Hippa Regulations

Only available on StudyMode
  • Download(s) : 103
  • Published : December 6, 2012
Open Document
Text Preview
After reading Chapters 19, 20, and the Web readings, submit a written response to these questions. Relate the topics to your own experiences. You response should be 400-600 words, using APA style formatting. 1. Discuss the HIPAA regulations, their purposes, and their significance to health care information management policies and procedures. HIPPA (Health Insurance Portability and Accountability Act), was passed in 1996. HIPPA has five purposes: to improve portability and continuity of health insurance coverage in the group and individual markets; to combat waste, fraud, and abuse in health insurance and health care delivery; to promote the use of medical savings accounts; to improve access to long-term care services and coverage; and to simplify the administration of health insurance and for other purposes. HIPPA accomplish these purposes by including a series of “administrative simplification” (AS) provisions that required the DHHS (Department of Health and Human Services) to adopt national standards for electronic health care transactions. The provisions called for an establishment of standards related to EDI (electronic data interchange) of specific administrative and financial transactions, while still protecting the security and privacy of transmitted information. AS, also, includes standards for transactions and code sets, unique identifies, security and electronic signature, and privacy and confidentiality (Healthcare Informatics: An Interdisciplinary Approach (2002)). 2. Discuss the role of HIPAA regulations in data and network security, patient consent and authorization. HIPPA security and electronic signature standards are designed to protect the confidentiality, integrity, and availability of individual health information while allowing appropriate use by providers, plans, and clearing houses. The security standards apply to health data stored electronically or transmitted over a network. The proposed security standards include standards for...
tracking img