Resolution Privacy and Security Policies: What You Need to Know about Confidential or Protected Health Information

How Privacy and Security Applies to You
 For Current Employees and Contractors: Orientation on the Privacy and Security section is mandatory for all current staff members, as is the self-attest...
Fri, 3 Mar, 2017 at 4:27 PM
Elsevier Introduction
Employees who handle PHI will receive an email invitation for on-line Privacy and Security training through Elsevier.  All modules apply to all team members...
Wed, 4 Feb, 2015 at 4:16 PM
Overview Elsevier Modules
Resolution IT will assign lessons, if you have been required to take the training. Here are the Modules you can expect to be trained on: Privac...
Tue, 16 Sep, 2014 at 7:19 PM
What constitutes Protected Health Information (PHI)?
PHI is any document – paper or electronic – or verbal conversation that includes confidential health related information (such as diagnosis or procedure cod...
Sun, 21 Sep, 2014 at 3:17 PM
What is De-Identified Data?
Any document – paper or electronic –  that had been PHI but subsequently has had all of the data elements on the list above removed, encrypted, or rendered ...
Sun, 21 Sep, 2014 at 3:17 PM
Who may we share PHI and Confidential Information with?
The general guidance for sharing PHI or Confidential Information within re|solution or between re|solution and a specific facility’s staff is ‘minimum neces...
Sun, 21 Sep, 2014 at 3:18 PM
Examples of re|solution PHI and Confidential Information
Any documents, files or reports with Patients identified and info specific to those Patients are PHI Any docume...
Sun, 21 Sep, 2014 at 3:18 PM
How re|solution Identifies PHI and Confidential Information
Whomever creates a document known to contain PHI or Confidential Information should add the following footer to that document…   ‘Contains CONFIDENT...
Sun, 21 Sep, 2014 at 3:19 PM
Securely Communicate Confidential or Protected Health Information
Sharing PHI or Confidential Information Electronically Below are the generally acceptable ways to electronically share PHI and Confidential Informat...
Thu, 15 Jan, 2015 at 8:37 AM
Accessing PHI or Confidential Information from Mobile Devices
You may use Mobile Devices such as smart phones or tablets to access PHI and Confidential Information (such as files in Egnyte or @ereso.com email) IF ALL T...
Sun, 21 Sep, 2014 at 3:20 PM