Deepscribe HIPAA
Deepscribe HIPAA
Learning Objectives
To put it simply, anyone who is part of the “business associate” or “covered entity” and can
access, alter, create, or transfer recorded ePHI will be required to follow these standards.
HIPAA Security Rule (continued)
Under such a case, the organization should ensure that such incidents don’t reoccur and
take corrective action plans. Breach alerts are required only for unsecured PHI.
What is PHI?
Protected Health Information (PHI)
Protected
Health
Identifier Health
Information
Information
Who Can Access HPI?
● Social media
○ Sharing photos and PHI of the patient on
Facebook, Linkedin, Instagram, Twitter, Tumblr,
etc.
● Authorization requirements
○ Written consent is required for the use or
disclosure of any individual’s PHI that is not used
for treatment, healthcare operations, or
permitted by the HIPAA privacy rule.
Do Your Part to Protect PHI
● Only access information during your assigned shifts and for your
assigned note(s).
UP NEXT:
HIPAA Quiz