HIM Breach

docx

School

University of Cincinnati, Clermont College *

*We aren’t endorsed by this school

Course

2012

Subject

Health Science

Date

Jun 14, 2024

Type

docx

Pages

4

Uploaded by MasterFog13529

Report
HIM Security Breach Chrissy Alden University of Cincinnati- Clermont HCMT 2012- Health Information Ethics Dr. Hyde & Professor Peters 11 June 2024 Alden 1
N. Northwest (Coder) Accessed on 10/16/XXXX Workstation: Home workstation 12 Applications Accessed and Actions: EHR (R), encoder (M), lab (R), radiology (R) Issue: Everything appears to be within normal use. Access was the same day as the actual coding and only modified in the encoder. S. Southward (Transcriptionist) Accessed on 10/15/XXXX Workstation: Home workstation 18 Applications Accessed and Actions: HER (R), transcription system (M), radiology (M) Issue: There is a question about the modification of the radiology record L. Easton (Coder) Accessed on 10/17/XXXX Workstation: Home workstation 9 Alden 2
Applications Accessed and Actions: HER (R), lab (R), radiology (R) Issue: The date of access is after the coding date E. Downey (File Clerk) Accessed on 10/15/XXXX Workstation: 8th floor nurse’s station Applications Accessed and Actions: HER (R), lab (R), radiology(R) Issue: Location of access W. Upton (File Clerk) Accessed on 10/15/XXXX** Workstation: HIM department workstation 3** Applications Accessed and Actions: HER (R), Chart tracking system (M) Issue: Modification of chart tracking system Several areas are cause for concern regarding inappropriate viewing, use, and modification of the patient’s EHR. 1. S Southward modified the radiology application when they were transcribing the record. Alden 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
2. L. Easton is a coder who accessed the record on 10/17. All coding was done on 10/16 so there is no reason to access the chart on the 17 th . 3. E. Downey is a file clerk who accessed the patient chart from the 8th-floor nurse’s station. There is no reason a file clerk should access a patient chart in the nurse’s station. 4. The modification of the chart tracking system by W. Upton, a file clerk, is suspicious and should be looked into. The next steps should be: 1. Conduct interviews with all 4. Ask Southward and Upton about the modifications. Ask Easton about the access on the 17 th , the day after the coding was complete. Ask Downey why they accessed a nurse’s station on the 8 th floor. See if any answers are justified based on job duties. 2. Review policies on privacy and access to the information. 3. Take disciplinary action against employees who violate the policies and laws based on the nature of the breach. 4. Reeducate the HIM staff on privacy, minimum necessary, HIPAA, and bylaws. 5. To ensure future compliance update software to monitor breaches and regularly audit. Alden 4