09.11.2012 Views

Pediatric Informatics: Computer Applications in Child Health (Health ...

Pediatric Informatics: Computer Applications in Child Health (Health ...

Pediatric Informatics: Computer Applications in Child Health (Health ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

22 Privacy Issues 309<br />

and receipt of the fax. Include standard fax privacy and <strong>in</strong>tended addressee notices<br />

on all fax communications, and disclose (and document) any errors <strong>in</strong> delivery.<br />

22.4.9 Shar<strong>in</strong>g Local Adolescent <strong>Health</strong> Privacy Laws<br />

with Patients and Staff<br />

Although adolescents under age 18 are legally m<strong>in</strong>ors (depend<strong>in</strong>g on the jurisdiction),<br />

there are precedents which permit them to consent to health services:<br />

Specific statutes empower m<strong>in</strong>ors to consent for pregnancy care as well as<br />

confidential contraception, STI/HIV test<strong>in</strong>g and treatment, alcohol and drug<br />

abuse treatment, and mental health counsel<strong>in</strong>g and treatment.<br />

Legally emancipated m<strong>in</strong>ors are those: (a) serv<strong>in</strong>g <strong>in</strong> the armed forces, (b) liv<strong>in</strong>g<br />

away from home and manag<strong>in</strong>g their own f<strong>in</strong>ancial affairs, or (c) who are or have<br />

been pregnant or are parents.<br />

By common law doctr<strong>in</strong>e, mature m<strong>in</strong>ors demonstrate sufficient cognitive maturity<br />

to understand the risks and benefits of proposed medical treatments and<br />

alternatives, and can thereby voluntarily and responsibly consent.<br />

Exceptions to confidentiality may <strong>in</strong>clude situations where an adolescent<br />

patient:<br />

� Is suicidal/homicidal or poses a danger to self or others<br />

� Is a victim of sexual or physical abuse<br />

22.5 Conclusion: The Place of IT <strong>in</strong> Information Assurance<br />

The protection of child and adolescent privacy and of PHI security is complex <strong>in</strong><br />

pediatric care because of the different and chang<strong>in</strong>g patterns of authorization that<br />

occur over the lifetime of the child. In assur<strong>in</strong>g these protections, the design and<br />

implementation of health IT must <strong>in</strong>corporate and enforce the basic premises of<br />

<strong>in</strong>formation assurance and HIPAA while tak<strong>in</strong>g <strong>in</strong>to account developmental and<br />

chronological differences.<br />

References<br />

1. Gost<strong>in</strong> LO. National health <strong>in</strong>formation privacy: regulations under the <strong>Health</strong> Insurance<br />

Portability and Accountability Act. JAMA. 2001;285(23):3015–3021.<br />

2. Hoffmann AD, Greydanus DE. Chapter 6: consent and confidentiality. In: Adolescent<br />

Medic<strong>in</strong>e. 3rd ed. Stamford, CT: Appleton & Lange; 1997.<br />

3. American Academy of <strong>Pediatric</strong>s Committee on Adolescence. Achiev<strong>in</strong>g quality health<br />

services for adolescents. <strong>Pediatric</strong>s. 2008;121:1263–1270.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!