Response to Jeff and Paula

[et_pb_section fb_built="1" specialty="on" _builder_version="4.9.3" _module_preset="default" custom_padding="0px|0px|0px|||"][et_pb_column type="3_4" specialty_columns="3" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_row_inner _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet" custom_padding="28px|||||"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" hover_enabled="0" sticky_enabled="0"]
    1. QUESTION

       DNP-830 Week 5 DQ 2 respond to Jeff

    Some of the types of protected health information (PHI) that would be considered as ways to identify individual or patients and could potentially cause brief of the Privacy protection act if revealed to others that are not part of patients care or should not have information regarding patients’ health information are the following: Patients’ name, address or demographic, telephone number, email, social security numbers, medical record number, license or certification of insurance, device identification or serial number, IP address, biometric identifiers, photographic images, unique identifying number, characteristic, or code. The information can be in paper or electronic forms (Bowman & Maxwell, 2018). To help protect patient health information data management software can be utilized that could safeguard information and promote privacy according to the Health Insurance Portability and Accountability Act (HIPPA) (Bowman & Maxwell, 2018).

    Some of these data can be used in research, but individual identity must be protected (Dehghan, Kovacevic, Karystianis, Keane, & Nenadic, 2017). It is important to understand that Information privacy is a way to enhance individual autonomy regarding their health information (Dehghan et al., 2017). With this project to help promote medication adherence and lifestyle changes regarding hypertension, patient health information will be collected, but the publication of the data collected will be generalized without patient identifiers.

    References

    Bowman, M. A., & Maxwell, R. A. (2018). A beginner’s guide to avoiding Protected Health Information (PHI) issues in clinical research -- With how-to’s in REDCap Data Management Software. Journal of Biomedical Informatics. https://doi-org.lopes.idm.oclc.org/10.1016/j.jbi.2018.07.008

    Dehghan, A., Kovacevic, A., Karystianis, G., Keane, J. A., & Nenadic, G. (2017). Learning to identify Protected Health Information by integrating knowledge- and data-driven algorithms: A case study on psychiatric evaluation notes. Journal of Biomedical Informatics. https://doi-org.lopes.idm.oclc.org/10.1016/j.jbi.2017.06.005

     

    DNP-830 Week 5 DQ 2 respond to Paula

     

    Review the types of data that are considered protected health information (PHI). Do you plan to collect any of this data during your project? How would the collection of this data affect your project (whether you plan to collect it or not)?

    The HIPPA Privacy Rule of 1996 provides privacy of patient health information. Individually identifiable patient health information includes any information that could disclose the identity of an individual including name, birthday, social security number, medical record number. The Privacy Rule determines waiver authorization as determined by the IRB the reviews the effects of research protocols on the individual, to ensure that the patient’s rights and privacies are protected.

    The DPI project I propose will not involve patient information, so HIPPA does not apply, however it does use human beings with minimal risk as protected by the Common Rule. Data will be collected from survey results of two Likert Scale Surveys regarding knowledge and confidence in the integration of CAM into their practice. The site of the project includes nurses of four Hospice Care Centers within a hundred miles of the research nurse. A survey will be completed by each group of nurses, prior to the intervention of an educational in-service. The random sample group chosen from all nurses will receive an immersion experience in CAM modalities. All nurses will receive the post intervention survey.

     

    Azim, A. (2018). Common Sense: Rethinking the New Common Rule’s Weak Protections for Human Subjects. Vanderbilt Law Review71(5), 1703–1737. Retrieved from https://lopes.idm.oclc.org/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=a9h &AN=132702857&site=eds-live&scope=site

     

     

[/et_pb_text][et_pb_text _builder_version="4.9.3" _module_preset="default" width_tablet="" width_phone="100%" width_last_edited="on|phone" max_width="100%"]

 

Subject Nursing Pages 3 Style APA
[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner module_class="the_answer" _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" width="100%" custom_margin="||||false|false" custom_margin_tablet="|0px|||false|false" custom_margin_phone="" custom_margin_last_edited="on|desktop"]

Answer

  Response to Jeff and Paula

Response to Jeff’s Work Discussion

Your work has an excellent flow and reflects a clear conceptualization and understanding of the topic on protected health information. The concepts covered on privacy protection are precise and it is evident that you understand how the operation facilitate patient care and data management for security reasons (Bowman & Maxwell, 2018). Generally, all the required elements have been comprehensively covered with more elaborate evidence from credible sources. It is clear that the sources are relevant to the topic in case and, therefore, your work is also a product of literature review. This is incredible. However, I think it would have been more appropriate and interesting if you chose to highlight the relevance of the subject and the upcoming project on patient information and data management on healthcare institutions.

Bowman, M. A., & Maxwell, R. A. (2018). A beginner’s guide to avoiding Protected Health Information (PHI) issues in clinical research -- With how-to’s in REDCap Data Management Software. Journal of Biomedical Informatics. https://doi-org.lopes.idm.oclc.org/10.1016/j.jbi.2018.07.008

 

 

 

 

 

Response to Paula

Your work is unequivocal. It is evident that you understood and hypothesized all the aspects required in the question before starting to work on it.  It is important that all required elements in questions have been keenly handled and further supported with credible literature sources. It is even more challenging how you sought to analyze the issue and create a basis for argument on the efficacy and credibility of protected health information (PHI) and how the relevance improve patient outcomes (Azim, 2018). Nevertheless, I think it would, however, been better if you tried comparing the model to the most commonly used one in health institution to bring out the relevance of the topic towards improving global health care, and provide a claim on whether or not you feel this is the best way for United States and beyond. Otherwise, the work is a great piece.

References

Azim, A. (2018). Common Sense: Rethinking the New Common Rule’s Weak Protections for Human Subjects. Vanderbilt Law Review71(5), 1703–1737. Retrieved from https://lopes.idm.oclc.org/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=a9h &AN=132702857&site=eds-live&scope=site

 

 

 

 

 

 

Appendix

Appendix A:

Communication Plan for an Inpatient Unit to Evaluate the Impact of Transformational Leadership Style Compared to Other Leader Styles such as Bureaucratic and Laissez-Faire Leadership in Nurse Engagement, Retention, and Team Member Satisfaction Over the Course of One Year

[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|desktop" custom_padding="60px||6px|||"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" min_height="34px" custom_margin="||4px|1px||"]

Related Samples

[/et_pb_text][et_pb_divider color="#E02B20" divider_weight="2px" _builder_version="4.9.3" _module_preset="default" width="10%" module_alignment="center" custom_margin="|||349px||"][/et_pb_divider][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner use_custom_gutter="on" _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px||" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet" custom_padding="13px||16px|0px|false|false"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_blog fullwidth="off" post_type="project" posts_number="5" excerpt_length="26" show_more="on" show_pagination="off" _builder_version="4.9.3" _module_preset="default" header_font="|600|||||||" read_more_font="|600|||||||" read_more_text_color="#e02b20" width="100%" custom_padding="|||0px|false|false" border_radii="on|5px|5px|5px|5px" border_width_all="2px" box_shadow_style="preset1"][/et_pb_blog][/et_pb_column_inner][/et_pb_row_inner][/et_pb_column][et_pb_column type="1_4" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_sidebar orientation="right" area="sidebar-1" _builder_version="4.9.3" _module_preset="default" custom_margin="|-3px||||"][/et_pb_sidebar][/et_pb_column][/et_pb_section]