Final Project Two - Milestone Two.docx - 1 FINAL PROJECT...

This preview shows page 1 - 4 out of 9 pages.

1FINAL PROJECT TWO: POLICY INTRODUCTION & EVALUATIONFinal Project Two: Policy IntroductionAnd EvaluationKevin OkimotoSouthern New Hampshire UniversityIHP-501 Global Health and DiversityDr. FaheyJuly 26th, 2020
2FINAL PROJECT TWO: POLICY INTRODUCTION & EVALUATIONPolicy IntroductionThe Health Insurance Portability and Accountability Act (HIPAA) of 1996 is a federal law that required the creation of national standards in order to secure protected health information (PHI) from being disclosed without the patient’s consent or knowledge (HIPAA, 2018). Prior to HIPAA, there was no generally accepted set of security standards that protected PHI within the healthcare industry. As technology began to evolve, the healthcare industry made its attempt to move away from paper processes and rely more heavily on the use of electronic information systems that were capable of paying claims, answering eligibility questions, and providing a patient’s health information; additionally, these new electronic systems were able to perform a host of other administrative and clinically based functions. However, in order to fulfill HIPAA requirements, the U.S. Department of Health and Human Services (HSS) developed what is known as the HIPAA Privacy Rule and the HIPAA Security Rule (Summary of the HIPAA, 2013). HIPAA was designed to address the use and disclosure of an individual’s protected health information (PHI) by various covered entities. Examples of covered entities include, healthcare providers, health plans, healthcare clearinghouses, and business associates. The Privacy Rule permits the use of important information by these covered entities, while also protecting the privacy of people who seek care and healing. Moreover, the Rule contains a set of standards that enable individuals (e.g. clients/patients) with the right to understand and control how their health information is being used (HIPAA, 2018). Whereas the Security Rule protects the accessibility of PHI in its electronic form, its flexibility and scalability provide covered entities with the ability to implement policies and procedures that are appropriate for the organization’s or entity’s structure and risks to consumers’ electronic protected health
3FINAL PROJECT TWO: POLICY INTRODUCTION & EVALUATIONinformation (e-PHI). Furthermore, it also allows these entities to adopt new technologies that will help evidently improve the quality and efficiency of patient care (Summary of the HIPAA, 2013). The Privacy and Security Rules work in conjunction with one another. They set standards that ensure a measure of compliance is upheld by various covered entities, providing patients or clients with the confidence and security they require to feel safe and content when committing themselves, and their information to an organization.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture