“Whatever, in connection with my professional service, or not in connection with it, I see or hear, in the life of men, which ought not to be spoken of abroad, I will not divulge, as reckoning that all such should be kept secret.”
—Confidentiality excerpt from the Hippocratic Oath (as cited in Croll, 2010)
Traditional schools of medicine have a ritual of reciting oath excerpts such as the one above during their graduation ceremonies. Such excerpts usually revolve around a professional’s promise to uphold the ideals of patient safety and confidentiality to the best of his or her ability.
With the continued integration of Health Information Technology (HIT), and advances in technology such as hand-held computers, new ethical considerations have evolved within health care settings. For example, wireless capabilities can provide easier access to information from unauthorized outside parties. While technological advances have led to improvements in health care, they have also created new vulnerabilities. Doctorally prepared nurses need to be aware of ethical issues surrounding the use of patient information, technology, and the respective liabilities.
Reference:
Croll, P. (2010). Privacy, security and access with sensitive health information. Studies in Health Technology and Informatics, 151, 167–175.
To prepare:
By tomorrow Wednesday 09/27/17, 12 pm, write a minimum of 550 words essay in APA format with a minimum of 3 references from the list in the instructions area. Include the level one headings as numbered below:
post a cohesive response that addresses the following:
1) Describe your selected ethical issue (example of ethical issues in nursing Informatics are: ). Choose one!
2) Analyze the potential liabilities that this issue poses to the organization by referencing the AMIA Code of Ethics.
3) Formulate strategies that the organization could implement to address the ethical issue.
Course Text: American Nurses Association. (2008). Nursing informatics: Scope and standards of practice. Silver Spring, MD: Author.
“Ethics in Nursing Informatics” (p. 49-52)
This page of the text introduces three common ethical codes used in health care today.
Croll, P. (2010). Privacy, security and access with sensitive health information. Studies in Health Technology and Informatics, 151, 167-175.
The author proposes a model for controlling the security of health information networks and systems.
Hjort, B. (2007). AHIMA report addresses evolving role of health care privacy and security officers. Journal of Health Care Compliance, 9(3), 47-68.
This article identifies the challenges and responsibilities of health care workers employed in privacy and security positions.
Layman, E. J. (2008). Ethical issues and the electronic health record. The Health Care Manager, 27(2), 165-176.
The findings within this article provide recommendations for health personnel, leaders, and policy makers when attempting to design ethically sound electronic health records.
Mackenzie, G., & Carter, H. (2010). Medico legal issues. Studies in Health Technology and Informatics, 151, 176-182.
Within this article, the authors provide an overview of the legal issues, precautions, and potential breaches that surround the privacy and security of electronic patient records
O’Keefe-McCarthy, S. (2009). Technologically-mediated nursing care: The impact on moral agency. Nursing Ethics, 16(6), 786-796.
Examine technology’s ability to negatively affect the patient/nurse relationship as decisions are based more on data and less on emotional and pedagogical reasoning by referencing the material found in this article.
Withrow, S. C. (2010). How to avoid a HIPAA horror story. Healthcare Financial Management, 64(8), 82-88.
The HIPAA horror story that is detailed here underlines the importance of adopting HIPAA privacy and security provisions in efforts to reduce potential violations and financial threats.
California HealthCare Foundation. (2011).
Retrieved from http://www.chcf.org/
The California HealthCare Foundation outlines quality reform plans that improve efficiency and reduce cost for California’s patients.
Centers for Medicare & Medicaid Services. (2010). CMS EHR meaningful use overview.
https://www.cms.gov/EHRIncentivePrograms/30_Meaningful_Use.asp
The U.S. Department of Health and Human Services defines the term meaningful use and also its view of meaningful use criteria, requirements, and financial impact.
American Nurses Association. (2011). Ethics and human rights.
Retrieved from http://nursingworld.org/MainMenuCategories/HealthcareandPolicyIssues/ANAPositionStatements/EthicsandHumanRights.aspx
See this website to view position statement documents developed by the ANA to promote adherence to ethics and human rights.
Healthcare Information and Management Systems. (2011). Privacy & security toolkit.
Retrieved from http://www.himss.org/ASP/topics_pstoolkit.asp
At this website, you will find a categorized tool kit that consists of implementation plans, legislation, and case studies to help health care professionals better understand matters of privacy and security.
The American Medical Informatics Association. (2014). Retrieved from http://www.amia.org/about-amia/ethics
At this website, you will find an American Medical Informatics Code of Ethics for Healthcare Professionals.
Laureate Education, Inc. (Executive Producer). (2011). Transforming nursing and healthcare through technology: Healthcare informatics: Ethics and law. Baltimore, MD: Author.
Note: The approximate length of this media piece is 10 minutes.
In this week’s media presentation, Dr. Don Detmer gives his insights on the government’s initiatives to create secure and meaningful electronic health records.
We value our customers and so we ensure that what we do is 100% original..
With us you are guaranteed of quality work done by our qualified experts.Your information and everything that you do with us is kept completely confidential.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreThe Product ordered is guaranteed to be original. Orders are checked by the most advanced anti-plagiarism software in the market to assure that the Product is 100% original. The Company has a zero tolerance policy for plagiarism.
Read moreThe Free Revision policy is a courtesy service that the Company provides to help ensure Customer’s total satisfaction with the completed Order. To receive free revision the Company requires that the Customer provide the request within fourteen (14) days from the first completion date and within a period of thirty (30) days for dissertations.
Read moreThe Company is committed to protect the privacy of the Customer and it will never resell or share any of Customer’s personal information, including credit card data, with any third party. All the online transactions are processed through the secure and reliable online payment systems.
Read moreBy placing an order with us, you agree to the service we provide. We will endear to do all that it takes to deliver a comprehensive paper as per your requirements. We also count on your cooperation to ensure that we deliver on this mandate.
Read more