hippa privacy

Post on 08-Jul-2015

66 Views

Category:

Education

3 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Presented by: Abdal MahdiAshford University

MHA 690Professor: Dr. Sherrie

February 28, 2013

• What is information Security?• What is your role with information Security?• How can you help?• Breaches

•Protect the patients•Protect the organization•Protect the employees

• Confidentiality• Integrity• Data• Availability

* In a recent survey conducted in 2011 on hospitals, medical practices, health insurers, pharmaceutical and life science companies, data theft scored high:

- Theft of records accounted for 66% of reported health data breaches during the previous two years.

- Just over one-third of hospitals and physician groups reported cases of medical identity theft. Statistics

- 54% of health organizations reported at least one issue with information privacy and security over the past two years.

•You are the eyes and ears for the information Security since you work directly with patients and the business

Sec-rityIs not complete without “U”

Locations

•Items sent to a fax machine should be removed immediately upon receiving.

•Items sent using a fax machine you should verify correct fax number and individual before sending

• Items sent to a printer should be removed immediately after printing

• Also, check for any other print outs that may have been included from someone else printing

•When stepping away from a computer, LOCK or LOG OFF all applications and network access when unattended for extended amount of time.•What is the difference between Locking your

computers vs. logging off?

* Put the word CONFIDENTIAL in the subject line if you are sending patient informationAdding the word “confidential” to the subject

line helps to send the email securely by encrypting it.

* If not sent properly, patient information could end up in the wrong hands.

* Be especially careful about sending file attachments. And remember that file attachments you receive are a potential source of viruses and other malicious software.

• Never dispose of sensitive information in a trash can.

• All sensitive information should be disposed of in a shredder bin.

• Examples of sensitive information can include:

LabelsWrist BandsAny printed information of PHI

• Never leave medical records unattended.• If need be

- Turn over records - Place something on top to hide the

records- Lock or store the records

• Always keep your area clear to help prevent:

- Missing documents- Stolen records

• Store or lock away important items securely.

• Lock offices, cabinets, draws, etc.

As you can see, most of these breaches were not the result of high-tech cyber attacks.They are the result of carelessness and theft, both of which can be prevented by taking some fairly straight-forward precautions.

top related