Question

CAHIIM Subdomain II.B.1 Apply confidentiality, privacy and security measures, and policies and procedures for internal a...

CAHIIM Subdomain II.B.1

Apply confidentiality, privacy and security measures, and policies and procedures for internal and external use an exchange to protect electronic health information.

Case Study:

Assume that your parents have decided to create individual PHRs. They found a vendor online, Microsoft Health Vault, and want your advice as an HIM student, about using their service. They are quick to tell you the vendor is HIPAA-compliant. Offer your opinion on using that vendor and be sure to address your concern about medical identity theft in your response.

NOTE: Your response should be AT LEAST a half page single spaced in 12 point font. I should be able to see that you researched this company and the identify theft standards which surround PHRs in your response.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

- Microsoft Healthvault is a new initiative by Microsoft to gather , store and share health information securely. By storing health information in this health record you can share your health information to your family , friends and healthcare care professionals online and that too securely.

- Each and every individual of the family can make their electronic health record and even for pets we can make it

- Every individual will have separate login IDs to access their health record .

- It also provides the option to share specific information to other people and programs.

Health is one of the most personal , private and emotional aspects of life. Its privacy is vital part of electronic health records.

Microsoft Healthvault provides privacy and theft standard are based on its four principles :-

- the health record is controlled by the client itself

- Client decides what information has to be entered in the electronic health record.

- Client decides who can see and use their information for health care purpose.

- Microsoft Healthvault don't use client information for commercial purposes without getting the permission and informing the client .

- It is HIPAA ( Health insurance portability and accountability act) compliant and follows the standards of HIPAA that are :-

- Privacy requirements

- Security requirements

- Electronic transactions and code sets standard requirements

- National identifier requirements

Using this vendor to maintain electronic health record is safe and secure and also enables to share health information with other and programs by maintaining confidentiality.

Add a comment
Know the answer?
Add Answer to:
CAHIIM Subdomain II.B.1 Apply confidentiality, privacy and security measures, and policies and procedures for internal a...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 2.28 Medical identity theft and PHRs Subdomain II.B.1 ly confidentiality, privacy and security measures, and policies...

    2.28 Medical identity theft and PHRs Subdomain II.B.1 ly confidentiality, privacy and security measures, and policies and procedures for internal and external use and exchange to protect electronic health information Assume that your parents have decided to create individual PHRs. They found a vendor PHRs-R-Us, online and want your advice, as an HIM student, about using their service. They are quick to tell you the vendor is HIPAA-compliant. Offer your opinion on using th vendor and be sure to address...

  • Protecting Health Care Privacy The U.S. Health Insurance Portability and Accountability Act (HIPAA) addresses (among other...

    Protecting Health Care Privacy The U.S. Health Insurance Portability and Accountability Act (HIPAA) addresses (among other things) the privacy of health information. Its Title 2 regulates the use and disclosure of protected health information (PHI), such as billing services, by healthcare providers, insurance carriers, employers, and business associates Email is often the best way for a hospital to communicate with off-site specialists and insurance carriers about a patient. Unfortunately, standard email is insecure. It allows eavesdropping, later retrieval of messages...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT