IT Security Policies and Videos

Guide to MHS HIPAA Privacy Security Policies

Three HIPAA IT Security Policies

Memorial Healthcare System is deeply committed to protecting patient privacy. Our three IT Security Policies are part of an ongoing effort to implement best practices and proper procedures intended to keep confidential information secure.

  1. Access: System Access Establishment, Modification and Termination Policy and Procedure (PDF)
  2. Monitoring: Information System Activity Review Policy and Procedure (PDF)
  3. Risk Analysis: HIPAA Risk Analysis and HIPAA Risk Management Policy (PDF)

These policies are distributed to all new members of our workforce including employees, medical staff, volunteers, vendors and affiliated physician office staff members, and regularly reinforced throughout the year. By raising awareness, we can all work together to maintain IT security and patient privacy.

Patient Privacy is Everyone's Responsibility

As part of our Memorial Healthcare System family, it is your responsibility to report any suspicious activity and to ensure you are only retrieving information that you have been authorized to access. Memorial Healthcare System has zero tolerance for snooping. No matter how well-intentioned a data search may seem, the act is considered a serious violation and can result in termination.

Patient information can include family history, medical records, and other confidential data as indicated below.

Examples of Protected Health Information (PHI) Include:

Name Account numbers
Street address License numbers
All elements of dates except year Medical Record number
Telephone number Health plan beneficiary number
Fax number Device identifiers and their serial numbers
Email address Vehicle identifiers
URL address Biometric identifiers (finger and voice prints)
IP address Full face photos and other comparable images
Social Security Number Any other unique identifying number, code, or characteristic

You are an ambassador of Memorial Healthcare System's standards. As a team, the actions of one affect us all. Protecting a patient's confidential data not only demonstrates respect, but also builds trust. Always remember what it means to be a part of the Memorial family—to care for our patients and to work as a unified force.

For more information or to report suspicious activity, please contact us at 954-265-1165 or mhsprivacy@mhs.net.

IT Security Videos

To better understand our IT Security Policies and patient privacy best practices, we encourage you to watch these videos on password sharing, identity theft, snooping, phone fraud scams, secure texting procedures, and more. Through various scenarios, learn how to identify situations that could put patient privacy and IT security at risk, and how to take proper measures to safeguard patient data.

Let’s all do our part to protect patient privacy.

Smart Snippet: Video
Datasource: Identity Theft
 
Smart Snippet: Video
Datasource: Monitoring access
 
Smart Snippet: Video
Datasource: Never share password doctor
 
Smart Snippet: Video
Datasource: Never share password nurse
 
Smart Snippet: Video
Datasource: Printing
 
Smart Snippet: Video
Datasource: Snooping
 
Smart Snippet: Video
Datasource: Phishing email
 
Smart Snippet: Video
Datasource: Extra prints
 
Smart Snippet: Video
Datasource: Secured video photos
 
Smart Snippet: Video
Datasource: Log off or lock computer
 
Smart Snippet: Video
Datasource: Phone fraud scam
 
Smart Snippet: Video
Datasource: Printing trash
 
Smart Snippet: Video
Smart Snippet: Video
Datasource: Texting orders
 
Smart Snippet: Video
Datasource: Official social media channels
 
Smart Snippet: Video
Datasource: Posting patient images on social media
 
Smart Snippet: Video
Datasource: Sending unencrypted PHI
 
Smart Snippet: Video
Datasource: C Drive
 
Smart Snippet: Video
Datasource: Break-the-glass alert
 
Smart Snippet: Video
Datasource: When to break-the-glass
 
Smart Snippet: Video
Datasource: HIPPA IT security policies
 
Smart Snippet: Video
Datasource: Monitoring policy
 
Smart Snippet: Video
Datasource: Access policy
 
Smart Snippet: Video
Datasource: Risk analysis policy