preview

Legal and Ethical Considerations - Task 1

Best Essays

Running head: LEGAL AND ETHICAL CONSIDERATIONS – TASK 1 Legal and Ethical Considerations – Task 1 Name Western Governors University Legal and Ethical Considerations – Task 1 A shadow chart is a partial copy of a patient’s medical history, kept by health care providers or departments for the sake of convenience. A shadow chart is not part of the official medical record. It is a working document where information can be added and removed as necessary to aid in the decision-making process. It may include reminder systems, scheduling information, research activities, and information not considered appropriate for the permanent record. It is frequently used to support inter-professional or …show more content…

Set retention and destruction schedules will be applied to all shadow charts. Information Security: Workstation Policy “Employees are required to secure their personal workstations when not in use. Confidential health information must not be displayed on computer screens unless the employee is performing work functions on the computer and using the information. Employees may not access another employee’s computer while it is in use nor may employees use another’s password for any reason. Violation of this policy will result in disciplinary action, and depending upon nature of violation, termination may result.” The HIPAA Security Standards for the Protection of Electronic Protected Health Information (the security rule) “establishes national standards to protect individuals’ electronic personal health information that is created, received, used, or maintained by a covered entity” (U.S. Department of Health and Human Services, n.d.). The security rule requires that specific standards be established and implemented into three categories; compliance in one category may overlap into another: Administrative Physical Technical Administrative standards are policies and procedures established “to prevent, detect, contain, and correct HIPAA security violations” (The HIPAA Security Rule Primer, n.d.). They are administrative actions used to satisfy security requirements as mandated by federal and state

Get Access