Personal Health Record are the data related to health and illness maintained by a patient themselves .There are chances for medical identity theft. The following things will enable one to be aware of it
2.28 Medical identity theft and PHRs Subdomain II.B.1 ly confidentiality, privacy and security measures, and policies...
CAHIIM Subdomain II.B.1 Apply confidentiality, privacy and security measures, and policies and procedures for internal and external use an exchange to protect electronic health information. Case Study: Assume that your parents have decided to create individual PHRs. They found a vendor online, Microsoft Health Vault, and want your advice as an HIM student, about using their service. They are quick to tell you the vendor is HIPAA-compliant. Offer your opinion on using that vendor and be sure to address your...
2.5 Information access Subdomain II.C.1 Apply policies and procedures surrounding issues of access and disclosure of protected health information Analyze the following scenarios to determine who can appropriately access health information 1. Mrs. John Smith is requesting the emergency room records from last week of her daughter, Katy. Mrs. Smith is the noncustodial parent of Katy, who lives with her dad Should you lease the records to her? Why or why not? 2. Pre h istou the birth record for...