StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Module 6 DQ1 and 2 - Article Example

Cite this document
Summary
There are three separate areas of that subject that will be discussed here; physical, technical and data redundancy. Physical security concerns the…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.5% of users find it useful
Module 6 DQ1 and 2
Read Text Preview

Extract of sample "Module 6 DQ1 and 2"

Module 6 DQ1 and 2 John Jones DQ1 One only has to listen to the news to realize that security should be of the utmost importance inmanaging a healthcare facility. There are three separate areas of that subject that will be discussed here; physical, technical and data redundancy. Physical security concerns the safety of the material aspects of the entity, buildings, equipment and people. Such preventive measures as security guards, passkeys and identification tags, locked equipment, and keeping an eye out for unauthorized people are all facets of physical security.

Technical security would be those measures taken to protect computers and the like from attacks, viruses, worms, etc. Such things as antivirus software and password or smart card logons help facilitate this. Data redundancy is backing up necessary computerized information so that it is available elsewhere in the event of a disaster. Most use what is known as a COOP site, an offsite storage area that is reasonably safe from fire, flood, and a myriad of other problems. Because mechanical items fail, data redundancy also can refer to having extra servers and computer equipment available so that the facility can continue to operate (IAHSS 2012).

After the devastating effects on healthcare caused by Hurricanes Sandy and Katrina, those administrators would probably agree with this author that redundancy is the most important of the three areas discussed in this paper. HIPAA 1996 and its successor, PPACA 2009 (Obama Care) do tend to place what appears to be a rather large burden on healthcare providers concerning privacy (HHS 2013). However, as described above, the laws as written attempt to help keep providers and patients alike comfortable in the knowledge that necessary personal information (such as social security numbers) is not released to the public, as was the case with the VA employee who lost thousands of SSN’s.

DQ2 The Health Insurance Portability and Accountability Act (HIPAA) provides a list of what it refers to as "identifiable patient information”. Although the law allows the use of the information for clinical use, the Act entails strict privacy rules that must be adhered to (HHS 2013). It specifically disallows release of such information, except in those particular circumstances as outlined. This includes what HIPAA refers to as “demographic” information as that is defined as those statistics or characteristics that define a certain segment of the population.

Such items as name, address, Social Security Number, and date of birth are specified, as well as any state of the patient’s health; physical as well as mental, past, present, and future. In addition, the patient’s monetary status is included, either payments he or she made or monies paid to said patient. The “Administrative Requirements” section does indeed list detailed responsibilities for those clinics (entities) receiving Federal money. This is basically all healthcare facilities operating in the country, for all treat some form of Federal patient, either Medicare, Medicaid, or the military Tricare system (Vormetric 2013).

As far as strictly adhering to those policies, it is probably true that entities do have written policies. After all, it is easy enough to publish rules and procedures. However, human nature is what it is and it is doubtful that clinics follow all of the policies to the letter. For example, one would doubt a busy employee shreds all of the paperwork containing privacy information. Moreover, the whistleblower protection against retaliation looks good on paper but one can read many times how that provision did not work.

ReferencesIAHSS (2012), Security Design Guidelines for Healthcare Facilities, Retrieved from: http://www.iahss.org/REF-MATERIALS/guidelines/designguidelines2012.pdf.HHS (2013), Summary of the HIPAA Privacy Rule, Retrieved from: http://www.hhs.gov/ocr/privacy/hipaa/understanding/summary/index.htmlHHS (2013), What Information is Protected, Retrieved from: http://www.hhs.gov/ocr/privacy/hipaa/understanding/summary/index.htmlVormetric (2013), HIPAA Requirements, Retrieved from: http://www.

hipaasurvivalguide.com/hipaa-requirements.php.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Module 6 DQ1 and 2 Article Example | Topics and Well Written Essays - 500 words”, n.d.)
Module 6 DQ1 and 2 Article Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1612778-module-6-dq1-and-2
(Module 6 DQ1 and 2 Article Example | Topics and Well Written Essays - 500 Words)
Module 6 DQ1 and 2 Article Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1612778-module-6-dq1-and-2.
“Module 6 DQ1 and 2 Article Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1612778-module-6-dq1-and-2.
  • Cited: 0 times

CHECK THESE SAMPLES OF Module 6 DQ1 and 2

The Professional Responsibility and Communication

This assignment discusses the professional responsibility and communication in the informational technology industry.... It has been discovered that business is not all about employing people and making money but a tool that makes the professions, careers and indeed the world a better place.... hellip; The computing and technological industry is one area that the world has come to rely on all aspects that relate to life, which range from finances to social media....
4 Pages (1000 words) Assignment

Biometric Authentication, an Overview of the Telecom System Security

From the paper "Biometric Authentication, an Overview of the Telecom System Security" it is clear that the password estimation patterns are observed when a network security attacker tries to get access to an official modem; however, the system deletes the attacker's link after a small time period....
5 Pages (1250 words) Assignment

Network Remote Access

The most ideal way of connecting to the office network would to use a virtual private network (VPN) when you are away from the office.... In order to connect to the office VPN server we need to first connect to a local carrier (i.... .... Internet service provider (ISP). … VPN technology is based on the concept of tunneling....
5 Pages (1250 words) Essay

Module 3 DQ 1 and 2

Survey research designs and cohort research designs are some of the alternatives that may be used.... In the former, there is the… As for the cohort research design, a study is to be conducted over a timeframe, and it has to involve a member of a population as a representative or Statistics Number: Question Despite the documented merits that experimental and control group designs enjoy, there are other alternative designs that are used frequently....
2 Pages (500 words) Assignment

Module 8 DQ 1 and 2

It is through the use of EBR that proper diagnoses and treatment are… Accurate diagnoses and treatment is the very mainstay of patient-centered medical care (Broyles, 2010). Likewise, the use of statistics one finds the way in which the use of interval variables may help the Federal Qualified Healthcare Center to promote Statistics Number module 8 Question As the director of the of the nursing for the Federal Qualified Healthcare Center, the best way of creating a patient-centered medical home is to adopt and promote the use of evidence-based research (EBR)....
2 Pages (500 words) Assignment

Module 6 Practice Exercise

The total funds remaining after deducting module 6 Practice Exercise Question One The loan committed is 4.... issued a new debt of 43.... 25 million US dollars.... The price of the offer was 1.... 0 dollars per bond.... The underwriter's spread was 8 percent of the gross proceeds....
2 Pages (500 words) Assignment

Six Sigma and CQI discussion questions

Six sigma was first used in the Six Sigma and CQI Discussion Questions Module 7 dq1 Six sigma is a mode of operation with tools and strategies that aims to improve efficiency in business by reducing the number of defects and errors to as minimal as possible.... Six sigma is a mode of operation with tools and strategies that aims to improve efficiency in business by reducing the number of defects and errors to as minimal as possible....
2 Pages (500 words) Essay

Network International's Profitability to Gulf Economy

It has pledged to fulfill the needs of institutions dealing with finance, corporate business and retailers (Network International).... hellip; According to Jim Randel, credit cards are used to borrow money from banks, which is a loan without collateral.... A debit card is used to access a customer's own money, which is backed by his or Network International Company profile Network international is an independent card solution involved in payment services and providing solutions in the Gulf and Middle East region....
2 Pages (500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us