Protecting Client Confidentiality for Volunteers and Agency Staff

Slides:



Advertisements
Similar presentations
Protect Our Students Protect Ourselves
Advertisements

HIPAA Security.
How to Log on & Log off of a Laptop and why it’s important.
Privacy and Information Security Training ( ) VUMC Privacy Website
System Security & Patient Confidentiality General Lesson 1.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
How to access AUXDATA March If you have not received a Username from your DSO-IS, do not go any further. Send a request to your FSO-IS/SO-IS asking.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Service Point 5 ReportWriter How to create and run reports in ReportWriter.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Computer Viruses.
Software How-To Using the HelpDesk Ticket System You can use the Helpdesk to request help from the technology department of your local district. This will.
Meditech Remote Access Training September 2011 Page 1.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
Electronic EDI e-EDI. The EDI has been in use since 1999 using a paper-based system and computerized spreadsheets to collect and manage EDI data. Over.
CSP Annual Security Training Miranda Gregory, CSP Analyst Carroll County Department of Citizen Services.
Welcome to the Second Tutorial Welcome to the second part of this communication system website tutorial! This tutorial is for church planters. When you.
IMC service provider bidding steps. Add your Username and Password as shown above.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
1.1 System Performance Security Module 1 Version 5.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
University Health Care Computer Systems Fellows, Residents, & Interns.
So – You want to learn how to put an article onto the state website. (Note: If you have not done so, you will need to review the web training provided.
Once all screens are completed in good order, you will be prompted to lock the application. Choose a signature method by checking the appropriate box on.
Confidentiality Region 7 Education Service Center Head Start Copyright 2013 by Region 7 Education Service Center. This document may be reproduced for educational.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
Testing Liaison Basic Training. Who can be a Testing Liaison? ONE RULE: INSTRUCTORS AND INSTRUCTIONAL AIDES CANNOT BE TESTING LIAISONS OR PROCTORS Typically,
SMART Tip Sheets Maryland February 2008 IGSR Technical Support: Client Referral Consent Referral Accepting Referrals This tip sheet focuses.
Adviser Panel. Go to All DD Track Advisers: Click “Advisor Login”
Product Training 1 JetFlash Software Application.
Taylor County Schools FERPA (Confidentiality) Training August 17, 2010.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
DHHS Open Window Office of Procurement & Contract Services Login & Set up Profile.
This tip sheet focuses on how to share client records and make client referrals using SMART. Total Pages: 6 Client Consent and Referral Consent Referral.
Service Point 5 ReportWriter How to run reports in ReportWriter.
CONTENT Introduction Objective Scope and methodologies Proposal chapters Proposed policies and recommendations Conclusion.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
How to complete and submit a Final Report through
Protect Our Students Protect Ourselves
What is Information Security?
HMIS Privacy and Security
Service Point 5 ReportWriter
Administrative Practices Outcome 1
Using iLocker.
Account Management Demonstration.
Student Monmouth College
Service Point 5 ReportWriter
Privacy of Client Data.
Business Risks of Insecure Networks
Bomgar Remote support software
Managing the IT Function
NForm 2.0 Training.
Move this to online module slides 11-56
IT for Students Need IT Help? Visit
2016 File Maker pro training for Summer program hiring
Security of People, Property and Information
Preparing for GDPR Sharing experiences of the process and using the British Canoeing Toolkit bit.ly/BCGDPRToolkit
Epic Introduction Basics
Student Introduction to CORE ELMS
Epic Introduction Basics
ASAP Connect Training Demo
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
CSS/Financial Aid PROFILE
Confidentiality, Privacy & Security Annual Training
Handout 4: Document distribution
New Tech Helpdesk
Express Contracting Producer Steps - EDC.
Unit 1.6 Systems security Lesson 1
Presentation transcript:

Protecting Client Confidentiality for Volunteers and Agency Staff 2-1-1 Orange County

Goals & Objectives To understand how the Consent to Share Protected Personal Information Form is used, and what it means. To learn how to protect client confidentiality. OCHMIS.org 2-1-1 Orange County

Consent to Share Protected Personal Information Form Consent to Share Protected Personal Information forms should be available for clients to sign when they complete an intake into your project. By signing a Consent to Share Protected Personal Information Form, the client is agreeing to share their Protected Personal Information (PPI) with other agencies participating in HMIS. Each agency is responsible for obtaining and storing consent forms for their clients. PPI should not be shared with agencies not participating in HMIS. The client has the right to receive services, even he/she refuses to sign the Consent to Share Protected Personal Information Form. The client has the right to revoke his/her consent by submitting a written request or by completing the Revocation of Consent Form. The client’s PPI is then no longer shared with other agencies in HMIS. OCHMIS.org 2-1-1 Orange County

Consent to Share Protected Personal Information Form Client needs to sign the form to be able to enter their data in HMIS and discuss their personal information. OCHMIS.org 2-1-1 Orange County

Protecting Client Confidentiality Clients’ Personal Information should be protected and confidential. It is the agency’s responsibility to ensure the following practices are implemented to protect client confidentiality. **READ SLIDE** OCHMIS.org 2-1-1 Orange County

How to Protect Client Confidentiality Install anti-virus and firewall protection on your computer. Agencies must maintain anti-virus software on all PC’s on their network. The anti-virus should automatically download updated virus definitions and take precautionary steps and prevent “adware” and “spyware”. Do not share your computer username and password. You should be required to enter a password when you first log into your computer. This password should not be shared. Do not send unencrypted data across a public network. This means any documents with client identifying information must be encrypted and password protected before being sent over email. No unencrypted PPI can ever be sent over email, including but not limited to clients’ first or last names, DOB, or SSN. Prevent unauthorized individuals from viewing data on your computer screen. The contents of your computer screen should not be visible to clients or visitors that may be at your agency. Do not leave computer screen unattended. You should lock your computer screen any time you leave your desk. You should also have a timed screen saver that requires a password for re-entry into your computer. **READ SLIDE** OCHMIS.org 2-1-1 Orange County

How to Protect Client Confidentiality Store client identifying information in a locked filing cabinet or office. If any documents with client identifying information/PPI have been printed, they should be kept locked in a cabinet or office. This includes any documents with any client PPI such as intake or exit forms, consent forms, identification materials, or other documents related to the client’s case. Shred printed copies of documents with client’s identifying information, if they are not going to be saved in a locked filing cabinet or office. This includes any reports with client PPI that have been printed. Do not discuss confidential information without consent from the client. **READ SLIDE** OCHMIS.org 2-1-1 Orange County

Questions All forms discussed in this training are available at OCHMIS.org under HMIS Help. To see a list of the agencies participating in HMIS, please click here. Please direct any questions to your HMIS Agency Administrator or Back-up Agency Administrator, and they can forward your question to the HMIS helpdesk. OCHMIS.org 2-1-1 Orange County