Explanation of the legal requirements for protecting patient

Assignment Help Other Subject
Reference no: EM131143783

Protecting Patient Data-

Part I: Policy Manual Introduction

United General's hospital administrator reviews the hospital's policy manual and discovers that it inadequately addresses the area of patient records. The hospital administrator tasks you with reviewing the hospital policy manual and reporting on the thoroughness of its coverage of patient records. After a review of the policy manual, you report that the coverage of patient records is sparse and outdated. The hospital administrator then asks you to update the policy manual.

The policy manual introduction should include:

  • An update to the manual's introduction to include more depth in the area of patient records. As you write this section, describe the purpose of patient record protection and its importance to the organization.
  • An explanation of the legal requirements for protecting patient health records.

Part II: Risk Assessment

Because Pete compromised Winnie's patient records, the hospital administrator tasks you with identifying other potential risks that the hospital and the primary care physicians may need to address to protect patient records.

Your risk assessment should:

  • Identify risks to both electronic and paper patient records, and recommend remedies United General can put in place to protect the records from compromise.
  • Create policy statements that comply with the Health Insurance Portability and Accountability Act of 1996 (HIPAA) regulations addressing access to and disclosure of electronic and paper patient records.
  • Describe relevant training topics that will educate the staff on accessing and disclosing patient records.

Part III: Alignment with Regulatory Requirements

Winnie's lawsuit refers to United General's violation of patient record protection and privacy regulations as the prime cause of the problem. This has now opened United General to governmental inquiries as well as to federal lawsuits.

Write a 3-5 page APA style paper addressing the following:

  • Review the requirements of the HIPAA regulations and identify areas in the case study that breached HIPAA regulations, remembering your analysis of the hospital's policy manual-the policies applicable to patient record handling and disposal require an update to align with HIPAA regulations.
  • Create policy statements that align with HIPAA regulations that address patient health care record handling and disposal.
  • Describe relevant training topics for staff in order to educate them on the handling and disposal of patient records.

Part IV: Managerial Oversight

During Pete's exit interview he states that he did not receive managerial direction or training in regard to accessing computer systems and online patient records. The hospital administrator reviews the management training manual and finds that the area detailing instructions that management needs to give to staff is sparse. The hospital administrator asks that you write a section of the management training manual to provide clear instructions for management oversight in the area of handling and accessing patient records. As part of managerial oversight of hospital staff, access to patient records should be restricted and only available to appropriate staff members. For instance, in this case study, Pete should not have had access to Winnie's patient record.

This section of the management training manual should:

  • Include clear instructions for management oversight in the area of handling and accessing patient records.
  • Include policy statements for role-based security level access to patient records.
  • Describe methods to set security levels for accessing patient records to support the policy statements.

Note: The paper should be 10-16 pages, not including the title and reference pages. Your Assignment must be written in standard edited English. Be sure to support your work with 4-6 specific citations including the entries listed below and additional scholarly sources as appropriate. The Assignment should show effective application of triangulation of content and resources to show your conclusion and recommendations.

Readings

  • Wager, K. A., Lee, F. W., & Glaser, J. P. (2013). Health care information systems: A practical approach for health care management (3rd ed.). San Francisco, CA: Jossey-Bass.

Chapter 11, "Security of Health Care Information Systems" (pp. 351-391)

  • Reddy, C. K., &Aggerwal, C. C. (2015). Healthcare data analytics. Boca Raton, FL: CRC Press.

Chapter 15, "Privacy-Preserving Data Publishing Methods in Healthcare" (pp. 507-530)

  • Hoadley, E. D., Deibel, J., Kistner, C., Rice, P., &Sokhey, S. (2012). Seeking best practices in the balancing act between data security and operational effectiveness. International Journal of Management & Information Systems (Online), 16(2), 183.
  • Gonzalez, N., Miers, C., Redígolo, F., Simplício, M., Carvalho, T., Näslund, M., &Pourzandi, M. (2012). A quantitative analysis of current security concerns and solutions for cloud computing. Journal of Cloud Computing, 1(1), 1-18.

Reference no: EM131143783

Questions Cloud

What type of access controls are probably configured : If you can browse a file on a Windows network share, but are not able to copy it or modify it, what type of access controls and permissions are probably configured?
Journalize the transaction on the books of both companies : Hollins Company buys merchandise on account from Gordon Company. The selling price of the goods is $780, and the cost of the goods is $520. Both companies use perpetual inventory systems.
Presented below are the components in waegelain company : Presented below are the components in Waegelain Company's income statement. Determine the missingamounts.
What is the minimum password length enforced by the password : What is the minimum password length enforced by the Password must meet complexity requirements policy? What sources could you use as a source to perform the MBSA security scan?
Explanation of the legal requirements for protecting patient : An update to the manual's introduction to include more depth in the area of patient records. As you write this section, describe the purpose of patient record protection and its importance to the organization. An explanation of the legal requirements..
The impact of abortion on the future generations : Write a Custom Essay on the topic "The Impact Of Abortion On The Future Generations"
Indicate the columns of the work sheet in which : Indicate the columns of the work sheet in which (a) Merchandise inventory and (b) Cost of goods sold will be shown.
What was the terminal password for lanswitch one and two : What were the Destination IP addresses discovered by the NetWitness Investigator analysis? Are packet-capturing tools like Wireshark less dangerous on switched LANs? What was the terminal password for LanSwitch 1 and LanSwitch 2?
Record payment of the balance due within the discount period : Give the journal entry on July 24 to record payment of the balance due within the discount period, assuming a periodic inventory system.

Reviews

Write a Review

Other Subject Questions & Answers

  Describe how the unitarist and pluralist approaches

Describe how the Unitarist and Pluralist approaches to conflict would explain the positions of (a) management and (b) unions in the Aurizon dispute. Identify which one of the approaches provides the better explanation. Explain how you reached this co..

  Potential health effects from radiation exposure

Describe three ways in which you may be exposed to radiation in your community in the next 12 months. Describe three potential health effects from radiation exposure during your lifetime

  Write a reflection about africa society

Watch the above movie and write a reflection about africa society

  General information regarding diagnosis

Also, I need to include general information regarding the diagnosis itself and why did this person fit the criteria for this particular disorder.

  Review the benefits to an elevator pitch

Benefits to an Elevator Pitch, Making an Initial connection, Structuring your Pitch

  Describe the domestic challenges

Describe the domestic challenges that affect foreign policy making and what you feel are the 2 most effective tools (Political, Socio-Cultural, Economic or Military) a nation state has to achieve its objectives.

  Tax computation

Need help with part I, tax computation. Compute the Rose's Federal Income tax payable or refund due, assuming they file a joint income tax return, for 2009.

  Determine some of the privacy problems related to biometrics

Research the Internet to determine some of the privacy problems related to biometrics. Consider some of the mechanisms that could mitigate these problems and concerns

  Anticommunism and mccarthyism during this period

anticommunism and McCarthyism during this period, including examples or quotes from each of the three articles you located (see rubric below).

  What were some of the major contributing factors

The Great Recession of 2007–2009 affected millions of U.S. citizens and had multiple causes. What were some of the major contributing factors and how did they combine to cause the recession? How were you affected by it? What are some long-term implic..

  Laaser understanding of sexual addiction

What does Laaser believe are some of the roots of sexual addiction? Explore how the dynamics of your family of origin and personal underlying beliefs about sex may affect your ability to treat persons with sex addiction.

  What should yahoo do about the situation in laffaire yahoo

In your opinion, what should Yahoo do about the situation in L'Affaire Yahoo? Should it make concessions to the French government

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd