Verified Document

Release Of Information Properly The Research Proposal

Medical identity theft can result in erroneous entries to the patient's health care records, which can affect the patient's medical and financial records for a long time (Federal Trade Commission, 2003 & 2007). In each medical facility, there is a need for trained professionals who can properly process Release of Information (ROI) requests. These individuals must also be able to make properly disclosures of request to first and third parties for the preservation of the integrity of the data and the privacy of the PHI. Moreover, these trained professionals cannot become complacent or corrupt, as this can lead to loss of privacy and security of the PHI (Littleton Police Department, 2004). The Health Insurance Portability and Accountability Act (HIPAA) was an attempt by Congress in 1996 to reform the health care system. HIPAA applies to health care providers, health plans and health care clearinghouses that utilize EHRs. HIPAA is enforced by the Department of Health and Human Services (DHHS). All facilities are required to use HIPAA as the basis of their action plans regarding the handling of PHI and PII. Parts of several other pieces of legislation also apply, including the E-Government Act; the Electronic Communications Privacy Act (ECPA); the Freedom of Information Act (FOIA) and the Privacy Act.

These laws have been enacted to deal with an increase in crimes related to health care information. Approximately half a million Americans have been victims of a medical identity theft crime. In large part, these crimes have been the result of poor handling of sensitive information by medical clerks, patients and disposal personnel. As a result, patients are increasingly hesitant to request information from their own records. There is reason to believe that some patients harbor a distrust of the entities that are maintaining and protecting their PHI and PII data. One of the causes for this fear is the reality that although victims have enforceable rights, those rights can only be enforced if the error is identified and corrected (Government Accountability Office (GAO), 2005).

Patients are the primary stakeholder with regards to PHI and PII issues. They have the most to lose from improper handling of their sensitive information....

From the patient's perspective, the desired outcomes for EHR and ROI are handling are integrity, accuracy, timeliness of release, confidentiality, privacy and security. Each of these topics has been subject to many articles and training manuals. They are the focal point of EHR and ROI training programs and are the most important principles to which health care providers must adhere for the protection of PHI and PII (American Health Information Management Association (AHIMA), 2007).
Many of the issues regarding the mishandling of PHI and PII can be traced to personnel issues. Employees with access to patient health care information occasionally steal the data and are sometimes incompetent or poorly trained. The FBI has been working with the National Health Information Network (NHIN) to stop criminals corrupting the system from the inside (FBI, 1995). Some of the issues can also be addressed at the health care provider side, with improved training programs or better background checks. Yet at present, the problem remains epidemic. There were approximately 20,000 complaints listed with the Federal Trade Commission (FTC) between 1992 and the spring of 2006 regarding medical identity theft. The FTC, however, does not litigate medical issues (FTC, 2007). This means that for patients who have become victims of medical identity theft, the channels for recourse are unclear. This compounds the perceived intensity of the issue among patients.

Unintentional errors are known as "errors and omissions liability" and can include data that has been lost or misplaces. When employees steal data, this is typically considered fraud.

Law enforcement categories medical identity fraud into two types: organized crime and individual identity theft.

An example of individual identity theft occurred at the University of Connecticut when a man with HIV utilized his cousin's health insurance information without the cousin's knowledge to receive approximately $76,000 worth of medical care and treatment (University of Connecticut, 2005).

The privacy and security review process identifies the strengths and weaknesses of the existing system of health care information management. Central to the review process is

Sources used in this document:
Law enforcement categories medical identity fraud into two types: organized crime and individual identity theft.

An example of individual identity theft occurred at the University of Connecticut when a man with HIV utilized his cousin's health insurance information without the cousin's knowledge to receive approximately $76,000 worth of medical care and treatment (University of Connecticut, 2005).

The privacy and security review process identifies the strengths and weaknesses of the existing system of health care information management. Central to the review process is
Cite this Document:
Copy Bibliography Citation

Related Documents

Technology Acceptance Model Tam and Information Systems Success...
Words: 4229 Length: 15 Document Type: Literature Review

Technology Acceptance Model Using Technology Acceptance Model (TAM) to Assess User Intentions and Satisfaction on Software as a Service (SaaS): The Value of SaaS Software as a Service (SaaS) was researched by Benlian and Hess (2011) in an effort to determine its value to companies. Among the arguments was that SaaS is already declining in popularity even though it is very new. The majority of the arguments that lean in that direction have

Learning Activity Sharing of Information and Cooperation
Words: 526 Length: 2 Document Type: Essay

Learning Activity Sharing of information and cooperation between agencies is often necessary to ensure that people who are guilty of crimes or misdemeanors are given their proper punishment. It is also the best way to present information between agencies to clear those who are suspected of crime but are, in fact, innocent. It is important to cooperate between police departments, but it is also important to secure the privacy and the

PR Release About LA Earthquakes
Words: 815 Length: 3 Document Type: Essay

Earthquake Press Release This announcement serves as a general information bulletin for those that are curious or need to learn about earthquakes and the associated hazards whilst living in the Los Angeles area. Indeed, the city of Los Angeles as well as much of the rest of the state of California sits along what is known as the San Andreas Fault. The fault is a point in which two major tectonic

Earth Science, Information Age, and
Words: 5138 Length: 14 Document Type: Essay

Continental tropical (cT) air masses are hot, dry, unstable at low levels and generally stable aloft (upper-level ridge); they originate in northern Mexico. Continental polar (cP) or continental arctic (cA) air masses are cold, dry, and stable originating over northern Canada and Alaska as a result of radiational cooling. (Oklahoma Climatological Survey, 2004)" The greenhouse effect has been in the news for the last several decades especially with the resulting

Risk Identification in Information Security
Words: 5004 Length: 15 Document Type: Thesis

Phishing Spear Phishing and Pharming The following is intended to provide a very brief overview of examples of some the most dangerous and pervasive security risks in the online and networked world. One of the most insidious of identity theft is known as phishing. The term 'phishing' refers to the practice of "fishing for information." This term was originally used to describe "phishing" for credit card numbers and other sensitive information

Behavioral Finance Human Interaction a Study of the Decision-Making...
Words: 22258 Length: 81 Document Type: Term Paper

Behavioral Finance and Human Interaction a Study of the Decision-Making Processes Impacting Financial Markets Understanding the Stock Market Contrasting Financial Theories Flaws of the Efficient Market Hypothesis Financial Bubbles and Chaos The stock market's dominant theory, the efficient market hypothesis (EMH) has been greatly criticized recently for its failure to account for human errors, heuristic bias, use of misinformation, psychological tendencies, in determining future expected performance and obtainable profits. Existing evidence indicates that past confidence in the

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now