HIPPA Tutorial Summary
September 8, 2014
University of Phoenix
HIPPA Tutorial Summary
HIPAA stands for Health Insurance Portability and Accountability Act. HIPAA privacy rule was passed by congress in August of 2002. According to Understanding Health Information Privacy (2014), "The HIPAA Privacy Rule provides federal protections for individually identifiable health information held by covered entities and their business associates and gives patients an array of rights with respect to that information. At the same time, the Privacy Rule is balanced so that it permits the disclosure of health information needed for patient care and other important purposes.” The Security Rule specifies a sequence of administrative, technical, and physical safeguards for covered entities and their business associates to use to assure the confidentiality, availability, and integrity of electronic protected health information (Understanding Health Information Privacy, 2014). The HIPAA, Health Insurance Portability and Accountability Act, tutorials are a memento that there is continuous need for progress on the part of health care professionals and individuals. There is a strong need among health care professionals to know the guidelines, rules and regulations to stay within the laws set onward by the federal government.
What did you learn from the HIPAA tutorial?
The HIPAA tutorial was very educational and informative. I learned many things from this tutorial; however, I found the online information the most fascinating. Personally, I started in healthcare soon before we had EMR’s (electronic medical records) or as HIPPA calls them, EHR’s (electronic health records). A majority of us feel that our health information is personal as well as private and should be protected. The federal government put in position the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy Rule to ensure you have rights over your own personal health information, no matter what form it is in (Understanding Health Information Privacy, 2014). The government also created the HIPAA Security Rule to require specific protections to safeguard your electronic health information (Understanding Health Information Privacy, 2014). A few possible procedures that can be built in to EHR/EMR systems may include:
“Access control” tools like PIN numbers and passwords, to help limit access to your information to authorized individuals (Understanding Health Information Privacy, 2014).
“Encrypting” your stored information. That means your health information cannot be understood or read except by those using a system that can “decrypt” it with a “key” (Understanding Health Information Privacy, 2014).
An “audit trail” characteristic, which records who accessed your information, when and what changes were made (Understanding Health Information Privacy, 2014).
There is so much new technology and more modern advances in technology to come. With just about everything being based on computers comes with a whole new set of procedures and policies to keep individuals personal health information private. Federal law requires hospitals, doctor offices, doctors, and other health care providers/professionals to notify you of a “breach” (Understanding Health Information Privacy, 2014). The law also requires the health care providers/professionals to notify the Secretary of Health and Human Services (Understanding Health Information Privacy, 2014). The Understanding Health Information Privacy (2014) “If a breach affects more than 500 residents of a state or jurisdiction, the health care provider must also notify prominent media outlets serving the state or jurisdiction.” This requirement helps patients know if something has gone erroneous with the protection of their information and helps keep providers accountable for HER/EMR protection (Understanding Health Information Privacy, 2014).
Also, I did not know...
References: Understanding Health Information Privacy. (2014). Retrieved from http://www.hhs.gov/ocr/privacy/hipaa/understanding/index.html
Pritts, J. L. (2010). The Importance and Value of Protecting the Privacy of Health Information: The Roles of the HIPAA Privacy Rule and the Common Rule in Health Research . Retrieved from
HIPPA HEALTH. (2010). Retrieved from https://www.courses.learnsomething.com/scripts2/content.asp?a=9F7B983E559541A692699E4D6709D56D&ph=0A2241E0A9004D7EB6AD1293A5A86346&r=BeginFlashCourse&screenw=1280&screenh=800
Please join StudyMode to read the full document