.

Tuesday, January 15, 2019

Administrative Ethics Paper Hcs/335

Administrative ethical motive Paper HCS/335 November 5, 2012 Administrative Ethics Paper In todays world of technology endurings face an ever thought-provoking issue of protect their privacy. One of the biggest beas infringing on a patients privacy would be the prescription(prenominal) drug health reading that is being released by pharmacists and the way in which that data is apply.Information is given to a wide material body of entities and to singulars, which raises enormous concern about the privacy rights of patients, especially considering the fact that the patient has non given consent for the release of this teaching. Legislative and judicial assist is being given on how to protect privacy identifiable information on prescription data and the harm that can be do by the release of this information. There is a lot of focus on exploring privacy issues with regard to personal health information (PHI), especially with the prescription drugs containing so much informat ion.The computerized databases in a pharmacy collect a host of patient information including the patients address, the patients name, the date it was filled, the mail service it was filled, the patients gender and age, the prescribing physician, what drug was prescribed, the dosage, and how legion(predicate) pills. How a patients information is used once it is de-identified about likely doesnt even cross anyones mind because to the highest degree patients dont realize that anyone other than the pharmacist, the doctor, and the insurance company for carry on the claim, are going to see it.There is a long list of companies and individuals that expect the patient prescription PHI, including lawyers, educators, researches that are performing clinical trials, marketing purposes, presidency officials, and employers. The article, Somebodys Watching Me, lays the groundwork in juristicly development the framework for protecting the privacy of patient prescription PHI, especially the information on de-identified PHI. There are 5 parts to the legal framework.Part 1 basically states why in that respect is a need for national edict to step in to help protect both patient prescription PHI, and de-identified patient prescription PHI. Part II shows the process of how the information is smooth and used. Part III talks about federal and state laws that are currently in make upence to protect a patients privacy rights, with a focus on three state statutory attempts that would curb information being used for marketing purposes, and the Supreme motor hotel and circuit court responses.Part IV looks at the existing laws regarding unauthorized divine revelation of patient prescription PHI. This is a more intense look at all of the statutes, ethical guidelines, federal and state statutes and laws, and other option for protecting a patients privacy. Part V suggests having a federal statute allowing patients to control the use of their information for both patient prescri ption PHI, and de-identified PHI. Most people would think that de-identified PHI would be protected because it is encrypted before it is transferred to others non authorized to access the identifiable information.Unfortunately, there are ways such(prenominal) as geo-coding that allows others to re-identify the information. Even if a company sells the data information that they exact and they state that personal information is not to be used by third parties, there is no guaranty that the purchaser will continue the agreement. In todays technological society it is difficult to book a program that will continue to make re-identification impossible, especially if an individuals privacy was once breached by re-identification. Encryptions are codes and codes are downhearted all the time.Moreover, encryption requires use of a key or cipher, which is used to lock and unlock the hidden data. Such a key is necessary to allow the hidden data to be viewed in an intelligible dash by thos e who are authorized to view it. However, there is always a risk that the encryption key might fall into the wrong turn over, thereby allowing the information to be accessed by unauthorized viewers. There are legion(predicate) problems that could arise from a patients information landing into the transfer of a stranger, a boss, an enemy, or any other individual that does not have permission to view that information.The wellness Insurance Portability and Accountability act (HIPAA) needs to take a hard look at the problems that exist with the identifiable patient prescription PHI, the de-identified patient prescription PHI, and the encrypted prescription PHI. These issues alter the entire population and can have a devastating impact on those that have their personal information get into the wrong hands. If there is an employee who has Aides and they dont want other workers to know, it would be too easy for an employer to obtain that information.The arguments and facts that are use d in the article financial backing the proposed solution by stating the problems that arise without having laws in place to protect the privacy rights of patients. There are many ethical and legal issues when you are dealing with privacy rights, including the chances of getting sued by individuals for letting their information be obtained and used by others. Having privacy information released into the wrong hands can be detrimental to a patient. A manager in a health care environment should be there to support and help bring laws into place that protects both the patient and the organization. REFERENCESSmith, C. (2012) Somebodys Watching Me Protecting Patient screen in Prescription health Information, Vermont Law Review, retrieved from the University of Phoenix Library on November 4, 2012. Kendall, D. Protecting Patient Privacy in the Information Age retrieved from http//www. hlpronline. com/kendall. pdf Thacker, S. , (2003) HIPAA Privacy Rule and Public Health CDC, retrieved fro m http//www. cdc. gov/mmwr/preview/mmwrhtml/m2e411a1. htm &8212&8212&8212&8212&8212&8212&8212&8212&8212&8212&8212&8212&8212&8212 1 . David Colarusso, Note, Heads in the dapple, A Coming Storm The Interplay of Cloud Computing, Encryption and the Fifth AmendmentsProtection Against Self-Incrimination, 17 B. U. J. Sci &038 TECH. L. 69, 78-80 (2011)(describing the details of symmetric key encryption and public key encryption) 2 . Id. at 789 (describing how a cipher or key renders plaintext unreadable gibberish). 3 . Robert D. Fram, Margaret Jane Radin &038 Thomas P. Brown, Altred States Electronic Commerce and Owning the sum of Value Exchange, 1999 STAN. TECH. L. REV. 2, 15-16 (1999) (outlining the risks of cryptography, including the possibility that encryption keys may not always be kept secret. )

No comments:

Post a Comment