PRIVACY & INFORMATION SECURITY AWARNESS
Ashford University
MHA 690: Health Care Capstone
Dr. Sherry Grover
May 23, 2013
Course Objectives
 Knowledge about the laws that governs the privacy
and protection of identifiable health information
 Recognize the types of information that must be kept
private
Recognize your responsibilities to protect privacy
when dealing with sensitive information
How to protect the privacy of identifiable health
information
Examples of incidents to report
Knowledge of the process for reporting incidents and
penalties of non-compliance
Laws and Regulations
 Privacy Act of 1974 – Governs the collection, use and distribution o
a person’s identifiable information kept in a system of record
 Health Insurance Portability & Accountability Act (HIPPA)- law th
protects the privacy of ones person’s personal health information
 Federal Information Security Management Act (FISMA) – law that
requires a risk assessment program, policies and procedures,
evaluation of security controls, and provide training of information
security to all employees
 Health Information Technology for Economic and Clinical Health
Act (HITECH) – requires patients to be notified of security breach,
funds the adoption of health information technology for organization
and enforces HIPPA violation penalties
What to Protect
Sensitive information includes both our organizational
business information and patients’ private information.
Violations can be accidental or purposefully. Do not
disclose, modify, or destroy any sensitive information
unless you are authorized to do so. Sensitive information
includes:
 Protected Health Information (PHI)
Personal Identifiable Information
Internal Business Information
Your Responsibilities to Protect It
Information security will be maintained when
you ensure the following:
Integrity – information is secure and
protected from being damaged or altered
Confidentiality – information is kept
private and not disclosed to those who do not
have permission to view it
Availability – access to information systems
and networks are available to those who have
been granted permission
How to Protect It
Follow the policies and procedures
Only access and view information that is
needed for you to do your job
Use encrypted email
 Do not place sensitive information in
trash receptacles
Do not discuss sensitive information in
public places
Information Security Officer (ISO)
Privacy Officer
Your Supervisor
Who Can Provide Support?
Examples of Incidents
Observing someone access records that
he/she should not
Observing someone change or delete
records without proper permission
Finding a device with sensitive
information
Hearing a persons discussing sensitive
information to an unauthorized person
Accessing mail or email that you should
not access
Examples of Incidents
Observing someone access records that
he/she should not
Observing someone change or delete
records without proper permission
Finding a device with sensitive
information
Hearing a persons discussing sensitive
information to an unauthorized person
Accessing mail or email that you should
not access
How to Report an Incident
Immediately notify your supervisor and ISO of:
 Person (s) involved
 The time of the incident
 What information was shared
If the incident is after hours or weekends, you can
call the Helpdesk @ 800-877-4327.
Consequences
Suspension of access to information systems
Disciplinary actions in your personnel file
Suspension or job loss
Civil or criminal prosecution
Fines and/or imprisonment
Civil and Criminal Penalties
Destroy records without being authorized -
$2000 in fines & 3 years in prison
Violation of the Privacy Act - $5000 & 1 year in
prison per occurrence
Intentional incident - $250,000 fines & 10 years
in prison
References
All images were from http://www.dreamstime.com/free-photos-
images/flowers.html
Privacy and Information Security Awareness. Retrieved from:
https://www.tms.va.gov
Velez, J. (2003). Hippa privacy compliance implications and
solutions. Caribbean Business.

More Related Content

PPTX
Week 1 discussion 2 confidentiality
PPTX
Confidentially in the workplace
PPTX
Blodgett MHA 690 W1 D2
PPTX
Hipaa training
PPTX
Mha 690 week 1 discussion presentation
PPT
hipaa presentation
PPTX
Administrative safeguards
PDF
Mha 690 wk 1 dis 3
Week 1 discussion 2 confidentiality
Confidentially in the workplace
Blodgett MHA 690 W1 D2
Hipaa training
Mha 690 week 1 discussion presentation
hipaa presentation
Administrative safeguards
Mha 690 wk 1 dis 3

What's hot (16)

PPTX
Privacy and confidentiality
PPTX
Hipaa in the era of ehr mo dept hss
DOCX
Data protection policy alex clapson 20-11-17
PPTX
Confidentiality Training
PPTX
Presentation5
PPTX
Hippa presentation
PPTX
Hipaa training by p. lynch
PPTX
Confidentiality and you
PPTX
Hippa training 2017
PPT
Confidentiality Rules
PPT
What is HIPAA
PPT
What is HIPAA
PDF
Do You Know How to Handle a HIPAA Breach?
PDF
HIPAA Compliance Checklist
PPT
PDF
Hipaa journal com - HIPAA compliance guide
Privacy and confidentiality
Hipaa in the era of ehr mo dept hss
Data protection policy alex clapson 20-11-17
Confidentiality Training
Presentation5
Hippa presentation
Hipaa training by p. lynch
Confidentiality and you
Hippa training 2017
Confidentiality Rules
What is HIPAA
What is HIPAA
Do You Know How to Handle a HIPAA Breach?
HIPAA Compliance Checklist
Hipaa journal com - HIPAA compliance guide
Ad

Viewers also liked (10)

PDF
1st isaca conference program
PPTX
Security in HR... How secure are your files, really?
PDF
CONFIDENTIALITY AGREEMENT - Contract Template and Sample
PPT
Non-Disclosure Agreement: key points
PPTX
Fraud Prevention - St. Louis - March 6, 2015
DOCX
Nondisclosure Agreements (Training Notes and Template)
PDF
WEBINAR - A New Era in HR Security for SAP
PDF
CERT - EXXONMOBIL - CYBER SECURITY AWARNESS
PDF
Fadi Mutlak - Information security governance
PPT
Organization Management, business presentations
1st isaca conference program
Security in HR... How secure are your files, really?
CONFIDENTIALITY AGREEMENT - Contract Template and Sample
Non-Disclosure Agreement: key points
Fraud Prevention - St. Louis - March 6, 2015
Nondisclosure Agreements (Training Notes and Template)
WEBINAR - A New Era in HR Security for SAP
CERT - EXXONMOBIL - CYBER SECURITY AWARNESS
Fadi Mutlak - Information security governance
Organization Management, business presentations
Ad

Similar to Week 1 discussion 2 confidentiality final (20)

PPTX
Week 1 discussion 2 confidentiality
PPT
Legal and ethical considerations in nursing informatics
PPTX
Confidentiality and information security33.pptx
PDF
Crowdsurf - HIPAA & FERPA Data Privacy Training.pdf
PPT
Training on confidentiality MHA690 Hayden
DOCX
Chapter 5HIPAA and HITECHLearning ObjectivesUnde
PDF
STUCOR_CS8792-LL.pdf
PPTX
Confidentiality
PPTX
Training innovations information governance slideshare 2015
PPTX
Data security training
PPTX
Presentation hippa
PPTX
Hippa final JU nursing informatics
DOCX
Confidentiality 9.26.13
PPTX
Marc etienne week1 discussion2 presentation
PDF
HIPAA Compliance For Small Practices
PPT
Objective 5 legal consideration in NIS.ppt
PDF
Workplace Investigations - Safeguarding Sensitive Information with Care.pdf
DOCX
CHAPTER 7Standards on Privacyand Confidentiality4. Privacy a.docx
PPTX
UCLA compliance training
PPT
Mha690 wk 1 fletcher
Week 1 discussion 2 confidentiality
Legal and ethical considerations in nursing informatics
Confidentiality and information security33.pptx
Crowdsurf - HIPAA & FERPA Data Privacy Training.pdf
Training on confidentiality MHA690 Hayden
Chapter 5HIPAA and HITECHLearning ObjectivesUnde
STUCOR_CS8792-LL.pdf
Confidentiality
Training innovations information governance slideshare 2015
Data security training
Presentation hippa
Hippa final JU nursing informatics
Confidentiality 9.26.13
Marc etienne week1 discussion2 presentation
HIPAA Compliance For Small Practices
Objective 5 legal consideration in NIS.ppt
Workplace Investigations - Safeguarding Sensitive Information with Care.pdf
CHAPTER 7Standards on Privacyand Confidentiality4. Privacy a.docx
UCLA compliance training
Mha690 wk 1 fletcher

Week 1 discussion 2 confidentiality final

  • 1. PRIVACY & INFORMATION SECURITY AWARNESS Ashford University MHA 690: Health Care Capstone Dr. Sherry Grover May 23, 2013
  • 2. Course Objectives  Knowledge about the laws that governs the privacy and protection of identifiable health information  Recognize the types of information that must be kept private Recognize your responsibilities to protect privacy when dealing with sensitive information How to protect the privacy of identifiable health information Examples of incidents to report Knowledge of the process for reporting incidents and penalties of non-compliance
  • 3. Laws and Regulations  Privacy Act of 1974 – Governs the collection, use and distribution o a person’s identifiable information kept in a system of record  Health Insurance Portability & Accountability Act (HIPPA)- law th protects the privacy of ones person’s personal health information  Federal Information Security Management Act (FISMA) – law that requires a risk assessment program, policies and procedures, evaluation of security controls, and provide training of information security to all employees  Health Information Technology for Economic and Clinical Health Act (HITECH) – requires patients to be notified of security breach, funds the adoption of health information technology for organization and enforces HIPPA violation penalties
  • 4. What to Protect Sensitive information includes both our organizational business information and patients’ private information. Violations can be accidental or purposefully. Do not disclose, modify, or destroy any sensitive information unless you are authorized to do so. Sensitive information includes:  Protected Health Information (PHI) Personal Identifiable Information Internal Business Information
  • 5. Your Responsibilities to Protect It Information security will be maintained when you ensure the following: Integrity – information is secure and protected from being damaged or altered Confidentiality – information is kept private and not disclosed to those who do not have permission to view it Availability – access to information systems and networks are available to those who have been granted permission
  • 6. How to Protect It Follow the policies and procedures Only access and view information that is needed for you to do your job Use encrypted email  Do not place sensitive information in trash receptacles Do not discuss sensitive information in public places
  • 7. Information Security Officer (ISO) Privacy Officer Your Supervisor Who Can Provide Support?
  • 8. Examples of Incidents Observing someone access records that he/she should not Observing someone change or delete records without proper permission Finding a device with sensitive information Hearing a persons discussing sensitive information to an unauthorized person Accessing mail or email that you should not access
  • 9. Examples of Incidents Observing someone access records that he/she should not Observing someone change or delete records without proper permission Finding a device with sensitive information Hearing a persons discussing sensitive information to an unauthorized person Accessing mail or email that you should not access
  • 10. How to Report an Incident Immediately notify your supervisor and ISO of:  Person (s) involved  The time of the incident  What information was shared If the incident is after hours or weekends, you can call the Helpdesk @ 800-877-4327.
  • 11. Consequences Suspension of access to information systems Disciplinary actions in your personnel file Suspension or job loss Civil or criminal prosecution Fines and/or imprisonment
  • 12. Civil and Criminal Penalties Destroy records without being authorized - $2000 in fines & 3 years in prison Violation of the Privacy Act - $5000 & 1 year in prison per occurrence Intentional incident - $250,000 fines & 10 years in prison
  • 13. References All images were from http://www.dreamstime.com/free-photos- images/flowers.html Privacy and Information Security Awareness. Retrieved from: https://www.tms.va.gov Velez, J. (2003). Hippa privacy compliance implications and solutions. Caribbean Business.