IT Security Policies and Videos
Three HIPAA IT Security Policies
Memorial Healthcare System is deeply committed to protecting patient privacy. Our three IT Security Policies are part of an ongoing effort to implement best practices and proper procedures intended to keep confidential information secure.
- Access: System Access Establishment, Modification and Termination Policy and Procedure (PDF)
- Monitoring: Information System Activity Review Policy and Procedure (PDF)
- Risk Analysis: HIPAA Risk Analysis and HIPAA Risk Management Policy (PDF)
These policies are distributed to all new members of our workforce including employees, medical staff, volunteers, vendors and affiliated physician office staff members, and regularly reinforced throughout the year. By raising awareness, we can all work together to maintain IT security and patient privacy.
Patient Privacy is Everyone's Responsibility
As part of our Memorial Healthcare System family, it is your responsibility to report any suspicious activity and to ensure you are only retrieving information that you have been authorized to access. Memorial Healthcare System has zero tolerance for snooping. No matter how well-intentioned a data search may seem, the act is considered a serious violation and can result in termination.
Patient information can include family history, medical records, and other confidential data as indicated below.
Examples of Protected Health Information (PHI) Include:
|Street address||License numbers|
|All elements of dates except year||Medical Record number|
|Telephone number||Health plan beneficiary number|
|Fax number||Device identifiers and their serial numbers|
|Email address||Vehicle identifiers|
|URL address||Biometric identifiers (finger and voice prints)|
|IP address||Full face photos and other comparable images|
|Social Security Number||Any other unique identifying number, code, or characteristic|
You are an ambassador of Memorial Healthcare System's standards. As a team, the actions of one affect us all. Protecting a patient's confidential data not only demonstrates respect, but also builds trust. Always remember what it means to be a part of the Memorial family—to care for our patients and to work as a unified force.
For more information or to report suspicious activity, please contact us at 954-265-1165 or email@example.com.
IT Security Videos
To better understand our IT Security Policies and patient privacy best practices, we encourage you to watch these videos on password sharing, identity theft, snooping, phone fraud scams, secure texting procedures, and more. Through various scenarios, learn how to identify situations that could put patient privacy and IT security at risk, and how to take proper measures to safeguard patient data.
Let’s all do our part to protect patient privacy.
Datasource: Identity Theft
Datasource: Monitoring access
Datasource: Never share password doctor
Datasource: Never share password nurse
Datasource: Phishing email
Datasource: Extra prints
Datasource: Secured video photos
Datasource: Log off or lock computer
Datasource: Phone fraud scam
Datasource: Printing trash
Smart Snippet: Video
Datasource: Texting orders
Datasource: Official social media channels
Datasource: Posting patient images on social media
Datasource: Sending unencrypted PHI
Datasource: C Drive
Datasource: Break-the-glass alert
Datasource: When to break-the-glass
Datasource: HIPPA IT security policies
Datasource: Monitoring policy
Datasource: Access policy
Datasource: Risk analysis policy