussion 2 presentation mha 690
CONFIDENTIALITY Week 1 discussion 2 presentation mha 690
 
Patient Confidentiality
Patient ConfidentialityPatient Confidentiality
Patient Confidentiality
 
Ageand sports
Ageand sportsAgeand sports
Ageand sports
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02
 
Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...
Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...
Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...
 

Similar a Mha690 health care capstone - confidentiality 9-26-2013

The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentialityswilson0050
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacykendale
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacykendale
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippamaggie_Platt
 
MHA 690 week 2 discussin
MHA 690 week 2 discussinMHA 690 week 2 discussin
MHA 690 week 2 discussinBrooke A Thomas
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion iibeleza1669
 
Protected health information
Protected health informationProtected health information
Protected health informationmiszkeeta
 
Healthcare Confidentiality
Healthcare ConfidentialityHealthcare Confidentiality
Healthcare Confidentialityljbroshious
 
Patient’s confidentiality
Patient’s confidentialityPatient’s confidentiality
Patient’s confidentialityDarkfawn
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxamartya2087
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informaticskmcanty
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcherEmed32
 
HIPAA and RHIOs
HIPAA and RHIOsHIPAA and RHIOs
HIPAA and RHIOsnobumoto
 

Similar a Mha690 health care capstone - confidentiality 9-26-2013 (20)

The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentiality
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacy
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacy
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
MHA 690 week 2 discussin
MHA 690 week 2 discussinMHA 690 week 2 discussin
MHA 690 week 2 discussin
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion ii
 
Protected health information
Protected health informationProtected health information
Protected health information
 
Healthcare Confidentiality
Healthcare ConfidentialityHealthcare Confidentiality
Healthcare Confidentiality
 
Patient’s confidentiality
Patient’s confidentialityPatient’s confidentiality
Patient’s confidentiality
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
DVHIMSS Ensuring Privacy and Security of HIEs in PA
DVHIMSS Ensuring Privacy and Security of HIEs in PADVHIMSS Ensuring Privacy and Security of HIEs in PA
DVHIMSS Ensuring Privacy and Security of HIEs in PA
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Hipaa
HipaaHipaa
Hipaa
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informatics
 
HIPAA Presentation
HIPAA PresentationHIPAA Presentation
HIPAA Presentation
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcher
 
HIPAA and RHIOs
HIPAA and RHIOsHIPAA and RHIOs
HIPAA and RHIOs
 

Último

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Último (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Mha690 health care capstone - confidentiality 9-26-2013

  • 1. Confidentiality MHA690: Health Care Capstone Ryan L. Ulibarri 9-26-2013 Report: Over 120 UCLA hospital staff saw celebrity health records (2008)
  • 2. Introduction Patient Confidentiality Importance of Patient Confidentiality HIPAA  Maintaining Confidentiality Display Actions Conclusion  In recent years, other laws, especially the Health Insurance Portability and Accountability Act (HIPAA), have had serious impact on the administration of these plans by, among other things, implementing privacy and related requirements with respect to personal health information of plan participants. (Wolper 2011, p. 268)
  • 3. Patient Confidentiality  AMA's Code of Medical Ethics states that the information disclosed to a physician during the course of the patient-physician relationship is confidential to the utmost degree.  The legal basis for imposing liability for a breach of confidentiality is more extensive than ethical guidelines, which dictate the morally right thing to do.  This agreement allows the patient to feel free and easy no confidential medical information will be disclosed or looked at without the patients express consent unless required to disclose the information by law.  A breach of confidentiality is a disclosure to a third party, without patient consent or court order, of private information that the physician has learned within the patient-physician relationship.  Physicians should set up office procedures to prevent the release of medical records without a copy of the patient's release.  Do not release patients medical records to any 3rd parties in any case unless the patient has the proper documents allowing to do that, this will can otherwise lead to breach of confidentiality.  Any breach in confidentiality—even one that seems minor—can result in mistrust and, possibly, a lawsuit and/or disciplinary action. Patient Confidentiality. (“n.d.”). Retrieved September 25, 2013, from http://www.ama-assn.org/ama/pub/physician- resources/legal-topics/patient-physician-relationship-topics/patient-confidentiality.page
  • 4. Importance of Confidentiality Physicians have always had a duty to keep their patients' medical records Confidential. Physicians, Nurses, and office personal should inform patients of the limits of confidentiality protections and allow the patients to decide whether treatment outweighs the risk of the disclosure of sensitive information. Protecting patients personal information needs to be a mission to hospitals and all its staff to provide the best patient experiences possible.
  • 5. HIPAA Health Insurance Portability and Accountability Act Passed in 1996 by Congress  The HIPAA Privacy regulations require health care providers and organizations, as well as their business associates, develop and follow procedures that ensure the confidentiality and security of protected health information (PHI) when it is transferred, received, handled, or shared.  Mandates industry-wide standards for health care information on electronic billing and other processes.  Requires the protection and confidential handling of protected health information.  All personal who handles patient records of any kind need to be educated on HIPPA compliances.  HIPPA requirements are enforced by the Office for Civil Rights, an agency within the US Department of Health and Human Services. Health Insurance Portability and Accountability Act. (2013). Retrieved September 24, 2013, from http://www.dhcs.ca.gov/formsandpubs/laws/hipaa/Pages/1.00%20WhatisHIPAA.aspx
  • 6. Maintaining Confidentiality Protection of Individually Identifiable Health Information (PHI)  All information contained in patient medical and billing records is confidential regardless of format; print, audio, electronic display or storage.  Hospitals need to inform patients of the current laws regarding Privacy Practices.  Violation of patient information and confidentiality standards, whether intentional or unintentional, will be subject to disciplinary actions.  All employees shall receive information and training concerning the standards for Confidentiality of Patient Information and HIPAA in annual mandatory education training.  Healthcare organizations need to implement role-based access control measures and processes for ensuring compliance measures within their organizations to not allow medical records to be viewed by non authorized personnel.
  • 7. Maintaining Confidentiality Continued Safeguards  Make sure you log off computer when leaving your area.  Dispose paper in proper confidential bins to throw away.  Position computer screens so patient information is not visible to passerby  Locate printers and fax machines in secure areas.  Never take home patient information home unless it is approved.  Do not discuss a patients medical history to other employees.  A key thing to remember, patients need to feel confident their medical records are confidential – ‘they trust you’.
  • 8. Display Actions  All personnel members need to trained on the Privacy and Security Polices and Procedures to the level appropriate for their job responsibilities and training must be documented.  All new hires need to be provided training during their hiring and orientation process.  All employees need to sign a Confidentiality Agreement which will be stored in their company Human Resource Department.  All employees shall receive information and training concerning the standards for Confidentiality of Patient Information and HIPAA in annual mandatory education training.  All employees shall receive information and training concerning the standards for Confidentiality of Patient Information and HIPAA in annual mandatory education training.
  • 9. Conclusion A breach of patient confidential information, whether intentional or unintentional needs to be subject to disciplinary actions. UCLA like so many health care organizations have little real information on the number of people within their organizations that have access to electronic medical records, and even less information on those who might have actually accessed those records. This is a major problem and the case against UCLA personnel in 2008 created organizations to implement role-based access control measures and processes for ensuring compliance to maintaining confidentiality of patient information. As shared by Wolper (2011), “In general, the Privacy Rule comprises five key principles: (1) consumer control, (2) the setting of boundaries, (3) accountability, (4) public responsibility, and (5) security’ (p. 390).
  • 10. References Health Insurance Portability and Accountability Act. (2013). Retrieved September 24, 2013, from http://www.dhcs.ca.gov/formsandpubs/laws/hipaa/Pages/1.00% 20WhatisHIPAA.aspx Patient Confidentiality. (“n.d.”). Retrieved September 25, 2013, from http://www.ama-assn.org/ama/pub/physician- resources/legal-topics/patient-physician-relationship- topics/patient-confidentiality.page Wolper, L.F. (2011). Health care administration: Managing organized delivery systems (5th ed.). Sudbury, MA: Jones and Bartlett Publishers

Notas del editor

  1. Draft (only two rounds with one pick in each round per team) is the exclusive process for players to enter the league .Includes all emerging players, including international stars Drafted players who have exhausted their collegiate eligibility are reserved one year by the teams that drafted them .If a player sits out and enters the draft again, the player is reserved one year by the team that drafted him in this subsequent draft. If not drafted, a player is an unrestricted free agent.