SlideShare a Scribd company logo
Securing Health Information 
Darla Moore 
MHA 690 Health Care Capstone 
David Cole 
October 2, 2014
Keeping Patient Data Secure 
• Patient Health Information (PHI) 
1. Contains names, birth dates, Social Security numbers, 
addresses, phone numbers, and health insurance information 
2. Must be maintained 
3. Responsibility of everyone to keep confidential
Health Insurance Portability and 
Accountability Act of 1996 (HIPAA) 
• Covers the protection of any information in an individual’s 
personal records. Examples are: 
– diagnosis and treatment reports 
– progress notes 
– recommendations 
– conversations with personal caregivers 
• HIPAA clearly states that no information shall be released 
without written consent from the data owner (patient), unless 
otherwise legislated, such as in emergencies or unusual 
situations.
Health Information Technology for Economic 
and Clinical Health Act (HITECH) 
• In 2009 the HITECH act was put into place and hospitals were 
given incentives of up to $40,000 per provider for using EHR's 
and health information exchanges (HIE) at the state and regional 
levels. 
• HITECH safeguards the information that is processed into 
computer systems used by care providers for: 
1. billing 
2. medication 
3. clinical evaluation reports 
4. radiological images and reports 
5. laboratory test results 
6. any information collected by individuals or organizations that 
has a health semantic.
Penalties of Breeches 
• The Department of Health and Human Services (HHS) must be informed of data 
breeches as well as the individual (s) affected 
• HHS issued privacy rules through a publication of proposed rules and 
has the authority to enforce these rules to include investigations on 
complaints and conducting HIPPA compliance reviews¹. 
• HIPAA Violations 
1. $100 per violation and up to $25,000 per year. 
• If the breech and misuse of PHI is intentional, the following penalties can occur: 
1. Reprimand or warning 
2. Dismissal from organization 
2. Fines ranging from $50,000 per occurrence to $250,000 
3. Between 1 to 10 years in prison².
Do’s and Don’ts 
Do 
• Keep information secure 
• Use passwords that are not 
obvious and change them 
regularly. 
• Keep your voice down when 
discussing patient information, 
both in person and over the 
phone. 
• Lock computer when you leave 
it. 
Don’t 
• Give out your password 
• Fail to log off computers. 
• Leave patient files easily 
accessible. 
• Post patient information online 
without ensuring it is de-identified. 
• Look up a patient’s medical 
record without a valid reason.
Questions 
1. What are some examples of PHI? 
2. What does HIPAA protect? 
3. HITECH safeguards what information? 
4. Name some consequences for security violations. 
5. What are you suppose to do to keep information private? 
6. What are you not suppose to do?
Answers 
1. Names, birth dates, Social Security numbers, addresses, phone 
numbers, and health insurance information 
2. diagnosis and treatment reports, progress notes, recommendations and 
conversations with personal caregivers 
3. Billing, medication, clinical evaluation reports, radiological images and 
reports, laboratory test results, and any information collected. 
4. Reprimand or warning, dismissal from organization, fines ranging from 
$50,000 per occurrence to $250,000, or 1 to 10 years in prison. 
5. Keep information secure, use passwords that are not obvious, don’t 
give out your password, and lock computer when not in use. 
6. Leave patient files easily accessible, post patient information online 
without ensuring it is de-identified, and look up a patient’s medical 
record without a valid reason
References 
1. Karasz, H. N., PhD., Eiden, A., J.D., & Bogan, S., M.P.H. (2013). Text 
messaging to communicate with public health audiences: How the HIPAA 
security rule affects practice. American Journal of Public Health, 103(4), 617- 
622. Retrieved from 
http://search.proquest.com/docview/1340553579?accountid=32521 
2. Swim, R. (2012). Keeping data secure: Protected health information and 
medical equipment. Biomedical Instrumentation & Technology, 46(4), 278-80. 
Retrieved from http://search.proquest.com/docview/1036947767? 
accountid=32521
References 
1. Karasz, H. N., PhD., Eiden, A., J.D., & Bogan, S., M.P.H. (2013). Text 
messaging to communicate with public health audiences: How the HIPAA 
security rule affects practice. American Journal of Public Health, 103(4), 617- 
622. Retrieved from 
http://search.proquest.com/docview/1340553579?accountid=32521 
2. Swim, R. (2012). Keeping data secure: Protected health information and 
medical equipment. Biomedical Instrumentation & Technology, 46(4), 278-80. 
Retrieved from http://search.proquest.com/docview/1036947767? 
accountid=32521

More Related Content

PPSX
8.2 Demonstration Health - IT benifits - Bagmishika Puhan ( Session 8)
PPTX
Mha690 week 1 disc2 10 3-2019
PPTX
Hippa presentation2
PPTX
Hipaa training
PPTX
Hippa training for healthcare employees
PPTX
Confidentiality
PPTX
Presentation hippa
PPTX
HIPAA AND INFORMATION TECHNOLOGY
8.2 Demonstration Health - IT benifits - Bagmishika Puhan ( Session 8)
Mha690 week 1 disc2 10 3-2019
Hippa presentation2
Hipaa training
Hippa training for healthcare employees
Confidentiality
Presentation hippa
HIPAA AND INFORMATION TECHNOLOGY

What's hot (20)

PPT
Tiffany hall mha 690 week 1 discussion 2
PPTX
Hippa training for healthcare employees
PPTX
MHA 690 week 2 discussin
PPT
What is hipaa
PPTX
TaylorWk1d2assignment
PPTX
Hippa training 2017
PPTX
Welcome to the hippa, privacy and security
PPSX
Hippa 2021
PPTX
PPTX
Employee confidentiality training
PPTX
Hipaa overview 073118
PDF
Hipaa ppt june 6 2014
PPTX
Mha690 week 1 discusssion 2
PPTX
2017 HIPAA Clinical Research Training
PPTX
HIPPA-Health Insurance Portability and Accountability Act
PPTX
Confidentiality
PPT
PPTX
Patient Confidentiality Training Presentation (1)
PPTX
Personal Health Records
PPTX
Safety of protected health information (phi)
Tiffany hall mha 690 week 1 discussion 2
Hippa training for healthcare employees
MHA 690 week 2 discussin
What is hipaa
TaylorWk1d2assignment
Hippa training 2017
Welcome to the hippa, privacy and security
Hippa 2021
Employee confidentiality training
Hipaa overview 073118
Hipaa ppt june 6 2014
Mha690 week 1 discusssion 2
2017 HIPAA Clinical Research Training
HIPPA-Health Insurance Portability and Accountability Act
Confidentiality
Patient Confidentiality Training Presentation (1)
Personal Health Records
Safety of protected health information (phi)
Ad

Viewers also liked (11)

PPT
香港六合彩
PDF
HIPAA Program Administration
PPT
New Hire Orientation Ppt
PPT
Hipaa pesentation
PPT
HIPAA week1
PPTX
Privacy & security training.pptx
PPTX
Developing a Comprehensive QA Program (Connect 2016) - David A. Miles, Ph.D. (2)
PPTX
HIPAA Training: Preventing Employees from Violating HIPAA
PPT
Hipaa101 updated
PDF
mHealth Summit EU 2015
PPT
HIPAA
香港六合彩
HIPAA Program Administration
New Hire Orientation Ppt
Hipaa pesentation
HIPAA week1
Privacy & security training.pptx
Developing a Comprehensive QA Program (Connect 2016) - David A. Miles, Ph.D. (2)
HIPAA Training: Preventing Employees from Violating HIPAA
Hipaa101 updated
mHealth Summit EU 2015
HIPAA
Ad

Similar to Securing health information (20)

PPT
Avoid Privacy by Disaster by Adopting Privacy by Design
PPTX
Patient confidentiality MHA 690
PPTX
Patient confidentiality
PDF
Hipaa and social media using new
PPTX
Confidentiality Training
PPTX
Patient confidentiality
PPTX
Confidentiality
PDF
Protecting ePHI: What Providers and Business Associates Need to Know
PPTX
Are You HIPAA Safe?
PPTX
Mha 690 week 1 discussion presentation
PDF
Confidentiality
PPTX
Phi masella
PPTX
PROTECTED HEALTH INFORMATION_PATIENT PRIVACY
PPT
Hipaa inservice
PPT
Legal and ethical considerations in nursing informatics
PPTX
Annual HIPAA Training
PPTX
Health Insurance and Portability and Accountability Act
PPTX
Confidentiality and privacy training
PDF
Hipaa basics.pp2
Avoid Privacy by Disaster by Adopting Privacy by Design
Patient confidentiality MHA 690
Patient confidentiality
Hipaa and social media using new
Confidentiality Training
Patient confidentiality
Confidentiality
Protecting ePHI: What Providers and Business Associates Need to Know
Are You HIPAA Safe?
Mha 690 week 1 discussion presentation
Confidentiality
Phi masella
PROTECTED HEALTH INFORMATION_PATIENT PRIVACY
Hipaa inservice
Legal and ethical considerations in nursing informatics
Annual HIPAA Training
Health Insurance and Portability and Accountability Act
Confidentiality and privacy training
Hipaa basics.pp2

Recently uploaded (20)

PDF
شيت_عطا_0000000000000000000000000000.pdf
PDF
Oral Aspect of Metabolic Disease_20250717_192438_0000.pdf
PPTX
09. Diabetes in Pregnancy/ gestational.pptx
PDF
Copy of OB - Exam #2 Study Guide. pdf
PPT
Rheumatology Member of Royal College of Physicians.ppt
PPTX
Enteric duplication cyst, etiology and management
PDF
Comparison of Swim-Up and Microfluidic Sperm Sorting.pdf
PDF
TISSUE LECTURE (anatomy and physiology )
PPTX
Acute Coronary Syndrome for Cardiology Conference
PPTX
Medical Law and Ethics powerpoint presen
PPTX
1. Basic chemist of Biomolecule (1).pptx
PPTX
IMAGING EQUIPMENiiiiìiiiiiTpptxeiuueueur
DOCX
PEADIATRICS NOTES.docx lecture notes for medical students
PPTX
Neonate anatomy and physiology presentation
PPTX
HYPERSENSITIVITY REACTIONS - Pathophysiology Notes for Second Year Pharm D St...
PDF
The_EHRA_Book_of_Interventional Electrophysiology.pdf
PDF
Transcultural that can help you someday.
PPT
neurology Member of Royal College of Physicians (MRCP).ppt
PDF
Calcified coronary lesions management tips and tricks
PPTX
y4d nutrition and diet in pregnancy and postpartum
شيت_عطا_0000000000000000000000000000.pdf
Oral Aspect of Metabolic Disease_20250717_192438_0000.pdf
09. Diabetes in Pregnancy/ gestational.pptx
Copy of OB - Exam #2 Study Guide. pdf
Rheumatology Member of Royal College of Physicians.ppt
Enteric duplication cyst, etiology and management
Comparison of Swim-Up and Microfluidic Sperm Sorting.pdf
TISSUE LECTURE (anatomy and physiology )
Acute Coronary Syndrome for Cardiology Conference
Medical Law and Ethics powerpoint presen
1. Basic chemist of Biomolecule (1).pptx
IMAGING EQUIPMENiiiiìiiiiiTpptxeiuueueur
PEADIATRICS NOTES.docx lecture notes for medical students
Neonate anatomy and physiology presentation
HYPERSENSITIVITY REACTIONS - Pathophysiology Notes for Second Year Pharm D St...
The_EHRA_Book_of_Interventional Electrophysiology.pdf
Transcultural that can help you someday.
neurology Member of Royal College of Physicians (MRCP).ppt
Calcified coronary lesions management tips and tricks
y4d nutrition and diet in pregnancy and postpartum

Securing health information

  • 1. Securing Health Information Darla Moore MHA 690 Health Care Capstone David Cole October 2, 2014
  • 2. Keeping Patient Data Secure • Patient Health Information (PHI) 1. Contains names, birth dates, Social Security numbers, addresses, phone numbers, and health insurance information 2. Must be maintained 3. Responsibility of everyone to keep confidential
  • 3. Health Insurance Portability and Accountability Act of 1996 (HIPAA) • Covers the protection of any information in an individual’s personal records. Examples are: – diagnosis and treatment reports – progress notes – recommendations – conversations with personal caregivers • HIPAA clearly states that no information shall be released without written consent from the data owner (patient), unless otherwise legislated, such as in emergencies or unusual situations.
  • 4. Health Information Technology for Economic and Clinical Health Act (HITECH) • In 2009 the HITECH act was put into place and hospitals were given incentives of up to $40,000 per provider for using EHR's and health information exchanges (HIE) at the state and regional levels. • HITECH safeguards the information that is processed into computer systems used by care providers for: 1. billing 2. medication 3. clinical evaluation reports 4. radiological images and reports 5. laboratory test results 6. any information collected by individuals or organizations that has a health semantic.
  • 5. Penalties of Breeches • The Department of Health and Human Services (HHS) must be informed of data breeches as well as the individual (s) affected • HHS issued privacy rules through a publication of proposed rules and has the authority to enforce these rules to include investigations on complaints and conducting HIPPA compliance reviews¹. • HIPAA Violations 1. $100 per violation and up to $25,000 per year. • If the breech and misuse of PHI is intentional, the following penalties can occur: 1. Reprimand or warning 2. Dismissal from organization 2. Fines ranging from $50,000 per occurrence to $250,000 3. Between 1 to 10 years in prison².
  • 6. Do’s and Don’ts Do • Keep information secure • Use passwords that are not obvious and change them regularly. • Keep your voice down when discussing patient information, both in person and over the phone. • Lock computer when you leave it. Don’t • Give out your password • Fail to log off computers. • Leave patient files easily accessible. • Post patient information online without ensuring it is de-identified. • Look up a patient’s medical record without a valid reason.
  • 7. Questions 1. What are some examples of PHI? 2. What does HIPAA protect? 3. HITECH safeguards what information? 4. Name some consequences for security violations. 5. What are you suppose to do to keep information private? 6. What are you not suppose to do?
  • 8. Answers 1. Names, birth dates, Social Security numbers, addresses, phone numbers, and health insurance information 2. diagnosis and treatment reports, progress notes, recommendations and conversations with personal caregivers 3. Billing, medication, clinical evaluation reports, radiological images and reports, laboratory test results, and any information collected. 4. Reprimand or warning, dismissal from organization, fines ranging from $50,000 per occurrence to $250,000, or 1 to 10 years in prison. 5. Keep information secure, use passwords that are not obvious, don’t give out your password, and lock computer when not in use. 6. Leave patient files easily accessible, post patient information online without ensuring it is de-identified, and look up a patient’s medical record without a valid reason
  • 9. References 1. Karasz, H. N., PhD., Eiden, A., J.D., & Bogan, S., M.P.H. (2013). Text messaging to communicate with public health audiences: How the HIPAA security rule affects practice. American Journal of Public Health, 103(4), 617- 622. Retrieved from http://search.proquest.com/docview/1340553579?accountid=32521 2. Swim, R. (2012). Keeping data secure: Protected health information and medical equipment. Biomedical Instrumentation & Technology, 46(4), 278-80. Retrieved from http://search.proquest.com/docview/1036947767? accountid=32521
  • 10. References 1. Karasz, H. N., PhD., Eiden, A., J.D., & Bogan, S., M.P.H. (2013). Text messaging to communicate with public health audiences: How the HIPAA security rule affects practice. American Journal of Public Health, 103(4), 617- 622. Retrieved from http://search.proquest.com/docview/1340553579?accountid=32521 2. Swim, R. (2012). Keeping data secure: Protected health information and medical equipment. Biomedical Instrumentation & Technology, 46(4), 278-80. Retrieved from http://search.proquest.com/docview/1036947767? accountid=32521

Editor's Notes

  • #4: HIPPA was one of the first regulations placed into law that established the protection of health information. HIPAA clearly states that no information shall be released without written consent from the data owner (patient), unless otherwise legislated, such as in emergencies or unusual situations.
  • #5: HITECH got government leadership involved in the implementation of electronic records and the security of PHI.
  • #6: ¹Karasz, Eiden, & Bogan, 2013, pg. 618 ²Swim, 2012 p. 279