post has two assignments
1: Public health
Order Description
1. There are three core functions for every public health department (DPH) in the U.S. Describe at least one activity for each function that a DPH would routinely execute that reflects their purpose or mission in addressing the needs of the residents.
2. There are Ten Essential Services expected of all public health departments.
a. List the ten services.
b. Give an example of a public health activity/campaign for all ten.
3. There are 17 PHN Interventions identified on the Minnesota PHN Intervention Wheel
a. Please provide an example of the following interventions:
i. Advocacy
ii. Social marketing
iii. Policy development & enforcement
b. Describe how the three interventions above are connected
c. Provide an example of the following interventions:
i. Collaboration
ii. Coalition building
iii. Community organizing
d. Describe how the three interventions above are connected
4. There are 10 Health Indicators:
a. List all 10 health indicators
b. For each provide a campaign or public health activity that currently is directed to facilitating healthier behaviors for the residents of LA County or your county of residence.
2: Ethical and Security Issues of HIT
Order Description
Headlines covered a rash of security breaches at companies around the globe. Millions of customers and clients have had their information stolen by hackers or lost through careless data handling. With the push for switching medical records from paper to digital, people have expressed concerns about the safety and security of this information. How much faith can patients put into a health care provider’s commitment to privacy, ethical standards, and careful protection of health care information?
The transition to digital communication presents ethical and security issues never before encountered. Despite the concerns generated by the digital paradigm shift, the key values of privacy, confidentiality, autonomy, and non-maleficence still can provide a framework for decision making in the context of health information technology. The question that health care professionals encounter when contemplating HIT is how well these ethical and security frameworks withstand the test of time as privacy and security issues grow more complex.
This week you explore the ethical and security issues that nurses need to be aware of when working with sensitive, private information. You also appraise strategies for ensuring the security of patient information.
Post
1)An analysis of the nurse’s responsibility to protect patient information
2) The extent that HIT has made it easier or more difficult to protect patient privacy.
3)Comment on any security or ethical issues related to the use of portable devices to store information.
4)Assess the strategies your organization uses to safeguard patient information
5) how these promote a culture of safety.
6) Describe an area where improvement is needed and one strategy that could address the situation.
McGonigle, D., & Mastrian, K. G. (2015). Nursing informatics and the foundation of knowledge (3rd ed.). Burlington, MA: Jones and Bartlett Learning.
Chapter 5, “Ethical Applications of Informatics”
This chapter examines the ethical dilemmas that arise in nursing informatics. The authors explore the responsibilities for the ethical use of health information technology.
Review Chapter 23 “Research: Data Collection, Processing, and Analytics” (pp. 415–416)
In this section, the author explains information fair use and copyright restrictions. The section describes processes for ensuring the security of a computer network.
Brown, B. (2009a). Improving the privacy and security of personal health records. Journal of Health Care Compliance, 11(2), 39–40, 68.
Retrieved from the Walden Library databases.
The author of this article examines the use of the document titled “Nationwide Privacy and Security Framework for Electronic Exchange of Individually Identified Health Information.” The article describes how the framework aims to construct an approach to address the privacy and security challenges that come with health information exchanges and personal health records.
Dimitropoulos, L., Patel, V., Scheffler, S. A., & Posnack, S. (2011). Public attitudes toward health information exchange: Perceived benefits and concerns. American Journal of Managed Care, 17, SP111–SP116.
Retrieved from the Walden Library databases.
This article describes a study that sought to determine the attitude of consumers toward electronic health information exchanges (HIE), HIE privacy and security concerns, and the relationship between these concerns and the perceived benefits of HIE. The authors recommend solutions to some of the privacy challenges stimulated by HIE.
Goodman, K. W. (2010). Ethics, information technology, and public health: New challenges for the clinician-patient relationship. Journal of Law, Medicine & Ethics, 38(1), 58–63.
Retrieved from the Walden Library databases.
In this article, the authors focus on how nurses can use health information technology to help transform health care using the recommendations included in the 2010 Institute of Medicine report “The Future of Nursing, Leading Change, Advancing Health.” The author also discusses the 2011 National Strategy for Quality Improvement in Health Care.
Hoffman, S., & Podgurski, A. (2011). Meaningful use and certification of health information technology: What about safety? Journal of Law, Medicine & Ethics, 39(3), 425–436.
Retrieved from the Walden Library databases.
This article stresses the necessity of sufficient safeguards for EHR systems. The author explores current safety regulations for EHR system design and deployment. The author makes additional recommendations for protecting public health in the digital area.
Rothstein, M. A. (2010). The Hippocratic bargain and health information technology. Journal of Law, Medicine & Ethics, 38(1), 7–13.
Retrieved from the Walden Library databases.
The increasing availability of sensitive patient information granted by electronic health records has generated significant debate about patient privacy. This article examines the potential ethical and legal consequences of patient-directed sequestering of sensitive health information.
Optional Resources
Ethical and Security Issues