Release Of Information Term Paper

Length: 7 pages Sources: 1+ Subject: Healthcare Type: Term Paper Paper: #22341552 Related Topics: Information Assurance, Doctor Patient Relationship, Six Sigma, Customer Expectations
Excerpt from Term Paper :

Release of Information

A Quality Assurance Indicator and Process for Measuring the Accuracy of Release of Information Requests

According to James F. Keenan (1993), questions about the accuracy of releases of information have assumed increasing prominence in several areas recently, such as the Persian Gulf war, the physical- and mental-health histories of public individuals, the identification of rape victims, and the threat of AIDS. The debates that have resulted have largely been guided by an important insight: the responsibilities that have been entrusted to particular professions contribute to the determination of whether release of information is considered right and proper. Ensuring such "right and proper" releases of information means having in place a system whereby quantifiable aspects of the underlying processes can be periodically reviewed to determine how well it is working. While the function goes by many names such as quality control, total quality management, and others, the healthcare profession in particular uses the term quality assurance to describe those methods used to monitor the outcomes of patient care activities, including the timely and accurate release of information. To this end, this paper provides a step-by-step analysis of how one such quality assurance monitor can be used to help improve patient healthcare outcomes, including the documentation required for this purpose, and graphic representations of how the process operates. A summary of the research will be provided in the conclusion.

Review and Discussion

Background and Overview. Financial and organizational strategies may inadvertently eliminate both needed and unneeded care as cost controls are introduced. Without quality monitoring, healthcare providers are unable to determine whether cost-control efforts are compromising quality. Therefore, quality assurance monitoring is an important tool for making optimal resource allocation decisions (Brook, Damberg, Ker & Mcglynn 1998). In their book, Ethics, Law and Medical Practice (1997), Kerry J. Breen, Stephen M. Cordner, and Vernon D. Plueckhahn note that the ethical concept of maintenance of confidentiality of information about patients was originally based on non-maleficence; in other words, the release of information could potentially do harm; however, the ethical concepts surrounding patient information is now clearly based on the principle of autonomy.

In other words, today, patients do not surrender their right to privacy and confidentiality by consulting a clinician. "Even if there were no ethical principle involved, for the practical reason of the need for trust to underpin a satisfactory doctor-patient relationship, confidentiality would remain pivotal" (Breen et al.:10). Notwithstanding the fundamental ethical principles involved in protecting confidential patient information, the healthcare facility's responsibilities certainly do not end there.

Today, there are a number of legal and ethical conflicts with the maintenance of patient confidentiality, the latter especially recognizable when a doctor possesses confidential information which, if released, might prevent harm or injury to others. Much more frequently in daily practice confidentiality is breached in several ways, knowingly (with implied consent), thoughtlessly, systematically or deliberately (without implied consent). For example, the sharing of information in hospitals with other staff or students breaches confidentiality, but normally implied consent can be safely assumed. In a thoughtless manner, many clinicians may inadvertently breach patient confidentiality in public discussions with colleagues or at clinical conferences.

This failure to maintain patient confidentiality is regarded as a systemic problem: "Systematically, institutional procedures can break confidentiality, by for example not keeping records secure or by the ready visibility of operating and admission lists" (Breen et al. 1997:11). Finally, some healthcare providers may intentionally breach confidentiality when seeking to learn more of the illness of one of their colleagues or certain public figures (Breen et al. 1997)....


Clearly, there are a number of ways in which patient confidentiality can be violated, but perhaps the most visible example of such methods is providing a copy of what was specifically requested in a release of information transaction to determine if it was, in fact, what was required to be provided.

According to Sheri A. Alpert (2003), "Informational privacy is often defined by how much personal information is available from sources other than the individual to whom it pertains" (301). The fewer opportunities people have to restrict access by others to their own personal information or to limit the amount of personal information they must give up to others (either voluntarily or by coercion), the less informational privacy they will enjoy (Alpert 2003). The appropriate release of information involves how and when personal information should be communicated or obtained and what uses of it will be made by others, and encompasses the collection, storage, use, maintenance, dissemination/disclosure, and disposition of personal information; in medical privacy settings, then, informational privacy is most frequently the interest that is at stake (Alpert 2003).

Setting of Random Audit and Methodology. One of the quality assurance monitors currently in place in the author's medical records unit is "Correct Information to be clipped and copied: Is the information requested correct? Yes/No?" To collect this information, a random audit of the release of information log book for a period of 30 days would be conducted to determine what was asked for against what was clipped and sent from the patient's chart. The threshold for this monitor is 99% accuracy in the documents or information provided to the requesting customer.


List the customers, outputs, measurable customer expectations and the gaps between expectations and performance. The customers of the release of information service may be both internal (other healthcare providers, administrative services or other agencies) or external (the patient and authorized family members). Regardless of their status as internal or external, all of these customers are directly impacted by the timeliness and accuracy of the medical information that is provided by the release of information service.

Furthermore, all patients will naturally expect their healthcare providers to tell them the truth (Breen et al. 1997). "It would be unusual," they say, "for an 'ethical' doctor to deliberately lie to patients but some doctors clearly have difficulty in discerning the difference between obfuscation and compassionate provision of information" (Breen, Cordner & Plueckhahn 1997:10). Likewise, other healthcare providers may seek medical test results or other information that concerns a specific current condition, and it would be inappropriate (and potentially illegal) to furnish these requestors with medical information that was not relevant or revealed information about the patient outside of the parameters established by the patient's permission for release.


Flow chart how the process is currently accomplished. Some aspects of the quality of patient care may be quantifiable; others are not (Drotar 1998). The flow chart shown in Figure 1 below illustrates the linear processes involved in accomplishing a typical ROI request:

Customer initiates ROI request

ROI Reception receives request and enters it in ROI log

ROI request it sent to ROI representative responsible for that alphabetic (patient name) or numeric (patient number or Social Security Number extension such as last four digits)

Patient medical records are retrieved, document or information is located and reproduced

ROI representative documents request in patient medical record and ROI log and sends document or information to customer

Figure 1. Linear Request for Information Flow.


Cause-and-Effect Diagram Illustrating the Current Process with Root Causes.

The cause-and-effect diagram illustrated in Figure 2 shows that both the ROI customer and/or the ROI representative can be the potential source of errors in completing a release of information request; for instance, the representative may select the incorrect information or document for copying, or the customer may request the incorrect information or document to be provided.

ROI Representative


____> Inaccurate ROI


ROI Support Equipment

ROI Methods

Figure 2. Cause-and-Effect Diagram for ROI Accuracy.

Other causes that tend to contribute to the higher incidence of error in the provision of ROI documents or information may be a computer or copy machine malfunction in the ROI service itself, or an internal ROI service method that does not support or provide the level of service that is required to meet the 99% threshold for this QA monitor.


Random Audit Data Collection Form. The data required for the random audit of the ROI records for the 30-day period would be accomplished using the form illustrated in Figure 3 below.

Random Audit of ROI Log (Threshold 99% Accuracy)


Patient ID

Accurate Info Provided?



Correct Information to be clipped and copied: Is the information requested correct? Yes/No?"

Figure 3. Sample Data Collection Form for Random Audit of ROI Log.


Customer Satisfaction Form. Data concerning the existing levels of patient satisfaction with the ROI function would be collected using the form illustrated in Figure 4 below. Each customer identified in the ROI log for the 30-day period under investigation would receive a copy of this survey, and the data analyzed using Excel or SPSS as appropriate. The responses in the open-ended segment would be collected verbatim and included in a periodic quality assurance summary for this monitor.

Customer Satisfaction Survey -- Release of Information (ROI)

Strongly Agree




Strongly Disagree

The information I received from the Release of Information Service was exactly the information I requested.

The Release…

Sources Used in Documents:

Works Cited

Alpert, Sheri A. (2003). Protecting Medical Privacy: Challenges in the Age of Genetic

Information. Journal of Social Issues, 59(2):301.

Breen, Kerry J., Stephen M. Cordner and Vernon D. Plueckhahn. Ethics, Law and Medical

Practice. St. Leonards, NSW: Allen & Unwin, 1997.

Cite this Document:

"Release Of Information" (2004, October 12) Retrieved June 12, 2021, from

"Release Of Information" 12 October 2004. Web.12 June. 2021. <>

"Release Of Information", 12 October 2004, Accessed.12 June. 2021,

Related Documents
Release of Information Properly the
Words: 1450 Length: 5 Pages Topic: Healthcare Paper #: 56586783

For the patient, there are equally negative consequences, such as medical identity theft, financial loss and potential damage to their health. Medical identity theft can result in erroneous entries to the patient's health care records, which can affect the patient's medical and financial records for a long time (Federal Trade Commission, 2003 & 2007). In each medical facility, there is a need for trained professionals who can properly process

Information Technology Acts While Information Technology Today
Words: 657 Length: 2 Pages Topic: Education - Computers Paper #: 67446768

Information Technology Acts While information technology today has many distinct advantages, it is also important to acknowledge that there are some specific potential drawbacks. These drawbacks relate especially to the right to privacy of people making use of information technology. Users of Internet subscription services, for example, expect certain privacy rights in terms of the contact and personal information they choose to divulge. At the same time, large institutions like learning

Information Systems Multi-Chapter Case Study
Words: 3615 Length: 13 Pages Topic: Business Paper #: 93834264

First, as Personal Trainer expands globally, the system will be available through web browsers anywhere in the world. Second, the ease of completing system upgrades across all users at the same time needs to be taken into consideration, and the use of the Web-based system architecture hosted on a Software-as-a-Service (SaaS) platform is critical. Third, by taking this approach Susan can b e assured there will be higher levels

Information Security
Words: 1440 Length: 4 Pages Topic: Information Technology Paper #: 32625376

Information Security The discussion below provides answers to questions raised with regard to a case at Greenwood Company A forensic plan of readiness comes with several advantages. If there arises a situation that forces a company to be engaged in litigation, and there is need for digital evidence, e-discovery is of central importance. The laws and rules that govern the e-discovery, such as the Federal Rules of Civil Procedure or the Practice

Information Technology's Impact on Quality
Words: 3529 Length: 12 Pages Topic: Business - Ethics Paper #: 11731690

The need for continually creating and updating the security techniques and technologies involved in an enterprise system is the ethical responsibility of the IT professional. In order to successfully protect the information and intellectual property assets of a firm, an IT professional also needs to make a personal commitment to stay as current as possible on existing and future technologies (Pemberton, 1998). This commitment needs to be supported by the

Information Technology to Transform a
Words: 2228 Length: 6 Pages Topic: Business Paper #: 32036164

And this money is required to be raised from the market as the company does not generate this amount of revenue either from profits or from internal accruals. (DeHayes, 2003) 5. What should Tim do now? After taking into account all the known and understood pros and cons, there are some points on which Tim has to take action. These are (i) the manner in which to raise capital needed either