hippa privacy
TRANSCRIPT
![Page 1: Hippa privacy](https://reader033.vdocuments.mx/reader033/viewer/2022060202/559c5be51a28ab656e8b4816/html5/thumbnails/1.jpg)
Presented by: Abdal MahdiAshford University
MHA 690Professor: Dr. Sherrie
February 28, 2013
![Page 2: Hippa privacy](https://reader033.vdocuments.mx/reader033/viewer/2022060202/559c5be51a28ab656e8b4816/html5/thumbnails/2.jpg)
• What is information Security?• What is your role with information Security?• How can you help?• Breaches
![Page 3: Hippa privacy](https://reader033.vdocuments.mx/reader033/viewer/2022060202/559c5be51a28ab656e8b4816/html5/thumbnails/3.jpg)
•Protect the patients•Protect the organization•Protect the employees
![Page 4: Hippa privacy](https://reader033.vdocuments.mx/reader033/viewer/2022060202/559c5be51a28ab656e8b4816/html5/thumbnails/4.jpg)
• Confidentiality• Integrity• Data• Availability
![Page 5: Hippa privacy](https://reader033.vdocuments.mx/reader033/viewer/2022060202/559c5be51a28ab656e8b4816/html5/thumbnails/5.jpg)
* In a recent survey conducted in 2011 on hospitals, medical practices, health insurers, pharmaceutical and life science companies, data theft scored high:
- Theft of records accounted for 66% of reported health data breaches during the previous two years.
- Just over one-third of hospitals and physician groups reported cases of medical identity theft. Statistics
- 54% of health organizations reported at least one issue with information privacy and security over the past two years.
![Page 6: Hippa privacy](https://reader033.vdocuments.mx/reader033/viewer/2022060202/559c5be51a28ab656e8b4816/html5/thumbnails/6.jpg)
•You are the eyes and ears for the information Security since you work directly with patients and the business
Sec-rityIs not complete without “U”
![Page 7: Hippa privacy](https://reader033.vdocuments.mx/reader033/viewer/2022060202/559c5be51a28ab656e8b4816/html5/thumbnails/7.jpg)
Locations
![Page 8: Hippa privacy](https://reader033.vdocuments.mx/reader033/viewer/2022060202/559c5be51a28ab656e8b4816/html5/thumbnails/8.jpg)
•Items sent to a fax machine should be removed immediately upon receiving.
•Items sent using a fax machine you should verify correct fax number and individual before sending
![Page 9: Hippa privacy](https://reader033.vdocuments.mx/reader033/viewer/2022060202/559c5be51a28ab656e8b4816/html5/thumbnails/9.jpg)
• Items sent to a printer should be removed immediately after printing
• Also, check for any other print outs that may have been included from someone else printing
![Page 10: Hippa privacy](https://reader033.vdocuments.mx/reader033/viewer/2022060202/559c5be51a28ab656e8b4816/html5/thumbnails/10.jpg)
•When stepping away from a computer, LOCK or LOG OFF all applications and network access when unattended for extended amount of time.•What is the difference between Locking your
computers vs. logging off?
![Page 11: Hippa privacy](https://reader033.vdocuments.mx/reader033/viewer/2022060202/559c5be51a28ab656e8b4816/html5/thumbnails/11.jpg)
* Put the word CONFIDENTIAL in the subject line if you are sending patient informationAdding the word “confidential” to the subject
line helps to send the email securely by encrypting it.
* If not sent properly, patient information could end up in the wrong hands.
* Be especially careful about sending file attachments. And remember that file attachments you receive are a potential source of viruses and other malicious software.
![Page 12: Hippa privacy](https://reader033.vdocuments.mx/reader033/viewer/2022060202/559c5be51a28ab656e8b4816/html5/thumbnails/12.jpg)
• Never dispose of sensitive information in a trash can.
• All sensitive information should be disposed of in a shredder bin.
• Examples of sensitive information can include:
LabelsWrist BandsAny printed information of PHI
![Page 13: Hippa privacy](https://reader033.vdocuments.mx/reader033/viewer/2022060202/559c5be51a28ab656e8b4816/html5/thumbnails/13.jpg)
• Never leave medical records unattended.• If need be
- Turn over records - Place something on top to hide the
records- Lock or store the records
![Page 14: Hippa privacy](https://reader033.vdocuments.mx/reader033/viewer/2022060202/559c5be51a28ab656e8b4816/html5/thumbnails/14.jpg)
• Always keep your area clear to help prevent:
- Missing documents- Stolen records
• Store or lock away important items securely.
• Lock offices, cabinets, draws, etc.
![Page 15: Hippa privacy](https://reader033.vdocuments.mx/reader033/viewer/2022060202/559c5be51a28ab656e8b4816/html5/thumbnails/15.jpg)
As you can see, most of these breaches were not the result of high-tech cyber attacks.They are the result of carelessness and theft, both of which can be prevented by taking some fairly straight-forward precautions.