Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Policy and Procedure Manual, Term Paper Example
Hire a Writer for Custom Term Paper
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
Kaiser Permanente’s employment policies and practices vary based on the particular job assignment. The particular policies and practices that will be discussed pertain to their postdoctoral residents, although a majority of these practices also apply to employees in other positions. Throughout the postdoctoral training, employees will be evaluated and supervision sessions will comment upon their progress on the job. At the beginning of employment, employees will enter a training program that lasts for several weeks. Residents are expected to incorporate what was learned in training into their daily practices. All employees are expected to maintain professional conduct, and if this is not met, remedial and disciplinary actions may be taken. In extreme cases, this can result in probation or termination. Throughout their employment, it is essential that they use proper documentation when visiting with patients and keep patient information confidential. In addition, residents are provided with scenarios in which they will be asked for this information and are provided with explanations for when it can and cannot be given (Arden, 2014).
Kaiser Permanente’s employment policies and practices are consistent with the security policies and practices covered by the administration domain. The employment policies emphasize the need to protect sensitive patient data, which is also a primary concern of security policies and practices. Their privacy statement specifically notes, “Our use and disclosure of an individual’s personal information is limited as required by state and federal law. We do not sell or rent personal information about visitors to this site or customers who use the site” (Kaiser Permanente, n.d.). Although Kaiser Permanente will use patient data for statistical analysis and for treatment of patients, they will not provide this information to third parties according to HIPAA and HITECH compliance. However, they have the right to provide certain third parties with de-identified patient information to organizations such as law firms, other doctors, the government, and insurance companies. To ensure that this information remains protected, the data is password protected and only authorized individuals may access it. While this is generally effective, Kaiser Permanente is a large organization and this protection could be improved. It may be helpful to track the individuals who access this information and for how long so if there is an information leak, the company can determine who is at fault. In addition, computers with sensitive patient information should have blocked e-mail functions so users cannot easily transfer this data.
To ensure that employees are aware of security policies and measures, they implemented an online training program that “includes a corporate website dedicated to security awareness and geared to the non-technical employee, featuring advice on home computer security and how to keep kids safe online, along with information on legislation like HIPAA and company security policies” (Search Security, n.d.). This tool is effective because while it is a requirement for all employees to complete, it also serve as a reference that individuals can access when they have doubts about what should be done in certain situations.
While Kaiser reports that this security policy is effective, I believe that there are other methods that can be used to ensure these procedures are followed. I support the concept that Kaiser Permanente allows their employees to access this information at all times to serve as a guide, but I believe that they should be provided with a printout that summarizes these policies for quick reference. Furthermore, it is difficult for Kaiser Permanente to ensure that their employees read all of this information carefully, or at all, since it is posted online.
It would be beneficial for Kaiser Permanente to implement an in-person training seminar that details the privacy policy in the form of a lecture. This lecture should be repeated at least once every year so the information is fresh in the minds of the employees. Attendance should be mandatory for everyone who will have access to patient information, whether patient identifiers are included or otherwise. In addition, employees should be asked to complete a ten question quiz at the end of this workshop to verify understanding. Those with a score of 70% or greater will be considered to have passed the training course, while those with a lower score will be asked to repeat the lecture within a week after studying the policies in a provided handbook. Furthermore, managers will be responsible for reminder their employees of these policies throughout the year.
Additional ways that managers can assist to ensure that the privacy policy is carried out is to make sure that sensitive information is adequately password protected. To ensure safety through these means, it would be useful to have the password contain a combination of numbers, letters, and symbols, and be changed every few months. Furthermore computers and other technology that contains the data should be set to lock the information from access if the system does not detect use for five minutes. Doing so will prevent individuals without authorized access from obtaining this information. A second method to prevent this would be to create a unique login for each employee with programs blocked as necessary.
References
Arden JB. (2014). Policy and Procedure Manual. Retrieved from http://info.kaiserpermanente.org/info_assets/psychtraining/pdfs/PD_P&P_Manual.pdf
Kaiser Permanente. (n.d.). Privacy Practices. Retrieved from http://www.kaiserpermanentejobs.org/privacy-practices.aspx
Search Security. (n.d.). Security Awareness Employee Training Essential to Infosec Program. Retrieved from http://searchsecurity.techtarget.com/magazineContent/Security-Awareness-Employee-Training-Essential-to-Infosec-Program
Stuck with your Term Paper?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee