Tuesday, September 24, 2019
Health Information Confidentiality Assignment Example | Topics and Well Written Essays - 500 words
Health Information Confidentiality - Assignment Example In addition, through implementing breach notification requirements, patients protect their identity if a breach occurs (Hebda & Czar, 2013). The benefits of collecting the confidential data of patients are more than the risks. It is important for the health care providers to conduct a review of the appropriate utilization and protection to ensure that patient data is protected (Davies & Collins, 2006). Improved technology and the current development of security software have made it possible for health care organizations to protect the private data of their patients and reduce the risk of data breaching. The major purpose of HITECH in to develop a nationwide electronic health records network that would allow for proper linking of health care professionals in ensuring quality health care for all citizens. The Act aims at promoting investment into information technology and thus promotes safety, quality health care, and efficiency in health management (Davies & Collins, 2006). The new HITECH notification requirements include notification of patients in the occurrence of an unsecured breach. In case the breach has an impact on more than 500 individuals, then there is need for the HHS to be aware (Institute of Medicine, 2009). Such notification will allow for automatic posting of the name of the entity that is carrying out the breach on the HHS website. The local media also have to be notified considering various conditions. These requirements are greatly effective in ensuring that the patients are kept up to date of any breach and that the involved entities are brought to book. This allows for timely counteraction of a breach and securing of patient data. The use of portable PHI could result in HIPAA violation involving the breaching of individual private data. Portable devices such as mobile phones store data on the devices, either in the SIM card, memory card, or
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.