Advanced technology such as retinal scans, or fingerprint matching could be employed at the most sensitive levels.
The implementation of such a system would be long and complicated. The first step would be the development and testing of the software package. The second would be training bedside personnel to enter information into the system properly. The third would be to encode existing patient information into the system. Next, a system for dispersing access to the various levels would have to be developed. Each of these components results in an integrated system that would result in the highest level of patient confidentiality, yet would allow those that need confidential access to have it. This system would serve the needs of the patients by way of quality improvement and would provide the maximum level of security possible.
References
Conn, J. (2005). AHA dispute with JCAHO over data-mining flare ups. Retrieved May 14, 2008 at http://www.patientprivacyrights.org/site/News2?page=NewsArticle&id=6438.
Lerouge, C, Culijak, G, & Horan, T. (2007). Consumer Health Informatics, Patient Safety and Quality of Practice. System Sciences, 2007. HICSS 2007. 40th Annual Hawaii...
Patient Rights The major objective of informed consent is to give the patient an opportunity play a role in his health care decision. The law requires physicians to get an informed consent of their patients before any medical procedure. The patient has a right to be informed and to be made aware of the nature of the procedure, available alternatives to the medical operation, the risks, benefits and uncertainties related to
They are also required to assess and address risks to customer information in all areas of operations, including employee management and training, information systems, and detecting and managing system failures. They must address what information is collected and stored as well as whether there is a business need for that particular information. Depending on the type of business operations, privacy laws govern how companies collect, store, and use customer identifiable
This is troubling, because the different exemptions can cause confusion among stakeholders about how they would apply. Where, health care providers, regulators and insurance companies can be able to circumvent the law, under the exemptions of HIPPA and the Privacy Act. For the individual this gives the appearance of security, yet the various exemptions do little to increase privacy. Then when you consider the fact; that these laws reflect
Patient Safety and Security Patient information, privacy and security are at the heart of providing a high level of medical services. These issues are vitally important if patient confidence is to be retained, in addition to ensuring that no potential harm comes to the patient. Hence, the information systems at any hospital should be managed in such a way as to retain the confidentiality of patient information, particularly where such information
Privacy Rules HIPPA Over the years, various regulations have been enacted to ensure increased amounts of protection for the general public. The Health Insurance Portability and Accountability Act (HIPPA) was designed for several different reasons. The most notable include: to ensure that laid off employees are receiving continuous health insurance coverage, prevent fraud / abuse and to protect the privacy of all patients. This is significant, because it created a new
One issue which has gained in public attention in recent years, first with the outbreak of SARS and avian flu, and more recently with the spread of swine flu, is that of public health epidemic. A failure to disclose health concerns properly or to allow others to know when one is seriously ill is a way to instigate the spread of a condition. Thus, "public health has laws governing
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now