This module is a product of a concerted effort of Third Year Nursing Students who were tasked to come up
with this instructional module arises due to provide clear viewpoints and comprehensive literature to the students about Nursing care, Policy, and Ethics on Nursing Informatics
The group brainstormed on different avenues and techniques in presenting the lesson to fill the knowledge craving mind of the Nursing Informatics learners The students will uphold the learnings, give creative ideas, accumulate concepts, and gear the substances this module contains. Through compiled educational materials such as video, text format, documents, different interactive activities and assessment, it would provide adequate comprehension of the importance of the said topics
All rights reserved. No part of this module may be reproduced, distributed, or transmitted in any forms by any means, including photocopying, recording, or other electronic methods without the prior written permission of the copyright owner, except in the case of brief quotations embodied in reviews and certain other noncommercial usespermittedbycopyrightlaw.
Copyright 2022byGroup4ofBSN3-5 2 RepublicofthePhilippines PamantasanngLungsodng Maynila CollegeofNursing E-MODULE: Policy&EthicsonInformatics Literacy&NursingCare GROUP4:BSN3-5 PASCUAL,KimMarinelleM. PEROLINA,ChannelL. PICACHE,LadyBeatriceC. PINGUL,JazelAevyN. POQUIZ,EuniceYoanA. RODRIGUEZ,MariAnD.S ROXAS,JohnFrancisB. SALAS,AdrianB. SORIANO,JohnRobertE. STO.DOMINGO,MaraYsabelI. TANGO,RochelleAnneL. YARZA,JemilieSwayM. OCTOBER,2022
PREFACE
Exercise1 Exercise2 22 Exercise3 23 Exercise4 24 Exercise5 25 Exercise6 27 Exercise7 29 20 Preface TableofContents 04LearningObjectives DataSecurity,Regulatory, Confidentiality,&Rightto Privacy Context HIPAA CopyrightsLaw Ethicalbehavior 05 11 14 17 05 CoverPage 02 03 35 38 3 CONTENTS Exercise8 PostAssessment 31 34 References 01
OBJECTIVES
E-MODULE
A and information systems to support a safer environment for both patient and healthcare workers.
toolsembeddedinpatientcare technologies
Discuss the influence of policy and ethics, in regard to patient engagement clinical decision support and the delivery of safe and high-quality of care.
Protect the confidentiality of protected health information in electronic health records. Participate in the evaluation of information systems in practice settings through policy and procedure development.
O B J E C T I V E S
4
DataSecurity,Regulatory, Confidentiality,andRighttoPrivacy
Objectives:
Inthistopic,studentswilllearn:
How data security, confidentiality, regulation and right to privacy helps in maintaining good flow of transaction betweenthepatientandhealthcareteam.
How these ethics and policies ensures safety environment of the patient and mitigate vulnerabilities in information systems and processes. Willlearnthepurposeofsafeguardingthepatient’sinformation
As our country continues to develop and increase the demand for healthcare services and delivery, the medical field is progressing to adapt the information
and communication technology to make all healthcare facilities more advanced andsuitableforpatient careinteraction.
However, in recent years, the importance of protecting the privacy and security of health information has emerged as a top priority for health care practitioners and informatics professionals Its relevance to practice is more critical than ever as new approaches to collecting, using, and sharing health data not only promise innovation but also raise the possibility for exploitation and breach
Informatics Nurses play an important role in health policy development, integrating knowledge in data andinformationcontent,filesystems,andITsolutions,
s well as care coordination and advocacy. This is to olve the underlying issues and challenges faced by he medical field in utilizing information technology in heir daily nursing practices. Here are the basic rights hat the patients must have in receiving their ealthcare.
5
INTRODUCTION
DATASECURITY
In nursing, nurses are required to handle patient data with care and to pay close attention to security concerns. They will be asked to decide when nursingdatamustbestoredindatabanksandwhohasaccesstoit.
Unauthorized disclosures of personal health information are likely to have occurred for as long as comprehensive recordshavebeenkept.
Advancements in technology that allow for the efficient gathering and sharing of information have heightened the ethical issues and challenges associated with keeping personal healthrecordssecureandprivate
Chances for illegal disclosure of personal health information continues to increase since every part of the healthcare industry was entered informationnetworksanddatabas
Data security is vital in securing personal medical information and adhering to standards such as HIPAA. It targets an effective and efficient method to protect the safety of patient data.
Improved healthcare data security solutions are required to mitigate the risks of malicious data
assaults. Especially now that nurses, physicians, and other healthcare workers rely on technology to access, update, and record patient data, such as in computersandtablets.
DATA SECURITY
6
REGULATORY
WHY
MOREIMPORTANTCONCERNSFORINFORMATICSNURSES?
Comprises
Healthcare professionals are incorporating information technologyintotheirjob.Thereisasubstantialriskthat they may breach regulations in handling their patients' data.Thoughnursinginformaticsismeanttoreducethe workloads of healthcare providers and make daily practices easier and hassle free, health information technologyhasthepotentialtocreateerrors.
the integration of electronic healthrecords with workflow
analysis and restructuring, human computer interface guidelines, preventative measures for medicine administration errors, and potential missed diagnoses may contribute to ensuring each patient's data quality regulation andsecurity.
7 DATA
of policies and laws that ensure the patient's necessary data is correctly shared or managed with other healthcare professionals or other individuals, with the right information assets going to the right timewithconsent. DATA REGULATORY
D a t a R e g u l a t o r y
SAFETY,SECURITY,ANDENVIRONMENTALHEALTHBECOMING
Here are some of the laws, policies and recommendations that safeguard the patient's information and ensure seamless on of quality and performance ment to enhance patient care outcomes.
TheHealthInsurancePortabilityand
Its major goals are to promote healthcare industry efficiency and health insurance portability, to guarantee patients' right to privacy and health plan members, to maintain the security of health information, and to notify patients ofbreachesoftheirhealthdata.
It is a substantial and strict privacy law in the Philippines that safeguards the basic human right to privacy and communication while allowing the free flow of information in order to promote innovation and growth. In healthcare, everyone acknowledges that all personal health information is sensitive, and as global technology becomes more prevalent in the medical industry, stricter privacy and security measures for health data must be established to prevent databreachesandpatienttechnicalethicaldilemmas.
In the Philippines’ 1987 Constitution, the Filipino patient’s right to privacy and confidentialityisguaranteedunderArticle3,Section3
Under the Cybercrime law, pertinent sections that protects patient privacy are under Chapter II, SEC. 4. Cybercrime Offenses. The following acts constitute the offense of cybercrime punishable under this Act: (a) Offenses against the confidentiality, integrity and availability of computer data and systems: (1) IllegalAccess,(2)IllegalInterception,(3)DataInterference.
Under the PMA’s Code of Ethics patient privacy and confidentiality is covered byArticle2.DutiesofPhysicianstotheirPatients,inthePMACode: “Section 6. The physician should hold as sacred and highly confidential whatever may be discovered or learned pertinent to the patient even after death, except when required in the promotion of justice, safety and public health”
DATA REGULATORY
AccountabilityActof1996 DataPrivacyAct2012orRA10173 BillofRights,PhilippineConstitution1987 RepublicAct10175:CybercrimePreventionActof2012 ThePhilippineMedicalAssociation’s(PMA)CodeofEthics 8
the categorization of electronic data or information that indicates that it is sensitive for some reason and, as such, must be safeguarded against theft, disclosure, or inappropriate use, or both, and must be distributed only to authorized individuals or groups with a need to know such as their closed family.
TRUSTISONEOFTHEPILLARSOF THEHEALTHCARESYSTEM.
The patient must have trust that the medical professionals caring for themhavetheirbestinterestsatheart.
INSTANCES: When patients see a healthcare worker, they frequently provide information about themselves and their conditions which they might not share with anyone else, they must have something that they can hold onto and feel confident that their healthcare provider won't disclose that information to others.
Patients are more inclined to receive the treatment they require or heed their physician's advice if there is trust between them and the healthcare team. Following a doctor and nurses ' guidance can help patients address their problems early and reduce the loadontheinstitutionasawhole
Patientsandprovidersmustbeabletotrustthetechnology theyusetomakethemostgainsinhealthcare Itisuptoall nursing professionals and particularly nurse informaticists (NI) to establish and maintain this trust so that the benefits of a fully interoperable and learning health system can be realized(Edenet.al.,2008).
9 CONFIDENTIALITY
D a t a R e g u l a t o r y
RIGHT TO PRIVACY
individuals' right to be left alone and to be safeguarded against physical or psychological invasion or exploitation of their property. It encompasses the righttobefreefromoutsideintrusionor monitoring intoone'sprivateaffairs,the
ability to keep control over certain personal information, and the freedom to act withoutinterruptionfromothers
the categorization of electronic data or information that indicates that it is sensitive for some reason and, as such, must be safeguarded against theft, disclosure, or inappropriate use, or both, and must be distributed only to authorized individuals or groups with a need to know such as their closed family.
Privacy breaches are on the rise, particularly in the midst of the pandemic. Many COVID 19 patients expressed their fear and concern about how their confidential information was disclosed which causes them to experience discrimination from their community https://www.rappler.com/newsbreak/indepth/264851-unauthorized-disclosurecovid 19 patients identities continues npc/
TRUSTISONEOFTHEPILLARSOF
THEHEALTHCARESYSTEM.
The patient must have trust that the medical professi themhavetheirbestinterestsatheart.
INSTANCES: When patients see a healthcare worker, the provide information about themselves and their condition might not share with anyone else, they must have someth can hold onto and feel confident that their healthcare pr disclose that information to others.
Since technology has emerged and is still evolving, a great deal of innovation and advanced medical practices may intrude on the privacy of patients. As a result, the privacy must be monitored and ensured at all phases of their treatment The likelihood of patient data or information being misused is more likely to occur Moreover, all medical and healthcare practitioners are required by law to keep patients' medical records and health information secure and private. There must be consent, and the patient must be told of all healthcare teams' plans regarding his or herhealth
Patients are more inclined to receive the treatment they or heed their physician's advice if there is trust betwee and the healthcare team. Following a doctor and nurses ' guidance can help patients address their problems early and reduce loadontheinstitutionasawhole
Howdatasecurity,confidentiality,
SCANTHISQRCODEorCLICKTHELINK/PICTUREBELOW to learn more about the ethics and policies of Nursing Informatics This will direct you to the news article discussing how Data Security, Confidentiality, Regulation,andtheRighttoPrivacyareimportantinthe middleoftheCOVID 19globalhealthcrisis
Patientsandprovidersmustbeablet
ogy theyusetomakethemostgainsinhe oall nursing professionals and particular cists (NI) to establish and maintain this tru efits of a fully interoperable and learning be realized(Edenet.al.,2008).
9 D
a t a R e g u l a t o r y
10
regulation,andtherighttoprivacyare importantinthemiddleoftheCovid-19?
HIPPA-COVEREDENTITIES
Healthcare Provider Healthcare Plan Health Clearinghouse
11 Ensuretheconfidentiality,integrity,andavailabilityofalle PHI Detectandsafeguardagainstanticipatedthreatstothesecurityof theinformation Protect against anticipated impermissible uses or disclosures that arenotallowedbytherule Certifycompliancebytheirworkforce HIPPA HIPPA:HealthInsurancePortability andAccountabilityActof1996 thedefinitionofHIPAA CoveredentitiesofHIPAA Securityrules PurposeofHIPAA Objectives: Inthistopic,studentswilllearn: is a federal law that constitutes the development of national standards to prevent the disclosure of sensitive patient health informationwithoutthepatient'sconsentorknowledge HIPAA The Privacy Rule standards address the use and disclosure of individuals’ health information (known as protected health information or PHI) by entities subject to the Privacy Rule. These individualsandorganizationsarecalled“coveredentities” The Privacy Rule includes standards for individuals' rights to understandandcontrolhealthinformationuse. AIM: To protect individual's health information while permitting the exchange of data needed to provide high quality healthcare and protect the public's health and well being.
A health care provider that keeps protected health information is called a "covered entity" (PHI). In other words, the hospital is the covered entity, not the health care providers who work there The hospital is in charge of putting HIPAA compliant policies into action and making sure they are followed. HIPAASecurityRule
from
in addition to
In an increasingly digital first world where electronic
are the primary modes of
and
and
the importance of this
12 organizations
expensive security breaches, lawsuits, and fines for violations,
safeguarding patient privacy and information.
record keeping, digital data transfer,
cloud services
communication
data storage,
cannotbeoveremphasized. CIA TECHNICAL SAFEGUARDSFOR ePHI PHYSICAL SAFEGUARDSFORePHI ADMINISTRATIVE SAFEGUARDSFORePHI REMEMBERSTOHHHH!!!!! Foradditionalresources,thisvideo wouldhelpyoutofurtherunderstand theHIPAA,thedifferentcategories, penaltiesyou’llencounteronceyou violatethesaidrulesRememberthat theconfidentialityofyourclients' protectedhealthinformation(PHI) shouldbeyourtoppriority. LINK:https://www.youtube.com/watch ?v=sNry7tMXlJw HIPPA he objective of HIPAA compliance is to protect the privacy of all forms of patient information: paper, oral, and electronic Adherence with HIPAA protects HIPAAPROTECTST PRIVACYRULE "reasonable"safeguardsforall PHI
" Hi there! do you want to see amazing real-life story abo HIPAA? Check the podcast fr Am I a Bad Therapist with th one episode entitled, Everybody gets a HIPAA violation HIPPA Overview: Rachel breaks confidentiality forALLofherclientsontheveryfirstday of her internship. She mitigates the fallout with the support of her site supervisor, only to feel shamed by a professor while presenting the situation atacaseconference. CLICKTHISLINK: https://open.spotify.com/episode/7iPiG8XAbuMIm9tK5MSGJd?si=JpPoD1STR2K31DX v skg&context=spotify%3Ashow%3A5ePe22kDhPvoX4WKo6V70Y&t=1305 WELCOME TO PODCAST WELCOME TO PODCAST 13
COPYRIGHTS
CopyrightsLaw
Objectives: Inthistopic,studentswilllearn:
themeaningofcopywrite thepurposeofcopyrightlaw different terms regarding copyrightlaw
The term used to describe the creator's exclusive right to distribute, sell, publish, copy, lease, or exhibit a work in any way they see fit. In addition to being erroneously interpreted, copyright rules are also frequently challenged byourrapidlydevelopingtechnologicalcapabilities
COPYRIGHT COPYRIGHTSLAW
Took effective on January 1, 1998 under thepresidencyofFidelV.Ramos
The legal defense provided to the owneroftherightstoauniquework
According to the Philippine Intellectual Property (IP) Code, literary and creative works comprise books, scripts, music, movies, paintings, and other creations, including computer programs.
HEALTHCARE SECTOR
Significantly impacted by intellectualpropertylaws.
Trademarks and patents are crucial elements in a subject that heavily relies on research and invention, even though copyright and trade secrets may be less relevant in most situations.
Healthcare system may be responsible for copyright infringement in a lotofinstances.Theseconsistof:
illegally distributing medical journal articles to multiple colleagues without payingaper copylicenseorsubscription using software items many times without authorization when only one license was purchased, none were purchased, or the license had already expired
health and wellness videos being downloaded or used in new ways withoutpermission inappropriateuseofpatienttestimonies usingdigitalphotosandimageswithouttheowner'sconsent
14
TYPESOFINTELLECTUALPROPERTYLAW
1.Copyright-Itspurposeistosafeguardoriginalworksofart, music, literature, and other creative media. With the exception of a few therapeutic uses, this kind of artistic, intellectual property is not very frequent or significant in the healthcareindustry.
2.TradeSecret despite being more difficult to enforce, trade secrets are slightly more common than copyrights. A trade secret is a piece of secret information, such as a production procedure, a supplier list, or anything else that helps a companybystayingundercover.
3. Trademark protect the names of companies or products, slogans, and other identifying characteristics of brands. Similar to other industries, trademarks also apply to the healthcareindustry.
4. Patents - Innovation would surely considerably slow down without the patenting system. An creator of a new medical product, procedure, or technique is shielded from market competition by a government-granted exclusive right known as a medical patent. It forbids the patented invention from being created, marketed, or utilized by rivals for a set period oftime.
5. Copyright Infringement - In general, copyright infringement refers to the unlawful use of original works that are covered by copyright legislation. The following content is eligible for copyright protection in the context of healthcare marketing and advertising and could be the target of infringementclaims:
Copy for marketing and advertising on various both digitalandprintmaterials
PhotosandimagesthatisavailableintheInternet
Systemsandsoftwarefordigitalhealth
Videodiagnostics
Medicalarticlesandjournals
15
COPYRIGHTS
Clinicalcases MedicalResearch
COPYRIGHTS
Copyright exists from the moment the work is created. Those who want to reuse or replicate content that is protected by copyright in research must request permission from the copyright owner.
Sean (the researcher) can possibly use some content in research
16
EthicalBehavior
Objectives:
Inthisfourthlesson,wewillbeunderstandingthe:
Properethicalbehavior
Principlesofethicalbehavior
Wordsthatdefineethicalbehavior
How do we apply the context of ethical behavior
WhatisEthicalBehavior?
It refers to well founded moral standards that prescribe what humans should do, usually in terms of rights, obligations, societal benefits, fairness, or specific virtues.
It is characterized by honesty, fairness, and equity ininterpersonal,professional, and academic relationships in research and scholarly activities.
Ethics is essentially a set of rules that we all live by, though they are usually unwrittenrules.
Taking responsibilities sincerely for which, an individualismorallyandlegallyaccountable. Identifying and knowing the importance of decisions. The individual then considers the effect of his or her decision on others and on himorherself.
Respecttherightsofothers.
Stating honest statements when another individual wants and needs to know the truth as the basis for self determination or participationindecision making.
Promoting honest relations to other individuals to foster effective communication andestablishtrustandconfidence.
Abiding not only by personal values but also by professional standards, codes, institutional policies and procedures, and societal and legalresponsibilities.
Each profession has a Code of Ethics that guides them in how we should and should not treat eachother.
It can be difficult to define what needstobedoneattimes Thisis where ethics plays its part; an orderly method of determining whatiscorrectandincorrect.
Assessing interventions done and what will be the benefits of those actions and the possibleharmitcancause.
Evaluating the alternatives in choosing decisionsandchoosinganintervention.
Differentiating right from wrong and acting accordingly.
Policies and procedures for dealing with unethicalbehavior need to reflect an efficient and effective process that avoids obscuring or cloudingtheissues
17
ETHICAL BEHAVIOR
1. 2 3 4. 5. 6. 7 8 9. 10
Ethicsarebasictotheestablishmentofa moralobligation.Thefollowingareafew principlesandconductthatdefineethical behavior.
Ethicaldecisionsgenerateandmaintaintrust,and demonstraterespect,responsibility,equity,andcare. FundamentalPrinciples ofEthicalBehavior
WORDSUSEDINDEFININGETHICALBEHAVIOR
“Dignity”-thestateorqualityofbeingworthyofhonororrespect;asenseofpridein oneself;self respect.
“Diversity” aninstanceofbeingcomposedofdifferingelementsorqualities,variety “Equity” justiceaccordingtonaturallaworright,specifically:freedomfrombiasor favoritism.
“Fairness” fairorimpartialtreatment:lackoffavoritismtowardonesideoranother; inaccordancewithrules
“Honesty”-adherencetothefacts:sincerity:fairnessandstraightforwardnessof conduct;showingrighteousness
“Respect” toconsiderworthyofhighregard:esteem;torefrainfrominterferingwith; afeelingthatsomethingisrightorimportantandyoushouldnotattempttochangeit orharmitthatwouldnotcauseoffense
“Right/s” thatwhichismorallycorrect,just,orhonorable;beinginaccordancewith whatisjust,good,orproper;conformingtofactsortruth:correct:appropriate
"ANOTTERLIFE"
See how Otter is affected by the hurtful words thrown at him? And how Panda made him feel better by telling him how everyone should be treated with respect, especially in terms of diversity, equality, and rights of others. It is important to know that ethical behavior can inspire positive emotions, not only in ahospitalsetting,but inanyworkplace
Ethicsiswhatmotivatesustotellthetruth,keepour word,andassistthoseinneed Aframeworkofethics underpins our daily lives, assisting us in making decisions that have a positive impact and steering usawayfromunjustoutcomes.
The value of ethics is in providing a guideline for properbehaviorsothatoursocietycanfunctionand grow in the future It also helps us become the best possibleversionofourselvesinthefuture.Thisisthe primaryreasonfortheimportanceofethics
Overview: This video presents about how technology delivers better patient care for our nurses; how clinical expertsdevelopabetterproduct
Thevideoshowshow technology transforms a better workflow to our healthcare workers and how it greatly impacts the patient care and the system in the hospital Watch the full video to dwell into the great minds of how technologybenefitstowardspatientcareandsafety.
18 ETHICAL BEHAVIOR
ADDITIONALEDUCATIONAL VIDEO: https://wwwyoutubeco m/watch?v=N5Lsf7RZMTA
W A
T
C
H T H I S
ASSESSMENT 19
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ You will see 10 different pictures and you have to identify what they are about.Buthere’sthepick!Youneedtohaveaclearsightandagoodmind toguessthembecausetheycanmystifyyou.Goodluckandlet’sseewhat yougot. SEENEXTPAGE _____ 20
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 21
Make a collage of at least (3 4) pictures, and through your facial expressions, objects, or body action you will showcase about issues/understanding pertaining to the concept of the Health Insurance Portability and Accountability Act of 1996 (HIPAA). After creatingacollage,nameorgiveatitletoyourwork.
SEEAPPENDICES FORTHE CRITERIA& SAMPLE 22
____ 1. When a person is being recorded without consent. 2.PatientA'sdatawasleakedandwasdisclosed tounauthorizedviewers. 3. Mr. Ramos overheard the nurses discussing about his wife doing a husband stitch. Which was violated? 4. Nurse Robert saw bruises on Patient X's arms and face. He questioned Patient X if she was abused at home, but she refused to answer and asked Nurse Robert to leave her alone. Despite this, Nurse Robert refusedtolistenandforcedPatientXtocommunicate. Match co umn B. Writethe A.RA10173 B.DataSecurity C.DataConfidentiality D.RightstoPrivacy COLUMN B 23
A.RA10173 B.DataSecurity C.DataConfidentiality D.RightstoPrivacy HIPPA INSURANCE SECURITY FREEDOM INTEGRITY PRIVACY HEALTH GOODLUCK ISKO-NARS!! FINDTHESEWORDS EXCERCISE #4 24
A.RA10173 B.DataSecurity C.DataConfidentiality D.RightstoPrivacy SEENEXTPAGE EXCERCISE #5 Use pictures, symbols, and positioning of the words to decipher the hidden phrases! You're going to need a lot of patienceandagoodeyetosolvethesetrickyrebuspuzzles. _______ ________ _______ 25
EXCERCISE #5 Use pictures, symbols, and positioning of the words to decipher thehiddenphrases!You'regoingtoneedalotofpatienceanda goodeyetosolvethesetrickyrebuspuzzles. FIND THE MAGIC WORD! ______ _________ + s 26
BenjaminFranklin said, “hon will you be able to apply t
NEVER if you haven't done a y chooseIHAVE.Brieflyexplainyouranswers.
Never have I ever violated the data privacy of the interviewedpatient.
NeverhaveIever said that the patient's blood pressure was120/80eventhoughtheyweren'tsure.
Never have I ever said to the patient that it is bad to drinkalcoholbuttheydo.
A.RA10173 B.DataSecurity C.DataConfidentiality D.RightstoPrivacy EXCERC
27
BenjaminFranklin said, “hon will you be able to apply t
NEVER if you haven't done a y chooseIHAVE.Brieflyexplainyouranswers.
Never have I ever made a script for the patient even thoughitissaidtodoaninterview.
Never have I ever had an idea on what to do with the nursingcareplan.
Never have I ever got quiet while being questioned by theclinicalinstructorduringthereturndemonstration.
D.RightstoPrivacy
A.RA10173 B.DataSecurity C.DataConfidentiality
EXCERC
28
Now that you have a lot of learning about the topic, it’s now time to reminisce and access yourself from the KWLCHART. Note that you need to be honest while answering all the boxes, as it will serve as your diary. After that, I want you to rateyoursatisfactionusinganemojiandexplainbriefly.
EXCERCISE #7
WHATIWANTTO KNOW WHATIKNOW WHATILEARNED 29
EXCERCISE #7
AftertheKWLchart, takeapictureofyourselfbycopyingan emojithatrepresentsyoursatisfactionrateintheactivity.
30
ized Cha rent que you tor Nur d of serv dures per
and
teachyouthecommonquestionsandyouneedtofillinacomputerized charting.
Thi
, , g
interactions between the patient and healthcare professionals. We will
Let us first give you an exercise on how to do a patient's charting in a traditionalway… Client states, "I'm having a hard time catching my breath." Respirations, labored at 32/min; P, 120; BP, 112/70, Pulse ox 90% on room air. Skin color pale, skin warm and dry, lips and nail beds cyanotic. Client alert and oriented X3. Client using intercostal muscles during inhalation. Breath sounds auscul tated, crackles and wheezes over both lower lobes. Chest excursion equal bilaterally. Elevated head of bed to high Fowler's position. Obtained arterial blood gas analysis at 1045 and 02 started at 2 L/min per mask as ordered. Remained at the bedside to calm the client. Pat Haske, RN 1130ResultsofABGsreportedtoDrSteinarepH,7.34;PCO,44mmHg;PO2, 80 mm Hg. Client states "it is easier to breathe now. " R, 24/min; P, 96; BP, 110/72 Pulse ox 97% on 2 L 02, lips pale pink; capillary refill greater than 3 seconds Cracklesandwheezingarestillapparent Clientremainsinhigh Fowler'sposi-tion.PatHaske,RN EXCERCISE #8 CASESCENARIO8/6/041100 31
Objective Cues
EXCERCISE #8 ANSWERS HERE!
Subjective Cues ASSESMENT CHIEF COMPLAINTS DIAGNOSIS DEMOGRAPHIC PROFILE 32
Overview: Now that you have knowledge regarding the different Policies, Ethics and Nursing Care through the eyes of Nursing Informatics. You can now watch the documentary video and answerthePostAssessmentTask.
BACKTOBACK
VIDEO
33
Make a reflection in what ways you could adhere to the concept of Policy and Ethics towards the Technological approach in Healthcare system.Asyouhavewatchedthevideo,whatarethefactorsyoucould thinkofsomewaystomaintainethicalmannersinsomedilemmasyou mightencounterinthefuture,asaprofessionalnurse.
POST-ASSESSMENT
34
APPENDICES
c, te eof t,and ssion, plete rs.
Originality
Content
Researchshows alargeamount oforiginal thoughtand givescredits whenusing otherpeople’s ideas
Researchshows someoriginal thoughtgives creditswhen usingother people’sideas
Researchshows someoriginal thoughtgives creditswhenusing otherpeople’s ideas
Organization
Coversthetopic in depthwith details Subject knowledgeis excellent
Includes essential knowledge aboutthetopic Subject knowledge appearstobe good
Includesessential knowledgeabout thetopicbutthere arefactual errors/unrelatedto thetopic
Contentiswell organizedwitha title/Nameof thePictogram, transitionof picturesiswell presented
Contentiswell organizedwitha title/Nameof thePictogram, transitionof picturesisweak presented
Contentis organizedbut missingoneofthe instructionsneeded
TOTALSCORE:
35
G R A M
36
APPENDICES
Somewhatinformativeandorganized.(Content)
Minorgrammaticalerrors(GrammaticalUsage)
18(good)
0 14(needs improvement)
Gives some new information but the organization is poorly organized(Content)
A number of grammatical errors are visible. (Grammatical Usage)
Someoftheideashaveoriginalityandaresubmittedontime. (OriginalityandTimeManagement) 15 (satisfactory)
Some of the ideas had originality but were submitted 5 minutesafterthetime (OriginalityandTimeManagement)
Content does not address the main point of the whole topic. (Content)
All the words used do not have any connection with the content (GrammaticalUsage)
Everything is plagiarized and was submitted 30 minutes after thetime.(OriginalityandTimeManagement)
TOTALSCORE:
37
REFERENCES
Hipaa Academy | Beyond Hipaa, Hitech & MU/Ehr.|Health it | Health Insurance Portability and accountability act. (n.d.). Retrieved October 9, 2022, from https://hipaaacademy.net/hipaa-security-rule/
Lutkevich, B. (2020, August 28). What is HIPAA (Health Insurance Portability and accountability act)? SearchHealthIT. Retrieved October 9, 2022, from https://www.techtarget.com/searchhealthit/definition/HIPA A
Magnusson, A. (2022, September 26). What is HIPAA compliance? 2022 complete guide. StrongDM. Retrieved October 9, 2022, from https://www.strongdm.com/hipaa compliance
Raju, S., Aravindhan, & Pasupathy, A. (n.d.). What is HIPAA and how does it work?: Managed IT services and Cyber Security Services Company. Teceze. Retrieved October 14, 2022, from https://www.teceze.com/what-is-hipaa-andhow-does-it-work
RSI Security. (2022, October 7). What are the top 5 components of the HIPAA Privacy Rule? RSI Security. Retrieved October 14, 2022, from https://blog.rsisecurity.com/what-are-the-top-5components-of-the-hipaa-privacy-rule/
38