Call/WhatsApp: +1 332 209 4094

Job application: Summarize the role and responsibilities of the aspirational position.

Job application: Summarize the role and responsibilities of the aspirational position.

Using the position description you identified and submitted in Module 2 as the foundation, please write a 5 page essay that addresses each bullet below. This assignment will require you to conduct some research to better learn the details regarding the position. Some you may already know, other information you will need to find. Don’t forget to cite whatever resources you use! Your paper should be comprised of an introduction, body, and conclusion.

Please note: APA formatting is required therefore you will need to include a cover page, reference page, and in-text citations where appropriate. Page count does not include a cover page and reference page. (OWL 10 steps for APA formatting) (Links to an external site.)

Introduction:

Summarize the role and responsibilities of the aspirational position.
Briefly describe the health care setting where this position would function.
Foreshadow the content of the essay.

Health Care System

Explain how does this position fit within the larger health care system.
How does this position fit within the continuum of care?
What population you will most likely serve in this position?
What type of funding source(s) will the population you’re serving utilize? E.g. Medicaid, Medicare, etc.
Give an example of the types of technology you would be required to use for this position. Are you trained in the use of this technology?
Two current trends in health care as they relate to technology are electronic health records and 3D printing. Describe how your position will interface with both of these. If there is not a direct link between your position and one of these trends, then explain how you think they may intersect in the future.
Explain how you will interact with other health care professional roles in this position.
Legal

How do HIPAA regulations impact this role?
What are some specific expectations you will need to carry out to support HIPAA regulations?
What are some legal aspects you would need to remain aware of in this role? For example, advanced directives or informed consent.

The concurrence particular date of the HIPAA Personal privacy Guideline was April 14, 2003 with a one-calendar year extension for several “small plans”. HIPAA Privacy Rules regulate the use and disclosure of Protected Health Information (PHI) held by covered entities which are defined as health care clearinghouses, employer-sponsored health plans, health insurers, and medical service providers that engage in certain transactions. The Department of Health and Human Services, when implementing the HIPAA Omnibus Rule, extended the HIPAA privacy rule to independent contractors of covered entities who fit within the definition of a business associate. PHI is any information held by a covered entity that concerns health status, provision of health care, or payment for health care that can be linked to an individual. There are 18 fields of ePHI that need to be considered that include such items as Name, Diagnosis, Social Security Number, etc. This is includes any part of an individual’s medical record or payment history. Under HIPAA regulations, covered Entities must disclose PHI to the individual within 30 days upon request. They also must disclose PHI when required to do so by law such as reporting suspected child abuse or when presented with a subpoena or when requested by law enforcement. Under the HIPAA Privacy Rule, a covered entity may disclose PHI to facilitate treatment, payment, or health care operations (TPO) without a patient’s express written authorization. Any other disclosure of PHI requires the covered entity to obtain and store written authorization from the individual for the disclosure. When a covered entity discloses any PHI, it must make a reasonable effort to disclose only the minimum necessary information required to achieve its purpose.

The Security Specs had been presented on February 20, 2003 while the HIPAA rules moved into influence on Apr 21, 2003 by using a agreement particular day of Apr 21. The HIPAA Privacy Rule pertains to all Protected Health Information (PHI) including paper and electronic, the Security Rule deals specifically with Electronic Protected Health Information (ePHI). HIPAA Rules and Regulations lay out three types of security safeguards required for compliance: administrative, physical, and technical. For each of these types, the HIPAA Privacy Rule identifies security standards, and for each standard, it names both required and addressable implementation specifications. Required specifications must be adopted and administered as dictated by the Rule. Addressable specifications are more flexible. Individual covered entities can evaluate their own situation and determine the best way to implement addressable specifications. The HIPAA Rules and Regulations standards and specifications are as follows:

Administrative Safety measures – Plans and procedures made to clearly present just how the enterprise will adhere to the act Included organizations must implement a written list of level of privacy treatments and designate a privacy representative to be responsible for developing and applying all necessary plans and procedures. The policies and procedures must reference management oversight and organizational buy-in to compliance with the documented security controls. Procedures should clearly identify employees or classes of employees who will have access to electronic protected health information ePHI. Access to ePHI must be restricted to only those employees who have a need for it to complete their job function. The procedures must address access authorization, establishment, modification, and termination. Entities must show that an appropriate ongoing training program regarding the handling of PHI is provided to employees performing health plan administrative functions. Covered entities that out-source some of their business processes to a third party must ensure that their vendors also have a framework in place to comply with HIPAA law requirements. Companies typically gain this assurance through clauses in the contracts stating that the vendor will meet the same data protection requirements that apply to the covered entity. Care must be taken to determine if the vendor further out-sources any data handling functions to other vendors and monitor whether appropriate contracts and controls are in place. A contingency plan should be in place for responding to emergencies. Covered entities are responsible for backing up their data and having disaster recovery procedures in place. The plan should document data priority and failure analysis, testing activities, and change control procedures. Internal audits play a key role in HIPAA compliance by reviewing operations with the goal of identifying potential security violations. Policies and procedures should specifically document the scope, frequency, and procedures of audits. Audits should be both routine and event-based. Procedures should document instructions for addressing and responding to security breaches that are identified either during the audit or the normal course of operations under HIPAA rules.

HIPAA rules beneath the Personal privacy and Protection Rules need included entities to notify people of makes use of of the PHI. Covered entities must also keep track of disclosures of PHI and document privacy policies and procedures. They must appoint a Privacy Official and a contact person responsible for receiving complaints and train all members of their workforce in procedures regarding PHI. An individual who believes that HIPAA Privacy Rules are not being upheld can file a complaint with the Department of Health and Human Services Office for Civil Rights (OCR), the reporting information but be available on the organizations’ Notice of Privacy Practices that is handed to the patient or visible in an obvious place like a doctors waiting room.