hippa privacy

15
Presented by: Abdal Mahdi Ashford University MHA 690 Professor: Dr. Sherrie February 28, 2013

Upload: abdal-mahdi

Post on 08-Jul-2015

65 views

Category:

Education


3 download

TRANSCRIPT

Page 1: Hippa privacy

Presented by: Abdal MahdiAshford University

MHA 690Professor: Dr. Sherrie

February 28, 2013

Page 2: Hippa privacy

• What is information Security?• What is your role with information Security?• How can you help?• Breaches

Page 3: Hippa privacy

•Protect the patients•Protect the organization•Protect the employees

Page 4: Hippa privacy

• Confidentiality• Integrity• Data• Availability

Page 5: Hippa privacy

* In a recent survey conducted in 2011 on hospitals, medical practices, health insurers, pharmaceutical and life science companies, data theft scored high:

- Theft of records accounted for 66% of reported health data breaches during the previous two years.

- Just over one-third of hospitals and physician groups reported cases of medical identity theft. Statistics

- 54% of health organizations reported at least one issue with information privacy and security over the past two years.

Page 6: Hippa privacy

•You are the eyes and ears for the information Security since you work directly with patients and the business

Sec-rityIs not complete without “U”

Page 7: Hippa privacy

Locations

Page 8: Hippa privacy

•Items sent to a fax machine should be removed immediately upon receiving.

•Items sent using a fax machine you should verify correct fax number and individual before sending

Page 9: Hippa privacy

• Items sent to a printer should be removed immediately after printing

• Also, check for any other print outs that may have been included from someone else printing

Page 10: Hippa privacy

•When stepping away from a computer, LOCK or LOG OFF all applications and network access when unattended for extended amount of time.•What is the difference between Locking your

computers vs. logging off?

Page 11: Hippa privacy

* Put the word CONFIDENTIAL in the subject line if you are sending patient informationAdding the word “confidential” to the subject

line helps to send the email securely by encrypting it.

* If not sent properly, patient information could end up in the wrong hands.

* Be especially careful about sending file attachments. And remember that file attachments you receive are a potential source of viruses and other malicious software.

Page 12: Hippa privacy

• Never dispose of sensitive information in a trash can.

• All sensitive information should be disposed of in a shredder bin.

• Examples of sensitive information can include:

LabelsWrist BandsAny printed information of PHI

Page 13: Hippa privacy

• Never leave medical records unattended.• If need be

- Turn over records - Place something on top to hide the

records- Lock or store the records

Page 14: Hippa privacy

• Always keep your area clear to help prevent:

- Missing documents- Stolen records

• Store or lock away important items securely.

• Lock offices, cabinets, draws, etc.

Page 15: Hippa privacy

As you can see, most of these breaches were not the result of high-tech cyber attacks.They are the result of carelessness and theft, both of which can be prevented by taking some fairly straight-forward precautions.