POST TANIC ASSESMENT

Assignment instructions: Reflect and respond to EACH of the following questions.

  1. Regarding the Post-TANIC Self-Assessment for this week, how does your competency level compare to the Week 2 Self-Assessment?
  2. Which two competencies do you think may benefit you in your future role as an APN and why?
  3. As discussed in the lesson this week, healthcare providers must be competent in informatics in order to make ethical decisions about informatics technologies and patients’ intimate healthcare data and information. To the extent that information technology is reshaping healthcare practices or promises to improve patient care, healthcare professionals must possess certain competencies which will assist with consistency and quality. Which two competencies did you achieve in this course? Explain.

 

Use one scholarly article within 5 years.

 

This was my response from week 2, USE It to compare and contrast for week 7 progress. You can make some things up.

“Hello Class,

Informatics is used to manage health information electronically through portals like HIM, and electronic medical records. My prior competency level, compared similar to my actual self assessment. I know I struggle with some technical skills. Despite taking computer literacy to learn things like excel, outlook, and word. It is still a struggle. I do not tend to use these daily, so it is easy for me to forget. My weakness are in the areas of protecting private information, spyware and antiviruses. My computer has that now, and Im not even sure if it helped protect against ads and bugs. My strongest points come from the basics such as properly restarting a computer, which I don’t practice but know how. I can send emails, navigate to different icons, restore or discard in to the recycling bin etc.

 

Two competencies I use in my current role would be computer literacy and information literacy. In this day and age everything is going electronic, so having computer literacy I will say is a must. For example using EPIC in our facility, there is a level of computer literacy you need to navigate through. When it comes to our intranet you need both computer and information literacy. Because through there you can find policies for a certain nursing task or policies for hospital protocols

Cont.

Two resources I would use are Health Stream for information and computer literacy. I would also utilize the resource of my nursing educators. These two resource would best suit me because in person teaching always works best for me. I also have some Independence by using the computer to maneuver my way through certain  applications and features of lets say my charting system. This improvement plan can be implemented by being an advocate for myself and asking for committees and resources to become available with those that struggle.”

 


Skip To Content

Week 7: Ethics, Legal, and Legislative Aspects of Nursing Informatics

Table of Contents

Review of Ethical Principles, Theory, and Approaches

The American Nurses Association (2015) provides specific guidance for ethical decision making via its Code of Ethics for Nurses with Interpretive Statements. While the document is not specific to HIT and informatics, it still provides a valuable framework that can be used when working with HIT, particularly the APN role with the following:

  • Respect for human dignity
  • Respect for individual right to self-determinism
  • Primary commitment to the patient (defined as individual, family, group, or community)
  • Advocacy for the patient
  • Participation in the creation, maintenance, and improvement of healthcare environments
  • Advancing the profession
  • Collaboration with others to meet health needs
  • Shaping social policy

Ethical Issues with HIT and Nursing Informatics

As with any paradigm shift, a new way of viewing the world brings with it some of the enduring values of the previous worldview. As health care continues its journey into digital communications, telehealth, and wearable technologies, it brings some familiar tools and skills recognized in the form of values, such as privacy, confidentiality, autonomy, and nonmaleficence. Although these basic values remain unchanged, the standards for living out these values will take on new meaning as health professionals confront new and different moral dilemmas brought on by the adoption of technological tools for information management, knowledge development, and evidence-based changes in patient care. Ethical decision-making frameworks will remain constant, but the context for examining these moral issues or ethical dilemmas will become increasingly complex.

Much of the healthcare literature addresses the potential of HIT, the need to prepare the 2020 workforce capable of working in a highly technological environment, and benefits accrued to date. Much less is written on the totality of ethical issues. A partial list of issues having an ethical component includes the following:

Image Description

According to Healthit.gov (2014) Protecting Your Health Information, the privacy and security of patient health information is a top priority for patients and their families, health care providers and professionals, and the government. This was also previously discussed under HIPAA. It also requires that “key persons and organizations that handle health information to have policies and security safeguards in place to protect your health information whether it is stored on paper or electronically.” (Healthit.gov, 2014, p. 1)

Each of these three items became ethical issues because they may result in patient harm, whether that might be to reputation or physical safety. Noting discrepancies in record information without corrective action is irresponsible. Nurses need to demonstrate accountability for data integrity or risk that it may be compromised (Procter, Hayward, Heyes, Owen, & 2013). Failure to adopt technology or not using it well or as designed can also jeopardize patient safety. Failure to adopt technology for example might be an APN who continues to use written notes when automated documentation is the expectation. This deviation might be quicker and easier initially for the individual provider, but it creates a fragmented patient record, increasing the likelihood that important information will be lost, and because it is unstructured data, it is invisible for data analysis.

Proctor et al. (2013) noted that, as the largest group of caregivers, nurses at all levels have an obligation to interpret data held by their organizations to plan, deliver, and evaluate services to support patient-centered care and to actively participate in setting the technology agenda, including how patient information is collected, stored, and used. APNs have an integral role not only to the proper collection of Meaningful Use criteria, but also in defining further criteria, which will collect information that will better determine and support population-health needs and services. Perhaps the biggest ethical challenge comes when nurses fail to embrace their roles in shaping health policy and social change. Nurses need to be aware of the facts related to features of HIT legislation, particularly the Patient Protection and Affordable Care Act (ACA). ACA was intended to improve care and reduce disparities and help reform healthcare. Lachman (2012) noted distributive justice as the major ethical principal underlying health-reform initiatives.

Emerging technology will introduce new issues and dilemmas. In addition to the use of EHRs, there is a growing use of social media to market provider services and provide support. Many organizations struggle with questions surrounding proper use of social media. Genomics, or personalized medicine targeted to one’s specific genetic make-up, is an area within our grasp but still not widely known. And, technological advancements and miniaturization are quickly making nanotechnology an area that we will need to address. Nanotechnology is science, engineering, and technology that is conducted at the level of the nanoscale (nano.gov, n.d.). For reference purposes, a nanometer is equal to one billionth of a meter.

According to Healthit.gov (2018) Protecting Your Health Information, the privacy and security of PHI is a top priority for patients and their families, health care providers and professionals, and the government. This was also previously discussed under HIPAA. It also requires that key persons and organizations that handle health information to have policies and security safeguards in place to protect your health information whether it is stored on paper or electronically. (Healthit.gov, 2018, p. 1)

Confidentiality in the Modern Era

 

The rapid growth of social media has found many healthcare professionals unprepared to face the new challenges or to exploit the opportunities that exist with these forums. The need to maintain confidentiality presents a major obstacle to the healthcare industry’s widespread adoption of such technology; thus, social networking has not yet been fully embraced by many health professionals. Adding to the complexity of maintaining confidentiality is the increased use of mobile devices by health professionals as well as the public. Smartphones have the capability to take still pictures as well as live recordings; they have found their way into treatment rooms around the globe. Consequently, stringent confidentiality laws and more widespread availability and use of social and mobile media, numerous ethical and legal dilemmas have been posed to all healthcare workers. What are not well defined are the expectations of healthcare providers regarding this technology. In some cases, APNs have been subjected to video and audio recordings by patients and families when procedure is performed. Providers must be aware of the institutional policy regarding audio/video recording by patients and families, as well as the state laws governing two-party consent. Such laws require consent of all parties to any recording or eavesdropping activity (Lyons & Reinisch, 2013, p. 54).

Sometimes the enthusiasm for patient care and learning can lead to ethics violations. In one case, an inadvertent violation of privacy laws occurred when a nurse in a small town blogged about a child in her care whom she referred to as her “little handicapper.” The post also noted the child’s age and the fact that the child used a wheelchair. A complaint about this breach of confidentiality was reported to the Board of Nursing. A warning was issued to the nurse blogging this information, although a more stringent disciplinary action could have been taken (Spector & Kappel, 2012, p. 2).

Legislation

Review the HIPAA, ARRA, and ACA legislations by clicking on each tab below.

Health Information Portability and Accountability Act (HIPAA)

HIPAA was enacted in 1996. While it is best known among consumers and healthcare professionals for its protection of personal health information (PHI) and the additional forms that each of us are asked to sign when we go to provider offices, HIPAA also ensures portability of insurance for individuals moving from one job to another, legal protection for PHI, and mandates standards for the electronic data interchange of healthcare data for encounter and claims information, and was intended to simplify the claims submission process by eliminating paper claims. HIPAA established legal sanctions for institutions and individuals who fail to protect PHI. As healthcare professionals, we are cognizant of HIPAA requirements before we share PHI via writing, electronic means, faxes, telephone, or in person. Specific measures to protect PHI include limiting record access to individuals with a right to know, signed disclosures to release information, encryption of e-mail and files, fax cover sheets, designated persons who may receive PHI, and the use of passwords to guarantee that PHI is only disclosed with persons designated by the consumer as having a right to know. HIPAA has also changed sign-in procedures for patients, disposal of forms containing PHI, and how we use whiteboards to show patient information.

Protection of PHI is the underlying reason that employees are asked to sign a statement that acknowledges that they will access electronic records solely on a need to know basis before receiving system access and that inappropriate access can result in termination of employment. An information-system safeguard to ensure that only legitimate access occurred is the electronic audit. Audit reports show all users who access an individual record and specific content viewed, making it possible to quickly establish if the record of a former spouse, another employee, or a celebrity is viewed without legitimate cause.

 

What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but splendidwritings.com proved they are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 14***| Rating: ⭐⭐⭐⭐⭐
"The company has some nice prices and good content. I ordered a term paper here and got a very good one. I'll keep ordering from this website."

"Order a Custom Paper on Similar Assignment! No Plagiarism! Enjoy 20% Discount"