Click the >> arrow to play the video.

This is the fifth episode in the 8-part series, Health Information Privacy and Security Policies and Procedures orientation training.

Welcome Back to the Privacy Procedure Orientation Training series!

This training series is part of the Health Information Privacy and Security Policies and Procedures that your clinic has purchased.

In this episode, we will review the policies and procedures related to research, records security, and wireless networking as outlined in your clinic’s Health Information Privacy and Security Manual. These guidelines ensure that personal information is kept private, confidential, and secure—whether it’s used for patient care or authorized secondary purposes like research or business management.

Ensuring Privacy in Secondary Use of Health Information

When using personal health information for secondary purposes such as research or evaluation, it’s essential to follow the correct privacy procedures. These safeguards apply not only to clinical settings but also to administrative tasks that help manage the clinic’s operations.

Key Policies to Review

Make sure to carefully review the following privacy procedures in your manual:

  • Research and Evaluation
  • Records Security Classification
  • Information Security in Contracting
  • Wireless Networking, Remote Access, and Mobile Devices

These policies ensure that both in-office and remote work environments maintain the highest standards of health information security.

Wireless and Remote Access for Healthcare Workers

If you are working remotely, whether to access email or other non-patient information, you are expected to follow best practices for wireless networks, remote access, and mobile devices. These practices ensure that health information remains secure, even outside the clinic.

Related Forms to Review

It’s important to review the related forms to maintain compliance with privacy laws and best practices. See your Health Information Privacy and Security Policies and Procedure Manual for templates that you can customize for your practice.

  • Form 5.1.1: Confidentiality Oath – Affiliates (Employees)
  • Form 5.1.2: Confidentiality Oath – Custodians (Physicians, Nurses, Others)
  • Form 5.4.1: PIA Amendment – New Custodian Joins the Clinic
  • Form 5.4.2: Amendment Letter for a New Custodian

Next Episode: Disaster Planning, Sanctions, and Privacy Breach

In the next episode, we will cover the policies related to disaster planning, sanctions, and responding to privacy breaches.

Stay tuned!

 

Don’t Have Written Privacy Policies and Procedures Yet?

If your clinic hasn’t yet purchased the Health Information Privacy and Security Policies and Procedures templates from Information Managers Ltd., don’t worry! You can still follow along with this training and refer to your current clinic’s procedures.

If you don’t have written policies in place yet, now is a great time to get started. Check out our customizable templates to help your healthcare practice stay compliant and protect patient information. Learn more at https://informationmanagers.ca/policy-and-procedure-template/.