Assessment 2 Instructions: Protected Health Information (PHI): Privacy, Security, and Confidentiality Best Practices
Top of Form
Bottom of Form
Introduction
As you begin to consider the assessment, it would be an excellent choice to complete the Breach of Protected Health Information (PHI) activity. The activity will support your success with the assessment by creating the opportunity for you to test your knowledge of potential privacy, security, and confidentiality violations of protected health information. The activity is not graded and counts towards course engagement.
Health professionals today are increasingly accountable for the use of protected health information (PHI). Various government and regulatory agencies promote and support privacy and security through a variety of activities. Examples include:
Technological advances, such as the use of social media platforms and applications for patient progress tracking and communication, have provided more access to health information and improved communication between care providers and patients.
At the same time, advances such as these have resulted in more risk for protecting PHI. Nurses typically receive annual training on protecting patient information in their everyday practice. This training usually emphasizes privacy, security, and confidentiality best practices such as:
Today, one of the major risks associated with privacy and confidentiality of patient identity and data relates to social media. Many nurses and other health care providers place themselves at risk when they use social media or other electronic communication systems inappropriately. For example, a Texas nurse was recently terminated for posting patient vaccination information on Facebook. In another case, a New York nurse was terminated for posting an insensitive emergency department photo on her Instagram account.
Health care providers today must develop their skills in mitigating risks to their patients and themselves related to patient information. At the same time, they need to be able distinguish between effective and ineffective uses of social media in health care.
This assessment will require you to develop a staff update for the interprofessional team to encourage team members to protect the privacy, confidentiality, and security of patient information.
Preparation
To successfully prepare to complete this assessment, complete the following:
Instructions
In this assessment, assume you are a nurse in an acute care, community, school, nursing home, or other health care setting. Before your shift begins, you scroll through Facebook and notice that a coworker has posted a photo of herself and a patient on Facebook. The post states, “I am so happy Jane is feeling better. She is just the best patient I’ve ever had, and I am excited that she is on the road to recovery.”
You have recently completed your annual continuing education requirements at work and realize this is a breach of your organization’s social media policy. Your organization requires employees to immediately report such breaches to the privacy officer to ensure the post is removed immediately and that the nurse responsible receives appropriate corrective action.
You follow appropriate organizational protocols and report the breach to the privacy officer. The privacy officer takes swift action to remove the post. Due to the severity of the breach, the organization terminates the nurse.
Based on this incident’s severity, your organization has established a task force with two main goals:
The task force has been charged with creating a series of interprofessional staff updates on the following topics:
You are asked to select one or more of the topics and create the content for a staff update containing a maximum of two content pages. This assessment is not a traditional essay. It is a staff educational update about PHI. Consider creating a flyer, pamphlet, or PowerPoint slide. Remember it should not be more than two pages (excluding a title and a reference page).
The task force has asked team members assigned to the topics to include the following content in their updates in addition to content on their selected topics:
Notes
Additional Requirements
Competencies Measured
By successfully completing this assessment, you will demonstrate your proficiency in the following course competencies and scoring guide criteria:
Use the scoring guide to understand how your assessment will be evaluated.
CRITERIA | NON-PERFORMANCE | BASIC | PROFICIENT | DISTINGUISHED |
Describe the security, privacy, and confidentially laws related to protecting sensitive electronic health information that govern the interdisciplinary team. | Does not describe the security, privacy, and confidentially laws related to protecting sensitive electronic health information that govern the interdisciplinary team. | Attempts to identify the security, privacy, and confidentially laws related to protecting sensitive electronic health information that govern the interdisciplinary team. | Describes the security, privacy, and confidentially laws related to protecting sensitive electronic health information that govern the interdisciplinary team. | Provides a comprehensive and insightful summary of confidentially laws related to protecting sensitive electronic health information that govern the interdisciplinary team. |
Explain the importance of interdisciplinary collaboration to safeguard sensitive electronic health information. | Does not explain the importance of interdisciplinary collaboration to safeguard sensitive electronic health information. | Explains interdisciplinary collaboration to safeguard sensitive electronic health information, but the explanation lacks detail or is missing critical information. | Explains the importance of interdisciplinary collaboration to safeguard sensitive electronic health information. | Explains in detail, and with professional insight, the importance of interdisciplinary collaboration to safeguard sensitive electronic health information. |
Identify evidence-based approaches to mitigate risks to patients and health care staff related to sensitive electronic health information. | Does not identify evidence-based approaches to mitigate risks to patients and health care staff related to sensitive electronic health information. | Attempts to identify evidence-based approaches to mitigate risks to patients and health care staff related to sensitive electronic health information; however, omissions and errors exist. | Identifies evidence-based approaches to mitigate risks to patients and health care staff related to sensitive electronic health information. | Identifies multiple appropriate and well-researched evidence-based approaches to mitigate risks to patients and health care staff related to sensitive electronic health information. |
Develop a professional, effective staff update that educates interprofessional team members about protecting the security, privacy, and confidentiality of patient data, particularly as it pertains to social media usage. | Does not develop a professional, effective staff update that educates interprofessional team members about protecting the security, privacy, and confidentiality of patient data, particularly as it pertains to social media usage. | Attempts to develop a staff update that educates interprofessional team members about protecting the security, privacy, and confidentiality of patient data, particularly as it pertains to social media usage. | Develops a professional, effective staff update that educates interprofessional team members about protecting the security, privacy, and confidentiality of patient data, particularly as it pertains to social media usage. | Develops a comprehensive, professional, and effective staff update that educates interprofessional team members about protecting the security, privacy, and confidentiality of patient data, particularly as it pertains to social media usage. |
Follow APA style and formatting guidelines for citations and references. | Does not follow APA style and formatting guidelines for citations and references. | Partially adheres to APA style and formatting guidelines for citations and references. Formatting inhibits effective communication or detracts from good scholarship. | Follows APA style and formatting guidelines for citations and references. Academic citations and references are largely error-free. | Follows flawless APA style and formatting guidelines for citations and references. |
Create a clear, concise, well-organized, and professional staff update that is generally free from errors in grammar, punctuation, and spelling. | Does not create a clear, concise, well-organized, and professional staff update that is generally free from errors in grammar, punctuation, and spelling. | Creates a staff update that contains errors in grammar, punctuation, and spelling that distract from good scholarship. Staff update is more than two pages of content. | Creates a clear, concise, well-organized, and professional staff update that is generally free from errors in grammar, punctuation, and spelling. | Creates a clear, concise, well-organized, and professional staff update that is generally free from errors in grammar, punctuation, and spelling. Adheres to all applicable disciplinary and scholarly writing standards. |
Why Choose Us
Top Quality and Well-Researched Papers
We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university or professional, and we will assign a writer who has a respective degree.
Professional and Experienced Academic Writers
We have a team of professional writers with experience in academic and business writing. Many are native speakers and able to perform any task for which you need help.
Free Unlimited Revisions
If you think we missed something, send your order for a free revision. You have 10 days to submit the order for review after you have received the final document. You can do this yourself after logging into your personal account or by contacting our support.
Prompt Delivery and 100% Money-Back-Guarantee
All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. In case you cannot provide us with more time, a 100% refund is guaranteed.
Original & Confidential
We use several writing tools checks to ensure that all documents you receive are free from plagiarism. Our editors carefully review all quotations in the text. We also promise maximum confidentiality in all of our services.
Customer Support 24/7
Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.
Our Services
No need to work on your paper at night. Sleep tight, we will cover your back. We offer all kinds of writing services.
Essays
No matter what kind of academic paper you need and how urgent you need it, you are welcome to choose your academic level and the type of your paper at an affordable price. We take care of all your paper needs and give a 24/7 customer care support system.
Admissions
Admission and Business Papers
An admission essay is an essay or other written statement by a candidate, often a potential student enrolling in a college, university, or graduate school. You can be rest assurred that through our service we will write the best admission essay for you.
Editing
Editing and Proofreading
Our academic writers and editors make the necessary changes to your paper so that it is polished. We also format your document by correctly quoting the sources and creating reference lists in the formats APA, Harvard, MLA, Chicago / Turabian.
Coursework
Revision Support
If you think your paper could be improved, you can request a review. In this case, your paper will be checked by the writer or assigned to an editor. You can use this option as many times as you see fit. This is free because we want you to be completely satisfied with the service offered.