Release of Information
A Quality Assurance Indicator and Process for Measuring the Accuracy of Release of Information Requests
According to James F. Keenan (1993), questions about the accuracy of releases of information have assumed increasing prominence in several areas recently, such as the Persian Gulf war, the physical- and mental-health histories of public individuals, the identification of rape victims, and the threat of AIDS. The debates that have resulted have largely been guided by an important insight: the responsibilities that have been entrusted to particular professions contribute to the determination of whether release of information is considered right and proper. Ensuring such "right and proper" releases of information means having in place a system whereby quantifiable aspects of the underlying processes can be periodically reviewed to determine how well it is working. While the function goes by many names such as quality control, total quality management, and others, the healthcare profession in particular uses the term quality assurance to describe those methods used to monitor the outcomes of patient care activities, including the timely and accurate release of information. To this end, this paper provides a step-by-step analysis of how one such quality assurance monitor can be used to help improve patient healthcare outcomes, including the documentation required for this purpose, and graphic representations of how the process operates. A summary of the research will be provided in the conclusion.
Review and Discussion
Background and Overview. Financial and organizational strategies may inadvertently eliminate both needed and unneeded care as cost controls are introduced. Without quality monitoring, healthcare providers are unable to determine whether cost-control efforts are compromising quality. Therefore, quality assurance monitoring is an important tool for making optimal resource allocation decisions (Brook, Damberg, Ker & Mcglynn 1998). In their book, Ethics, Law and Medical Practice (1997), Kerry J. Breen, Stephen M. Cordner, and Vernon D. Plueckhahn note that the ethical concept of maintenance of confidentiality of information about patients was originally based on non-maleficence; in other words, the release of information could potentially do harm; however, the ethical concepts surrounding patient information is now clearly based on the principle of autonomy.
In other words, today, patients do not surrender their right to privacy and confidentiality by consulting a clinician. "Even if there were no ethical principle involved, for the practical reason of the need for trust to underpin a satisfactory doctor-patient relationship, confidentiality would remain pivotal" (Breen et al.:10). Notwithstanding the fundamental ethical principles involved in protecting confidential patient information, the healthcare facility's responsibilities certainly do not end there.
Today, there are a number of legal and ethical conflicts with the maintenance of patient confidentiality, the latter especially recognizable when a doctor possesses confidential information which, if released, might prevent harm or injury to others. Much more frequently in daily practice confidentiality is breached in several ways, knowingly (with implied consent), thoughtlessly, systematically or deliberately (without implied consent). For example, the sharing of information in hospitals with other staff or students breaches confidentiality, but normally implied consent can be safely assumed. In a thoughtless manner, many clinicians may inadvertently breach patient confidentiality in public discussions with colleagues or at clinical conferences.
This failure to maintain patient confidentiality is regarded as a systemic problem: "Systematically, institutional procedures can break confidentiality, by for example not keeping records secure or by the ready visibility of operating and admission lists" (Breen et al. 1997:11). Finally, some healthcare providers may intentionally breach confidentiality when seeking to learn more of the illness of one of their colleagues or certain public figures (Breen et al. 1997). Clearly, there are a number of ways in which patient confidentiality can be violated, but perhaps the most visible example of such methods is providing a copy of what was specifically requested in a release of information transaction to determine if it was, in fact, what was required to be provided.
According to Sheri A. Alpert (2003), "Informational privacy is often defined by how much personal information is available from sources other than the individual to whom it pertains" (301). The fewer opportunities people have to restrict access by others to their own personal information or to limit the amount of personal...
For the patient, there are equally negative consequences, such as medical identity theft, financial loss and potential damage to their health. Medical identity theft can result in erroneous entries to the patient's health care records, which can affect the patient's medical and financial records for a long time (Federal Trade Commission, 2003 & 2007). In each medical facility, there is a need for trained professionals who can properly process
Information Technology Acts While information technology today has many distinct advantages, it is also important to acknowledge that there are some specific potential drawbacks. These drawbacks relate especially to the right to privacy of people making use of information technology. Users of Internet subscription services, for example, expect certain privacy rights in terms of the contact and personal information they choose to divulge. At the same time, large institutions like learning
First, as Personal Trainer expands globally, the system will be available through web browsers anywhere in the world. Second, the ease of completing system upgrades across all users at the same time needs to be taken into consideration, and the use of the Web-based system architecture hosted on a Software-as-a-Service (SaaS) platform is critical. Third, by taking this approach Susan can b e assured there will be higher levels
Information Security The discussion below provides answers to questions raised with regard to a case at Greenwood Company A forensic plan of readiness comes with several advantages. If there arises a situation that forces a company to be engaged in litigation, and there is need for digital evidence, e-discovery is of central importance. The laws and rules that govern the e-discovery, such as the Federal Rules of Civil Procedure or the Practice
The need for continually creating and updating the security techniques and technologies involved in an enterprise system is the ethical responsibility of the IT professional. In order to successfully protect the information and intellectual property assets of a firm, an IT professional also needs to make a personal commitment to stay as current as possible on existing and future technologies (Pemberton, 1998). This commitment needs to be supported by the
And this money is required to be raised from the market as the company does not generate this amount of revenue either from profits or from internal accruals. (DeHayes, 2003) 5. What should Tim do now? After taking into account all the known and understood pros and cons, there are some points on which Tim has to take action. These are (i) the manner in which to raise capital needed either
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now