IT Security Policies and Videos

Three HIPAA IT Security Policies

Guide to HIPAA Privacy Security Policies

Memorial Healthcare System is deeply committed to protecting patient privacy. Our three IT Security Policies are part of an ongoing effort to implement best practices and proper procedures intended to keep confidential information secure.

  1. Access: System Access Establishment, Modification and Termination Policy and Procedure (PDF)
  2. Monitoring: Information System Activity Review Policy and Procedure (PDF)
  3. Risk Analysis: HIPAA Risk Analysis and HIPAA Risk Management Policy (PDF)

These policies are distributed to all new members of our workforce including employees, medical staff, volunteers, vendors and affiliated physician office staff members, and regularly reinforced throughout the year. By raising awareness, we can all work together to maintain IT security and patient privacy.

Patient Privacy is Everyone's Responsibility

As part of our Memorial Healthcare System family, it is your responsibility to report any suspicious activity and to ensure you are only retrieving information that you have been authorized to access. Memorial Healthcare System has zero tolerance for snooping. No matter how well-intentioned a data search may seem, the act is considered a serious violation and can result in termination.

Patient information can include family history, medical records, and other confidential data as indicated below.

Examples of Protected Health Information (PHI) Include:

The following:  
Name Account Numbers
Street Address License Numbers
All elements of dates except year Medical Record number
Telephone number Health plan beneficiary number
Email address Device identifiers and their serial numbers
URL address Vehicle identifiers
IP address Biometric identifiers (finger and voice prints)
Social Security Number Any other unique identifying number, code, or characteristic

 

You are an ambassador of Memorial Healthcare System's standards. As a team, the actions of one affect us all. Protecting a patient's confidential data not only demonstrates respect, but also builds trust. Always remember what it means to be a part of the Memorial family—to care for our patients and to work as a unified force.

For more information or to report suspicious activity, please contact us at 954-265-1165 or mhsprivacy@mhs.net.

IT Security Videos

To better understand our IT Security Policies and patient privacy best practices, we encourage you to watch these videos on password sharing, identity theft, snooping, phone fraud scams, secure texting procedures, and more. Through various scenarios, learn how to identify situations that could put patient privacy and IT security at risk, and how to take proper measures to safeguard patient data.

Let’s all do our part to protect patient privacy.

IdentityTheft

IdentityTheft

Memorial has zero tolerance for identity theft
monitoring access

monitoring access

password doctor

password doctor

password nurse

password nurse

027 printing 720

027 printing 720

snooping

snooping

065 Phishingemail final 720

065 Phishingemail final 720

028 ExtraPrints 720

028 ExtraPrints 720

045 SecuredVideoPhotos 720

045 SecuredVideoPhotos 720

030 Logofforlock 720

030 Logofforlock 720

066 PhoneFraudScam final 720 wm

066 PhoneFraudScam final 720 wm

029 printing trash 720

029 printing trash 720

Texting Orders Is A Serious Violation

Texting Orders Is A Serious Violation

At Memorial, texting orders, including clarifications, continuations or discontinuations is a serious violation to MHS privacy policy.
Only Share Memorial News From Official Social Media Channels

Only Share Memorial News From Official Social Media Channels

Posting Patient Images or Video on Personal Social Media Violates Privacy

Posting Patient Images or Video on Personal Social Media Violates Privacy

Sending Unencrypted Patient Information Is Serious Violation

Sending Unencrypted Patient Information Is Serious Violation

Saving To Your C Drive Can Put You At Risk

Saving To Your C Drive Can Put You At Risk

Break The Glass Events Reported By Privacy Monitoring System

Break The Glass Events Reported By Privacy Monitoring System

When Break The Glass Is Appropriate

When Break The Glass Is Appropriate

Locations of IT Security Policies

Locations of IT Security Policies

Monitoring Policy

Monitoring Policy

Access Policy

Access Policy

Risk Analysis Policy

Risk Analysis Policy

Daughter learning how to assist her mother during a Family In Training (FIT) Program session at Memorial Regional South.

Patient and Family Centered Care

We treat patients and family members as partners in healthcare.

It matters to you. It matters to us.

Quality and Safety Data for Memorial Healthcare System

Our goal is to provide our patients with the information they need to make informed choices for themselves and their families.

View Quality and Safety
You have a Right to Know About Prices

We want to give you the information you need to make important healthcare decisions, including the costs of our services.

View Pricing
MyChart Portal

View test results, schedule follow-up appointments, request prescription refills and more.

Login or Sign-up to MyChart