Confidentiality power point

11
Confidential Healthcare and HIPPAcracies Makena Lei Byers MHA 690 Dr. Hwang-Ji Lu November 14 th 2013 November 14, 2013

description

 

Transcript of Confidentiality power point

Page 1: Confidentiality power point

Confidential Healthcare and HIPPAcracies

Makena Lei Byers

MHA 690

Dr. Hwang-Ji Lu

November 14th 2013November 14, 2013

Page 2: Confidentiality power point

In Conclusion: Safeguarding

"The Health Information Trust Alliance (HITRUST) was born out of the belief that information security should be a core pillar of, rather than an obstacle to, the broad adoption of health information systems and exchanges. HITRUST, in collaboration with healthcare, business, technology and information security leaders, has established the Common Security Framework (CSF), a certifiable framework that can be used by any and all organizations that create, access, store, or exchange personal health and financial information. The CSF is an information security framework that harmonizes the requirements of existing standards and regulations, including federal (HIPAA, HITECH), third party (PCI, COBIT), and government (NIST, FTC). www.hitrustalliance.net." (Accretive Health, 2013)

The law condones powerful training measures and heightened security systems. In this way, the law empowers patients, employees and Health Care Establishments by blocking or legally refining those who disregard the veritable conduction of safe and Top Quality Management.

Page 3: Confidentiality power point

Why trainings in confidentiality are extremely important: "All professionals are prone to boundary transgressions; explicit training about and the maintenance of appropriate role balance will help to ensure high-functioning relationships and maximize the quality of patient care, resident education, faculty and resident satisfaction, and modeling of professional behavior to improve competencies as clinicians and educators."(Reitz, 2013)

It is crucial that we inform ourselves and others on the HIPAA laws and regulations. Breach of contract, indiscretion, Informed consent, “Do no harm”, the threat of self-destruction are just a few of the great understandings which we must take into account.

Page 4: Confidentiality power point

Why and how we must protect patient information

When determining eligibility for certain services and providing needed and appropriate resources, human service agencies and education institutions often require that children and families share very private information about themselves. Laws and statutes are in place to protect the privacy of these individuals and to ensure that this information is released only when necessary."(California Univ., 2002)

All employees must be made aware of the imperative significance of safeguarding every patient’s confidential material.

Page 5: Confidentiality power point

The reasons for observing ethical behavior:"Most primary care training programs have a behavioral science professional on faculty. Despite more similarities than differences among the roles filled by behavioral health professionals within primary care medicine residencies, each professional guild has a distinct set of ethical principles." (Reitz, 2013)

Patients have individual privacy rights. There may be multifarious ethical codes postulate at each hospital and every other health care facility. Overall, in omniscience, The law requires that we provide and bear the human rights of privacy to our patients.

Page 6: Confidentiality power point

Training: Behaving Unethically is Punishable. Please inform others.“Among the threats to the four information security aspects: confidentiality, integrity, availability, and quality; confidentiality threats were identified as most serious, with one threat given an unacceptable level of High risk." (Henrickson, 2013)

The Misconduct that occurred at UCLA in regards to the abusive speculation of private medical records, (some may have been those who were in the limelight with the media), must be carefully analyzed and born into retrospect as a greater lesson on what virtue is versus indelicate “MYOB” patterns which only afford abrasiveness, and are far from the vicinities of healing.

Page 7: Confidentiality power point

Adopting a higher security system &Making all aware of the risks of technological escapades(!):“

Because of the creation and use of information online and the widespread use of the internet and Web 2.0 platforms, physicians and others are increasingly required to consider how best to protect patient interests and apply principles of professionalism to new settings" (Farnan, 2013)

It then becomes vital that information which is privy to the patient and their honorable confidantes is never ever shared or speculated or…heaven forbid, stolen from any Health Care System

Page 8: Confidentiality power point

Confidentiality

"Confidentiality Risks in home are different from those in a more controlled environment, such as a hospital and electronic equipment located in private homes and commuting via internet is a more exposed unauthorized access. By implementing certain measures it has been possible to design a home based service which ensures the necessary level of information and security privacy." (Henrickson, 2013)

Even when a facility is established out of a residence, confidentiality and security must be cardinal.

Page 9: Confidentiality power point

In Conclusion: Safeguarding

"The Health Information Trust Alliance (HITRUST) was born out of the belief that information security should be a core pillar of, rather than an obstacle to, the broad adoption of health information systems and exchanges. HITRUST, in collaboration with healthcare, business, technology and information security leaders, has established the Common Security Framework (CSF), a certifiable framework that can be used by any and all organizations that create, access, store, or exchange personal health and financial information. The CSF is an information security framework that harmonizes the requirements of existing standards and regulations, including federal (HIPAA, HITECH), third party (PCI, COBIT), and government (NIST, FTC). www.hitrustalliance.net." (Accretive Health, 2013)

The law condones powerful training measures and heightened security systems. In this way, the law empowers patients, employees and Health Care Establishments by blocking or legally refining those who disregard the veritable conduction of safe and Top Quality Management.

Page 10: Confidentiality power point

References

Accretive Health, I. c. (3). Accretive Health Achieves Industry-Leading HITRUST Certification for Data Security and Protection of Private Patient Health Information. Business Wire (English).

Aronovitz, L. G. (1999). Medicare: HCFA Needs to Better Protect Beneficiaries' Confidential Health Information: T-HEHS-99-172. GAO Reports, 1.

California Univ., L. s. (2002). Confidentiality. A Center Quick Training Aid.

Farnan, J. M., Sulmasy, L., Worster, B. K., Chaudhry, H. J., Rhyne, J. A., & Arora, V. M. (2013). Online Medical Professionalism: Patient and Public Relationships: Policy Statement From the American College of Physicians and the Federation of State Medical Boards. Annals Of Internal Medicine, 158(8)

Page 11: Confidentiality power point

Henrickson, Eva. (2013) BMC Medical Informatics & Decision Making. 2013, Vol. 13 Issue 1, p1-13. 13p. 3 Charts.

http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=90292245&site=eds-liveReitz, Randall, St. Mary’s Family Medicine Residency, 2698 Patterson Road, Grand Junction, CO, US, 81506, [email protected]

Wolper, L.F. (2011). Health care administration: Managing organized delivery systems (5th ed.). Boston: Jones and Bartlett.

References (Continued)