Release of Information Properly the essay

Download this essay in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from essay:

For the patient, there are equally negative consequences, such as medical identity theft, financial loss and potential damage to their health. Medical identity theft can result in erroneous entries to the patient's health care records, which can affect the patient's medical and financial records for a long time (Federal Trade Commission, 2003 & 2007). In each medical facility, there is a need for trained professionals who can properly process Release of Information (ROI) requests. These individuals must also be able to make properly disclosures of request to first and third parties for the preservation of the integrity of the data and the privacy of the PHI. Moreover, these trained professionals cannot become complacent or corrupt, as this can lead to loss of privacy and security of the PHI (Littleton Police Department, 2004).

The Health Insurance Portability and Accountability Act (HIPAA) was an attempt by Congress in 1996 to reform the health care system. HIPAA applies to health care providers, health plans and health care clearinghouses that utilize EHRs. HIPAA is enforced by the Department of Health and Human Services (DHHS). All facilities are required to use HIPAA as the basis of their action plans regarding the handling of PHI and PII. Parts of several other pieces of legislation also apply, including the E-Government Act; the Electronic Communications Privacy Act (ECPA); the Freedom of Information Act (FOIA) and the Privacy Act.

These laws have been enacted to deal with an increase in crimes related to health care information. Approximately half a million Americans have been victims of a medical identity theft crime. In large part, these crimes have been the result of poor handling of sensitive information by medical clerks, patients and disposal personnel. As a result, patients are increasingly hesitant to request information from their own records. There is reason to believe that some patients harbor a distrust of the entities that are maintaining and protecting their PHI and PII data. One of the causes for this fear is the reality that although victims have enforceable rights, those rights can only be enforced if the error is identified and corrected (Government Accountability Office (GAO), 2005).

Patients are the primary stakeholder with regards to PHI and PII issues. They have the most to lose from improper handling of their sensitive information. From the patient's perspective, the desired outcomes for EHR and ROI are handling are integrity, accuracy, timeliness of release, confidentiality, privacy and security. Each of these topics has been subject to many articles and training manuals. They are the focal point of EHR and ROI training programs and are the most important principles to which health care providers must adhere for the protection of PHI and PII (American Health Information Management Association (AHIMA), 2007).

Many of the issues regarding the mishandling of PHI and PII can be traced to personnel issues. Employees with access to patient health care information occasionally steal the data and are sometimes incompetent or poorly trained. The FBI has been working with the National Health Information Network (NHIN) to stop criminals corrupting the system from the inside (FBI, 1995). Some of the issues can also be addressed at the health care provider side, with improved training programs or better background checks. Yet at present, the problem remains epidemic. There were approximately 20,000 complaints listed with the Federal Trade Commission (FTC) between 1992 and the spring of 2006 regarding medical identity theft. The FTC, however, does not litigate medical issues (FTC, 2007). This means that for patients who have become victims of medical identity theft, the channels for recourse are unclear. This compounds the perceived intensity of the issue among patients.

Unintentional errors are known as "errors and omissions liability" and can include data that has been lost or misplaces. When employees steal data, this is typically considered fraud.

Law enforcement categories medical identity fraud into two types: organized crime and individual identity theft.

An example of individual identity theft occurred at the University of Connecticut when a man with HIV utilized his cousin's health insurance information without the cousin's knowledge to receive approximately $76,000 worth of medical care and treatment (University of Connecticut, 2005).

The privacy and security review process identifies the strengths and weaknesses of the existing system of health care information management. Central to the review process is[continue]

Cite This Essay:

"Release Of Information Properly The" (2008, December 27) Retrieved December 3, 2016, from http://www.paperdue.com/essay/release-of-information-properly-the-25617

"Release Of Information Properly The" 27 December 2008. Web.3 December. 2016. <http://www.paperdue.com/essay/release-of-information-properly-the-25617>

"Release Of Information Properly The", 27 December 2008, Accessed.3 December. 2016, http://www.paperdue.com/essay/release-of-information-properly-the-25617

Other Documents Pertaining To This Topic

  • Released by the FBI and

    " Human development- behavioral shifts in human being that tae place during the course of an entire lifespan ("Human Behavior"). Risk Analysis- the activity of determining and analyzing the dangerous natural and human caused negative events. This analysis takes into consideration the risks these event pose to businesses individuals and governments. Within the domain of information technology risk analysis reports are utilized to tailor technology-related objectives with a an organization's business objectives.

  • Cloud Computing Information Security in

    This approach to defining a performance-based taxonomy will also allow for a more effective comparison within industries as well. All of these factors taken together will provide enterprise computing buyers with more effective foundations of arguing for more thorough measures of application performance. The net result will be much greater visibility into how cloud computing is actually changing the global economics of the enterprise computing industry. III. Final Report: Introduction The foundational

  • Accounting Information for Decision Making

    Accounting Information for Decision Making Corporate Confirming on Water Risk (Feb 2010) indicates that the Global Confirming Initiative (GRI) G3 Guidelines' five water-related indications (total withdrawal volume by source, ponds considerably impacted by distributions, percentage and total amount of water recycled and used again, total water discharge by quality and destination, and identification water physiques and related habitats impacted by discharges) make the perfect beginning point for assessing and confirming water

  • Automating Compliance With Federal Information

    The Act also demanded that agency heads to ensure that the process of implementation of information security plan in the various life cycles of each and every federal system. The significant differences between FISMA and GISRA are the fact that its provisions are stronger and more permanent. It also includes the minimum mandatory standards for information security (OIG, 2003). The suitability of the eight FISMA requirements model for business information security

  • Learning Activity Sharing of Information and Cooperation

    Learning Activity Sharing of information and cooperation between agencies is often necessary to ensure that people who are guilty of crimes or misdemeanors are given their proper punishment. It is also the best way to present information between agencies to clear those who are suspected of crime but are, in fact, innocent. It is important to cooperate between police departments, but it is also important to secure the privacy and the

  • Delphi Study Influence of Environmental Sustainability Initiatives...

    Delphi Study: Influence of Environmental Sustainability Initiatives on Information Systems Table of Contents (first draft) Green IT Current Methods and Solutions Green IT and energy costs Green It and Email Systems Green IT and ICT Green IT and ESS Green IT and TPS Green IT and DSS Green IT and other support systems Green IT and GHG reduction Green IT and the Government Sector Green IT and the Corporate Sector Future Prospects of Green IT in the software industry The paper focuses on how the

  • Risk Identification in Information Security

    Phishing Spear Phishing and Pharming The following is intended to provide a very brief overview of examples of some the most dangerous and pervasive security risks in the online and networked world. One of the most insidious of identity theft is known as phishing. The term 'phishing' refers to the practice of "fishing for information." This term was originally used to describe "phishing" for credit card numbers and other sensitive information


Read Full Essay
Copyright 2016 . All Rights Reserved