Premium Essay

HIPAA Case Study Summary

Submitted By
Words 1304
Pages 6
Sherron has become familiar with DHSS administrative policies, procedures, applicable rules, regulations and policies that apply to the HCBS program. She has displayed consistent understanding of the importance of confidentiality and HIPAA and continues to demonstrate knowledge by sharing confidential information with only those that have a direct business need to know. Sherron has had several situations where information was requested by others but sharing that information would have been HIPAA violation. She was able to identify what could and or could not be given, shared or hinted at. Sherron discussed these incidents with her direct supervisor. She was shocked at how many HIPAA violations could be committed by the information that is requested by family and/or providers. She has consistently showed she is able to follow the HIPAA expectations.
Sherron is able to explain goals/missions of this division. She consistently authorizes services according to policy and participant needs. Sherron addresses her direct supervisor for review of care plans and plan of actions for cases that require special care plans. Sherron has displayed understanding of ANE …show more content…
Sherron has become familiar with a pattern of interviewing that allows her to make the participant comfortable as well as interpret the assessment tool in a way that they are able to correctly respond to the questions. She continues to successfully complete Initial and reassessment orders within the expected time frame and according to policy. If there are issues that would interfere with completion of cases Sherron has documentation to support the delay in completion as well inform/update Supervisor to explain events that have occurred. Sherron successfully navigates the data bases that are used to complete case actions. She is proficient on the LFAM system due to prior employment with

Similar Documents

Premium Essay

Doctors

...medical savings accounts, to improve access to long-term care services and coverage, to simplify the administration of health insurance, and for other purposes. HIPAA Colloquial acronym(s) Enacted by the  104th United States Congress Citations Public Law Stat. Pub.L. 104–191 110 Stat. 1936 [1] [2] Legislative history [3] • • • • • • • • • Introduced in the House as H.R. 3103 [4] by Bill Archer (D-TX) on March 18, 1996 [5] Committee consideration by: House Ways and Means Passed the House on March 28, 1996 (267–151 Passed the Senate on April 23, 1996 (100-0 [6] ) [7] ) [8] ) and by the Senate on , in lieu of S. 1028 Reported by the joint conference committee on July 31, 1996; agreed to by the House on August 1, 1996 (421–2 [9] August 2, 1996 (98–0 ) Signed into law by President Bill Clinton on August 21, 1996 e v t [10] The Health Insurance Portability and Accountability Act of 1996 (HIPAA; Pub.L. 104–191 [1], 110 Stat. 1936 [2] , enacted August 21, 1996) was enacted by the United States Congress and signed by President Bill Clinton in 1996. It has been known as the Kennedy–Kassebaum Act or Kassebaum-Kennedy Act after two of its leading sponsors.[11] Title I of HIPAA protects health insurance coverage for workers and their families when they change or lose their jobs. Title II of HIPAA, known as the Administrative...

Words: 7409 - Pages: 30

Premium Essay

Healthcare

...Professor Natasha Celestin Table of Contents………………………………………………… I. Introduction of NueMD EMR……………………………………………… A. Practice Management………………………………………………... 1. Patient Registration…………………………………………….... 2. Reimbursement Management II. Uses of NueMD EMR Software…………………………………………….. A. Advantages of using NuMD EMR…………………………………… B. Disadvantages of the product…………………………………………. III. Governance, Privacy, and Legal Issues…………………………………….. A. Privacy compliance – HIPAA………………………………………… 1. Liability…………………………………………………………….. 2. Legal Interoperability ……………………………………………... 3. HIPAA Audits……………………………………………………… IV. Benefits of using NueMd EMR software versus the previous software …... A. Inpatients EMR………………………………………………………… B. Patient Accounting and Patient Management…………………………... 1. NueMd Case Studies……………………………………………….. 2. Partnerships and Affiliations……………………………………….. V. Summary VI. References NueSoft technologies, Inc. is a provider of web based medical and practice management software. Nue soft also known as NueMD medical software. Nuesoft technology headquarter and was established in 1993 in Marietta Georgia by Massoudd Alibaksh. The company develops and sells practice management software for physicians, practices, medical billing companies, Nusoft also known as NueMD that is a flagship product which is notable for being the first internet based. Nuemd is well known...

Words: 1696 - Pages: 7

Free Essay

Security Policy

...Law and Policy Case Study September 15, 2013 Introduction In the field of information security, there are many types of law. As senior managers, it is important to be knowledgeable of the legal environment. Once this information is learned and retained, then it will increase access and understanding of information security. Laws and practices that are related to information security will be discussed and how these laws impact organizations today and ensures confidentiality, integrity, and availability, of information and information systems. Governance policy will be discussed and recommendations for development of governance policy in an organization. Analysis The law in information security is very broad. There are different types of laws in information security. Civil law, criminal law, administrative law, and constitutional law are all part of law in information security. Civil law deals with law associated with individuals and organizations. Criminal laws are laws that effect society and are prosecuted by the state. Cornell University defines administrative law as “Branch of law governing the creation and operation of administrative agencies. Of special importance are the powers granted to administrative agencies, the substantive rules that such agencies make, and the legal relationships between such agencies, other government bodies, and the public at large (Cornell, 2010).” Constitutional law deals with how law...

Words: 824 - Pages: 4

Premium Essay

Information Systems

...Axia/HCS 483 | Information System Briefing | November,2011 | Information System Briefing Selecting and acquiring information systems is important to this organization. Information systems are designed based on the organization’s needs, thus simplifying patient needs, departmental, and other information. Information systems should also accommodate other departments as well such as radiology, pharmacy, and other various branches of the hospital. An information system is, of course, an expensive technology but can greatly benefit the hospital. With information systems many systems have to be installed databases, storage, identification, and selection. Once it is up the organization still has to think about an offsite back up station with a firewall. It is to much for an organization or investors to take in, making it imperative that the organization receives the system designed to their needs. Selecting and Acquiring When selecting what is needed for the organization one has to look at many different variables. Does the organization have many branches, do they have different specialties, patients, billing, and other various staff. Communication between these is vital to making the information system work. The information also has to be user friendly and easy to obtain by staff. If any of the information is not easily obtainable it will make the organization run slow in all departments or fragment it. That means that patient information could be lost resulting in duplicate...

Words: 1181 - Pages: 5

Premium Essay

Clinical System Trends

...risk management: Development of a monitoring instrument. BMC Health Service Research, 10, 337. The article focuses on the role of clinical risk management (CRM) in enabling health care institutions to identify and manage risks that could threaten patient safety. In the study, the researchers developed an instrument to assist in risk identification, which was then distributed to different institution. The researchers concluded that the instrument was effective in monitoring critical areas that could threaten patient safety. Harrison, M. D., & Sujan, M.-A. (2008). Computer safety, reliability, and security. New York, NY: Springer Science & Business Media. The book was based on an international conference on computer safety held in Tyne, UK, in 2008. The conference had brought together leading scholars and experts in the field of computer safety, with issues such as software dependability, data privacy, and safety taking priority. The information contained in this book would be useful in shedding more light on the leading trends of privacy and safety in the use of clinical systems. HHS. (2015). Summary of the HIPAA Privacy Rule. Retrieved February 12, 2015, from http://www.hhs.gov/ocr/privacy/hipaa/understanding/summary/ In this web article, the U.S. Department of Health and Human Services elaborates on the issue of privacy in the sharing of patient data among qualified health care practitioners. The website summarizes key elements contained in the Privacy Rule, including provisions...

Words: 667 - Pages: 3

Premium Essay

Healthcare Law and It

...Healthcare Law and IT 1 Healthcare Law and IT 2 Healthcare as a whole has undergone an enormous transformation in recent years. The United States spends more on healthcare delivery, in terms of a percentage of GDP, than any other country in the world. Much of that cost is related to research and improvements in technology and information systems, as well as implementing them in an effort to reduce healthcare costs over time. That is where healthcare informatics comes into effect. According to Health Services Research Information Central, the definition of health informatics is, “the interdisciplinary study of the design, development, adoption, and application of IT-based innovations in healthcare services delivery, management, and planning.” Healthcare informatics is used to gather, analyze, and interpret data and information about patients and treatments. This information, along with business and management information, is used to interpret how things are and to develop a better, more efficient and more cost effective method of operation. The big question is, how does healthcare informatics and technology effect or impact the development and implementation of healthcare law? One of the most effective technologies that has been widely adopted already is electronic health records. EHR are systems that track and record patient information. It also makes them more accessible and easier to share and communicate between doctors, patients and insurance companies. Electronic...

Words: 1608 - Pages: 7

Premium Essay

Health Information

...record. (Complete for all that are listed in Abdelhak under the “health data users and uses” section. - Patient: uses their medical data to understand their health care and to become more active partners in maintain or improving their health. - Health care practitioners: uses it as a primary means of communications among themselves. - Health Care providers and Administrators: uses the data to evaluate care, monitor the use of resources, and receive payment for services rendered. Administrators analyze financial and patient case mix information for business planning and marketing activities - Third party payers: the data become the basis for determining the appropriate payment to be made. - Utilization and case managers: uses it to coordinate care so that the patient is cared for in the most clinically cost-effective manner. - Quality of care committees: use the information as a basis for analysis, study, and evaluation of the quality of care given to the patient. - Accrediting, licensing, and certifying agencies: use the record to provide public assurance that quality health care is being provided. - Governmental agencies and public health: to determine the appropriate use of the governmental financial resources for health care facilities and educational and correctional institutions - Health information exchanges: provides patient centered care that improves quality, safety, efficiency, timeliness and accessibility -...

Words: 3416 - Pages: 14

Premium Essay

Basic Institutional Review Board (Irb) Regulations

...Introduction The purpose of this module is to provide a basic understanding of the human subject protection regulations that govern the participation of human volunteers in research in the United States. Learning Objectives By end of the module you should be able to: * Describe the role, authority, and composition of the IRB. * List the IRB requirements for conducting research involving human subjects. * Describe the types of IRB review. * Describe the process of working with the IRB. * Identify other regulations and regulatory groups that require compliance based on the type of research being conducted. IRB Role, Authority, and Composition The Role of the IRB An Institutional Review Board (IRB) is a review committee established to help protect the rights and welfare of human research subjects. Regulations require IRB review and approval for research involving human subjects if it is funded or regulated by the federal government. Most research institutions, professional organizations, and scholarly journals apply the same requirements to all human research. Although federal regulations refer to IRBs, an institution may have chosen a different name for this committee. To clarify when IRB review is required, let's define some terms: * Research: Federal regulations define research as: "a systematic investigation... designed to develop or contribute to generalizable knowledge." [45 CFR 46.102(d)] If an investigator is unclear about whether a planned...

Words: 5929 - Pages: 24

Premium Essay

Instituational Review Board Regulations

...Basic Institutional Review Board (IRB) Regulations and Review Process Content Authors Ada Sue Selwitz, M.A. The University of Kentucky Norma Epley, M.S. East Carolina University Janelle Erickson, MPH Institute for Systems Biology Introduction The purpose of this module is to provide a basic understanding of the human subject protection regulations that govern the participation of human volunteers in research in the United States. Learning Objectives By end of the module you should be able to: Describe the role, authority, and composition of the IRB. List the IRB requirements for conducting research involving human subjects. Describe the types of IRB review. Describe the process of working with the IRB. Identify other regulations and regulatory groups that require compliance based on the type of research being conducted. IRB Role, Authority, and Composition The Role of the IRB An Institutional Review Board (IRB) is a review committee established to help protect the rights and welfare of human research subjects. Regulations require IRB review and approval for research involving human subjects if it is funded or regulated by the federal government. Most research institutions, professional organizations, and scholarly journals apply the same requirements to all human research. Although federal regulations refer to IRBs, an institution may have chosen a different name for this committee. To clarify when IRB review is required, let's define some...

Words: 5985 - Pages: 24

Premium Essay

Healthcare

...the Time of HIPAA Margaret M. Richards Cleveland Clinic Children’s Hospital With the application of the Health Insurance Portability and Accountability Act (HIPAA) in the medical community, new issues arise for psychologists in keeping documented records of patient visits. Confidentiality limits have broadened, making use of the electronic medical record more complicated for the psychologist practitioner, particularly when serving as part of a multidisciplinary team. As the electronic medical record (EMR) has become more prevalent in multiple settings, various researchers have examined the effectiveness of this record keeping system, with a focus on improving patient outcomes. The risks and benefits of implementing an EMR will be discussed, focusing on specific considerations for psychologists in regard to confidentiality and interdisciplinary collaboration. Keywords: Health Insurance Portability and Accountability Act (HIPAA), electronic medical record (EMR), confidentiality How much information is appropriate to place in an electronic medical record (EMR), especially when that record is accessible to professionals throughout an organization (i.e., a hospital setting)? This question has become an important topic of discussion and research as EMRs become more prevalent in larger institutions, such as academic medical centers and community mental health centers. With the implementation of the Health Insurance Portability and Accountability Act (HIPAA), psychologists...

Words: 6602 - Pages: 27

Premium Essay

Healthcare and Information Technology

...Information Technology (IT) is increasingly being deployed and used in healthcare facilities to facilitate the communication of information across different healthcare teams and external insurance payers. The underlying assumption underpinning the introduction of IT in healthcare is that, improvements in information flow will eventually translate into improved quality of care (Mort M, 2009).The US Healthcare system is slowly moving toward Electronic Health Records. As mandated by the government all healthcare establishments need to be complaint by 2014 as per this report ( ref).In IT's infancy, healthcare organizations used it for limited payroll and accounting functions. Today, healthcare organizations can use technology for direct deposit of their payroll, receiving payments from insurance providers, remote patient monitoring, clinical data processing and remote delivery of diagnoses (Bernstien, 2007). At every step of its evolution, IT has become more affordable, more powerful, more reliable, and more accessible and above an all much more versatile in the amount of applications than it was conceived for (Bernstien, 2007). The challenges faced by the industry are on multiple fronts, including rising costs and inconsistent quality (McGlynn et.al, 2003). Health information technology, especially electronic health records has the potential to improve overall quality and effectiveness of healthcare providers (Chaudhry, 2006). Over the last few years US policy makers with help of...

Words: 2024 - Pages: 9

Premium Essay

Health Information

...to the American Health Information Management Association (AHIMA), some recommended core data elements for indexing and searching records include: * Internal patient Identification * Patient Name * DOB * DOB qualifier * Gender * Race * Ethnicity * Address * Alias/pervious name * SS# * Facility identification * Universal patient identifier (if available) * Account number * Admission date * Discharge date * Service type * Patient disposition 2. What are registers and indexes? Registers and registries contain information about a disease or event and are maintained by individual health care facilities, federal and state government agencies and private organizations. Case report form are submitted by health care facilities and providers to report data to sponsoring agencies, facilities, and organizations. ***Remember, a register is a collection of information, such as a hospital’s admission/discharge register, while a registry is a structured system for collecting a maintaining information about a defined population so that analyses and reviews can...

Words: 3684 - Pages: 15

Premium Essay

Summary

...Part 1 Study of the Law in General Chapter 1 LEARNING OBJECTIVES After reading this chapter, the learner should be able to: 1. Differentiate between public and private law. 2. Compare and contrast contract and tort law. 3. Compose a scenario that illustrates the difference between the substantive and procedural aspects of criminal law. 4. Identify and explain the differences between various sources of law. 5. Describe the branches of government and their roles in creating, administering, and enforcing law. 6. Explain the process of how a bill becomes a law. 7. List and describe quasi-legal requirements to which health-care organizations are subject. KEY CONCEPTS Common law Conflict of laws Constitution Contract law Deeming authority Electronic case filing systems Felonies 2 Law Misdemeanors Ordinances Private law Procedural law Public law Res judicata Separation of powers Stare decisis Statutes Substantive law Tort law Words of authority Workings of the American Legal System INTRODUCTION As health care becomes more complex, the interplay between the law and health care increases. Government regulation of the health-care field continues almost without pause while lawsuits against health-care providers appear to increase. The interplay of these forces significantly affects the health information manager’s ability to manage patient-specific health information. Thus, the health information manager must possess a fundamental...

Words: 8869 - Pages: 36

Premium Essay

Clinical

...document that directs researchers to consider privacy and confidentiality when conducting research. The guidelines of the American Anthropological Association, the Oral History Association, the American Psychological Association, and the American Sociological Association identify protecting privacy and ensuring confidentiality as key components of respecting the safety and dignity of research subjects. This module will define privacy and confidentiality and discuss their application in various research settings. It will also discuss applicable laws, other than the Common Rule. Learning Objectives By the end of this module, you should be able to: • Distinguish between privacy and confidentiality • Identify privacy risks associated with study designs • Identify a range of procedures for ensuring confidentiality • Identify relevant laws regarding collection of private information • Identify laws that limit the ability to ensure confidentiality Definitions According to the IRB Guidebook, published by the Office for Human Research Protections, privacy can be defined in terms of having control over the extent, timing, and circumstances of sharing oneself (physically, behaviorally, or intellectually) with others. Confidentiality pertains to the treatment of information that an individual has disclosed in a relationship of trust and with the expectation that it will not be divulged to others in ways that are inconsistent with the understanding of the original disclosure without...

Words: 2446 - Pages: 10

Premium Essay

Vetrerans Affairs (Va) Case Study

...Mrs. Hubbard IS3350 Security Issues in Legal Content 1/8/2015 Don Delano, Steve Brown Unit 2 Assignment 1 Executive Summary on Veteran’s Affairs and Loss of Private information On May 3, 2006 an analyst took home a laptop and hard drive with personal data that was unencrypted. Another thing was that he had been doing this for the past three years. This was a mistake on the part of the data analyst because the information requires strict protection according to HIPAA act. According to the study he had permission to take the laptop and hard drive home from his supervisor. The information was stolen from his residence which he reported immediately to the local law enforcement and his immediate supervisor. Unfortunately his supervisor did not escalate it in a timely manner which was another mistake made in this situation. Auditors informed the Veterans affairs of the lack of cyber security, the agency took a lackadaisical approach to fixing the problems. The agency waited until May 22, 2006 to inform the people that were affected by the loss of information. If the security measures were in place the loss would have been a lot less. The cost was estimated between 100 million and 500 million. The information should have as a minimum been encrypted allowing protection, and making it harder for someone to retrieve the data off both the laptop and the hard drive. This would allow them the ability to mitigate the loss of data. The Veterans affair needs to implement...

Words: 473 - Pages: 2