2. Why trainings in confidentiality are extremely important:
"All professionals are prone to boundary transgressions; explicit training
about and the maintenance of appropriate role balance will help to ensure
high-functioning relationships and maximize the quality of patient care,
resident education, faculty and resident satisfaction, and modeling of
professional behavior to improve competencies as clinicians and
educators."(Reitz, 2013)
It is crucial that we inform ourselves and others on the HIPAA laws and
regulations. Breach of contract, indiscretion, Informed consent, “Do no
harm”, the threat of self-destruction are just a few of the great
understandings which we must take into account.
3. Why and how we must protect patient information
When determining eligibility for certain services and providing needed
and appropriate resources, human service agencies and education
institutions often require that children and families share very private
information about themselves. Laws and statutes are in place to protect
the privacy of these individuals and to ensure that this information is
released only when necessary."(California Univ., 2002)
All employees must be made aware of the imperative significance of
safeguarding every patient’s confidential material.
4. The reasons for observing ethical behavior:
"Most primary care training programs have a behavioral science
professional on faculty. Despite more similarities than differences among
the roles filled by behavioral health professionals within primary care
medicine residencies, each professional guild has a distinct set of ethical
principles." (Reitz, 2013)
Patients have individual privacy rights. There may be multifarious ethical
codes postulate at each hospital and every other health care facility.
Overall, in omniscience, The law requires that we provide and bear the
human rights of privacy to our patients.
5. Training: Behaving Unethically is Punishable. Please inform others.
“Among the threats to the four information security aspects:
confidentiality, integrity, availability, and quality; confidentiality threats
were identified as most serious, with one threat given an unacceptable
level of High risk." (Henrickson, 2013)
The Misconduct that occurred at UCLA in regards to the abusive
speculation of private medical records, (some may have been those who
were in the limelight with the media), must be carefully analyzed and born
into retrospect as a greater lesson on what virtue is versus indelicate
“MYOB” patterns which only afford abrasiveness, and are far from the
vicinities of healing.
6. Adopting a higher security system &
Making all aware of the risks of technological escapades(!):
“
Because of the creation and use of information online and the widespread
use of the internet and Web 2.0 platforms, physicians and others are
increasingly required to consider how best to protect patient interests
and apply principles of professionalism to new settings" (Farnan, 2013)
It then becomes vital that information which is privy to the patient and
their honorable confidantes is never ever shared or speculated
or…heaven forbid, stolen from any Health Care System
7. Confidentiality
"Confidentiality Risks in home are different from those in a more
controlled environment, such as a hospital and electronic equipment
located in private homes and commuting via internet is a more exposed
unauthorized access. By implementing certain measures it has been
possible to design a home based service which ensures the necessary
level of information and security privacy." (Henrickson, 2013)
Even when a facility is established out of a residence, confidentiality and
security must be cardinal.
8. In Conclusion: Safeguarding
"The Health Information Trust Alliance (HITRUST) was born out of the belief that
information security should be a core pillar of, rather than an obstacle to, the
broad adoption of health information systems and exchanges. HITRUST, in
collaboration with healthcare, business, technology and information security
leaders, has established the Common Security Framework (CSF), a certifiable
framework that can be used by any and all organizations that create, access,
store, or exchange personal health and financial information. The CSF is an
information security framework that harmonizes the requirements of existing
standards and regulations, including federal (HIPAA, HITECH), third party (PCI,
COBIT), and government (NIST, FTC). www.hitrustalliance.net." (Accretive Health,
2013)
The law condones powerful training measures and heightened security systems.
In this way, the law empowers patients, employees and Health Care
Establishments by blocking or legally refining those who disregard the veritable
conduction of safe and Top Quality Management.
9. References
Accretive Health, I. c. (3). Accretive Health Achieves Industry-Leading HITRUST
Certification for Data Security and Protection of Private Patient Health Information.
Business Wire (English).
Aronovitz, L. G. (1999). Medicare: HCFA Needs to Better Protect Beneficiaries'
Confidential Health Information: T-HEHS-99-172. GAO Reports, 1.
California Univ., L. s. (2002). Confidentiality. A Center Quick Training Aid.
Farnan, J. M., Sulmasy, L., Worster, B. K., Chaudhry, H. J., Rhyne, J. A., & Arora, V. M.
(2013). Online Medical Professionalism: Patient and Public Relationships: Policy
Statement From the American College of Physicians and the Federation of State
Medical Boards. Annals Of Internal Medicine, 158(8)
10. References (Continued)
Henrickson, Eva. (2013) BMC Medical Informatics & Decision Making. 2013, Vol. 13
Issue 1, p1-13. 13p. 3 Charts.
http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=90292245&site=edslive
Reitz, Randall, St. Mary’s Family Medicine Residency, 2698 Patterson Road, Grand
Junction, CO, US, 81506, reitz.randall@gmail.com
Wolper, L.F. (2011). Health care administration: Managing organized delivery
systems (5th ed.). Boston: Jones and Bartlett.