Research the laws and regulations

Assignment Help Management Information Sys
Reference no: EM132273600

Assignment

A list of 18 identifiers was created in 1996 by the US Health Insurance Portability and Accountability Act (HIPAA) to represent protected health information (PHI). PHI is any information that can be used to identify an individual and that was created, used, or disclosed during a patient-physician encounter.

In contrast, personal identifiers, such as name and address, are not considered to be PHI unless they are associated with or derived from a health-care service event.

In addition, health information by itself without the 18 identifiers is not considered to be PHI. For example, a dataset that contains only patient vital signs or blood pressure readings would not be PHI. The identifiers that HIPAA established are:

Names

Geographic information (including city, state, and zip code)

Elements of dates

Telephone numbers

Fax numbers

E-mail address

Social Security numbers

Medical record, prescription numbers

Health plan beneficiary numbers

Account numbers

Certificate/license numbers

VIN, serial numbers, license plate numbers

Device identifiers, serial numbers

Web URLs

IP addresses

Biometric identifiers (finger prints)

Full face, comparable photo images

Unique identifying numbers

PHI data can be "de-identified" for use within research or other related projects.

Also search the Internet for the principles and values of medical ethics as can be found at the Web site, American Medical Association Principles of Medical Ethics.

Research the laws and regulations that require care providers to override patient confidentiality and privacy rights, such as is the case in New York for communicable diseases (for more information on this, see the New York State Department of Health Web site).

For this Discussion:

Comment on the types of identifiers and consider their stratification based upon risk to the patient as a result of non-consensual disclosure.

Discuss the ramifications concerning unauthorized disclosure of a patient's PHI.

Discuss how the principles of medical ethics apply to unauthorized disclosure.

Describe measures that are commonly taken to assure both privacy and security concerning a patient's PHI, and their rationale.

Reference no: EM132273600

Questions Cloud

Explain different types of attacks on cloud-based architects : Type an essay describing the common security threats to cloud-based environments and different types of attacks on cloud-based architects.
Identify two companies that have time-based strategies : Identify two companies that have time-based strategies, and two that have quality-based strategies.
What is inventory accumulation or decumulation : If Y is 1,500, what is planned spending? What is inventory accumulation or decumulation? Should equilibrium Y be higher or lower than 1,500?
Examine the major design flaws and features of the airline : Describe the key factors that constitute a user friendly check-in experience. Examine the major design flaws and features of the airline you researched.
Research the laws and regulations : Research the laws and regulations that require care providers to override patient confidentiality and privacy rights, such as is the case in New York.
Create a query showing all sales that occurred in aurora : Create at least 2 related Tables. Create a Query showing all sales that occurred in Aurora. Name it City Sales Query.
Comments ending up on facebook about patients : Perhaps you have heard about pictures and comments ending up on Facebook about patients.
Pros and cons of the current highway funding structure : What are the pros and cons of the current highway funding structure as related the taxes paid by motor carries?
Write a report detailing steps jack needs to take to gather : Write a one-page report detailing the steps Jack needs to take to gather all of the appropriate evidence and protect his company.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd