Part 1 of Block 4 discussed e-health for providing clinical health care at a dis
ID: 3911890 • Letter: P
Question
Part 1 of Block 4 discussed e-health for providing clinical health care at a distant. Protecting patients' data is a crucial issue. PHI stands for Protected Health Information, it protects patients data and at the same time permits the disclosure of personal health information needed for patient care and other important purposes Search the web and answer the following questions with your own words: ID Explain the difference between data considered to be PHI and data not considered to be PHI. (4 Marks) 2) Write at least 10 examples of PHI. That is concrete examples of information that is considered PHI. (5 Marks) 3) Write at least 2 examples of data not considered to be PHI. (2 Marks) 4) Explain at least three types of threats to electronic protected health information. (6 Marks) 5) With paper records, organization had to ensure that file cabinets remained locked. But for electronic media, safeguards are needed. List three. (3 Marks) 6) List three references you have used in mHealth? (Wikipedia is not counted) (3 Marks)Explanation / Answer
Difference between PHI and non PHI:
PHI : Under US law PHI is information about Health Status, Provision of health care, the payment details for the healt care that waas collected by the entity that was covering, which was directly linked to any individual.
Non PHI : It will not be derived from Healthcare service agent. It is used in research study that will not use diagnostics. As well as it will not deal with Health information of any individuals.
2. Examples of PHI:
1. Patient Names
2. Email address
3. Account Numbers
4. Medical Record numbers
5.Biometric Identifiers
6.Name of Relatives
7.Social Security Number
8. Device Identifiers and serial numbers
9. Dates
10. Full face photographic images
3. Examples of Non PHI:
1. Number of steps in Pedometer
2. Number of calories burned
4. Types of threat to PHI
1. Unauthorized access
2. Identity theft
3. Vulnerablities increasing threat exposure.
5. Safeguards for Electronic Media
1. Access keys
2. Network Access
3. Passwords for records
6. References for mHealth
https://www.himss.org/mhealth
www.who.int/goe/publications/goe_mhealth_web.pdf
https://nhp.gov.in/miscellaneous/m-health