Evaluate the hipaa regulations and the it governance polices

Assignment Help Computer Engineering
Reference no: EM133583738

Discussion Post: Compliance

For your initial post, consider the scenario below.

Mary Salvatore works at the New University of Arizona Global Campus General Hospital in downtown San Diego. Mary is a nurse helper and sometimes works at the front desk to admit patients. She frequently works with computer equipment and printers. On November 1, 2015, Mary was working a night shift when an ambulance brought a young man to the emergency room. He had four gunshot wounds in his chest. Mary quickly recognized him as one of her son's friends and was in utter shock. His name was Jason Smith and lived only a few blocks from her.

Later that evening, Mary reviewed his file from her computer to see his progress and saw that he was in a coma. She then called her son to let him know about Jason. Her son then called several of his friends to let them know about Jason's situation. Mary discussed Jason's case with nurses and fellow workers, and even posted Jason's situation on her Facebook page. In addition, Mary used her cell phone to take a picture of Jason in his hospital bed and sent it to several of her friends and neighbors.

On her way home from work, Mary stopped by the grocery store and could not help but talk about Jason's injuries to local shoppers. At one point there were at least five shoppers sympathizing with her about his injuries. Once she got home, Mary logged into the hospital network almost every hour to check on Jason's file and progress. When she got back to work the next day, Jason was smiling and showed some sign of recovery. Mary was relieved and thankful.

Carefully review the scenario and analyze the actions taken by Mary Salvatore following Jason's admission to the hospital. Explain how the actions taken by Mary violated HIPAA rules as well as the fines that the hospital could face based on her actions. Support your statements with evidence from your sources.

Evaluate the HIPAA regulations and the IT governance polices that would need to be in place in order to ensure that those in roles like Mary's would not have access to medical record files like those she accessed in order to determine Jason's coma status. Explain how the network should be segmented so that Mary's access would be limited to just those records necessary for her role to admit patients.

Reference no: EM133583738

Questions Cloud

What is the next best step in his evaluation : What is the next best step in his evaluation? evaluation of an elevated bilirubin level detected on blood work for a preemployment physical.
What is the role of cms in ensuring compliance with : What is the role of CMS in ensuring compliance with the Affordable Care Act? Identify and explain specific initiatives/programs that are utilized by CMS.
Discuss effective treatment interventions : Effective Treatment Interventions Please discuss what key components are necessary for the effective treatment of substance use.
How can abeing healthya maintain and manage confidentiality : List any two (2) laws that have been breached in the above scenario. Give specific example of how they have breached them.
Evaluate the hipaa regulations and the it governance polices : Evaluate the HIPAA regulations and the IT governance polices that would need to be in place in order to ensure that those in roles like Mary's not have access.
Conducting is a partial replication of shepard et al : The experiment that we are conducting is a partial replication of Shepard et al. (1961) experiment I.
Food preferences relating to classical and contemporary : SITHKOP010 Plan and cost recipes - Explain how each method for calculating portion yield listed - food preferences relating to classical and contemporary dining
What patient data is required on the hipaa 837 : what patient data is required on the HIPAA 837? What is the correct option: the information must be duplicated in both sections the subscriber data is
What is the first course of action : Patient is alert but disorientated to person, place, and time. Patient is aggressive towards staff and has been yelling and kicking on staff. What is the first

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write down problem on strings in java

Write down problem on strings in java

  Develop a research project that will include pico question

Nurses are responsible for conducting research in their practice area to add to the profession and improve client outcomes.

  How could the shortcoming have been prevented

Using a Web browser and a search engine, search the terms "Citibank back up tapes lost". You will find many results, Select one article and identify what that.

  Determine general security architecture for the company

Determine general security architecture for the company

  How has malware affected your computer life

How has malware affected your computer life? Explain how the internet provides a vehicle for terrorism in the physical realm. What efforts can be taken to.

  Develop draft bulleted list of requirements for each process

Develop a draft bulleted list of requirements for each process, systems, and sub-systems you have discovered in your research.

  Develop rwd for your microsite and use bootstrap framework

Develop RWD for your microsite and use the bootstrap framework to implement it. Explain the message that you want to communicate through your microsite.

  Show the current configuration and network connections

Describe in detail for each of the tools what a helpdesk or network analyst would use in your display to identify and troubleshoot issues.

  Define a two-dimensional array data type called chart

Define a two-dimensional array data type called Chart with 30 rows and 10 columns. The component type of the array is type Float.

  Draw a window navigation diagram

Draw a Window navigation diagram (WND) that de?nes the basic structure of the interface through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia

  What is difference between a block cipher and stream cipher

What is the difference between a block cipher and a stream cipher? What are the two general approaches to attacking a cipher?

  How will they affect the balance between securing the system

How will they affect the balance between securing the systems, and allowing the business enough breathing room to function effectively?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd