StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Confidentiality in Allied Health - Research Paper Example

Cite this document
Summary
Confidentiality in Allied Health 1. Should corrections be date and time stamped? In spite of the benefits provided by electronic health records (EHR), the potential for errors creeping in remain. These errors are likely to occur due to difficulties inherent in the system design, or from user error…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.8% of users find it useful
Confidentiality in Allied Health
Read Text Preview

Extract of sample "Confidentiality in Allied Health"

Confidentiality in Allied Health Should corrections be and time stamped? In spite of the benefits provided by electronic health records (EHR), the potential for errors creeping in remain. These errors are likely to occur due to difficulties inherent in the system design, or from user error. Correcting these errors is essential to maintaining the quality of the data and the safety of the patient. The correct procedure for making such corrections involves several elements, consisting of retaining the ability to view the original; stamping of the date and time of when the correction has been made; disclosing the identity of the individual making the correction; and entering the reason for the correction.

Thus corrections of errors in EHR require the stamping of date and time. (1). 2. When should a patient be advised of the existence of computerized databases containing medical information about the patient? Respect of patient autonomy is integral to the ownership of EHR. This statement stems from the patient autonomy perspective that subscribes to patients being the real owners of the confidential information that is present in EHR. (2). Information regarding the existence of computerized databases in which the medical information of the patient will be stored has to be passed on to the patient.

This communication should occur prior to the release of the medical information to the entities maintaining the computer database. Included in this communication is the information on who will be in a position to access the EHR and the access levels that will be provided. This communication should occur prior to obtaining the informed consent for treatment. Through such a procedure it is possible to uphold ethic of patient autonomy in maintaining EHR. (3). 3. When should the patient be notified of the purging of archaic or inaccurate information?

Aging of the medical records of patients beyond utility value is quite likely to arise, along with the possibility of information on the medical record of the patient being no longer relevant or accurate. Purging such information then becomes necessary. There are defined guidelines on how this purging activity should take place. However, there is the recommendation that such procedures be established in the setting up of the databases. There is the requirement that the patient and physician be informed about the purging activity prior to its actual occurrence and also immediately after archaic or inaccurate information is purged. (3). 4.

When should the computerized medical database be online to the computer terminal? Access of patient medical information will require computers to have online access to the computerized medical database. This online linkage between the computerized medical database and the computer terminal used for this purpose is allowed only when authorized computer programs that require the patient medical information are in use. However, in keeping with confidentiality requirements, individuals or organizations outside of the clinical facility should not be given online access to a computerized medical database that is holding identifiable patient information in the medical records.

Furthermore, security measures that include encryption of the data and passwords that provide user identification are a must for monitoring and controlling access to computerized medical databases. In this manner security of patient information contained in the computerized medical database is the objective when providing online access to computerized medical databases to computers in a clinical facility. (3). 5. When the computer service bureau destroys or erases records, should the erasure be verified by the bureau to the physician?

The physician is the custodian of the medical information contained in an electronic health record of a patient. Any activity with regard to electronic patient records therefore is to occur with the knowledge of the physician. This means that when a computer service bureau decides to destroy or erase records it must inform the physician of the intent of erasure and ensure that a soft copy of the medical record is made available to the physician prior to erasure of a patient record. Once the erasure has occurred information confirming the erasure must be passed on to the physician.

In this manner the custodian of the medical record of a patient in the form of the physician is aware of the erasure, has a copy of the record for his and the patient’s future needs and has confirmatory information that there exists no other record other than the one possessed by the physician. (4). 6. Should individuals and organizations with access to the databases be identified to the patient? Patients have the right to control the dissemination of information contained in their medical records.

Information contained in their medical records cannot be provided to any individual or organization by the databases without the express permission of the patients. Seeking such permission calls for the identity of the individual or organizations that will have access to the databases holding the medical records to be revealed to the patients. Therefore the identity of individuals and organizations with access to the databases has to be indentified to the patients. (3). 7. Does the AMA ethics opinion mention encryption as a technique for security?

Maintaining confidentiality in patient medical records held in computerized medical databases forms a part of the AMA ethics in electronic health records. With limited online access permitted for the authorized use of patient medical records, there is scope for the breaching of confidentiality ethic of AMA. To ensure confidentiality of patient information being available for only authorized used AMA has suggested several security measures to be employed. Encryption is one such security technique suggested by AMA. (3). 8.

In regard to electronic medical records (EMRs), what is the policy for disclosing authorized data requested by third parties? Confidentiality of patient information is a binding principle in medicine. Along with that is the patient autonomy as a cornerstone of medical ethics. The confidentiality principle in medicine and patient autonomy in medical ethics are the controlling factors in the dissemination of medical information of patients. The policy for disclosing authorized data requested by third parties is governed by them.

Without patient consent no medical information of the patient can be provided to any individual or organization. Requests for authorized data from third parties can be given only if patient approval has been received for the giving the data and that too only for the purposes for which permission has been given by the patient. This sums up the policy on disclosing authorized data requested by third parties. (5). Works Cited 1. Samaritan Georgette. “Correcting Errors in Electronic Medical Records”.

23 April 2011. . 2. Mercuri, J. John. “The Ethics of Electronic Health Records”. 2010. New York University. 23 April 2011. . 3. “AMA Code of Medical Ethics”. 1998. American Medical Association. 23 April 2011. 4. Macios Annie. “Moving Mountains: The Proper Purge of Medical Records”. For the Record, 21.2. (20). 5. “HIPAA Physicians Guide”. 2011. 23 April 2011. .

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Confidentiality in Allied Health Research Paper Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/family-consumer-science/1415868-confidentiality-in-allied-health
(Confidentiality in Allied Health Research Paper Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/family-consumer-science/1415868-confidentiality-in-allied-health.
“Confidentiality in Allied Health Research Paper Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/family-consumer-science/1415868-confidentiality-in-allied-health.
  • Cited: 0 times

CHECK THESE SAMPLES OF Confidentiality in Allied Health

Legal Aspects of Health Administration

The civil health Admin 3penalty may reach $25,000 (US Department of Justice 2003, p.... Statutory Rape laws have undergone drastic amendments among all states of USA in order to protect the minor victim....
5 Pages (1250 words) Case Study

Employment Law in Ireland

The first relevant law the must be examined is the Safety, health and Welfare at Work Act 2005.... Under this law, the employer is… This includes the obligation to manage and conduct work activities in a way that ensures the safety, health and welfare of its employees; and 菟roviding and maintaining facilities and arrangements for the welfare What this means to Pisces is that Pisces is obligated to ensure Antonias safety, health and welfare....
8 Pages (2000 words) Case Study

Violation of Patient Consent

Through the verdict and with fair considerations over the initial findings, the conflict could have been resolved had the doctor thought more seriously about the value of confidentiality in the patient's point of view.... On the one hand, the patient argued that no discourse took place between her and the doctor regarding her problem with peptic ulcer yet contradictory to this, the defendant doctor claimed that the patient expressed full consent for the medical examination to be carried out for the sake of the plaintiff's employer aiming to obtain a medical record of the employee based on the prevailing health conditions of the latter at the time....
2 Pages (500 words) Essay

Substance abuse documentation confidentiality

Outcome Study of Substance Impaired Physicians and Physician Assistants Under Contract with North Carolina Physicians health Program for the Period 1995-2000.... confidentiality refers to any information of an individual under service of s facility received in connection with performance of a function of the facility.... The… role of protecting the rights of the client under confidentiality must not disclose any confidential information acquired through practice, teaching or investigation with any executed consent (Fang & Applegate, 1998). The documentation on confidentiality sets the requirements Substance Abuse Documentation confidentiality North Carolinas requirements regarding documentation of adherence to confidentiality from state division of addiction or substance abuse servicesConfidentiality refers to any information of an individual under service of s facility received in connection with performance of a function of the facility....
2 Pages (500 words) Research Paper

Personal & Prefessional Issues in Adult Nursing

Whilst on a clinical placement, the author experienced a breach of confidentiality, so for the purpose of this assignment, the author concentrates on the rules and guidelines associated with confidentiality.... confidentiality is more than keeping a secret.... nbsp;… confidentiality is not only an obligation for the nurse; it is also a right for the patient.... This is supported by the Data Protection Act of 1998 and the Human Rights Act of 1998 under which nurses and other medical care providers are supposed to protect the confidentiality of those who are placed under their care....
16 Pages (4000 words) Term Paper

Internet Security: Privacy and Confidentiality

This paper “Internet Security: Privacy and confidentiality” is an attempt to analyze the present concerns regarding privacy and confidentiality issues as applicable to human resource departments in organizations and government offices which use Web-based applications....
20 Pages (5000 words) Research Paper

Does Use an Electronic Health Record Increase the Risk of Breach of Privacy to Clients

From the paper "Does Use an Electronic Health Record Increase the Risk of Breach of Privacy to Clients" it is clear that confidentiality in case of the health professionals and providers impose the duty to protect the information related to the health of a patient.... ) Firstly it will be tried to find out why the concept of Electronic health Record evolved in Ontario and whether this will have any risk of breach of privacy.... -health record helps the doctors to know whether the continuation of the medicines is helping the patient during the course....
12 Pages (3000 words) Assignment

Electronic Software Security in Medical Institutions

Such incidence is extremely damaging, especially when utilized in health care settings--medical advances is now focusing on the optimum application of software technologies in health services (Clarke, Avrunin, & Osterweil, 2008).... Amidst the provision of quality, health delivery is the concept of “communication and cooperation” (Surjan, Engelbrecht, & McNair, 2002).... Medical records are restricted, yet they are utilized not only in the delivery of health care but also in “health insurance....
5 Pages (1250 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us