Table of Contents  Protect patients and their personal health information  Became law in 1996.

Slides:



Advertisements
Similar presentations
Protect Our Students Protect Ourselves
Advertisements

Patient Rights and Confidentiality. Inform Patient of their Rights  Upon admissions  Written information available in English and Spanish  Non-English.
Privacy and Information Security Training ( ) VUMC Privacy Website
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
WORKFORCE CONFIDENTIALITY HIPAA Reminders. HIPAA 101 The Health Insurance Portability and Accountability Act (HIPAA) protects patient privacy. HIPAA is.
HIPAA Health Insurance Portability and Accountability Act.
HIPAA 101 Education. WHAT IS HIPAA??? WHAT IS HIPAA? The Health Insurance Portability and Accountability Act The Health Insurance Portability and Accountability.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
NAU HIPAA Awareness Training
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones.
HIPAA How can you maintain patient privacy and confidentiality? General Medicine LCCA.
HIPAA Training Presentation for New Employees How did we get here? HIPAA Police 1.
CCHAP Practice Manager’s Meeting HIPAA Guidelines and Updates for Primary Care Practices Thursday October 24 th 2013 Noon – 1:00PM Instructions to join.
Health Insurance Portability and Accountability Act (HIPAA)
15 The Health Record.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
An expert system is a package that holds a body of knowledge and a set of rules on a subject that has been gained from human experts. An expert system.
Have You Read Your Medical Record? Peggy Beck, RHIA, CMT, FAAMT.
Electronic Health Records
HIPAA Privacy & Security EVMS Health Services 2004 Training.
Protecting Sensitive Information PA Turnpike Commission.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Telemedicine in Medicine BT03.03  Definition: “The use of computers, the Internet, and other communication technologies to provide medical care to patients.
 Definition: “The use of computers, the Internet, and other communication technologies to provide medical care to patients at a distance.”  Forms: 
Protected Health Information (PHI). Privileged Communication An exchange of information between two individuals in a confidential relationship. (Examples:
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
HIPAA Privacy & Security Kay Carolin Barbara Ann Karmanos Cancer Center March 2009.
FERPA Ramapo Style Everything You Wanted to Know But Were Afraid To Ask… And Shouldn’t Tell!
Next ETCH Confidentiality and HIPAA Annual Review What you need to know. The Privacy Rule 1.
Privacy and Information Management ICT Guidelines.
HIPAA (health insurance portability and accountability act)
University Health Care Computer Systems Fellows, Residents, & Interns.
Children’s Hospital Requirements for Remote Access.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 2 The HIPAA Privacy Standards HIPAA for Allied Health Careers.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
 The use of telecommunications technology to provide, enhance, or expedite health care services.  Accessing off-site databases, linking clinics or physicians'
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 7 Medical Records and Informed Consent.
Health Informatics Employability Skills. Goals: Apply prior knowledge of Career Pathways. Discuss levels of education, credentialing requirements, and.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
Technology in Medicine
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
The Medical Record, Documentation, and Filing
Health Insurance Portability and Accountability Act (HIPAA) © 2013 Project Lead The Way, Inc.Principles of Biomedical Science.
What is HIPAA? Health Insurance Portability and Accountability Act of HIPAA is a major law primarily concentrating on the prolongation of health.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. Privileged Communication Go Go 3. Medical Records Go Go 4. Technology Go Go.
HIPAA Privacy What Every Staff Member Needs to Know.
MEDICAL RECORDS MANAGEMENT.  Dr. owns the medical record  TRADITIONAL MEDICAL RECORD- Addresses all problems all at once.  PROBLEM ORIENTED RECORD-
© 2016 McGraw-Hill Education. All rights reserved. Ch 7 Medical Records and Informed Consent.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
CONFIDENTIALITY AND HIPAA LEGAL AND ETHICAL. HIPPOCRATIC OATH = CONFIDENTIALITY “And whatsoever I shall see or hear in the course of my profession, as.
Health Insurance Portability and Accountability Act
Presented by: Ambulatory Education and Systems
Privacy & Confidentiality
HIPAA Online Student Orientation
You Are The Specialist Designed by: Kelly Stortz, Norma Oxford and Stephanie Hudson.
Chapter 6—Medical Records and Informed Consent
Privacy and Security.
Health Insurance Portability and Accountability Act
CONTRACTS PRIVILEGED COMMUNICATION PRIVACY ACT
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Lesson 3: Medical Records
CONTRACTS PRIVILEGED COMMUNICATION PRIVACY ACT
Technology in Medicine
Health Insurance Portability and Accountability Act
The Health Insurance Portability and Accountability Act
Presentation transcript:

Table of Contents  Protect patients and their personal health information  Became law in 1996

Table of Contents  Personal information, such as full name, phone number, address, work number and address, birth date, social security number, and marital status  Medical history  Description of symptoms  Diagnoses  Treatments  Prescriptions and refills  Records of patient’s telephone calls  Name of legal guardian  Name of power of attorney  Notes about copies of medical records

Table of Contents  Medical records belong to health care providers, but patients have the right to see and obtain a copy of their records.  Patients with mental illness may not have the right to see their medical records.  If a patient’s employer or prospective employer pays for a job-related physical examination, the employer, not the patient, has the right to see and obtain a copy of the records.

Table of Contents  Medical records must be complete, legible, and timely.  All information in records must be objective and the information must be initialed and dated.  Errors should never be erased or covered with correction fluid. Instead, a single line should be drawn through an error so that the error is still readable.

Table of Contents  Advantages: ▫Instant access ▫Remote access to up-to- date information ▫Simultaneous access ▫Decreased time to record information ▫Legible ▫Better organization ▫Flexible data layout ▫Automated checks and reminders ▫Increased privacy and decreased tampering, destruction, and loss due to required authorization

Table of Contents  Disadvantages: ▫Additional hardware, software, and licensing costs ▫Resistance to giving up paper records ▫Difficult data entry ▫Training ▫Computer downtime, such as unexpected failure or routine servicing ▫Confidentiality and security concerns, such access of information to unauthorized individuals

Table of Contents  Limit individuals who have access to records by using passwords, fingerprints, voice recognition, and eye patterns.  Require codes to access specific information.  Place monitors in areas where others cannot see the screen.  Do not leave monitors unattended while confidential information is on the screen.  Do not send confidential information by .  Back up data.  Constantly monitor and evaluate the use of electronic medical records.

Table of Contents  Printers: ▫Do not leave printers unattended while printing confidential information. ▫Do not print confidential information on printers that are shared by unauthorized individuals. ▫Do not print confidential information on wrong printers. ▫Make sure to collect printouts of confidential information from printers. ▫Do not throw unneeded printouts of confidential information in trash cans. Instead, these should be shredded.

Table of Contents  Copiers: ▫Do not copy confidential information if unauthorized individuals are in the area and can see the information. ▫Do not leave copiers unattended while copying confidential information. ▫If a paper jam occurs, be sure to remove the copies that caused the jam from the copier. ▫Make sure to collect all copies of confidential information as well as the original from the copier. ▫Do not throw unneeded copies of confidential information in trash cans. Instead, these should be shredded.

Table of Contents  Telephones: ▫Do not use patients’ names if unauthorized individuals are in the area and can overhear. ▫When leaving messages, simply ask patients to return the call. Do not speak about any confidential information.