StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Sensitivity and Protection of Data (CASE) module 5 - Essay Example

Cite this document
Summary
According to Jarrell, Welker, Silsbee, and Tucker (2012) in their article entry in the journal of American business review on effects of unintended consequences, the effecting of HIPAA Act to regulate information security has a couple of ripples that were not intended in the…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.8% of users find it useful
Information Sensitivity and Protection of Data (CASE) module 5
Read Text Preview

Extract of sample "Information Sensitivity and Protection of Data (CASE) module 5"

Information Sensitivity and Protection of Data: HIPAA Affiliation: Summary According to Jarrell, Welker, Silsbee, and Tucker (2012) in their article entry in the journal of American business review on effects of unintended consequences, the effecting of HIPAA Act to regulate information security has a couple of ripples that were not intended in the initial plan. Initially the HIPAA was intended to ensure that limited cases of insurance fraud are reported, increase access to the health care, and guarantee administrative simplification.

However, with the implementation of the HIPAA Act, various problems have been witnessed as they involve consequences that were undesired. For instance, employers and organizations are putting more limitation on the accessibility of their information. In the long run, these organizations are suffering time management issues. In this cases, organizations have limited the access of information to physicians and nurses likewise. This limitation requires organizations to only authorize a few entities to information databases.

For the physicians and nurses, flow of information changes from prompt and detailed to delayed and censored. The article defines the cost of unintended consequences from policies and other strategies (Jarrell et al. 2012). What is interdisciplinary health care delivery? When do we use it? What are the advantages of this approach? An interdisciplinary health care delivery can be defined through the consideration of the term interdisciplinary meaning integration of multiple disciplines or fields of expertise.

Within the health care sector interdisciplinary health care delivery means the delivery of services by collaboration of multiple health care professionals. Normally health care professionals use interdisciplinary health care delivery when they are faced by multi-step medical intervention. This medical intervention plan may involve diagnosis by a doctor, tests by a lab technician, prescriptions by a physician, and administration of care by nurses. In this case, the flow of information starts from the first professional to see the patient down to the one offering care.

The advantages of using interdisciplinary health care delivery include professional intervention by experts on specific areas of the intervention. This ensures accuracy and best practice ensuring that all parties provide timely and relevant intervention input coinciding with their qualifications (Hinegardner, 2003).Briefly discuss the law of unintended consequences and how it applies in this case The law of unintended consequences is an idiomatic warming that informs administrative bodies that their strategies and policies have the potential of leading to undesired or unintended results.

With application to the health care sector, the law of unintended consequences warns health care administrators that their policies and strategies not only accomplished their intended duties but also that they can create other issues both beneficial or detrimental to the organization or sector. With reference to the indented purpose of implementing the HIPAA Act, the implementing committees did not anticipate a slower health care sector influenced by too many security laws about data security.

In this case, the law of unintended consequences suits the situation as the implementers of the Act did not consider the side-effects of the policy (Nuutten, 2003).Discuss what the authors uncovered about the follow of information between staff before and after HIPAA The authors of the article “Unintended Effects of…” uncovered that the flow of data before the introduction of the HIPAA was reliable as information would travel from different personnel within limited time. This approach inspired multidisciplinary health care delivery.

After the introduction of the policy, the authors discover that health care organizations have transformed their information systems into security hubs restricting information flow. In this case, information would only be accessible by department administrators rather than all department staff.Importance for health care in terms of communication/teamwork, training, culture, cost of care, public policy With regards to the importance for health care communication, training, cost of care, and public policy, it is observed that information systems are platforms used by various health professions.

Communication systems allow professionals to contribute to interventional measures thus inspiring interdisciplinary health care delivery. Training on the other hand, is required within the health care sector to ensure that professionals understand the benefits and obligations of protecting sensitive information. ReferencesJarrell, K., Welker, J., Silsbee, D., and Tucker, F. (2012). The Unintended Effects Of The HIPAA Privacy Protections On Health Care Treatment Team And Patient Outcomes. Cambridge: Journal Of American Business Review, 1(1): 88-98Nuutten, S. (2003). An IT Contingency Plan to Meet HIPAA Security Standards.

Journal of AHIMA, 75(2): 32-38Hinegardner, S. (2003). Data Storage for Managing the Health Enterprise and Archiving Business Continuity. Journal of Health Information Management.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Sensitivity and Protection of Data (CASE) module 5 Essay”, n.d.)
Information Sensitivity and Protection of Data (CASE) module 5 Essay. Retrieved from https://studentshare.org/health-sciences-medicine/1626153-information-sensitivity-and-protection-of-data-case-module-5
(Information Sensitivity and Protection of Data (CASE) Module 5 Essay)
Information Sensitivity and Protection of Data (CASE) Module 5 Essay. https://studentshare.org/health-sciences-medicine/1626153-information-sensitivity-and-protection-of-data-case-module-5.
“Information Sensitivity and Protection of Data (CASE) Module 5 Essay”, n.d. https://studentshare.org/health-sciences-medicine/1626153-information-sensitivity-and-protection-of-data-case-module-5.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Sensitivity and Protection of Data (CASE) module 5

Information Management College Case Study

Among these, the following features are of note:Presentation of data summaries for managers using dashboards and scorecards.... asy creation of business reportsOLAP analysis for extended operation analysisPredictive and statistical analysis of data that allows users to thoroughly extract trends from the information stored in the system.... Also, market optimization tools are available in this module.... The optimal production volume can be planned from this module of the software....
2 Pages (500 words) Case Study

The United States Air Force

The essence of the rational process is the belief that, "all good persons, given the same information, will come to the same conclusion".... In the military, the person with the most rank is not always the person in charge.... A Major is completely at the mercy of the Sgt.... Assignment clerk....
10 Pages (2500 words) Case Study

Policies and Procedures for Washington Posts Information System

On the other hand, the KMS provides technical help to the end-users or employees that would be requiring solutions for their systems and data management.... With the current setup of the IS department, it is very easy for anyone within the organization to access the data, which is immediately available in their servers or info bank.... One risk would be if competing companies would see an opportunity to send someone who can infiltrate the company and be allowed access to the system, if there is no internal policy limiting users in saving documents on flash disk, floppy disks or any other forms of handy data storage, confidential information may leak....
7 Pages (1750 words) Case Study

Broadway Cafe: an E-Business Strategy

This paper "Broadway Cafe: an E-Business Strategy" aims at understanding the current position of the café in terms of its competitors and building a strategic plan for the company to move into E-Business.... Also, the report will include a very fast-growing feature – Customer Relationship Management....
8 Pages (2000 words) Case Study

Marketing Strategy for Mobile Phone Company: Apple Inc

This report “Marketing Strategy for Mobile Phone Company: Apple Inc.... rdquo; identifies a new product development concept for penetration into the United States market.... It further describes why new product development is important for businesses, such as Apple, driven by competitive and consumer demands....
10 Pages (2500 words) Case Study

Teradyne Corporation: the Jaguar Project

This research will begin with the statement that in the early 1990s, the CEO of Teradyne Corporation, Alex D'Arbeloff changed the way the company was conducting its operations through the introduction of a total quality management (TQM) program.... hellip; The paper operates mainly based on research questions which can be stated as follows: What impact did the project management tools have on the Jaguar project?...
10 Pages (2500 words) Case Study

EBuy Control Station

The strength of the platform should be in terms of data security and the ability to serve big global traffic of customers at the same time.... First of all, there internet service providers (ISPs) must keep secure all the data of those they secure.... The cloud service used must be an encrypted one to ensure that there are no data leakages at all.... hellip; The information system security is in two levels, and the cloud is used at both levels....
5 Pages (1250 words) Case Study

The Protection of the Information in BioMed Company

The paper "The protection of the Information in BioMed Company" examines the vulnerabilities associated with this information when the GSM network is used to conduct project activities.... An action was developed to cater to the effective protection of information being subjected to the GSM network.... The protection of this information system by the company should meet both companies and operational needs.... The report identified the information associated with the new product and found that it includes sensitive, system, and explicit information....
12 Pages (3000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us