2. Why trainings in confidentiality are extremely
important:
"All professionals are prone to boundary transgressions;
explicit training about and the maintenance of appropriate
role balance will help to ensure high-functioning
relationships and maximize the quality of patient care,
resident education, faculty and resident satisfaction, and
modeling of professional behavior to improve competencies
as clinicians and educators."(Reitz, 2013)
It is crucial that we inform ourselves and others on the HIPAA
laws and regulations. Breach of contract, indiscretion,
Informed consent, “Do no harm”, the threat of self-
3. Why and how we must protect patient information
When determining eligibility for certain services and
providing needed and appropriate resources, human service
agencies and education institutions often require that
children and families share very private information about
themselves. Laws and statutes are in place to protect the
privacy of these individuals and to ensure that this
information is released only when necessary."(California
Univ., 2002)
All employees must be made aware of the imperative
4. The reasons for observing ethical behavior:
"Most primary care training programs have a behavioral
science professional on faculty. Despite more similarities
than differences among the roles filled by behavioral health
professionals within primary care medicine residencies, each
professional guild has a distinct set of ethical principles."
(Reitz, 2013)
Patients have individual privacy rights. There may be
multifarious ethical codes postulate at each hospital and
every other health care facility. Overall, in omniscience, The
law requires that we provide and bear the human rights of
privacy to our patients.
5. Training: Behaving Unethically is Punishable.
Please inform others.
“Among the threats to the four information security aspects:
confidentiality, integrity, availability, and quality;
confidentiality threats were identified as most serious, with
one threat given an unacceptable level of High risk."
(Henrickson, 2013)
The Misconduct that occurred at UCLA in regards to the
abusive speculation of private medical records, (some may
have been those who were in the limelight with the media),
must be carefully analyzed and born into retrospect as a
greater lesson on what virtue is versus indelicate “MYOB”
patterns which only afford abrasiveness, and are far from the
6. Adopting a higher security system &
Making all aware of the risks of technological escapades(!):
“
Because of the creation and use of information online and the
widespread use of the internet and Web 2.0 platforms,
physicians and others are increasingly required to consider
how best to protect patient interests and apply principles of
professionalism to new settings" (Farnan, 2013)
It then becomes vital that information which is privy to the
patient and their honorable confidantes is never ever shared
or speculated or…heaven forbid, stolen from any Health Care
System
7. Confidentiality
"Confidentiality Risks in home are different from those in a
more controlled environment, such as a hospital and
electronic equipment located in private homes and
commuting via internet is a more exposed unauthorized
access. By implementing certain measures it has been
possible to design a home based service which ensures the
necessary level of information and security privacy."
(Henrickson, 2013)
Even when a facility is established out of a residence,
confidentiality and security must be cardinal.
8. In Conclusion: Safeguarding
"The Health Information Trust Alliance (HITRUST) was born out of the
belief that information security should be a core pillar of, rather than
an obstacle to, the broad adoption of health information systems and
exchanges. HITRUST, in collaboration with healthcare, business, technology
and information security leaders, has established the Common Security
Framework (CSF), a certifiable framework that can be used by any and all
organizations that create, access, store, or exchange personal health and
financial information. The CSF is an information security framework that
harmonizes the requirements of existing standards and regulations,
including federal (HIPAA, HITECH), third party (PCI, COBIT), and government
(NIST, FTC). www.hitrustalliance.net." (Accretive Health, 2013)
The law condones powerful training measures and heightened security
systems. In this way, the law empowers patients, employees and Health
Care Establishments by blocking or legally refining those who disregard
the veritable conduction of safe and Top Quality Management.
9. References
Accretive Health, I. c. (3). Accretive Health Achieves Industry-Leading HITRUST
Certification for Data Security and Protection of Private Patient Health Information.
Business Wire (English).
Aronovitz, L. G. (1999). Medicare: HCFA Needs to Better Protect Beneficiaries'
Confidential Health Information: T-HEHS-99-172. GAO Reports, 1.
California Univ., L. s. (2002). Confidentiality. A Center Quick Training Aid.
Farnan, J. M., Sulmasy, L., Worster, B. K., Chaudhry, H. J., Rhyne, J. A., & Arora, V. M.
(2013). Online Medical Professionalism: Patient and Public Relationships: Policy
Statement From the American College of Physicians and the Federation of State
Medical Boards. Annals Of Internal Medicine, 158(8)
10. References (Continued)
Henrickson, Eva. (2013) BMC Medical Informatics & Decision Making. 2013, Vol. 13
Issue 1, p1-13. 13p. 3 Charts.
http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=90292245&site=edslive
Reitz, Randall, St. Mary’s Family Medicine Residency, 2698 Patterson Road, Grand
Junction, CO, US, 81506, reitz.randall@gmail.com
Wolper, L.F. (2011). Health care administration: Managing organized delivery
systems (5th ed.). Boston: Jones and Bartlett.