mhm. Hello, I'm Adler Archer. And today we'll be learning about how to safeguard sensitive healthcare data. So during this presentation will discuss safeguarding healthcare data as well as the three types of safeguards that hip requires under the security rule. We'll talk about some additional protective measures, and then we'll give some examples of not protecting sensitive healthcare data. So three government requires health care organizations to safeguard protected health information. Ph i, HIPPA has a security rule, and within that rule it outlines three different types of safeguards that required eso administrative, technical and physical. And it's just important to know these things because it's really everyone's responsibility to work as a team toe. Make sure that we protect our patients. Healthcare data, eso, administrative safeguards, thes air generally policies, procedures, rules, different things that an organization puts into place from a policy standpoint, to make sure that people are aware of the rules and to make sure that people are doing the things they should be doing if they work for covered entity or business associate covered entities or, generally, hospitals, health care providers, clearing houses, any organization that's going to deal with patient protected health information or their business associates. So this could be like accounting firms or other organizations that would have access toe patient billing information or other things. So anyone that's going to come into contact with that protected health information that required to also have administrative safeguards physical safeguards. So these are things that you do to actually physically prevent someone from getting to your data. So, policies, procedures, protocols around that. So, you know, limiting access to you can come into the facility. Maybe if people can get into the facility limiting access to the room where the data is housed so they can't physically get to the data. Eso maybe having like a key batch to get in, certainly having a log of who's going in and out so you can keep track of who's had physical access. Eso those air examples of physical safeguards and the third type is technical safeguards. So these were going to be technology based things that you would do to help monitor who's got access to the information. Where is going. Is it really going where it's meant to be going So transmission control so assessing when the data is transmitted if it's exposed to go to port, is it actually going there? Is it getting intercepted some way so that someone can have access to which was not meant to have access? So all of the different tech based ways that you would monitor and control access to PH I and then some other ways to protect the health data, which are, you know, pretty basic to do. But they're important for us all to keep in mind. So when you're using a system and you finish, just log out, tap out of it, log out. Make sure that when you're done that you completely exit. So the next person has thio log in with your credentials to get into the system, and that kind of gets too strong. Passwords, right. So, password is not a good password. 121212 It's not a good password. So you know you want to have a strong password that's hard to guess. To help make sure that people aren't getting access to the system because they guess your password and user name. Now they have access to this protected data along the same thing. You don't want to share your passwords with people, even if it's someone you know really well, because everything you do under your log in is track to you. So if you give your password to someone else and they're looking up stuff using your log in, then it looks as if it's something that you're doing. So you want to make sure that it's always something that is related to what you're working on and then let other people log in using their data. Andi, if you see something, say something. So if you see something that seems suspicious, report it. If you're not sure, if you think it might be. But maybe it's not. It's better safe than sorry just to report it to your security team, and then they can help you figure out what to do to a true or false. It is acceptable to share your log in and password for the medical record system with a co worker so long as it's a friend or someone you trust. And so if you answered false, of course, that's the right answer. Just to say it again. You definitely don't want to share your passwords, and it's not even necessarily about whether you trust the person. It's just that everything you do with your log in and password is attributed to you every file you look at so it could be that you've given it to someone. They're using it for a legitimate reason. The looking up something that's related to what they're working on. But it's not related to what you're working on. So if they're using your log in, then it looks like you're researching some patients record they shouldn't be. So it's just really important to make sure that you have a strong password and then don't share that password with anyone. So just to recap what we've covered, you know why It's important toe safeguard healthcare data The different safeguards that are required under law so administrate a technical physical, additional protective measures you can take and then example so not protecting that data. So thank you so much for watching