Confidentiality power point
-
Upload
doug-miller -
Category
Business
-
view
225 -
download
0
description
Transcript of Confidentiality power point
Confidential Healthcare and HIPPAcracies
Makena Lei Byers
MHA 690
Dr. Hwang-Ji Lu
November 14th 2013November 14, 2013
In Conclusion: Safeguarding
"The Health Information Trust Alliance (HITRUST) was born out of the belief that information security should be a core pillar of, rather than an obstacle to, the broad adoption of health information systems and exchanges. HITRUST, in collaboration with healthcare, business, technology and information security leaders, has established the Common Security Framework (CSF), a certifiable framework that can be used by any and all organizations that create, access, store, or exchange personal health and financial information. The CSF is an information security framework that harmonizes the requirements of existing standards and regulations, including federal (HIPAA, HITECH), third party (PCI, COBIT), and government (NIST, FTC). www.hitrustalliance.net." (Accretive Health, 2013)
The law condones powerful training measures and heightened security systems. In this way, the law empowers patients, employees and Health Care Establishments by blocking or legally refining those who disregard the veritable conduction of safe and Top Quality Management.
Why trainings in confidentiality are extremely important: "All professionals are prone to boundary transgressions; explicit training about and the maintenance of appropriate role balance will help to ensure high-functioning relationships and maximize the quality of patient care, resident education, faculty and resident satisfaction, and modeling of professional behavior to improve competencies as clinicians and educators."(Reitz, 2013)
It is crucial that we inform ourselves and others on the HIPAA laws and regulations. Breach of contract, indiscretion, Informed consent, “Do no harm”, the threat of self-destruction are just a few of the great understandings which we must take into account.
Why and how we must protect patient information
When determining eligibility for certain services and providing needed and appropriate resources, human service agencies and education institutions often require that children and families share very private information about themselves. Laws and statutes are in place to protect the privacy of these individuals and to ensure that this information is released only when necessary."(California Univ., 2002)
All employees must be made aware of the imperative significance of safeguarding every patient’s confidential material.
The reasons for observing ethical behavior:"Most primary care training programs have a behavioral science professional on faculty. Despite more similarities than differences among the roles filled by behavioral health professionals within primary care medicine residencies, each professional guild has a distinct set of ethical principles." (Reitz, 2013)
Patients have individual privacy rights. There may be multifarious ethical codes postulate at each hospital and every other health care facility. Overall, in omniscience, The law requires that we provide and bear the human rights of privacy to our patients.
Training: Behaving Unethically is Punishable. Please inform others.“Among the threats to the four information security aspects: confidentiality, integrity, availability, and quality; confidentiality threats were identified as most serious, with one threat given an unacceptable level of High risk." (Henrickson, 2013)
The Misconduct that occurred at UCLA in regards to the abusive speculation of private medical records, (some may have been those who were in the limelight with the media), must be carefully analyzed and born into retrospect as a greater lesson on what virtue is versus indelicate “MYOB” patterns which only afford abrasiveness, and are far from the vicinities of healing.
Adopting a higher security system &Making all aware of the risks of technological escapades(!):“
Because of the creation and use of information online and the widespread use of the internet and Web 2.0 platforms, physicians and others are increasingly required to consider how best to protect patient interests and apply principles of professionalism to new settings" (Farnan, 2013)
It then becomes vital that information which is privy to the patient and their honorable confidantes is never ever shared or speculated or…heaven forbid, stolen from any Health Care System
Confidentiality
"Confidentiality Risks in home are different from those in a more controlled environment, such as a hospital and electronic equipment located in private homes and commuting via internet is a more exposed unauthorized access. By implementing certain measures it has been possible to design a home based service which ensures the necessary level of information and security privacy." (Henrickson, 2013)
Even when a facility is established out of a residence, confidentiality and security must be cardinal.
In Conclusion: Safeguarding
"The Health Information Trust Alliance (HITRUST) was born out of the belief that information security should be a core pillar of, rather than an obstacle to, the broad adoption of health information systems and exchanges. HITRUST, in collaboration with healthcare, business, technology and information security leaders, has established the Common Security Framework (CSF), a certifiable framework that can be used by any and all organizations that create, access, store, or exchange personal health and financial information. The CSF is an information security framework that harmonizes the requirements of existing standards and regulations, including federal (HIPAA, HITECH), third party (PCI, COBIT), and government (NIST, FTC). www.hitrustalliance.net." (Accretive Health, 2013)
The law condones powerful training measures and heightened security systems. In this way, the law empowers patients, employees and Health Care Establishments by blocking or legally refining those who disregard the veritable conduction of safe and Top Quality Management.
References
Accretive Health, I. c. (3). Accretive Health Achieves Industry-Leading HITRUST Certification for Data Security and Protection of Private Patient Health Information. Business Wire (English).
Aronovitz, L. G. (1999). Medicare: HCFA Needs to Better Protect Beneficiaries' Confidential Health Information: T-HEHS-99-172. GAO Reports, 1.
California Univ., L. s. (2002). Confidentiality. A Center Quick Training Aid.
Farnan, J. M., Sulmasy, L., Worster, B. K., Chaudhry, H. J., Rhyne, J. A., & Arora, V. M. (2013). Online Medical Professionalism: Patient and Public Relationships: Policy Statement From the American College of Physicians and the Federation of State Medical Boards. Annals Of Internal Medicine, 158(8)
Henrickson, Eva. (2013) BMC Medical Informatics & Decision Making. 2013, Vol. 13 Issue 1, p1-13. 13p. 3 Charts.
http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=90292245&site=eds-liveReitz, Randall, St. Mary’s Family Medicine Residency, 2698 Patterson Road, Grand Junction, CO, US, 81506, [email protected]
Wolper, L.F. (2011). Health care administration: Managing organized delivery systems (5th ed.). Boston: Jones and Bartlett.
References (Continued)