HIPAA Privacy Rules and problems Outline
HIPAA Privacy Rules and problems
HIPAA is a federal is a federal regulation that sets the limits of use of health information, receives and disseminates this information (Beaver & Herold, 2004). They also set the rules for use of this health information. They have their own multitude of challenges that they face daily. For this case, their different privacy rules as discussed in the outline below. The rules are;
- Your rights
- Ask and see a copy of your personal health information.
- Some people find it very difficult knowing who to ask for this information. Most haven’t asked it in any way. This could be provided through annual emailing since most of them have basic internet connection as stated by (Carter, 2006).
- Have any correction added to your health record.
- Just like accessing a copy of one’s health records, they are difficult to know what kind of information is stored and is available. Emailing will also inform them of the information available to trigger the need of changing this information.
- Be noticed on how and when your information is shared.
- Getting notified on this information might not even reach the intended persons (Herdman, 2006). The information might not be received accurately
- Decide whether to allow your information to be shared.
- Some people haven’t had a chance to decide for themselves what this information being shared to know what exactly it is. Some people don’t even understand fully what they are. This could be solved though informing the people the exact information being shared.
- Receive a report about when your health information was shared, how and for what purpose.
- Hardly are reports given to the intended people. Sometimes information report after being accessed doesn’t come back to the intended people. Sending them directly of the report is very crucial solution for this.
- If you believe that your health information is not being well protected, you can either file a complaint with your health service insurer or with the US government. People don’t even know when their information is accessed and mishandled. Filing a dispute is nearly impossible for this case. Giving the people the right information of when their health data is accessed is very crucial (Nass, Levit & Gostin, 2009).
- Who to follow the law
- Doctors, pharmacies, nurses, hospitals, clinics, nursing homes, clinics, and all other healthcare providers (Simon, 2003).
- Many at times, information get to the wrong hands. Knowing the exact qualified personnel to access this information is very crucial.
- Insurance companies that deal with health, HMOs and employer group plans.
- Most of the time the information that gets to these people is mishandled and thus leading to infringement (Trinckes, 2013). Limiting the specific information could be a solution.
- Government programs that pay for healthcare like Medicaid and Medicare.
- The protected information
- Information put in a healthcare record by the doctors, nurses and other healthcare providers.
- These information is not normally protected as expected. Holding them accountable with suitable heavy punishment could be a solution to those who mishandle the information (Trinckes, 2013).
- Conversation records that you had with a doctor or any other practitioner about your health information.
- Knowing that the conversation that one has had with a doctor is recorded is very difficult. Trust is the main solution to this. Qualified Personnel should also be allowed to do this.
- Your health information stored in any computer or server.
- With the advent of people who can access information without being authorized, this information staying safe isn’t an assurance. The best solution is to keep all the health records offline.
- Billing information about you of your health from the clinic or anywhere where your health information is stored. Billing information is very sensitive information which should never land in the wrong hands as stated by (Nass, Levit & Gostin, 2009). Keeping them very secure and only responsible and professional people should access it.
- Any other health information about you that is held by the responsible persons.
- Just like any other information, ensuring that this information doesn’t get to the unintended persons is very difficult if not impossible. Strict laws should be in place for people who are found to be in access to other people’s information (Herdman, 2006). These laws should be made public to prevent such occurrences in future.
Beaver, K., & Herold, R. (2004). The practical guide to HIPAA privacy and security compliance. Boca Raton: Auerbach Publications.
Carter, P. I. (2006). Hipaa compliance handbook. S.l.: Aspen Law.
Herdman, R. (2006). Effect of the HIPAA privacy rule on health research proceedings of a workshop presented to the National Cancer Policy Forum. Washington D.C.: National Academies Press.
Nass, S. J., Levit, L. A., & Gostin, L. O. (2009). Beyond the HIPAA privacy rule enhancing privacy, improving health through research. Washington, D.C.: National Academies Press.
Simon, M. (2003). HIPAA privacy guide for employers: a guide to the new Health Insurance Portability & Accountability Act privacy rules. Old Saybrook, CT: Business & Legal Reports.
Trinckes, J. J. (2013). The definitive guide to complying with the HIPAA/HITECH privacy and security rules. Boca Raton, Fla.: CRC Press.
Place an Order