STANDARD 5.3 Objective 3 Students will explain and understand the need for confidentiality.

Slides:



Advertisements
Similar presentations
Protect Our Students Protect Ourselves
Advertisements

Family Educational Rights and Privacy Act (FERPA) Basics For Faculty and Staff.
University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
FERPA Refresher Training Start. Page 2 of 11 Copyright © 2006 Arizona Board of Regents FERPA Refresher Training What is FERPA FERPA stands for Family.
1 The Health Insurance Portability and Accountability Act (HIPAA) A guided tutorial for GVSU employees.
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
Confidentiality and HIPAA
HIPAA Privacy Rule Training
NAU HIPAA Awareness Training
HIPAA Health Insurance Portability and Accountability Act 1.
1 Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 01/09/
WHAT IS HIPAA? The Health Insurance Portability and Accountability Act of 1996 (HIPAA) provides certain protections for any of your health information.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved 3-1 LEGAL AND ETHICAL ISSUES in Medical Practice, Including HIPAA PowerPoint® presentation.
HIPAA Privacy Rule Compliance Training for YSU April 9, 2014.
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
Are you ready for HIPPO??? Welcome to HIPAA
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
Health Insurance Portability and Accountability Act (HIPAA)
FERPA: Family Educational Rights and Privacy Act.
1 GRAND VALLEY STATE UNIVERSITY FAMILY EDUCATIONAL RIGHTS & PRIVACY ACT (FERPA) TRAINING OFFICES OF THE REGISTRAR AND UNIVERSITY COUNSEL JANUARY 20, 2009.
FERPA The Family Educational Rights and Privacy Act.
Privacy & Personal Information -- Why do we care or do we?
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
The University of Kansas Medical Center Shadow Experience Training.
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
HIPAA PRIVACY AND SECURITY AWARENESS.
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
Next ETCH Confidentiality and HIPAA Annual Review What you need to know. The Privacy Rule 1.
Student Confidentiality: The FERPA/HIPAA Facts AISD Policy Student Records AISD Procedure AP. 11.
FERPA Refresher Training Start. Page 2 of 11 Copyright © 2006 Arizona Board of Regents FERPA Refresher Training What is FERPA FERPA stands for Family.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Building a Privacy Foundation. Setting the Standard for Privacy Health Insurance Portability and Accountability Act (HIPAA) Patient Bill of Rights Federal.
Securing Patient-Related Data: The Impact of HIPAA Module VI NUR 603 Russ McGuire.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
FERPA Family Educational Rights and Privacy Act A Tutorial.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
1 st Choice Document Destruction th Avenue, Milaca, Minnesota Office: Cell:
C HAPTER 34 Code Blue Health Sciences Edition 4. Confidentiality of sensitive information is an important issue in healthcare. Breaches of confidentiality.
HIPAA A Sea of Confusion, A Wave of the future and A High Tide of Confidentiality.
Prepared by The Office of the Registrar Youngstown State University February, 2009.
F.E.R.P.A.. What is F.E.R.P.A. ? The Family Educational Rights and Privacy Act of 1974,
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
CH 10. Confidentiality A. Confidentiality about sensitive medical information is necessary to preserve the patient’s dignity. B. In order to receive payment.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
Health Insurance Portability and Accountability Act (HIPAA) © 2013 Project Lead The Way, Inc.Principles of Biomedical Science.
UC Riverside Health Training and Development
Health Insurance Portability and Accountability Act
HIPAA Privacy Rule Training
Protect Our Students Protect Ourselves
FERPA AND HIPAA COMPLIANCE AS COMMUNITY PARTNERS
HIPAA THE PRIVACY RULE Reviewed December 2012.
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
Student Confidentiality: The FERPA/HIPAA Facts
Health Insurance Portability and Accountability Act
Health Advocate HIPAA Privacy Information
Disability Services Agencies Briefing On HIPAA
Family Educational Rights & Privacy Act (FERPA)
Introduction to General Medical Conditions
The Health Insurance Portability and Accountability Act
Lesson 1: Introduction to HIPAA
Move this to online module slides 11-56
Student Confidentiality: The FERPA/HIPAA Facts
Presentation transcript:

STANDARD 5.3 Objective 3 Students will explain and understand the need for confidentiality.

CONFIDENTIALITY  Customers have a right to expect privacy and confidentiality  This applies to all industries  Health  Travel  Entertainment  Education  Etc….

WHAT HAPPENS AT THE DR. OFFICE STAYS AT THE DR. OFFICE  How would you feel if…  You went to the Doctor expecting your information to stay confidential, and the Doctor shared your information with others. Now your family may know of your situation, or you receive junk mail for treating ___ disease. Or people saying congratulations, when you haven’t told anyone you are pregnant. Awkward…….

HEALTH INDUSTRY  Most of us believe that our medical and other health information is private and should be protected, and we want to know who has this information. The Privacy Rule, a Federal law, gives you rights over your health information and sets rules and limits on who can look at and receive your health information. The Privacy Rule applies to all forms of individuals' protected health information, whether electronic, written, or oral. The Security Rule, a Federal law that protects health information in electronic form, requires entities covered by HIPAA to ensure that electronic protected health information is secure.

HIPAA  Health Insurance Portability and Accountability Act, a 1996 Federal law that restricts access to individuals' private medical information  Protects individuals information  Strict punishments for violations  You usually are asked to sign different forms at the Dr. office to allow them to share information, in certain ways to a select group of people.  This protects under HIPAA requirements  Doctors and Health care professionals want your business and want to stay in business and must follow policies put in place to protect individuals private information.

EDUCATION  Like many other areas, you have right to expect confidentiality.  Along with other things, teachers can’t disclose your grades or behaviors to your neighbors or others. Colleges and Universities can’t release information to spouses, or other family members without written permission.

FERPA  Family Education Rights and Privacy act of Federal Law  Gives students access to their education records, an opportunity to seek to have the records amended, and some control over the disclosure of information from the records. With several exceptions, schools must have a student's consent prior to the disclosure of education records  Examples of situations affected by FERPA include school employees divulging information to anyone other than the student about the student's grades or behavior, and school work posted on a bulletin board with a grade. Generally, schools must have written permission from the parent or eligible student in order to release any information from a student's education record.

OSHA  Occupational Safety and Health Administration (OSHA)  With the Occupational Safety and Health Act of 1970, Congress created the Occupational Safety and Health Administration (OSHA) to assure safe and healthful working conditions for working men and women by setting and enforcing standards and by providing training, outreach, education and assistance.

TRAVEL INDUSTRY  Today’s world requires a lot of documentation when traveling.  Passports, Id’s, tickets, reservations and plenty of confirmation numbers  Booking trips involves many individuals, in several states or even countries.  It is vital that during the booking, travel and billing process all information is kept safe.  Having theft while traveling (robbery, id theft…… any form of losing money) is already a huge concern for those who travel. Companies must do everything they can to ensure customers’ information will say secure.

RETAIL STORES/ RESTAURANTS/ENTERTAINMENT  Customers use debit and credit cards on a daily basis as a variety of retail locations.  They expect their financial information to stay safe and secure.  Breeches in security, have caused companies $$$ to fix and resolve the issue as well as lose customer business and relations.  Customers also do not want records of their purchases made available

LIABILITIES FACED BY COMPANIES  Lawsuits  Fines  Imprisonment  Loss of permit/license  Pay for corrective services  ID Theft  Credit Score ……..It all comes back to making money, company image and future business.

EXAMPLE FINES FOR HIPAA  General Penalty for failure to comply  100 a time  Wrongful Disclosure of Individually Identifiable Health Information  Thousand dollars  Those in the health industry do want to be fined and pay money out.  Not only do fines hurt the companies revenue, it also can look bad to patients and/or future patients, which could decrease future business.

LAWSUITS  Can happen for any reason  Major liability for companies who violate privacy laws  Costly to the company in payouts, or premiums for insurance.  Messy court situations and not wanted to drag the company name through the mud, cause companies to settle before court dates.

LOSS OF SAFE REPUTATION  Customers want to ensure their information is secure  As companies have breeches in private/secure information, in order to keep a positive image companies  Issue Statements notifying all that might be effected  Pay for reconciliation services  Do all they can to reassure their current and future customers/clients that they have a secure system.

SECURITY  Since confidentiality is viewed as high importance to both customer and business it is imperative to secure private information  Protecting customer’s private information, must be top priority.  Private information includes  Name  Address  Phone  Social Security Number  Family Information  Medical Records  Purchase Records  Bank Information- Credit Card #

TYPES OF THREAT  Internal  Employees/ people within the company or with access  Leaking information for personal gain  Selling contacts to other parties  Misplacing or losing information  i.e. Losing company laptop while on a business trip  Janitors or other personnel with access to secure information  Giving access codes to unauthorized individuals

THREATS  External –people outside of the company  Computer Hackers  Large Variety of ways to attack systems and information  Buyers trying to purchase information  Theft of  computers  Records  Documents