Step back in time
To help you understand.
This is a memorandum.
1). I am Axe Health System’s Privacy Officer. I have just discovered all 4 breaches and need to determine whether to report these breaches to the attorney generals of the states in which the patients affected by the breaches resolve. – Choose Four States doesn’t matter which US States.
You already know that they need to be reported to the Office for Civil Rights.
2)Of those four states What are the medical privacy laws and imagine that Breach #1 impacted the residents of that state, For Example Florida.
Then Compare Florida against Hawaii Medical privacy laws (example)
3) Breach #2 involved the residents of another state, ( South Carolina)
Then compare Florida against South Carolina.
4) Breach #3 affected the residents of a third state, Make it California
Then Compare Florida against South Carolina and California
Breach #4 Breach #4 impacted residents of a fourth state. Hawaii.
Then compare florida, Hawaii, South Carolina and California
5) please discuss what type of action you will need to take to address each breach in the Summary of the Events under the state law that you choose.
Please cite each law and describe whether the law is more or less strict than HIPAA and why.
These are the breaches. Cite them and explain what the Medical privacy laws for ( Florida, Califonia , Hawaii, South Carolina
Axe’s local minor league baseball team, the Sharp Axes, won their league’s championship game. It was a big deal for the town and Axe’s mayor wanted to celebrate this victory in style, so he and the other members of the city council organized a parade and celebration day to honor the city’s champions. The celebration day’s parade had all of the standard fare – floats, marching bands, and of course, ticker tape. While cleaning up after the parade, Paul Steele, a member of the town’s sanitation department, noticed that he could read some of the text on the ticker tape. Curious as to what the tickertape said, he put a few pieces together, like a puzzle. Paul soon discovered that the tickertape was not made from just any old scrap paper, these were medical records! Paul was putting more pieces together when he determined that these records were from his old podiatrist, Dr. Toe. Concerned about whether his medical records were amongst the tickertape, he called Dr. Toe’s office. After speaking with Paul, Dr. Toe’s Office Manager contacted Axe Health System’s Compliance Officer. The Compliance Officer launched an investigation into how this could have happened. The Compliance Officer called the company that they had contracted with to destroy all of the paper records for the health system and it was determined that in 2012 one of their trucks overturned on a highway, sending bags of shredded papers everywhere. Some of the bags of records must have fallen off the highway and on to the road below and had been picked up by recyclers. The Compliance Officer became very angry at the trash company because they never notified the hospital that the accident involved bags of shredded medical records.
On December 31, 2013, Carl, a receptionist at Axe Urgent, was working his weekly late shift. Feeling blue about the fact that he would be spending another new year’s eve alone on the couch, Carl tried to kill some time, so he decided to check his personal email on his work computer. Carl knew that it was against Axe Urgent’s policy to check his personal email on his work computer, but no one was looking. Carl was deleting a few pieces of junk mail when he noticed an email from an unfamiliar sender, email@example.com. Intrigued, Carl opened the email and began reading it. The writer of the email introduced herself as Natasha, she explained that she was a Nigerian princess whose parents had both been killed in a plane crash in Zimbabwe and that she was set to inherit several million dollars but needed the help of a kind American man to help her secure the funds. In exchange for his help, the email told Carl that he would receive $475,000 from the princess. The email instructed Carl to click on a link that would let him chat live with the princess so that they could set up plans to meet and obtain the funds. Eager to meet the princess and to get some cash, Carl clicked on the link and waited. Nothing happened. He clicked again and again and again. Figuring that it was time to go home, Carl gave up, shut down his computer and left work. Little did Carl know that by clicking that link, he had opened up the urgent care clinic’s entire network to hacking via malware. As a result of clicking on the link, the hackers were able to access the urgent care center’s entire system. On January 20, 2014 it was discovered that the malware caused a breach of unsecured electronic protected health information (ePHI) that involved 1,212 patients. The breach could have been prevented had Axe Urgent’s IT staff updated all of the necessary patches on the system, but they had failed to do so.
BattleAxe Acres knew that Evan Novella was a “bad apple” but failed to do anything about him. Evan consistently received bad performance evaluations and negative reviews from patients, but little did BattleAxe Acres know that he was stealing patient records to sell their information on the internet to fund his prescription drug addiction. After Evan Novella was arrested on June 11, 2014, a search of Evan’s home was conducted, during which hundreds of pages of medical records belonging to 23 patients of BattleAxe Acres were discovered. According to the police, Evan was using the records to steal the identities of the patients and sell their identifying information online for cash to fuel his prescription drug addiction. It was determined by the Axe Health System that Evan had stolen paper medical records that were being thrown away and that he had printed some pages of electronic health records because all staff members, regardless of their duties, had access to the electronic health record platform at BattleAxe Acres.
Nurse Jack walking to his car after a long overnight shift at Axe Health System’s main hospital when he was accosted by two men in masks with guns. “Give me your stuff or else I will shoot you!” said one of the robbers. Jack immediately handed over his wallet, keys, and his laptop case. The robbers then went through his things and said, “hey, you work at that hospital. I know that this computer is encrypted! Give me your username and password, or else!” The robbers through Jack a post-it note pad and a pencil and he began writing when the robber said, “and don’t you dare write a fake username and password. I am going to make sure that what you are giving us is real, or else you dead punk!’ Jack gave them the information and the robbers logged on to the computer. They punched him in the face and then drove off in his car. Jack determined that the laptop contained PHI of about 30 patients.
Our Service Charter
Excellent Quality / 100% Plagiarism-FreeWe employ a number of measures to ensure top quality essays. The papers go through a system of quality control prior to delivery. We run plagiarism checks on each paper to ensure that they will be 100% plagiarism-free. So, only clean copies hit customers’ emails. We also never resell the papers completed by our writers. So, once it is checked using a plagiarism checker, the paper will be unique. Speaking of the academic writing standards, we will stick to the assignment brief given by the customer and assign the perfect writer. By saying “the perfect writer” we mean the one having an academic degree in the customer’s study field and positive feedback from other customers.
Free RevisionsWe keep the quality bar of all papers high. But in case you need some extra brilliance to the paper, here’s what to do. First of all, you can choose a top writer. It means that we will assign an expert with a degree in your subject. And secondly, you can rely on our editing services. Our editors will revise your papers, checking whether or not they comply with high standards of academic writing. In addition, editing entails adjusting content if it’s off the topic, adding more sources, refining the language style, and making sure the referencing style is followed.
Confidentiality / 100% No DisclosureWe make sure that clients’ personal data remains confidential and is not exploited for any purposes beyond those related to our services. We only ask you to provide us with the information that is required to produce the paper according to your writing needs. Please note that the payment info is protected as well. Feel free to refer to the support team for more information about our payment methods. The fact that you used our service is kept secret due to the advanced security standards. So, you can be sure that no one will find out that you got a paper from our writing service.
Money Back GuaranteeIf the writer doesn’t address all the questions on your assignment brief or the delivered paper appears to be off the topic, you can ask for a refund. Or, if it is applicable, you can opt in for free revision within 14-30 days, depending on your paper’s length. The revision or refund request should be sent within 14 days after delivery. The customer gets 100% money-back in case they haven't downloaded the paper. All approved refunds will be returned to the customer’s credit card or Bonus Balance in a form of store credit. Take a note that we will send an extra compensation if the customers goes with a store credit.
24/7 Customer SupportWe have a support team working 24/7 ready to give your issue concerning the order their immediate attention. If you have any questions about the ordering process, communication with the writer, payment options, feel free to join live chat. Be sure to get a fast response. They can also give you the exact price quote, taking into account the timing, desired academic level of the paper, and the number of pages.