{"id":11540,"date":"2024-02-14T01:06:50","date_gmt":"2024-02-14T01:06:50","guid":{"rendered":"https:\/\/www.writemyessays.app\/blog\/questions\/prepare-a-2-page-interprofessional-staff-update-on-hipaa-and-appropriate-social-media-use-in-health-care\/"},"modified":"2024-02-14T01:06:50","modified_gmt":"2024-02-14T01:06:50","slug":"prepare-a-2-page-interprofessional-staff-update-on-hipaa-and-appropriate-social-media-use-in-health-care","status":"publish","type":"questions","link":"https:\/\/www.writemyessays.app\/blog\/questions\/prepare-a-2-page-interprofessional-staff-update-on-hipaa-and-appropriate-social-media-use-in-health-care\/","title":{"rendered":"Prepare a 2 page interprofessional staff update on HIPAA and appropriate social media use in health care."},"content":{"rendered":"<h2 style=\"margin: -1px 0px 0px; font-weight: 700; font-size: 24px; line-height: 30px; cursor: auto;\">Introduction<\/h2>\n<div style=\"padding: 15px 46px; cursor: auto; color: inherit;\" aria-labelledby=\"hlsl2ehw6102\">\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">Health care providers today must develop their skills in mitigating risks to their patients and themselves related to patient information. At the same time, they need to be able distinguish between effective and ineffective uses of social media in health care.<\/p>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">This assessment will require you to develop a staff update for an interprofessional team to encourage team members to protect the privacy, confidentiality, and security of patient information.<\/p>\n<h2 style=\"margin: -1px 0px 0px; font-weight: 700; font-size: 24px; line-height: 30px; cursor: auto;\">Professional Context<\/h2>\n<div style=\"padding: 15px 46px; cursor: auto; color: inherit;\" aria-labelledby=\"hlsl2ehw8695\">\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">Health professionals today are increasingly accountable for the use of protected health information (PHI). Various government and regulatory agencies promote and support privacy and security through a variety of activities. Examples include:<\/p>\n<ul style=\"margin-right: 0px; margin-bottom: 6px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">Meaningful use of electronic health records (EHR).<\/li>\n<li style=\"cursor: auto; color: inherit;\">Provision of EHR incentive programs through Medicare and Medicaid.<\/li>\n<li style=\"cursor: auto; color: inherit;\">Enforcement of the Health Insurance Portability and Accountability Act (HIPAA) rules.<\/li>\n<li style=\"cursor: auto; color: inherit;\">Release of educational resources and tools to help providers and hospitals address privacy, security, and confidentiality risks in their practices.<\/li>\n<\/ul>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">Technological advances, such as the use of social media platforms and applications for patient progress tracking and communication, have provided more access to health information and improved communication between care providers and patients.<\/p>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">At the same time, advances such as these have resulted in more risk for protecting PHI. Nurses typically receive annual training on protecting patient information in their everyday practice. This training usually emphasizes privacy, security, and confidentiality best practices such as:<\/p>\n<ul style=\"margin-right: 0px; margin-bottom: 6px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">Keeping passwords secure.<\/li>\n<li style=\"cursor: auto; color: inherit;\">Logging out of public computers.<\/li>\n<li style=\"cursor: auto; color: inherit;\">Sharing patient information only with those directly providing care or who have been granted permission to receive this information.<\/li>\n<\/ul>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">Today, one of the major risks associated with privacy and confidentiality of patient identity and data relates to social media. Many nurses and other health care providers place themselves at risk when they use social media or other electronic communication systems inappropriately. For example, a Texas nurse was recently terminated for posting patient vaccination information on Facebook. In another case, a New York nurse was terminated for posting an insensitive emergency department photo on her Instagram account.<\/p>\n<h2 style=\"margin: -1px 0px 0px; font-weight: 700; font-size: 24px; line-height: 30px; cursor: auto;\">Preparation<\/h2>\n<div style=\"padding: 0px 46px; cursor: auto; color: inherit;\" aria-labelledby=\"hlsl2ehwa186\">\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">\n<ul style=\"margin-right: 0px; margin-bottom: 6px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><a style=\"cursor: auto;\" data-api-returntype=\"File\" data-api-endpoint=\"https:\/\/courseroom.capella.edu\/api\/v1\/courses\/13555\/files\/2156962\"><\/a><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\"><\/span><span style=\"margin: -1px; cursor: auto; color: inherit;\">Download Assessment 02 Supplement: Protected Health Information [PDF]<\/span><\/a><\/span><\/li>\n<li style=\"cursor: auto; color: inherit;\">\n<ul style=\"margin-right: 0px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\"><\/strong><\/li>\n<\/ul>\n<\/li>\n<li style=\"cursor: auto; color: inherit;\">\n<ul style=\"margin-right: 0px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\"><\/li>\n<li style=\"cursor: auto; color: inherit;\"><\/li>\n<li style=\"cursor: auto; color: inherit;\"><\/li>\n<li style=\"cursor: auto; color: inherit;\"><\/li>\n<\/ul>\n<\/li>\n<li style=\"cursor: auto; color: inherit;\"><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\"><\/span><\/a><\/li>\n<\/ul>\n<\/div>\n<h2 style=\"margin: -1px 0px 0px; font-weight: 700; font-size: 24px; line-height: 30px; cursor: auto;\">Scenario<\/h2>\n<div style=\"padding: 15px 46px; cursor: auto; color: inherit;\" aria-labelledby=\"hlsl2ehwb913\">\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">In this assessment, imagine you are a nurse in one of the health care settings described in the following resource:<\/p>\n<ul style=\"margin-right: 0px; margin-bottom: 6px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><a style=\"cursor: auto;\" data-api-returntype=\"File\" data-api-endpoint=\"https:\/\/courseroom.capella.edu\/api\/v1\/courses\/13555\/files\/2156962\">Assessment 02 Supplement: Protected Health Information [PDF]<\/a><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\"><\/span><span style=\"margin: -1px; cursor: auto; color: inherit;\">Download Assessment 02 Supplement: Protected Health Information [PDF]<\/span><\/a><\/span><\/li>\n<\/ul>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">Before your shift begins, you scroll through Facebook and notice that a coworker has posted a photo of herself and a patient on Facebook and described how happy she is that her patient is making great progress. You have recently completed your annual continuing education requirements at work and realize this is a breach of your organization&#8217;s social media policy. Your organization requires employees to immediately report such breaches to the privacy officer to ensure the post is removed immediately and that the nurse responsible receives appropriate corrective action.<\/p>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">You follow appropriate organizational protocols and report the breach to the privacy officer. The privacy officer takes swift action to remove the post. Due to the severity of the breach, the organization terminates the nurse.<\/p>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">Based on this incident&#8217;s severity, your organization has established a task force with two main goals:<\/p>\n<ul style=\"margin-right: 0px; margin-bottom: 6px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">Educate staff on HIPAA and appropriate social media use in health care.<\/li>\n<li style=\"cursor: auto; color: inherit;\">Prevent confidentiality, security, and privacy breaches.<\/li>\n<\/ul>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">The task force has been charged with creating a series of interprofessional staff updates on the following topics:<\/p>\n<ul style=\"margin-right: 0px; margin-bottom: 6px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">Social media best practices.<\/li>\n<li style=\"cursor: auto; color: inherit;\">What not to do: Social media.<\/li>\n<li style=\"cursor: auto; color: inherit;\">Social media risks to patient information.<\/li>\n<li style=\"cursor: auto; color: inherit;\">Steps to take if a breach occurs.<\/li>\n<\/ul>\n<div>\n<h2 style=\"margin: -1px 0px 0px; font-weight: 700; font-size: 24px; line-height: 30px; cursor: auto;\">Instructions<\/h2>\n<div style=\"padding: 15px 46px; cursor: auto; color: inherit;\" aria-labelledby=\"hlsl2ehwd340\">\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">First, select one of the health care settings described in the following resource:<\/p>\n<ul style=\"margin-right: 0px; margin-bottom: 6px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><a style=\"cursor: auto;\" data-api-returntype=\"File\" data-api-endpoint=\"https:\/\/courseroom.capella.edu\/api\/v1\/courses\/13555\/files\/2156962\">Assessment 02 Supplement: Protected Health Information [PDF]<\/a><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\"><\/span><span style=\"margin: -1px; cursor: auto; color: inherit;\">Download Assessment 02 Supplement: Protected Health Information [PDF]<\/span><\/a><\/span><\/li>\n<\/ul>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">As a nurse in this setting, you are asked to create the content for a staff update containing a<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">maximum<\/strong><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>of two content pages that address one or more of these topics:<\/p>\n<ul style=\"margin-right: 0px; margin-bottom: 6px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">Social media best practices.<\/li>\n<li style=\"cursor: auto; color: inherit;\">What not to do: social media.<\/li>\n<li style=\"cursor: auto; color: inherit;\">Social media risks to patient information.<\/li>\n<li style=\"cursor: auto; color: inherit;\">Steps to take if a breach occurs.<\/li>\n<\/ul>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">This assessment is not a traditional essay<\/strong>.<strong style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>It is a staff educational update about PHI.<\/strong><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>Consider creating a flyer, pamphlet, or one PowerPoint slide (not an entire presentation). Remember it should not be more than two pages (excluding a title and a reference page).<\/p>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">The task force has asked team members assigned to the topics to include the following content in their updates in addition to content on their selected topics:<\/p>\n<ul style=\"margin-right: 0px; margin-bottom: 6px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">What is protected health information (PHI)?\n<ul style=\"margin-right: 0px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">Be sure to include essential HIPAA information.<\/li>\n<\/ul>\n<\/li>\n<li style=\"cursor: auto; color: inherit;\">What are privacy, security, and confidentiality?\n<ul style=\"margin-right: 0px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">Define and provide examples of privacy, security, and confidentiality concerns related to the use of technology in health care.<\/li>\n<li style=\"cursor: auto; color: inherit;\">Explain the importance of interdisciplinary collaboration to safeguard sensitive electronic health information.<\/li>\n<\/ul>\n<\/li>\n<li style=\"cursor: auto; color: inherit;\">What evidence relating to social media usage and PHI do interprofessional team members need to be aware of? For example:\n<ul style=\"margin-right: 0px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">What are some examples of nurses being terminated for inappropriate social media use in the United States?<\/li>\n<li style=\"cursor: auto; color: inherit;\">What types of sanctions have health care organizations imposed on interdisciplinary team members who have violated social media policies?<\/li>\n<li style=\"cursor: auto; color: inherit;\">What have been the financial penalties assessed against health care organizations for inappropriate social media use?<\/li>\n<li style=\"cursor: auto; color: inherit;\">What evidence-based strategies have health care organizations employed to prevent or reduce confidentiality, privacy, and security breaches, particularly related to social media usage?<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h5 style=\"margin: 6px 0px; font-weight: 700; font-size: 16px; line-height: 1.5; cursor: auto;\">Notes<\/h5>\n<ul style=\"margin-right: 0px; margin-bottom: 6px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">Your staff update is limited to two double-spaced content pages. Be selective about the content you choose to include in your update so you can meet the page length requirement. Include<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">need-to-know<\/strong><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>information. Omit<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">nice-to-know<\/strong><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>information.<\/li>\n<li style=\"cursor: auto; color: inherit;\">Many times people do not read staff updates, do not read them carefully, or do not read them to the end. Ensure your staff update piques staff members&#8217; interest, highlights key points, and is easy to read. Avoid overcrowding the update with too much content.<\/li>\n<li style=\"cursor: auto; color: inherit;\">Also, supply a separate reference page that includes two or three peer-reviewed and one or two non-peer-reviewed resources (for a total of 3\u20135 resources) to support the staff update content.<\/li>\n<\/ul>\n<div>\n<h2 style=\"margin: -1px 0px 0px; font-weight: 700; font-size: 24px; line-height: 30px; cursor: auto;\">Additional Requirements<\/h2>\n<div style=\"padding: 15px 46px; cursor: auto; color: inherit;\" aria-labelledby=\"hlsl2ehwf670\">\n<ul style=\"margin-right: 0px; margin-bottom: 6px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Written communication:<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/strong>Ensure the staff update is free from errors that detract from the overall message.<\/li>\n<li style=\"cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Submission length:<\/strong><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>Maximum of two double-spaced content pages.<\/li>\n<li style=\"cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Font and font size:<\/strong><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>Use Times New Roman, 12-point.<\/li>\n<li style=\"cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Citations and references:<\/strong><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>Provide a separate reference page that includes 2\u20133 current, peer-reviewed and 1\u20132 current, non-peer-reviewed in-text citations and references (total of 3\u20135 resources) that support the staff update&#8217;s content. Current<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">means<\/strong><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>no older than 5 years.<\/li>\n<li style=\"cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">APA format:<\/strong><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>Be sure your citations and references adhere to APA format.<\/li>\n<\/ul>\n<div>\n<h2 style=\"margin: -1px 0px 0px; font-weight: 700; font-size: 24px; line-height: 30px; cursor: auto;\">Competencies Measured<\/h2>\n<div style=\"padding: 15px 46px; cursor: auto; color: inherit;\" aria-labelledby=\"hlsl2ehwh898\">\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">By successfully completing this assessment, you will demonstrate your proficiency in the following course competencies and scoring guide criteria:<\/p>\n<ul style=\"margin-right: 0px; margin-bottom: 6px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">Competency 1: Describe nurses&#8217; and the interdisciplinary team&#8217;s role in informatics with a focus on electronic health information and patient care technology to support decision making.\n<ul style=\"margin-right: 0px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">Describe the security, privacy, and confidentially laws related to protecting sensitive electronic health information that govern the interdisciplinary team.<\/li>\n<li style=\"cursor: auto; color: inherit;\">Explain the importance of interdisciplinary collaboration to safeguard sensitive electronic health information.<\/li>\n<\/ul>\n<\/li>\n<li style=\"cursor: auto; color: inherit;\">Competency 2: Implement evidence-based strategies to effectively manage protected health information.\n<ul style=\"margin-right: 0px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">Identify evidence-based approaches to mitigate risks to patients and health care staff related to sensitive electronic health information.<\/li>\n<li style=\"cursor: auto; color: inherit;\">Develop a professional, effective staff update that educates interprofessional team members about protecting the security, privacy, and confidentiality of patient data, particularly as it pertains to social media usage.<\/li>\n<\/ul>\n<\/li>\n<li style=\"cursor: auto; color: inherit;\">Competency 5: Apply professional, scholarly communication to facilitate use of health information and patient care technologies.<\/li>\n<ul style=\"margin-right: 0px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">Follow APA style and formatting guidelines for citations and references.<\/li>\n<li style=\"cursor: auto; color: inherit;\">Create a clear, concise, well-organized, and professional staff update that is generally free from errors in grammar, punctuation, and spelling.<\/li>\n<\/ul>\n<li>\n<div style=\"padding: 30px 67.1406px 20px; cursor: auto; color: inherit;\">\n<h1 style=\"margin-right: auto; margin-bottom: 0px; margin-left: auto; font-weight: lighter; font-size: 25px; cursor: auto;\">Protected Health Information (PHI): Privacy, Security, and Confidentiality Best Practices Scoring Guide<\/h1>\n<\/div>\n<div style=\"padding: 0px 67.1406px; cursor: auto; color: inherit;\">\n<div style=\"margin: 0px auto 50px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<table style=\"margin-top: 30px; cursor: auto; color: inherit;\">\n<thead style=\"cursor: auto; color: inherit;\">\n<tr style=\"font-size: 0.8em; cursor: auto; color: inherit;\">\n<th style=\"padding: 11.9844px; font-weight: normal; cursor: auto; color: inherit;\">CRITERIA<\/th>\n<th style=\"padding: 11.9844px; font-weight: normal; cursor: auto; color: inherit;\">NON-PERFORMANCE<\/th>\n<th style=\"padding: 11.9844px; font-weight: normal; cursor: auto; color: inherit;\">BASIC<\/th>\n<th style=\"padding: 11.9844px; font-weight: normal; cursor: auto; color: inherit;\">PROFICIENT<\/th>\n<th style=\"padding: 11.9844px; font-weight: normal; cursor: auto; color: inherit;\">DISTINGUISHED<\/th>\n<\/tr>\n<\/thead>\n<tbody style=\"cursor: auto; color: inherit;\">\n<tr style=\"cursor: auto; color: inherit;\">\n<th style=\"padding: 11.9844px; font-weight: normal; font-size: 1.1em; cursor: auto; color: inherit;\"><span style=\"font-size: 1.1em; cursor: auto; color: inherit;\">Describe the security, privacy, and confidentially laws related to protecting sensitive electronic health information that govern the interdisciplinary team.<\/span><\/th>\n<td style=\"padding: 11.9844px; cursor: auto; color: inherit;\">Does not describe the security, privacy, and confidentially laws related to protecting sensitive electronic health information that govern the interdisciplinary team.<\/td>\n<td style=\"padding: 11.9844px; cursor: auto; color: inherit;\">Attempts to identify the security, privacy, and confidentially laws related to protecting sensitive electronic health information that govern the interdisciplinary team.<\/td>\n<td style=\"padding: 11.9844px; cursor: auto; color: inherit;\">Describes the security, privacy, and confidentially laws related to protecting sensitive electronic health information that govern the interdisciplinary team.<\/td>\n<td style=\"padding: 11.9844px; cursor: auto; color: inherit;\">Provides a comprehensive and insightful summary of confidentially laws related to protecting sensitive electronic health information that govern the interdisciplinary team.<\/td>\n<\/tr>\n<tr style=\"cursor: auto; color: inherit;\">\n<th style=\"padding: 11.9844px; font-weight: normal; font-size: 1.1em; cursor: auto; color: inherit;\"><span style=\"font-size: 1.1em; cursor: auto; color: inherit;\">Explain the importance of interdisciplinary collaboration to safeguard sensitive electronic health information.<\/span><\/th>\n<td style=\"padding: 11.9844px; cursor: auto; color: inherit;\">Does not explain the importance of interdisciplinary collaboration to safeguard sensitive electronic health information.<\/td>\n<td style=\"padding: 11.9844px; cursor: auto; color: inherit;\">Explains interdisciplinary collaboration to safeguard sensitive electronic health information, but the explanation lacks detail or is missing critical information.<\/td>\n<td style=\"padding: 11.9844px; cursor: auto; color: inherit;\">Explains the importance of interdisciplinary collaboration to safeguard sensitive electronic health information.<\/td>\n<td style=\"padding: 11.9844px; cursor: auto; color: inherit;\">Explains in detail, and with professional insight, the importance of interdisciplinary collaboration to safeguard sensitive electronic health information.<\/td>\n<\/tr>\n<tr style=\"cursor: auto; color: inherit;\">\n<th style=\"padding: 11.9844px; font-weight: normal; font-size: 1.1em; cursor: auto; color: inherit;\"><span style=\"font-size: 1.1em; cursor: auto; color: inherit;\">Identify evidence-based approaches to mitigate risks to patients and health care staff related to sensitive electronic health information.<\/span><\/th>\n<td style=\"padding: 11.9844px; cursor: auto; color: inherit;\">Does not identify evidence-based approaches to mitigate risks to patients and health care staff related to sensitive electronic health information.<\/td>\n<td style=\"padding: 11.9844px; cursor: auto; color: inherit;\">Attempts to identify evidence-based approaches to mitigate risks to patients and health care staff related to sensitive electronic health information; however, omissions and errors exist.<\/td>\n<td style=\"padding: 11.9844px; cursor: auto; color: inherit;\">Identifies evidence-based approaches to mitigate risks to patients and health care staff related to sensitive electronic health information.<\/td>\n<td style=\"padding: 11.9844px; cursor: auto; color: inherit;\">Identifies multiple appropriate and well-researched evidence-based approaches to mitigate risks to patients and health care staff related to sensitive electronic health information.<\/td>\n<\/tr>\n<tr style=\"cursor: auto; color: inherit;\">\n<th style=\"padding: 11.9844px; font-weight: normal; font-size: 1.1em; cursor: auto; color: inherit;\"><span style=\"font-size: 1.1em; cursor: auto; color: inherit;\">Develop a professional, effective staff update that educates interprofessional team members about protecting the security, privacy, and confidentiality of patient data, particularly as it pertains to social media usage.<\/span><\/th>\n<td style=\"padding: 11.9844px; cursor: auto; color: inherit;\">Does not develop a professional, effective staff update that educates interprofessional team members about protecting the security, privacy, and confidentiality of patient data, particularly as it pertains to social media usage.<\/td>\n<td style=\"padding: 11.9844px; cursor: auto; color: inherit;\">Attempts to develop a staff update that educates interprofessional team members about protecting the security, privacy, and confidentiality of patient data, particularly as it pertains to social media usage.<\/td>\n<td style=\"padding: 11.9844px; cursor: auto; color: inherit;\">Develops a professional, effective staff update that educates interprofessional team members about protecting the security, privacy, and confidentiality of patient data, particularly as it pertains to social media usage.<\/td>\n<td style=\"padding: 11.9844px; cursor: auto; color: inherit;\">Develops a comprehensive, professional, and effective staff update that educates interprofessional team members about protecting the security, privacy, and confidentiality of patient data, particularly as it pertains to social media usage.<\/td>\n<\/tr>\n<tr style=\"cursor: auto; color: inherit;\">\n<th style=\"padding: 11.9844px; font-weight: normal; font-size: 1.1em; cursor: auto; color: inherit;\"><span style=\"font-size: 1.1em; cursor: auto; color: inherit;\">Follow APA style and formatting guidelines for citations and references.<\/span><\/th>\n<td style=\"padding: 11.9844px; cursor: auto; color: inherit;\">Does not follow APA style and formatting guidelines for citations and references.<\/td>\n<td style=\"padding: 11.9844px; cursor: auto; color: inherit;\">Partially adheres to APA style and formatting guidelines for citations and references. Formatting inhibits effective communication or detracts from good scholarship.<\/td>\n<td style=\"padding: 11.9844px; cursor: auto; color: inherit;\">Follows APA style and formatting guidelines for citations and references. Academic citations and references are largely error-free.<\/td>\n<td style=\"padding: 11.9844px; cursor: auto; color: inherit;\">Follows flawless APA style and formatting guidelines for citations and references.<\/td>\n<\/tr>\n<tr style=\"cursor: auto; color: inherit;\">\n<th style=\"padding: 11.9844px; font-weight: normal; font-size: 1.1em; cursor: auto; color: inherit;\"><span style=\"font-size: 1.1em; cursor: auto; color: inherit;\">Create a clear, concise, well-organized, and professional staff update that is generally free from errors in grammar, punctuation, and spelling.<\/span><\/th>\n<td style=\"padding: 11.9844px; cursor: auto; color: inherit;\">Does not create a clear, concise, well-organized, and professional staff update that is generally free from errors in grammar, punctuation, and spelling.<\/td>\n<td style=\"padding: 11.9844px; cursor: auto; color: inherit;\">Creates a staff update that contains errors in grammar, punctuation, and spelling that distract from good scholarship. Staff update is more than two pages of content.<\/td>\n<td style=\"padding: 11.9844px; cursor: auto; color: inherit;\">Creates a clear, concise, well-organized, and professional staff update that is generally free from errors in grammar, punctuation, and spelling.<\/td>\n<td style=\"padding: 11.9844px; cursor: auto; color: inherit;\">Creates a clear, concise, well-organized, and professional staff update that is generally free from errors in grammar, punctuation, and spelling. Adheres to all applicable disciplinary and scholarly writing standards.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><\/div>\n<\/div>\n<\/div>\n<\/li>\n<\/ul>\n<div><\/div>\n<div><\/div>\n<div>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">Remember that your assessment will be graded according to the<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><strong style=\"font-weight: bold; cursor: auto; color: inherit;\"><em style=\"cursor: auto; color: inherit;\"><u style=\"cursor: auto; color: inherit;\">Scoring Guide Rubric<\/u><\/em><\/strong>.&nbsp; Please review it to help you most fully address the scoring criteria in your staff update.&nbsp; The format you select for your update is up to you, but<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><strong style=\"font-weight: bold; cursor: auto; color: inherit;\"><em style=\"cursor: auto; color: inherit;\"><u style=\"cursor: auto; color: inherit;\">be sure you fully address each scoring criterion<\/u><\/em><\/strong>.&nbsp; Special formatting, colors and fonts, and graphics<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><strong style=\"font-weight: bold; cursor: auto; color: inherit;\"><em style=\"cursor: auto; color: inherit;\"><u style=\"cursor: auto; color: inherit;\">will not<\/u><\/em><\/strong><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>contribute to your score, so don\u2019t invest a great deal of time into that.&nbsp; Many students submit their updates as a regular WORD document, which is fine.&nbsp; In order to<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><em style=\"cursor: auto; color: inherit;\"><u style=\"cursor: auto; color: inherit;\">fully address each scoring criterion<\/u><\/em><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>you will likely need to exceed the suggested 2-page format, which is perfectly fine.&nbsp;<\/p>\n<ol style=\"margin-right: 0px; margin-bottom: 6px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">Criterion #1 \u2013<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><strong style=\"font-weight: bold; cursor: auto; color: inherit;\"><em style=\"cursor: auto; color: inherit;\"><u style=\"cursor: auto; color: inherit;\">HIPAA<\/u><\/em><\/strong><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>was the original security, privacy and confidentiality law relating to PHI. More recently, the<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><strong style=\"font-weight: bold; cursor: auto; color: inherit;\"><em style=\"cursor: auto; color: inherit;\"><u style=\"cursor: auto; color: inherit;\">HITECH Act<\/u><\/em><\/strong><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>reinforced HIPAA and increased the severity of penalties for non-compliance.&nbsp; I would encourage you to check out these two governmental resources:<\/li>\n<\/ol>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\"><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">https:\/\/www.healthit.gov\/sites\/default\/files\/pdf\/privacy\/onc_privacy_and_security_chapter4_v1_022112.pdf<\/span><span style=\"cursor: auto; color: inherit;\"><span style=\"margin: -1px -1px 0px; cursor: auto; color: inherit;\">Links to an external site.<\/span><\/span><\/a>&nbsp;&nbsp;&nbsp; and&nbsp;&nbsp;<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">https:\/\/www.hhs.gov\/hipaa\/for-professionals\/special-topics\/hitech-act-enforcement-interim-final-rule\/index.html<\/span><span style=\"cursor: auto; color: inherit;\"><span style=\"margin: -1px -1px 0px; cursor: auto; color: inherit;\">Links to an external site.<\/span><\/span><\/a><\/p>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">Criterion # 2 \u2013 Focus on INTERDISCIPLINARY collaboration related to<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><em style=\"cursor: auto; color: inherit;\"><u style=\"cursor: auto; color: inherit;\">sensitive ELECTRONIC health information<\/u><\/em>,<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><strong style=\"font-weight: bold; cursor: auto; color: inherit;\"><em style=\"cursor: auto; color: inherit;\"><u style=\"cursor: auto; color: inherit;\">not just to social media<\/u><\/em><\/strong>.&nbsp; The Vos and Kruse articles recommended for Assessment 1 provides some great information that will help you address this criterion.&nbsp;<\/p>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">Criterion #3 \u2013 This criterion requires you to \u201c<strong style=\"font-weight: bold; cursor: auto; color: inherit;\"><em style=\"cursor: auto; color: inherit;\">Identify evidence-based approaches to mitigate risks to patients and health care staff related to sensitive electronic health information<\/em><\/strong><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">.\u201d&nbsp;<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/strong>Evidence-based approaches refers here to<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><em style=\"cursor: auto; color: inherit;\"><u style=\"cursor: auto; color: inherit;\">specific tools, procedures, methods and protocols<\/u><\/em><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>used to protect sensitive electronic health information.&nbsp; The Kruse article from Assessment 1 identifies the \u201c3 pillars of HIPAA\u201d and addresses a number of specific approaches within each pillar.&nbsp; The \u201chealthit\u201d document suggested above also addresses some great methods.&nbsp;<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><strong style=\"font-weight: bold; cursor: auto; color: inherit;\"><em style=\"cursor: auto; color: inherit;\"><u style=\"cursor: auto; color: inherit;\">Simply providing a \u201cDo and Don\u2019t\u201d list of social media practices is not sufficient<\/u><\/em><\/strong>.&nbsp;&nbsp;<\/p>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\"><\/p>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">Vos, Boonstra, Kooistra, Seelen &amp; van Offenbeck.&nbsp; (2020).&nbsp; The influence of electronic health record use on collaboration among medical specialties.&nbsp; BMC Health Services Research.<\/span><\/p>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><br \/><\/span><\/p>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">Kruse, Smith, Vanderlinden &amp; Nealand.&nbsp; (2017).&nbsp; Security techniques for the electronic health records.&nbsp;<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/span><em style=\"cursor: auto; color: inherit;\">Journal of Medical Systems, 41<\/em><span style=\"cursor: auto; color: inherit;\">(8), 127.&nbsp;&nbsp;<\/span><br \/><\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Introduction Health care providers today must develop their skills in mitigating risks to their patients and themselves related to patient information. At the same time, they need to be able distinguish between effective and ineffective uses of social media in health care. This assessment will require you to develop a staff update for an interprofessional [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":[],"disciplines":[13],"paper_types":[],"tagged":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/11540"}],"collection":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions"}],"about":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/types\/questions"}],"author":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/comments?post=11540"}],"version-history":[{"count":0,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/11540\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/media?parent=11540"}],"wp:term":[{"taxonomy":"disciplines","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/disciplines?post=11540"},{"taxonomy":"paper_types","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/paper_types?post=11540"},{"taxonomy":"tagged","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/tagged?post=11540"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}