Sanyia Meghani MMHA 6600 Healthcare Informatics Week 9 – Assignment – Protecting Patient Data Dr. Gillespie
Part I: Policy Manual Introduction United General Hospital is, like many other health care organizations, working to develop processes and systems that will provide control to help protect against security breaches associated with patient confidentiality and data compromise. Protecting patient healthcare data is becoming a greater challenge for facilities as the industry transitions from manual to electronic information storage and sharing. The number of individuals that have been affected by health care data breaches is on the rise and has resulted in the pressure of regulating stricter guidelines and rules for organizations to abide by. Stricter and more in-depth guidelines are required to be integrated at United General Hospital due to the recent increase in volume of patients and updated use of technology to manage records. Additionally, this will allow our organization to implement penalties and disciplinary action where required for liable parties of any and all security breaches. The Health Insurance Portability and Accountability Act of 1996 (HIPAA) requires the development of regulations to protect the privacy of health information. With the use of modernized clinical technology for patient records and other healthcare systems, the medical workforce has seen a rise in the potential security risks. This security law requires covered individuals to be ensured confidentiality, integrity and compliance by their workforce against improper access to their information. The purpose of this rule is to protect the privacy of individuals’ health information and to ensure that with the implementation of electronic records the likelihood of potential risk to electronic patient health information (e-PHI) is decreased. “HIPAA requirements grant patients several key privacy rights” (National Center for Medical Records 2018) while imposing obligations on health care providers to apply those safety measures. Although many rules and regulations are put into place, the risk analysis of manually
reviewing records and tracking access should be implemented as an ongoing process. It is legally required for institutions to follow the general rules of HIPAA to be able to operate the systems with the utmost integrity. All entities must ensure confidentiality of all e-PHI under their operation, identify and protect against possible security threats, protect against impermissible uses and ensure compliance by their workforce. These basic models will allow reasonable protection as demanded by the law.
Part II: Risk Assessment Health care organizations have a liability to identify potentials risks and implement assessments to protect patient records. When patient records are accessible by a large volume of individuals, it requires proper compliance to be integrated. In addition to potential fines and other
Want to read all 14 pages?
Previewing 5 of 14 pages Upload your study docs or become a member.
Want to read all 14 pages?
Previewing 5 of 14 pages Upload your study docs or become a member.
End of preview
Want to read all 14 pages? Upload your study docs or become a member.