Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Week 7 HIPAA and Diversity Awareness (December 12-18) ... W7A1 Interview Key Assessment for Learning Objective #7 Assignment Objectives: Meet CAHIIM Curriculum requirement for Associate

Week 7 HIPAA and Diversity Awareness (December 12-18) ...
  • W7A1 Interview Key Assessment for Learning Objective #7 Assignment Objectives:
    1. Meet CAHIIM Curriculum requirement for Associate Degree
      1. Domain II. Information Protection: Access Disclosure Archival Privacy and Security
      2. Subdomain II.B. Data Privacy Confidentiality and Security
      3. Section 1. Apply confidentiality, privacy and security measures and policies and procedures for internal and external use and exchange to protect electronic health information
      4. Competencies: Internal and external standards, regulations and initiatives o State and federal privacy and security laws
    2. Meet CAHIIM Curriculum requirement for Bachelor Degree
      1. Domain II. Information Protection: Access Disclosure Archival Privacy and Security
      2. Subdomain II.A. Health Law
      3. Section: 1. Identify laws and regulations applicable to health care
      4. Competencies: Health information laws and regulations o HIPAA, The Joint Commission, State laws
    Assignment Purpose: It is important for HIM professionals to understand the HIPAA privacy and security rules. This is a great networking opportunity.Assignment Description: Professional InterviewStep 1: Each student is required to locate and read two (2) different current (less than 3 years old) journal articles related to HIPAA, Privacy Rules, or Security Rules. The articles can be chosen from a periodical such as the Journal of AHIMA, For The Record, and Advance For Health Information Professionals or from a web site such as www.ahima.org, Herzing databases, or using Herzing LibraryStep Two: Interview a Health Information Management Professional about HIPAA, privacy rule and security rules. At minimum ask the following questions, you may add more of your own questions.
    1. What facility do you work at (name and location) and what is your title?
    2. What is your job in the medical field?
    3. Does your job relate to HIPAA? If so, in what way?
    4. How would you describe the Privacy Rule?
    5. How would you describe the Security Rule?
    6. How does your facility fulfill the requirements of the privacy and security rules?
    7. Why is HIPAA important for me to learn while in school?
    Step Three: Write a 2-4 page summary of your research findings and interview.
    1. Provide an executive summary of the article (an executive summary is a synopsis of all the basic information in a longer article). The summary is to include the basic information in the articles, outlining the articles purpose, methods, findings, and conclusions. Briefly tell what the article says at length
    2. Provide a summary of the information obtained in the interview. Be sure to include the name, title and contact information for the person that you interviewed.Compare the information obtained in the interview with the information from the articles that you read.
    3. In your summary, create a policy and procedure outlining HIPAAs privacy and security rules. (HINT: See sample policy in Health Information Functions chapter).
    4. Analyze and evaluate the information by including your thoughts and opinions regarding the subject. Answer these questions: how does this information relate to you? What actions do you need to take now or will you need to take in the future? Do you need to share this information with someone else?
    5. There are 9 security/privacy related 2014 Edition criteria in the ONC's Health IT Certification Program, criteria 170.314(d)(1) through 170.314(d)(9). This program certifies EHRs so that providers/hospitals can use them to become meaningful users of EHRs and obtain CMS incentives for doing so. Pick 1 of these criteria and discuss how it supports the HIPAA privacy and/or security requirements.
    6. The ARRA legislation introduce breach notification rules. Discuss the steps a facility must take when a breach occurs.
    7. Pay attention to grammar and punctuation issues that must be addressed. Editing and proofreading must be evident.
    8. Cite the source of your information (using APA format). Use good sources. Professional journals, vendor web sites and scholarly sources are recommended. Avoid less scholarly sources like Newsweek.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Management A Practical Introduction

Authors: Angelo Kinicki, Brian Williams

6th Edition

0078029546, 978-0078029547

More Books

Students also viewed these General Management questions

Question

Explain the four kinds of utility.

Answered: 1 week ago

Question

5-8 What are the advantages and disadvantages of the BYOD movement?

Answered: 1 week ago