Premium Essay

Bat1 Task 1

In:

Submitted By jukasdrj
Words 849
Pages 4
A. Evaluate the two policies in the attached “Health Record Policies” by doing the following: 1. Discuss what information should be included in an addendum pertaining to a shadow chart. The addendum requested by the supervisor should include a requirement to seek authentication of the shadow chart by the original healthcare provider. The HIM department can’t be responsible to determine if the information located in the shadow copy is relevant or not. That task should be placed with the provider. 2. Discuss how information technology staff can help decrease incidents of security breaches. IT staff in the facility can help decrease security incidents by simple group security policies across their IT platform. These policies could include password protected screen savers, shorter screensaver activation timers, and standard password complexity requirements. With the screensaver changes, if personnel left their workstation without logging off, the saver would kick in and lock the station for them. Password complexity forces the staff to not recycle old passwords, and to use complex passwords that are more difficult to guess. B. Discuss one situation from Montana Code 41-1-402 (2a through 2d) that may result in criminal liability to the organization if not followed. 1. Summarize how HIPAA defines criminal liability. 2. Explain which part of 2a through 2d of Montana Code 41-1-402 would directly impact actions of clinical staff. The situation listed in part (b) struck me as interesting due to the nature of the definition. The key word in the beginning of the statement was professes. No burden of proof is needed by the minor. Therefore, if a medical provider denies care to a minor that has professed one of the key stipulations of adulthood, that provider would be criminally liable. Criminal liability in regards to HIPAA is judged by knowledge of the individual. Knowing of an

Similar Documents

Premium Essay

Legal Concerns

...BAT1 Task #1 A1. ​Addendum to the Shadow Chart Policy: ​Employees shall know that original records are always in the permanent chart of the patient. The shadow chart does contain records, but these records are only copies of the original files. After each visit a record of the visit is place in the patient’s primary chart. After this is in place a copy may be made for the shadow chart. It is essential to understand that these are only copies. The reason we have shadow charts is to treat patients at our off site clinic locations, and to be able to provide other departments a copy of the record without having to give the primary file. We want to make sure our permanent chart is ALWAYS in place, so therefore this contains all the patient information. In the shadow charts we only place copies of what is needed to be seen by other departments. These departments do not need access to the patient’s entire medical record. ​Employees must know that shadow charts are to be place in the locked cabinet at all time. This maintains the confidentiality of the patient’s medical record. Even though the shadow chart doesn’t contain all patient information it is essential to treat it just like the permanent chart. It must be safe and secure at all times. A2. ​IT Staff & Security Breach Measures: There are several different ways in which IT staff can help decrease incidents in security breaches. The first way is to provide limited access to employees based on the employees needs within the...

Words: 1681 - Pages: 7