Verified Document

Patient Privacy Protecting Patient Privacy Term Paper

Advanced technology such as retinal scans, or fingerprint matching could be employed at the most sensitive levels. The implementation of such a system would be long and complicated. The first step would be the development and testing of the software package. The second would be training bedside personnel to enter information into the system properly. The third would be to encode existing patient information into the system. Next, a system for dispersing access to the various levels would have to be developed. Each of these components results in an integrated system that would result in the highest level of patient confidentiality, yet would allow those that need confidential access to have it. This system would serve the needs of the patients by way of quality improvement and would provide the maximum level of security possible.

References

Conn, J. (2005). AHA dispute with JCAHO over data-mining flare ups. Retrieved May 14, 2008 at http://www.patientprivacyrights.org/site/News2?page=NewsArticle&id=6438.

Lerouge, C, Culijak, G, & Horan, T. (2007). Consumer Health Informatics, Patient Safety and Quality of Practice. System Sciences, 2007. HICSS 2007. 40th Annual Hawaii...

Held January 2007 at Waikoloa, HI. IEEE Xplore. Retreived May 13, 2008 at http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=4076635
Loonsk, J. (2004). BioSense - a National Initiative for Early Detection and Quantification of Public Health Emergencies. MMWR Supplement. September 24, 2004. 53(Suppl);53-55. http://www.cdc.gov/mmwr/preview/mmwrhtml/su5301a13.htm

McNabb, S., Koo, D., Pinner, R., and Seligman, J. (2006). Informatics and Public Health at CDC. MMWR. December 22, 2006. 55(SUP02);25-28. Retrieved May 13, 2008 at http://www.cdc.gov/mmwr/preview/mmwrhtml/su5502a10.htm?s_cid=su5502a10_e

National Cancer Institute (2000). Shared Pathology Informatics Network (SPIN). RFA: CA-01-

http://grants.nih.gov/grants/guide/rfa-files/RFA-CA-01-006.htm

Office for Civil Rights (OCR)(2003). Summary of the HIPAA Privacy Rule. Department of Health and Human Services. http://www.hhs.gov/ocr/privacysummary.pdf

Ohno-Machadoa, L., Silveirab, P., and Vinterboa, S. (2004). Protecting patient privacy by quantifiable control of disclosures in disseminated databases. International Journal of Health Informatics. 73 (7-8), 599-606.

Sources used in this document:
References

Conn, J. (2005). AHA dispute with JCAHO over data-mining flare ups. Retrieved May 14, 2008 at http://www.patientprivacyrights.org/site/News2?page=NewsArticle&id=6438.

Lerouge, C, Culijak, G, & Horan, T. (2007). Consumer Health Informatics, Patient Safety and Quality of Practice. System Sciences, 2007. HICSS 2007. 40th Annual Hawaii International Conference. Held January 2007 at Waikoloa, HI. IEEE Xplore. Retreived May 13, 2008 at http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=4076635

Loonsk, J. (2004). BioSense - a National Initiative for Early Detection and Quantification of Public Health Emergencies. MMWR Supplement. September 24, 2004. 53(Suppl);53-55. http://www.cdc.gov/mmwr/preview/mmwrhtml/su5301a13.htm

McNabb, S., Koo, D., Pinner, R., and Seligman, J. (2006). Informatics and Public Health at CDC. MMWR. December 22, 2006. 55(SUP02);25-28. Retrieved May 13, 2008 at http://www.cdc.gov/mmwr/preview/mmwrhtml/su5502a10.htm?s_cid=su5502a10_e
http://grants.nih.gov/grants/guide/rfa-files/RFA-CA-01-006.htm
Office for Civil Rights (OCR)(2003). Summary of the HIPAA Privacy Rule. Department of Health and Human Services. http://www.hhs.gov/ocr/privacysummary.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Patient Rights the Major Objective of Informed
Words: 1091 Length: 4 Document Type: Essay

Patient Rights The major objective of informed consent is to give the patient an opportunity play a role in his health care decision. The law requires physicians to get an informed consent of their patients before any medical procedure. The patient has a right to be informed and to be made aware of the nature of the procedure, available alternatives to the medical operation, the risks, benefits and uncertainties related to

Privacy Laws Are a Big
Words: 1816 Length: 6 Document Type: Research Paper

They are also required to assess and address risks to customer information in all areas of operations, including employee management and training, information systems, and detecting and managing system failures. They must address what information is collected and stored as well as whether there is a business need for that particular information. Depending on the type of business operations, privacy laws govern how companies collect, store, and use customer identifiable

Patient's Guide to the Internet
Words: 642 Length: 2 Document Type: Essay

This can be as relatively minor as a night without sleep every few weeks or a continual struggle to sleep every night. Curing insomnia by just trying to Google a response to the problem only unleashes a flood of websites that offer all sorts of over-the-counter and prescription medications. The person wants to find relaxation techniques and also understand how they can overcome the insomnia on their own without

Privacy Protection Act the United
Words: 2315 Length: 8 Document Type: Term Paper

For example, almost all companies doing business on the Internet will have a link disclosing their privacy policy and the steps they will take to ensure the customer's privacy. Privacy matters become an issue because, in order to transact business of the Internet, one is required to enter such personal information as credit card numbers, addresses, emails and personal phone numbers. The vast majority of online businesses will have policy disclosure

Patient Privacy and Security Information
Words: 1794 Length: 5 Document Type: Research Paper

This is troubling, because the different exemptions can cause confusion among stakeholders about how they would apply. Where, health care providers, regulators and insurance companies can be able to circumvent the law, under the exemptions of HIPPA and the Privacy Act. For the individual this gives the appearance of security, yet the various exemptions do little to increase privacy. Then when you consider the fact; that these laws reflect

Patient Safety and Security Patient Information, Privacy
Words: 2093 Length: 7 Document Type: Essay

Patient Safety and Security Patient information, privacy and security are at the heart of providing a high level of medical services. These issues are vitally important if patient confidence is to be retained, in addition to ensuring that no potential harm comes to the patient. Hence, the information systems at any hospital should be managed in such a way as to retain the confidentiality of patient information, particularly where such information

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now