0% found this document useful (1 vote)
199 views

Privacy and Confidentiality

This document discusses privacy, confidentiality, and protecting personal health information (PHI) according to relevant laws and policies. It defines privacy as an individual's right to control how their information is shared, and confidentiality as the obligation to protect entrusted information. The Personal Health Information Protection Act provides direction on collecting, using, disclosing, and retaining personal and health information. PHI includes any identifying and health-related information. Healthcare organizations must protect privacy, confidentiality, and security of PHI. Examples of privacy breaches and maintaining confidentiality are also outlined.

Uploaded by

Mary Grace Padre
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
199 views

Privacy and Confidentiality

This document discusses privacy, confidentiality, and protecting personal health information (PHI) according to relevant laws and policies. It defines privacy as an individual's right to control how their information is shared, and confidentiality as the obligation to protect entrusted information. The Personal Health Information Protection Act provides direction on collecting, using, disclosing, and retaining personal and health information. PHI includes any identifying and health-related information. Healthcare organizations must protect privacy, confidentiality, and security of PHI. Examples of privacy breaches and maintaining confidentiality are also outlined.

Uploaded by

Mary Grace Padre
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Privacy & Confidentiality

Privacy vs. Confidentiality?


• Confidentiality is the moral, ethical, legal, professional and
employment obligation to protect the information entrusted to us

• Includes anything you learn about the patient during his/her


hospital visit, including information on the patient’s hospital chart,
any information shared verbally, and any electronic information

• Privacy is the right of an individual to determine when, how and to


what extent they share information about themselves with others

• It is the patient’s right to control the collection, use and disclosure


of information
Personal Health Information Protection Act
(PHIPA)
• Provides direction to all individuals who collect, use,
disclose and retain personal information and personal
health information (PHI)

• Under PHIPA, the patient/substitute-decision maker


(SDM) has the right to access PHI, correct PHI, know
who has accessed his/her information and challenge
an organization’s privacy practices
Personal Health Information (PHI)
• PHI is any information and/or data that a healthcare professional
collects to identify an individual and determine appropriate care. This
includes information collected orally and/or in written form

• Every hospital has an obligation to protect the privacy, confidentiality


and security of personal information to which it is entrusted

• Examples include date of birth, address, medical record number


(MRN), OHIP number, records from previous visits, name of
healthcare provider, family history, and all information related to
physical or mental health
What is Confidential?
WRH considers the following types of information to be confidential:

• Personal information and PHI regarding patients and their families;

• Personal information, PHI, employment information, and


compensation information regarding staff and hospital affiliates; and

• Information regarding the organization’s operations, which are not


publicly disclosed (e.g. unpublished financial statements, legal
matters, quality of care)

• This applies whether this information is verbal, written, electronic or


in any other format
Breaching Privacy & Confidentiality
• A breach occurs when a patient’s private information is disclosed with
a third party without his/her consent. This includes sharing
information with other clerks who are not part of the team caring for
the patient

• A proven breach in privacy will be subject to discipline and possible


termination of placement

• Your career is at risk


• Potential civil action or criminal prosecution
• Your professional college will be notified
• Institutional and personal fines
Examples of Privacy Breaches
• Misdirected faxes
• Improper destruction of PHI
• Cell phones used to take pictures
in the hospital
• Staff member / clerk discussing
the patient, outside of patient care
• Sharing personal health
information on social networks
e.g. Facebook
• Unauthorized access – you must
NOT look at a patients’ records if
you are NOT providing care
How to Maintain Confidentiality/Privacy
• Avoid discussions of personal health information in public areas e.g.
cafeteria, hallway, other patient rooms
• Never leave charts, computers or other devices containing PHI
unattended or in clear view of others. File information or put charts
away in their proper place. Transport charts or other PHI face down or
in envelopes
• Do not share passwords. Always log off the computer. You are
responsible for activity under your password
• Do not engage in conversations with family, friends, neighbors, etc., in
the hospital, unless they approach you first. Don’t ask “Why are you
here?” People have the right to keep their reason for being on
hospital property private.
When Can You Share Confidential
Information?
• When accessing and sharing PHI, use the
“Need to Know” principle:
• Only access or share what is relevant for
patient care. This helps maintain privacy
• Circle of Care includes the healthcare
providers that are directly involved in the
provision of services to a patient
• Confidential information should only be
shared with individuals within the circle of
care
You have completed the Privacy Review.
Click on another content area for more
information. Once done reviewing all
content slides, please complete the
post-test.
Thank you

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy