Develop a form that you can complete to make it easier

Assignment Help Computer Engineering
Reference no: EM133659344

Homework: Breach Activity

Assessing Privacy This activity meets CAHIIM Domain.

Develop privacy strategies for health information.

Part I

You are the Privacy Officer at Quality Hospital. It is a 500-bed hospital in large city. It provides various services: acute care with an ICU, CCU, NICU, pediatrics, obstetrics, psychiatric and is a Level I trauma center. Quality Hospital provides various outpatient services as well: cardiac cath lab, specialty clinics, and rehabilitation. It is a complex organization.

Review the following scenarios that occurred at your hospital and determine whether the scenario is a reportable breach:

Scenario A: On April 1 Mary Nurse, RN, reports for duty on Unit 3B. Michael Patient is assigned to her. The EHR automatically gives staff access to patients on the unit they are assigned for the shift. Michael Patient was transferred from Unit 3A to Unit 3B on March 31. Mary logs into the EHR and is unable to access Michael Patient's record. The EHR has an override if this issue occurs, and she goes through a series of steps to gain access to his record. Since Mary is not familiar with Mr. Patient's history, she begins to review the medical record. After reviewing quite a bit of the record, she notices that it says Michael is aged 25. Mary suddenly realizes that this is not her patient. Her Michael Patient is 80 years old.

Is this a breach? Why or why not? Provide a detailed explanation (citing HIPAA statute numbers if necessary to provide rationale). If this is a breach, indicate if this is a reportable breach and indicate how many patients are impacted. If there is not enough information to determine whether this was a breach, indicate what additional information you would need.

Scenario B: Even though Quality Hospital has an EHR many old paper records still exist, and the hospital is required by law to continue to retain them. Since the hospital was unable to maintain all of the records onsite, it hired Acme Storage to store their records offsite. All paper records have been stored by Acme since 3/1/2015. Quality Hospital somehow stopped paying the storage fees to Acme in 2019. On 1/3/2021 Acme started to throw out the records in a big dumpster. A new HIM Director was hired 12/7/2021. The HIM Department received a medical record request on 2/18/2022. The ROI clerk could not locate the information and asked the HIM Director where he could locate paper medical records dating back to 2013. It took a few days for the HIM Director to track down the records. On 2/23/2022 the HIM Director discovers that Acme has thrown out the records. On 2/24/2022 the HIM Director notifies you the Privacy Officer.

Is this a breach? Why or why not? Provide a detailed explanation (citing HIPAA statute numbers if necessary to provide rationale). If this is a breach, indicate if this is a reportable breach and indicate how many patients are impacted. If there is not enough information to determine whether this was a breach, indicate what additional information you would need.

Scenario C: On 3/1/21 Dr. Jones is preparing for his telemed appointment with John Harrison. He pulls up the most recent lab work and then calls Mr. John Harrison. He begins discussing with Mr. Harrison that he is a little concerned with the results as his A1C is rather high. Mr. Harrison cannot understand this. He had bloodwork done three months ago and it was within normal limits. Dr. Jones pulls up the graph of the A1C results over time and sees that the bloodwork from three months ago was also elevated. He then realizes that is looking at Joan Harrison's bloodwork. He apologizes to Mr. Harrison for the error and then continues their appointment.

Is this a breach? Why or why not? Provide a detailed explanation (citing HIPAA statute numbers if necessary to provide rationale). If this is a breach, indicate if this is a reportable breach and indicate how many patients are impacted. If there is not enough information to determine whether this was a breach, indicate what additional information you would need.

Part II: As Privacy Officer, you are charged with reporting breaches to OCR. Download the Sample Form (pdf on right side of the page). In the past you have realized that you do not always have all the key information for reporting breaches in one location. You have decided to develop a form that you can complete to make it easier to report breaches. Using good form design techniques and the information in the pdf, create a form for this purpose. After you complete designing your form, select the scenario(s) you have identified as breach(es) in part I of this homework and begin to enter the information. You will probably not have all the information that is required such as addresses, phone numbers etc. If the information is not available, leave it blank. However, you should be able to complete some key such as whether a Business Associate was involved, how many individuals were impacted, the breach start date, discovery date, type of breach, location etc.

Reference no: EM133659344

Questions Cloud

Role of the indian in north carolina history : Review article "The Role of the Indian in North Carolina History," Ruth Wetmore stated that Indians have played four distinct roles throughout state's history.
Maintain regular contact with suppliers : Identify six ways you could maintain regular contact with suppliers and customers to communicate better and foster stronger business relationships.
When did the salem witch trials take place : How did they hold one another accountable in adhering to Puritan values? (provide at least two examples) When did the Salem Witch Trials take place?
Considering both practical logistical and legal perspectives : Discuss the implications of the chosen place of arbitration (London) on the proceedings, considering both practical logistical and legal perspectives.
Develop a form that you can complete to make it easier : You have decided to develop a form that you can complete to make it easier to report breaches.
Describe japan conquests in the east asian : Describe Japan's conquests in the East Asian and Pacific Basin region in the early 1900's.
Review the muslim views of the crusades : ReviewECR documents entitled "Muslim Views of the Crusades" (1st Crusade and aftermath). Review ECR documents entitled "Saladin and the Third Crusade".
How have the artists of these works emphasized the power : How have the artists of these works emphasized the power and status of one individual over others?
Ladies individually by addressing all industrial relations : You are to advise the ladies individually by addressing all the Industrial Relations issues being highlighted in the above case study.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd