-
- QUESTION
Required Uniform Assignment: We Can, but Dare We? PURPOSE The purpose of this assignment is to investigate smartphone and social media use in healthcare and to apply professional, ethical, and legal principles to their appropriate use in healthcare technology. Course Outcomes This assignment enables the student to meet the following course outcomes. • CO #4: Investigate safeguards and decision‐making support tools embedded in patient care technologies and information systems to support a safe practice environment for both patients and healthcare workers. (PO 4) • CO #6: Discuss the principles of data integrity, professional ethics, and legal requirements related to data security, regulatory requirements, confidentiality, and client’s right to privacy. (PO 6) DUE DATE See Course Schedule in Syllabus. The college’s Late Assignment Policy applies to this activity. TOTAL POINTS POSSIBLE This assignment is worth a total of 240 points. Requirements 1. Research, compose, and type a scholarly paper based on the scenario described below, and choose a conclusion scenario to discuss within the body of your paper. Reflect on lessons learned in this class about technology, privacy concerns, and legal and ethical issues and addressed each of these concepts in the paper, reflecting on the use of smartphones and social media in healthcare. Consider the consequences of such a scenario. Do not limit your review of the literature to the nursing discipline only because other health professionals are using the technology, and you may need to apply critical thinking skills to its applications in this scenario. 2. Use Microsoft Word and APA formatting. Consult your copy of the Publication Manual of the American Psychological Association, sixth edition, as well as the resources in Doc Sharing if you have questions (e.g., margin size, font type and size (point), use of third person, etc.). Take NR360 INFORMATION SYSTEMS IN HEALTHCARE NR360 We Can But Dare We.docx Revised 5‐9‐16 DA/LS/psb 11/08/17 2 advantage of the writing service SmartThinking, which is accessed by clicking on the link called the Tutor Source, found under the Course Home area. 3. The length of the paper should be four to five pages, excluding the title page and the reference page. Limit the references to a few key sources (minimum of three required). 4. The paper will contain an introduction that catches the attention of the reader, states the purpose of the paper, and provides a narrative outline of what will follow (i.e., the assignment criteria). 5. In the body of the paper, discuss the scenario in relation to HIPAA, legal, and other regulatory requirements that apply to the scenario and the ending you chose. Demonstrate support from sources of evidence (references) included as in‐text citations. 6. Choose and identify one of the four possible endings provided for the scenario, and construct your paper based on its implications to the scenario. Make recommendations about what should have been done and what could be done to correct or mitigate the problems caused by the scenario and the ending you chose. Demonstrate support from sources of evidence (references) included as in‐text citations. 7. Present the advantages and disadvantages of using smartphones and social media in healthcare and describe professional and ethical principles to the appropriate use of this technology, based on facts from supporting sources of evidence, which must be included as in‐text citations. 8. The paper’s conclusion should summarize what you learned and make reflections about them to your practice. 9. Use the “Directions and Assignment Criteria” and “Grading Rubric” below to guide your writing and ensure that all components are complete. 10. Review the section on Academic Honesty found in the Chamberlain Course Policies. All work must be original (in your own words). Papers will automatically be submitted to TurnItIn when submitted to the Dropbox. 11. Submit the completed paper to the “We Can, but Dare We?” Dropbox by the end of Week 3. Please refer to the Syllabus for due dates for this assignment. For online students, please post questions about this assignment to the weekly Q & A Forums so that the entire class may view the answers. Preparing for the Assignment BACKGROUND NR360 INFORMATION SYSTEMS IN HEALTHCARE NR360 We Can But Dare We.docx Revised 5‐9‐16 DA/LS/psb 11/08/17 3 Healthcare is readily embracing any technology to improve patient outcomes, streamline operations, and lower costs, but we must also consider the impact of such technology on privacy and patient care. This technology includes the use of social media applications, such as Facebook, Instagram, MySpace, Twitter, and LinkedIn on smartphones. In healthcare today, smartphones are widely used for communication, efficiency, and care. Obviously, a variety of issues (ethical, professional, and legal) from both the personal and hospital perspectives must be considered. SCENARIO You are a nurse in the emergency room, working the Friday 7 p.m. to 7 a.m. shift, and your evening has been filled with the usual mix of drunken belligerent teens, wailing babies, chronic obstructive pulmonary disease (COPD) exacerbations, falls, fractures, and the routine, regular congestive heart failure (CHF) patients. Your best friend is texting you from the concert that you had to miss tonight because you were scheduled to work, and you respond to her between care of patients, jealous that she is there and you are not. “What a jerk to torture me like this!” you think to yourself. It is now 2 a.m., and the medics radio once again, notifying you of an incoming motor vehicle accident victim, ETA of 5 minutes. You sigh and opt to use the restroom, rather than getting that much‐needed cup of coffee, and prepare a room for your next patient. The medics roll in and begin to fill you in. The patient is a 28‐year‐old male, a passenger on a bus that was involved in a crash, leaving the vehicle overturned after rolling over an embankment. There were several fatalities among the bus passengers, and “this victim has remained unconscious, though his vitals are currently” . . . and as you start to focus on the patient, you take a second look. Can it be? It is! The lead singer, Jerod, from the band “Blue Lizards,” who you have adored since you first heard his voice! The band had just left the concert that you had missed last evening when the accident occurred. You quickly text your best friend . . . “Can you believe?” and she responds with “Yeah, right. PROVE IT.” So you quickly snap a picture with your smartphone, when alone with the patient, and send it to her. Can’t hurt, right? Celebrities are “public property,” and that’s a part of their life, right? Just for good measure, you snap a few more pictures of the unconscious singer in various stages of undress and then a shot of his home address, phone number, and demographic information from his electronic health record. You sit your phone down on the bedside table for a minute as you continue your assessment of the patient. At 7:00 a.m., you drag your tired body home and straight to bed after a long but eventful night. What happens next? Choose an ending to the scenario, and construct your paper based on those reflections: 1. You are the following nurse on the day shift and discover the night nurse’s phone on the bedside table. While trying to figure out to whom it belongs, you open the phone and see the photographs taken the night before. Holy moly! What a find, and nobody could trace you to the photos. NR360 INFORMATION SYSTEMS IN HEALTHCARE NR360 We Can But Dare We.docx Revised 5‐9‐16 DA/LS/psb 11/08/17 4 2. You receive a call from the gossip paper the Gossip Gazette, offering you $20,000 for the photos you have taken (courtesy of your best friend). Your identity would never be revealed, and you desperately need a new car and are behind on some bills. 3. You go on Facebook, on your day off, and talk about the night you had at work and how you didn’t really feel as bad having to miss the concert, because you actually got to meet Jerod in person and even “Got his number!” You then post a picture of Jerod on Facebook and Instagram, figuring that most of your contacts would never recognize him anyway. It’s your day off and your personal time, so no harm, no foul, right? 4. You receive a message the next morning from a peer at work that there is a big investigation being conducted at work due to a HIPAA violation and that it involved a celebrity who had been admitted to the hospital. The word is that legal action is being taken against the hospital due to some photos that were sold to the Gossip Gazette. Knowing that the photo you sent is safe with your best friend, you reach for your smartphone, but it is nowhere to be found.
Subject | Health Matters | Pages | 8 | Style | APA |
---|
Answer
Smartphones and Social Media Use in Healthcare
Technological tools such as cell phones and social media have proved vital for healthcare professionals (HCPs) when used in the improvement or enhancement of professional networking and education, patient care and education, organizational promotion, and public health programs. However, according to Ventola (2014), when social media tools such as social networking sites, blogs and media-sharing sites are not used in accordance with the existing privacy laws and ethical practices, they can result in breaches of privacy and confidentiality, distribution of unauthorized information, and violation of person-professional boundaries among other things (Denecke et al., 2015). Legal issues in the form of litigations may also arise to individual HCPs or the organizations that they work for. As such, before using smartphones in healthcare, HCPs should consider the ethical, professional, and legal issues involved. This paper provides a discussion of the legal and regulatory issues as they relate to the use of smartphones and social media in healthcare. Additionally, one scenario will be identified from the four provided and recommendations made as to what should be the best way to correct the issue. Finally, the advantages and disadvantages of the use of smartphones and social media in healthcare will be provided.
HIPAA, Legal, and Regulatory Discussion
Patient confidentiality and data privacy laws in healthcare are governed by the Health Insurance Portability and Accountability Act of 1996 (HIPAA), the Health Information Technology for Economic and Clinical Health (HITECH) and other state privacy laws. The pieces of legislation govern the permitted use as well as disclosure of patient information by entities (Koch, 2016). Based on the HIPAA Security Rule, organizations are supposed to take a variety of administrative, technological, and physical security procedures to ensure the integrity, confidentiality, and availability of protected health information (PHI). Additionally, it is only the minimum health information which is necessary to conduct business should be used or shared (HHS.gov, n.d.). The HIPAA privacy rule seeks to protect all individually identifiable health information which is held or transmitted by an entity or its associates in any form of media.
The HITECH Act requires entities and their business associates to abide by the privacy-breach notification requirements. However, those who fail to abide by the provision of the HITECH Act are susceptible to various penalties. For instance, Section 13410(d) prescribes the civil as well as criminal penalties which are imposed for violations of patient confidentiality and privacy (HHS.gov, n.d.). Such penalties are pegged on the nature of the violation and the resultant harm from the violation. Despite the two legislations not specifically mentioning cellphones and social media, the privacy laws can be breached via the posting of patient information, making comments, and posting photos and videos concerning patients to a social networking site (Koch, 2016). An important note is, however, that the legislation does not restrict the distribution of “de-identified” information. To ensure compliance with the HIPAA Privacy Rule, patient information posted on social media should not have any revealing personal information or references.
Scenario Ending and Recommendations
In the selected scenario 4 ending, an investigation was started in the workplace due to a HIPAA violation. Additionally, a legal action is being taken against the hospital as some photos were sold to the Gossip Gazette. The hospital should have taken various measures to ensure that issues of privacy of patient information are ensured. One of the recommended actions which should have been taken is putting in place written policies as well as procedures in relation to breach notification (Denecke et al., 2015). Additionally, it should have trained the employees on the policies and procedures so that they understand and appreciate how they should safeguard patient information from breaches (Ventola, 2014). Moreover, the hospital should have developed and applied appropriate sanctions against those members of the workforce who fail to comply with the policies and procedures related to breach notification.
What could be done to correct or mitigate the problems arising from the scenario is the hospital being guided by the HIPAA Breach Notification Rule. In specific, this rule requires entities to notify the individuals affected by the breach but also the HHS and the media. The notification should be provided without any unreasonable delay after the organization has discovered the breach (Denecke et al., 2015). Since the information has already been provided to the Gossip Gazette, then it means the notification of breach should be provided to the Gazette so as to stop further publication of the information. It is recommended that the business associate, in this case, the person who took the photos and shared with a friend, notifies the concerned entity (hospital) of the breach. The organization should then notify the celebrity whose photos were leaked. Additionally, according to Ventola (2014), in the individual notification, the hospital should provide a description of the types of information involved in the breach and the steps that the celebrity should take to protect himself from potential harm. Additionally, information should be provided on what the entity is doing in the quest to investigate the breach and mitigate the harm and prevent any further breaches.
Advantages and Disadvantages
The use of smartphones and social media in healthcare presents various advantages and disadvantages. One of the advantages is that it results in the improvement and enhancement of patient care. In specific, technology in the form of smartphones and social media results in improved patient outcomes and streamlined healthcare operations (Ventola, 2014). The second advantage is that the two tools ensure quicker and effective sharing of information to debate various health care policy and practice issues. Moreover, smartphones and social media are key to the promotion of healthy behaviors, engagement with the public, and the provision of education to patients’ caregivers and professionals.
Despite the various advantages of social media and smartphones, one of the disadvantages of the two tools is that they can lead to the dissemination of information which lacks quality and reliability. The second limitation of social media and cell phones is that they can lead to the damage of professional image especially when unprofessional content is posted which unfavorably reflects the healthcare practitioners and their affiliated institutions (Ventola, 2014). The third and most important disadvantage of social media and cell phones’ use in healthcare is that they can lead to potential repercussions such as legal actions in the event of a breach of patient confidentiality (Smailhodzic et al., 2016). The infractions arising from the use of the tools can lead to entities being liable under HIPAA and other state privacy laws.
The appropriate use of technology in the form of social media and smartphones should be based on various professional and ethical principles. Organizations should ensure that they create and implement guidelines for the ethical use of social media. In these guidelines, according to Ventola (2014), they should emphasize the importance of maintaining patient confidentiality and cognition of privacy settings. Additionally, in the use of technology, healthcare workers and organizations should maintain appropriate patient-physician boundaries and act with collegiality (Smailhodzic et al., 2016). Moreover, they should declare any existing conflicts of interest and maintain professional profiles which are separate from their personal ones. Denecke et al. (2015) advise that those using social media in healthcare should ensure that the information they provide is accurate and truthful and avoid anonymity. Following such ethical and professional guidelines will ensure the appropriate use of technology and thus avoid the disadvantages associated with the use of social media and cellphones.
In conclusion, although social media has proved vital in the provision of better patient outcomes and streamlining of hospital operations, healthcare practitioners should observe various ethical and professional principles in their use of technology. They should be guided by the existing legislations such as HIPAA and HITECH, which underscore the importance of avoiding the breach of protected patient information. In scenario 4 ending, the hospital should have ensured that it had policies and guidelines on notification of breaches. Additionally, it should have educated its workers on the provisions of the HIPAA and the relevant state privacy laws. However, to ensure that the effects of the situation are mitigated, the organization should notify the celebrity whose photos have been leaked and the Gossip Gazette. Reflecting on these aspects, it is vital for healthcare organizations to ensure that they have policy guidelines on the use of social media and ensure that they educate their workers on the provision of the relevant legal frameworks. A responsible use of social media by workers will ensure that any adverse effects of using technology are avoided.
References
Denecke, K., Bamidis, P., Bond, C., Gabarron, E., Househ, M., Lau, A. Y. S., & Hansen, M. (2015). Ethical issues of social media usage in healthcare. Yearbook of medical informatics, 24(01), 137-147. HHS.gov. (n.d.). Summary of the HIPAA Security Rule. U.S. Department of Health & Human Services. Retrieved from https://www.hhs.gov/hipaa/for-professionals/security/laws-regulations/index.html Koch, D. D. (2016). Is the HIPAA security rule enough to protect electronic personal health information (PHI) in the cyber age? Journal of Health Care Finance, 43(3). Smailhodzic, E., Hooijsma, W., Boonstra, A., & Langley, D. J. (2016). Social media use in healthcare: a systematic review of effects on patients and on their relationship with healthcare professionals. BMC health services research, 16(1), 442. Ventola, C. L. (2014). Social media and health care professionals: benefits, risks, and best practices. Pharmacy and Therapeutics, 39(7), 491.
|
Related Samples
The Role of Essay Writing Services in Online Education: A Comprehensive Analysis
Introduction The...
Write Like a Pro: Effective Strategies for Top-Notch Explication Essays
Introduction "A poem...
How to Conquer Your Exams: Effective Study Strategies for All Learners
Introduction Imagine...
Overcoming Writer’s Block: Strategies to Get Your Essays Flowing
Introduction The...
Optimizing Your Online Learning Experience: Tips and Tricks for Success
The world of education...