Prevent Training
Introduction
• There should never be a case where nurses or
  any other hospital worker are looking at
  patients records other than there patient they
  are working on. If anyone are found in
  violation of this law they should have
  immediate action taken against them. Just
  because a person is a celebrity that doesn’t
  mean their personal lives should be violated
HIPPA
• “The Health Insurance Portability and Accountability
  Act of 1996 (HIPAA; Pub.L. 104-191, 110 Stat. 1936,
  enacted August 21, 1996) was enacted by the United
  States Congress and signed by President Bill Clinton in
  1996. Title I of HIPAA protects health
  insurance coverage for workers and their families when
  they change or lose their jobs. Title II of HIPAA, known
  as the Administrative Simplification (AS) provisions,
  requires the establishment of national standards
  for electronic health care transactions and national
  identifiers for providers, health insurance plans, and
  employers”.
Hitech
• “The Health Information Technology for
  Economic and Clinical Health (HITECH) Act,
  enacted as part of the American Recovery and
  Reinvestment Act of 2009, was signed into law
  on February 17, 2009, to promote the
  adoption and meaningful use of health
  information technology”.
Security Rule
• “The HIPAA Security Rule establishes national
  standards to protect individuals’ electronic
  personal health information that is created,
  received, used, or maintained by a covered
  entity”
Penalties
•   Fines
•   Jail time
•   Loss of license to practice
•   Public humiliation
•   Job loss
Training
• Making sure that people have read and signed
  the Privacy and security acts are step 1.
• Next having quarterly meetings to reinstate
  what was signed and make sure everyone is
  following rules is step 2
• Step 3 would be to set up monthly security
  checks on public use computers of patient
  records
Training
• You want people to understand that you are serious
  about the laws and will not take things lightly if laws
  are broken.
• Keeping accurate records on who works with each
  patient is a must.
• Doing checks to make sure everyone is where they
  should be is a must as well
• Finally creating pass codes for each patient that only
  the team that is working with them will know and use
  will be a great idea. If codes are used under another
  nurse or doctors name it should flag the system.
Preventive Methods
• For employees ways to make sure they are not in
  violation is to make sure they stay on only task
  assigned. If someone needs help make sure
  proper steps are taken. It is ok to ask questions
  to make sure you are in the right. Also logging off
  your computers properly will make sure that
  nobody else is working under your name. Also
  not sharing your pass words with anyone is a
  must. Every three months it is good to change
  your pass code to make sure nobody is using your
  account access.
References
• Wolper, L.F. (2011). Health care
  administration: Managing organized delivery
  systems (5th ed.). Sudbury, MA: Jones and
  Bartlett Publishers, Inc

• http://www.hhs.gov/ocr/privacy/hipaa/admin
  istrative/securityrule/index.html

More Related Content

PPTX
HIPAA Part I the Law Test
PPT
Hipaa basics
PPTX
Hipaa presentation
PDF
Cyber & Data Risk Insurance
PPT
HIPAA Compliance
PPTX
Hipaa basics pp2
PPTX
Understanding the HIPPA Act
HIPAA Part I the Law Test
Hipaa basics
Hipaa presentation
Cyber & Data Risk Insurance
HIPAA Compliance
Hipaa basics pp2
Understanding the HIPPA Act

What's hot (20)

PPT
Mha690 wk 1 fletcher
PPTX
HIPPA Security Presentation
PPTX
Mha 690 week 1 discussion presentation
PPTX
Protecting patient privacy
PPT
Personal privacy and computer technologies
PDF
Hipaa basics.pp2
PPTX
Patient confidentiality
PDF
Legal implications of HIPAA, HITECH and BAAs
PPT
Hippa slide show
PPSX
Data Protection Act presentation
PPTX
UCLA compliance training
PPTX
PDF
The Data Protection Act What You Need To Know
PPTX
The Data Protection Act
PPTX
Hippa laws
PPTX
Hipaa slideshare ppt
PPTX
Confidentiality
PDF
Implications of hipaa non compliance
PPTX
Hi103 week 4 chpt 11
PPTX
Hm300 week 7 part 1 of 2
Mha690 wk 1 fletcher
HIPPA Security Presentation
Mha 690 week 1 discussion presentation
Protecting patient privacy
Personal privacy and computer technologies
Hipaa basics.pp2
Patient confidentiality
Legal implications of HIPAA, HITECH and BAAs
Hippa slide show
Data Protection Act presentation
UCLA compliance training
The Data Protection Act What You Need To Know
The Data Protection Act
Hippa laws
Hipaa slideshare ppt
Confidentiality
Implications of hipaa non compliance
Hi103 week 4 chpt 11
Hm300 week 7 part 1 of 2
Ad

Viewers also liked (9)

PPTX
Prevent training
PPTX
Top Packers Movers
PPTX
Packers And Movers in Delhi
DOC
Adverbs
PPTX
Хотите продать коммерческую недвижимость?
PDF
M14112
PPTX
Коммерческая недвижимость
PPTX
Track me
PPT
SoroushTelecom
Prevent training
Top Packers Movers
Packers And Movers in Delhi
Adverbs
Хотите продать коммерческую недвижимость?
M14112
Коммерческая недвижимость
Track me
SoroushTelecom
Ad

Similar to Prevent training (20)

PPTX
Week 1 discussion 2 - HIPAA Training
PPTX
Hippa final JU nursing informatics
PPTX
Mha 690 presentation hippa
PPTX
Hipaa presentation
PPT
Training on confidentiality MHA690 Hayden
PDF
Hipaa basics
PPT
Knowing confidentiality
PPTX
HIPAA
PPTX
Hipaa and privacy
PPTX
Privacy rules & regulations in healthcare- Edwards
PPTX
Hippa privacy and security awareness
PPTX
Hippa training v2
PPTX
Hipaa 2012
PPTX
Patient privacy
PPT
DOCX
This training program is designed to introduce staff
PPTX
HIPAA Training MHA 690 7-31-2013
PPTX
Patient confidentiality
PPTX
Mha690 brittany koenig week 1 assignment2
PPTX
Mha690 brittany koenig week 1 assignment2
Week 1 discussion 2 - HIPAA Training
Hippa final JU nursing informatics
Mha 690 presentation hippa
Hipaa presentation
Training on confidentiality MHA690 Hayden
Hipaa basics
Knowing confidentiality
HIPAA
Hipaa and privacy
Privacy rules & regulations in healthcare- Edwards
Hippa privacy and security awareness
Hippa training v2
Hipaa 2012
Patient privacy
This training program is designed to introduce staff
HIPAA Training MHA 690 7-31-2013
Patient confidentiality
Mha690 brittany koenig week 1 assignment2
Mha690 brittany koenig week 1 assignment2

Recently uploaded (20)

PPTX
Machine Learning (ML) is a branch of Artificial Intelligence (AI)
PPT
Project_finance_introduction in finance.ppt
PPTX
Simple linear regression model an important topic in econometrics
PPTX
Very useful ppt for your banking assignments Banking.pptx
PPTX
balanced_and_unbalanced_growth_theory_ppt.pptx
PDF
Pension Trustee Training (1).pdf From Salih Shah
PDF
Veritas Interim report 1 January – 30 June 2025
PPTX
Chapter 2 - Essentials of Economics.pptx
PPTX
Corporate Governance and Financial Decision-Making in Consumer Goods.pptx
PDF
NewBase 22 August 2025 Energy News issue - 1818 by Khaled Al Awadi_compresse...
PPTX
Lecture on Perfect Competition of the course introduction to microeconomics
PDF
Very useful ppt for your banking assignments BANKING.pptx.pdf
PPTX
Risk Based Audit - Key to managhe the bussines & Creating the value
PDF
Income processes in Poland: An analysis based on GRID data
PPTX
Case study for Financial statements for Accounts
PPT
Business Process Analysis and Quality Management (PMgt 771) with 2 Credit Housr
PDF
2018_Simulating Hedge Fund Strategies Generalising Fund Performance Presentat...
PDF
Science 5555555555555555555555555555.pdf
PDF
Modern Advanced Accounting in Canada, 9th Edition by Darrell Herauf, Murray H...
PDF
Call cute girls 😀 Delhi, call now pls cute girls delhi call🔙
Machine Learning (ML) is a branch of Artificial Intelligence (AI)
Project_finance_introduction in finance.ppt
Simple linear regression model an important topic in econometrics
Very useful ppt for your banking assignments Banking.pptx
balanced_and_unbalanced_growth_theory_ppt.pptx
Pension Trustee Training (1).pdf From Salih Shah
Veritas Interim report 1 January – 30 June 2025
Chapter 2 - Essentials of Economics.pptx
Corporate Governance and Financial Decision-Making in Consumer Goods.pptx
NewBase 22 August 2025 Energy News issue - 1818 by Khaled Al Awadi_compresse...
Lecture on Perfect Competition of the course introduction to microeconomics
Very useful ppt for your banking assignments BANKING.pptx.pdf
Risk Based Audit - Key to managhe the bussines & Creating the value
Income processes in Poland: An analysis based on GRID data
Case study for Financial statements for Accounts
Business Process Analysis and Quality Management (PMgt 771) with 2 Credit Housr
2018_Simulating Hedge Fund Strategies Generalising Fund Performance Presentat...
Science 5555555555555555555555555555.pdf
Modern Advanced Accounting in Canada, 9th Edition by Darrell Herauf, Murray H...
Call cute girls 😀 Delhi, call now pls cute girls delhi call🔙

Prevent training

  • 2. Introduction • There should never be a case where nurses or any other hospital worker are looking at patients records other than there patient they are working on. If anyone are found in violation of this law they should have immediate action taken against them. Just because a person is a celebrity that doesn’t mean their personal lives should be violated
  • 3. HIPPA • “The Health Insurance Portability and Accountability Act of 1996 (HIPAA; Pub.L. 104-191, 110 Stat. 1936, enacted August 21, 1996) was enacted by the United States Congress and signed by President Bill Clinton in 1996. Title I of HIPAA protects health insurance coverage for workers and their families when they change or lose their jobs. Title II of HIPAA, known as the Administrative Simplification (AS) provisions, requires the establishment of national standards for electronic health care transactions and national identifiers for providers, health insurance plans, and employers”.
  • 4. Hitech • “The Health Information Technology for Economic and Clinical Health (HITECH) Act, enacted as part of the American Recovery and Reinvestment Act of 2009, was signed into law on February 17, 2009, to promote the adoption and meaningful use of health information technology”.
  • 5. Security Rule • “The HIPAA Security Rule establishes national standards to protect individuals’ electronic personal health information that is created, received, used, or maintained by a covered entity”
  • 6. Penalties • Fines • Jail time • Loss of license to practice • Public humiliation • Job loss
  • 7. Training • Making sure that people have read and signed the Privacy and security acts are step 1. • Next having quarterly meetings to reinstate what was signed and make sure everyone is following rules is step 2 • Step 3 would be to set up monthly security checks on public use computers of patient records
  • 8. Training • You want people to understand that you are serious about the laws and will not take things lightly if laws are broken. • Keeping accurate records on who works with each patient is a must. • Doing checks to make sure everyone is where they should be is a must as well • Finally creating pass codes for each patient that only the team that is working with them will know and use will be a great idea. If codes are used under another nurse or doctors name it should flag the system.
  • 9. Preventive Methods • For employees ways to make sure they are not in violation is to make sure they stay on only task assigned. If someone needs help make sure proper steps are taken. It is ok to ask questions to make sure you are in the right. Also logging off your computers properly will make sure that nobody else is working under your name. Also not sharing your pass words with anyone is a must. Every three months it is good to change your pass code to make sure nobody is using your account access.
  • 10. References • Wolper, L.F. (2011). Health care administration: Managing organized delivery systems (5th ed.). Sudbury, MA: Jones and Bartlett Publishers, Inc • http://www.hhs.gov/ocr/privacy/hipaa/admin istrative/securityrule/index.html