HIM Breach
docx
keyboard_arrow_up
School
University of Cincinnati, Clermont College *
*We aren’t endorsed by this school
Course
2012
Subject
Health Science
Date
Jun 14, 2024
Type
docx
Pages
4
Uploaded by MasterFog13529
HIM Security Breach
Chrissy Alden
University of Cincinnati- Clermont
HCMT 2012- Health Information Ethics
Dr. Hyde & Professor Peters
11 June 2024
Alden 1
N. Northwest (Coder)
Accessed on 10/16/XXXX
Workstation: Home workstation 12
Applications Accessed and Actions: EHR (R), encoder (M), lab (R), radiology
(R)
Issue: Everything appears to be within normal use. Access was the same day as the actual coding and only modified in the encoder.
S. Southward (Transcriptionist)
Accessed on 10/15/XXXX
Workstation: Home workstation 18
Applications Accessed and Actions: HER (R), transcription system (M), radiology (M)
Issue: There is a question about the modification of the radiology record
L. Easton (Coder)
Accessed on 10/17/XXXX
Workstation: Home workstation 9
Alden 2
Applications Accessed and Actions: HER (R), lab (R), radiology (R)
Issue: The date of access is after the coding date
E. Downey (File Clerk)
Accessed on 10/15/XXXX
Workstation: 8th floor nurse’s station
Applications Accessed and Actions: HER (R), lab (R), radiology(R)
Issue: Location of access
W. Upton (File Clerk)
Accessed on 10/15/XXXX**
Workstation: HIM department workstation 3**
Applications Accessed and Actions: HER (R), Chart tracking system (M)
Issue: Modification of chart tracking system
Several areas are cause for concern regarding inappropriate viewing, use, and modification of the patient’s EHR.
1. S Southward modified the radiology application when they were transcribing the record.
Alden 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
2. L. Easton is a coder who accessed the record on 10/17. All coding was done on 10/16 so there is no reason to access the chart on the 17
th
.
3. E. Downey is a file clerk who accessed the patient chart from the 8th-floor nurse’s station. There is no reason a file clerk should access a patient chart in the nurse’s station.
4. The modification of the chart tracking system by W. Upton, a file clerk, is suspicious and should be looked into.
The next steps should be:
1.
Conduct interviews with all 4. Ask Southward and Upton about the modifications. Ask Easton about the access on the 17
th
, the day after the coding was complete. Ask Downey why they accessed a nurse’s station on the 8
th
floor. See if any answers are justified based on job duties.
2.
Review policies on privacy and access to the information.
3.
Take disciplinary action against employees who violate the policies and
laws based on the nature of the breach.
4.
Reeducate the HIM staff on privacy, minimum necessary, HIPAA, and bylaws.
5.
To ensure future compliance update software to monitor breaches and regularly audit.
Alden 4