Top Posters
Since Sunday
6
s
4
t
4
k
4
H
3
S
3
c
3
m
3
b
3
d
3
d
3
b
3
New Topic  
goliath goliath
wrote...
Posts: 764
7 years ago
A sample fax cover sheet and a sample ethical computing statement are provided in your textbook. Explain when each of them is used. Then state one specific example for each showing how their use enhances information security.
Textbook 
Handbook of Informatics for Nurses and Health Care Professionals

Handbook of Informatics for Nurses and Health Care Professionals


Edition: 4th
Authors:
Read 138 times
3 Replies
Replies
Answer verified by a subject expert
karmakarma
wrote...
Top Poster
Posts: 764
7 years ago
Sign in or Sign up in seconds to unlock everything for free
More solutions for this book are available here
 Regarding the sample fax cover sheet and sample ethical computing statement found in your textbook: you should have explained when each of them is used; and stated one specific example for each showing how their use enhances information security. Answers should include:

The Ethical Computing Statement:
When used: The ethical computing statement is used to emphasize to employees the importance of ethical behavior. It informs staff of the consequences for unauthorized access and information misuse.
Examples (1 needed): It reminds staff that client information belongs to the client as well as what comprises professional, legal, and ethical behavior. It lets staff know what constitutes an incident and how it should be handled. Yearly review of the ethical computing statement is one way to emphasize the importance of ethical behavior. Proper disposal of PHI includes shredding onsite.
 
Fax Cover Sheet
When used: Every fax should have a cover sheet.
Examples (1 needed): A fax cover sheet eliminates the need for the recipient to read the fax transmission to determine who gets it. The cover sheet may also contain a statement to remind recipients of the presence of confidential information. Inadvertent entry of a wrong telephone number can jeopardize sensitive information. In the event that information is faxed to a wrong number, a request to return documents may limit further disclosure. Authentication is enabled by listing the intended recipient, the sender, both phone and fax numbers and the transmittal confirmation sheet that lists the fax number.
Reference: Figure 10-2 and Figure 10-.3.
This verified answer contains over 260 words.
1

Related Topics

goliath Author
wrote...
7 years ago
That makes a huge difference, thanks, and problem solved
wrote...
7 years ago
It was good practice for me too, I'll be around if you need anything more
New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers
  332 People Browsing
 219 Signed Up Today
Related Images
  
 764
  
 43
Your Opinion
What's your favorite math subject?
Votes: 187