System Security & Patient Confidentiality General Lesson 1.

Slides:



Advertisements
Similar presentations
Protect Our Students Protect Ourselves
Advertisements

HIPAA Security.
WRSU Customer Service The Beauty of Change. Privacy and Confidentiality.
Privacy and Information Security Training ( ) VUMC Privacy Website
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
The Health Insurance Portability and Accountability Act - HIPAA
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
LMC WHAT IS HIPAA AND HOW TO COMPLY WITH IT? Health Insurance Portability and Accountability Act of 1996.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
NAU HIPAA Awareness Training
Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones.
Are you ready for HIPPO??? Welcome to HIPAA
HIPAA How can you maintain patient privacy and confidentiality? General Medicine LCCA.
PowerChart Basics Session 1 June Goal: To acquaint the user with the basics of PowerChart patient information security. Objective: 1.State the importance.
Chapter 6 Review Questions
FERPA: Family Educational Rights and Privacy Act.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
Practical Information Management
HIPAA PRIVACY AND SECURITY AWARENESS.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Next ETCH Confidentiality and HIPAA Annual Review What you need to know. The Privacy Rule 1.
Compliance Strategies for Records Management
HIPAA (health insurance portability and accountability act)
Group 3 Angela, Rachael, Misty, Kayelee, and Krysta.
Children’s Hospital Requirements for Remote Access.
Building a Privacy Foundation. Setting the Standard for Privacy Health Insurance Portability and Accountability Act (HIPAA) Patient Bill of Rights Federal.
Why Respect Privacy and Confidentiality? Access to Confidential Information (OP ) Protection and Security of Protected Health Information (OP.
Signing On General Lesson 2. Objectives Following completion of this lesson you will be able to:. Open the Meditech application. Sign on to Meditech.
HIPAA Pre-Clerkship Review Dr. Maryann Skrabal, Pharm.D., CDE.
FERPA Family Educational Rights and Privacy Act A Tutorial.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
ANNUAL COMPULSORY EDUCATION CONFIDENTIALITY. LEARNING OBJECTIVES Be able to define confidentiality Understand who is responsible for confidential information.
Working with HIT Systems
HIPAA LAWS.  Under the privacy rule, the patient must give consent to use his or her Protected Health Information.  Examples in which consent must be.
Changing Your Password General Lesson 3. Objectives Following completion of this lesson you will be able to:. Define how often a password must be changed.
Confidentiality Region 7 Education Service Center Head Start Copyright 2013 by Region 7 Education Service Center. This document may be reproduced for educational.
Prepared by The Office of the Registrar Youngstown State University February, 2009.
Atrezzo Provider Portal Inpatient Case Creation July 2015 INTEGRATED CARE MANAGEMENT AND QUALITY IMPROVEMENT 1.
C ONFIDENTIALITY Region 7 Education Service Center Head Start.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
HIPAA for Students Health Insurance Portability and Accountability Act.
New Hire HIPAA Orientation. HIPAA Overview HIPAA is an acronym that stands for the Health Insurance Portability and Accountability Act of HIPAA.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
THE UNIVERSITY OF VERMONT F E R P A Q U I Z Veronika Carter, Acting Registrar R.J. Sweeney, Assistant Registrar.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
The Health Insurance Portability and Accountability Act 
ISMS Information Security Management System
Protect Our Students Protect Ourselves
HIPAA Privacy and Security
WHAT IS HIPAA AND HOW TO COMPLY WITH IT?
HIPAA Privacy & Security
Protecting Client Confidentiality for Volunteers and Agency Staff
HIPAA Basic Training for Privacy and Information Security
WHAT IS HIPAA AND HOW TO COMPLY WITH IT?
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
Disability Services Agencies Briefing On HIPAA
Health Insurance Portability and Accountability Act
HIPAA Privacy & Security
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
The Health Insurance Portability and Accountability Act
Lesson 1: Introduction to HIPAA
Distributed medical databases
Lesson 3: Medical Records
Move this to online module slides 11-56
Presentation transcript:

System Security & Patient Confidentiality General Lesson 1

Objectives Following completion of this lesson you will be able to:. Define confidentiality. Identify types of data that must be kept confidential. State who has access to confidential patient information. List the ways in which the Meditech System protects both patients and system users.

Confidentiality Every hospital employee, attending physician, and contractor with access to patient-identifiable data has a responsibility to protect patient confidentiality. Safeguarding patient information applies to all forms of patient data – written documents, conversations, computer information and any other electronic forms such as faxes, s or pager messages.

You may view information on a “need to know” basis only. Hospital staff members who have access to patient data may not use the Meditech system to view information on any patients for which they do not have direct care responsibilities.

Employees must contact the Medical Records Department for authorized request to view his/her medical record Employees who currently are or have been patients in this facility and who have access to patient data must sign a release prior to using Meditech system to view their own medical information.

Unattended Computers Personal Computers (PCs) are available for authorized access throughout the hospital. Many of them are in areas that are accessible by patients and their visitors. You must not leave a computer display screen unattended with patient information in view.

Meditech Security While computer technology makes patient information available to a wide range of hospital associates, it also protects both the staff member and the patient through a number of security measures.

User Ids and Passwords Every Meditech user has a unique User ID and Password that identify him or her to the system. The Password protects you by ensuring that only you can enter an order or documentation with you User ID.

Audit Trials The Meditech System is audited regularly in order to insure that the system is being used appropriately. The audits confirm that you ID was used to review only the records of patients for whom you had direct care responsibility.

System “Time-outs” Be sure to always sign off of the Meditech system before you leave the computer in order to ensure that your work is saved and patient information is kept confidential. The Meditech system is designed to automatically sign off if it is left unattended for a prolonged period of time. Be aware that this could cause you to lose unsaved work.

Summary You have completed the lesson, System Security and Patient Confidentiality.. Everyone must protect patient confidentiality. Information that must be kept confidential includes computer information and any other electronic forms such as faxes, s or pager messages. You may only view information about patients for whom you have direct care responsibilities. You may not view your own records without permission. Dispose of confidential paper documents in containers marked for shredding. Audits are performed regularly.