Featured Post

Romeo And Juliet With Much Ado About Nothing Essays -

Romeo And Juliet With Much Ado About Nothing William Shakespeare has composed a wide range of classifications of plays: comedies, disa...

Monday, November 18, 2019

Internet Sharing of Files, and HIPAA Regulations Research Paper

Internet Sharing of Files, and HIPAA Regulations - Research Paper Example Physicians  have a legal obligation to keep patient information, such as data contained in PACS confidential (Cao, Huang & Zhou, 2003). Legal issues and resolutions surrounding internet sharing of files, HIPAA, and PACS revolve around safeguarding data Privacy and Security. Healthcare institutions bear an obligation of taking appropriate measures to guarantee that patient information is availed to persons who have a professional need. Some of the issues essential to adhering to HIPAA requirements include restricting access, tracking access, protecting data security, confidentiality, and integrity and sustaining data chain-of-control (Lyer, Levin & Shea, 2006). Health Insurance Portability and Accountability (HIPAA) standards for privacy of Individually Identifiable Health Information avail a comprehensive federal protection for the confidentiality of health information. The Privacy Rule  pursues strong privacy protections that do not interfere with patient’s access to heal thcare. The Act gives patients more control over their health information, outlines boundaries on the application and release of healthcare records, and avails appropriate safeguards that health care providers must attain so as to safeguard the privacy of health information (McWay, 2010). The bedrock of HIPAA Privacy Rule is the protection, use, and disclosure of Protected Health Information (PHI). Under HIPAA, patients have an enhanced awareness of their health information privacy rights. The Security Rule outlines means of protecting patient information  on computer networks, over the internet, disks and other storage media, and extranets. The safeguards pursue protection against dangers for breaches of confidentiality. The Security Rule mandates medical facilities to implement audit controls, so as to record and vet staff  accessing information systems containing PHI (Lyer, Levin & Shea, 2006).

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.