Question

In: Nursing

What provisions should be included in a model privacy and security policy that patients might use...

What provisions should be included in a model privacy and security policy that patients might use in making decisions related to their privacy and the security of their PHRs?

Solutions

Expert Solution

The provisions that should be included in a model privacy and security policy that patients might use in making decisions related to their privacy and the security of their Public Health Record are -

i. Provision of mandating the consumer whether to provide consent for collection, use, disclosure, maintenance and feeding data in their public health record.

ii. Provision of implementing safe harbour regime with independent approval and oversight to ensure best practice.

iii. Provision of seperate policies in order to control and resolve disputes related to public health record related data.

iv. The one responsible for providing PHR must acquire necessary authentication policy like identity tokens, ID cards, proper monitoring and auditing.

v. Provision of providing the recipent the to decide if they would like to open a PHR account and there should be no compulsion of disclosing their info in PHR.

vi. Provision of mandatory clarification by the provider to the consumers about the third party involvements and their roles.


Related Solutions

What is a formal organisational environmental policy? What might be covered by or included in an...
What is a formal organisational environmental policy? What might be covered by or included in an organisation’s environmental policies and procedures? List at least five issues and discuss in 120–150 words.(In Australian Accounting Environment) (please type up your answer)
What are the major provisions of the privacy rule in the Health Insurance Portability and Accountability...
What are the major provisions of the privacy rule in the Health Insurance Portability and Accountability Act of 1996? Define and describe the components of the Obamacare legislation and how the law treats U.S. citizens of varying ages.
What kind of difficulties there might be when creating an information security policy? What is required of them?
What kind of difficulties there might be when creating an information security policy? What is required of them?
1. Is it a security policy? 2. What type of security policy is described?
1. Is it a security policy? The textbook defines a security policy as, "... an overall general statement produced by senior management (or a selected policy board or committee) that dictates what role security plays within the organization". Is your selected document a security policy per this definition? If not then describe its purpose. Note that some items on this list may not really be security policies per this definition.2. What type of security policy is described? Assuming the document is...
Analyze the ways in which patients' privacy is protected for effective record keeping, use, and disclosure....
Analyze the ways in which patients' privacy is protected for effective record keeping, use, and disclosure. Then, think about and describe a situation in which protected health information (PHI) is reportable. What are your thoughts on disclosing PHI in reportable situations? Does it represent a breach of patient confidentiality? Explain your viewpoint. Think about why it is permissible to disclose PHI in these situations, yet it must be de-identified in other situations.
Consider a system that combines the Military security policy andBell-LaPadula confidentiality model. Given the security...
Consider a system that combines the Military security policy and Bell-LaPadula confidentiality model. Given the security levelsTOP SECRET, SECRET, CONFIDENTIAL, andUNCLASSIFIED (ordered from highest to lowest), and compartments Students, Faculty, Staff, andContractors specify what type of access (read, write, both, none) is allowed in each of the following situations.a) John, cleared for (TOP SECRET, {Faculty, Staff, Students}), wants to access a document classified as (TOP SECRET, {Faculty, Staff, Contractors}).b) Bill, cleared for (CONFIDENTIAL, {Faculty, Students}), wants to access a document...
1. List ten (10) elements that should be included in your institution's credit policy. 2. What...
1. List ten (10) elements that should be included in your institution's credit policy. 2. What are the advantages of a credit institution having a written loan policy? 3. State the four (4) things an effective credit risk management system should do. 5. Explain, in general terms, how to conduct a credit risk assessment.
what changes are supposed to be included in a credit policy ?
what changes are supposed to be included in a credit policy ?
Explain and analyse some policy/privacy/security/ethical concerns that arise in Cryptocurrency. ( write at least 500 words...
Explain and analyse some policy/privacy/security/ethical concerns that arise in Cryptocurrency. ( write at least 500 words )
Write a research project on Biometrics Authentication. What are the security challenges and privacy implications. What...
Write a research project on Biometrics Authentication. What are the security challenges and privacy implications. What are the technologies used for biometrics authentication?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT