Verified Document

Ethics Of Client Messaging As Is Made Essay

Ethics of Client Messaging As is made clear in the document Online Patient-Clinician Messaging: Fundamentals of Ethical Practice, a publication of the National Ethics Committee of the Veterans Health Administration (2004), there are man broad and varied ethical considerations when it comes to using online communications to facilitate healthcare inquiries and provision. These concerns range from security and privacy issues, and the manner in which online communication could potentially lead to greater threats in these areas, to the quality of care and the relationship of the clinician and the patient that develops via such communications (VHA, 2004). Also of importance are the elements of technical expertise on the part of both clinicians and patients, which could affect utilization of these technologies, and the need to keep such programs voluntary and on par with non-electronic healthcare provision (VHA, 2004).

Forming appropriate training courses and materials for both clinicians and patients and making them readily available (or mandatory in the case of clinicians), being proactive in the development of security measures and disclosures to patients, and ensuring that the technology utilized is the best available in terms of security protections are all means of ensuring ethicality alongside the efficiency of these systems. Like any new policy, operation, or technology, this new form of communication must be undertaken with the proper foresight and care.
Privacy Concerns

Reading over the Fox News (2008) report, "Over 120 UCLA Hospital Staff Saw Celebrity Health Records," it does not seem that a training initiative is all…

Sources used in this document:
References

CrazyTalk. (2012). Accessed 19 July 2012. http://www.reallusion.com/crazytalk/

Fox News. (2008). Over 120 UCLA Hospital Staff Saw Celebrity Health Records.

SlideShare. (2012). Accessed 19 July 2012. http://www.slideshare.net/

VHA. (2004). Online Patient-Clinician Messaging: Fundamentals of Ethical Practice.
Cite this Document:
Copy Bibliography Citation

Related Documents

Ethics in Counseling the Research and Empirically-Derived
Words: 844 Length: 3 Document Type: Article Review

Ethics in Counseling The research and empirically-derived conclusions in the article, So what do u want to work on 2 day? (Rummell, Joyce, 2010) illustrate just how much of an ethical quagmire online counseling is today. The article clearly shows how much of an urgent need there is today for greater compliance and oversight, with a call for the American Psychological Association (APA) needing to be involved. One of the most

Ethics Cybersecurity Awareness
Words: 2891 Length: 10 Document Type: Term Paper

Introduction The case of publicly traded company TechFite reveals a substantial number of ethically questionable activities being committed by the company’s Applications Divisions. Not only are their accusations of theft of proprietary information but also evidence of conflicts of interest, dummy accounts used to gain escalation of privilege, and security omissions that cannot be justified. This paper will address the ethical issues for cybersecurity that relate to the case of TechFite,

Medical Ethics Interview Medical Ethics Interview Healthcare
Words: 1637 Length: 5 Document Type: Essay

Medical Ethics Ethics Interview Medical Ethics Interview Healthcare providers include nurses, doctors, social workers and a number of other professions that seem to exist on the periphery of the helping field. One of those on the outside, that many do not consider when looking at the healthcare profession, are professional counselors. Since the term "counselor" has been diluted by everyone from friends to lawyers, it is unclear what one is talking about when

Marketing Management of Boy's and
Words: 5025 Length: 15 Document Type: Thesis

The broader areas of Customer Relationship Management (CRM) serve as the foundation of client relationship management and analysis (Ravanas, 2007). There is the second weakness of also concentrating on the corporate donors as a largely homogeneous group. This can be seen in the approaches defined in the Club's annual report. The tailoring of individualized strategies can maximize the experiences of donors so they have a higher level of ownership in

SL/https De-Encryption SSL/https is Widely
Words: 17577 Length: 63 Document Type: Dissertation

This is however, not considered foolproof. It is possible to break the security by a person having adequate technical expertise and access to the network at hardware level. In view of this the SSL method with right configuration is considered perfectly sufficient for all commercial purposes.5In order to safeguard the data while in transit it is customary to adopt a practical SSL protocol covering all network services that use

Promising Phenomenon That Lends Itself
Words: 26560 Length: 96 Document Type: Dissertation

66). Furthermore, social software will only increase in importance in helping organizations maintain and manage their domains of knowledge and information. When networks are enabled and flourish, their value to all users and to the organization increases as well. That increase in value is typically nonlinear, where some additions yield more than proportionate values to the organization (McCluskey and Korobow, 2009). Some of the key characteristics of social software applications

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now