Featured Post
Romeo And Juliet With Much Ado About Nothing Essays -
Romeo And Juliet With Much Ado About Nothing William Shakespeare has composed a wide range of classifications of plays: comedies, disa...
Monday, November 18, 2019
Internet Sharing of Files, and HIPAA Regulations Research Paper
Internet Sharing of Files, and HIPAA Regulations - Research Paper Example Physiciansà have a legal obligation to keep patient information, such as data contained in PACS confidential (Cao, Huang & Zhou, 2003). Legal issues and resolutions surrounding internet sharing of files, HIPAA, and PACS revolve around safeguarding data Privacy and Security. Healthcare institutions bear an obligation of taking appropriate measures to guarantee that patient information is availed to persons who have a professional need. Some of the issues essential to adhering to HIPAA requirements include restricting access, tracking access, protecting data security, confidentiality, and integrity and sustaining data chain-of-control (Lyer, Levin & Shea, 2006). Health Insurance Portability and Accountability (HIPAA) standards for privacy of Individually Identifiable Health Information avail a comprehensive federal protection for the confidentiality of health information. The Privacy Ruleà pursues strong privacy protections that do not interfere with patientââ¬â¢s access to heal thcare. The Act gives patients more control over their health information, outlines boundaries on the application and release of healthcare records, and avails appropriate safeguards that health care providers must attain so as to safeguard the privacy of health information (McWay, 2010). The bedrock of HIPAA Privacy Rule is the protection, use, and disclosure of Protected Health Information (PHI). Under HIPAA, patients have an enhanced awareness of their health information privacy rights. The Security Rule outlines means of protecting patient informationà on computer networks, over the internet, disks and other storage media, and extranets. The safeguards pursue protection against dangers for breaches of confidentiality. The Security Rule mandates medical facilities to implement audit controls, so as to record and vet staffà accessing information systems containing PHI (Lyer, Levin & Shea, 2006).
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.