Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Curriculum and Instruction (5)
- Education (5)
- Medical Education (5)
- Public Health (5)
- Medical Specialties (2)
-
- Business (1)
- Business Administration, Management, and Operations (1)
- Computer Sciences (1)
- Critical Care (1)
- Dental Public Health and Education (1)
- Dentistry (1)
- Health Information Technology (1)
- Health Law and Policy (1)
- Health and Medical Administration (1)
- Human Resources Management (1)
- Information Security (1)
- Law (1)
- Leadership (1)
- Nursing (1)
- Palliative Care (1)
- Physical Sciences and Mathematics (1)
- Psychiatric and Mental Health Nursing (1)
- Theory and Algorithms (1)
- Institution
- Publication
- Publication Type
- File Type
Articles 1 - 9 of 9
Full-Text Articles in Medicine and Health Sciences
Dentistry And The Law: Ex-Employees Who Solicit Patients Using Stolen Information, Dan Schulte Jd
Dentistry And The Law: Ex-Employees Who Solicit Patients Using Stolen Information, Dan Schulte Jd
The Journal of the Michigan Dental Association
This month’s Dentistry and the Law column discusses actions to take with a former employee who solicits patients. In cases where former employees solicit patients using stolen patient information, dental practices can take legal action. Employment agreements and employee handbooks should include confidentiality clauses. Breach of these clauses allows for lawsuits, seeking damages for business loss. Additional claims like tortious interference, unfair competition, and misappropriation may also apply. Michigan's Uniform Trade Secrets Act can provide injunctive relief and damages if the patient information is deemed a "trade secret." Seeking legal advice from an experienced attorney is essential.
A Novel Qkd Approach To Enhance Iiot Privacy And Computational Knacks, Kranthi Kumar Singamaneni, Gaurav Dhiman, Sapna Juneja, Ghulam Muhammad, Salman A Alqahtani, John Zaki
A Novel Qkd Approach To Enhance Iiot Privacy And Computational Knacks, Kranthi Kumar Singamaneni, Gaurav Dhiman, Sapna Juneja, Ghulam Muhammad, Salman A Alqahtani, John Zaki
Journal Articles
The industry-based internet of things (IIoT) describes how IIoT devices enhance and extend their capabilities for production amenities, security, and efficacy. IIoT establishes an enterprise-to-enterprise setup that means industries have several factories and manufacturing units that are dependent on other sectors for their services and products. In this context, individual industries need to share their information with other external sectors in a shared environment which may not be secure. The capability to examine and inspect such large-scale information and perform analytical protection over the large volumes of personal and organizational information demands authentication and confidentiality so that the total data …
Conflict With Administrators: Patient Confidentiality, Terry Buford-Pendergast, Marlee Hewitt, Alyssa Kalsbeek, Cedric Mutebi, Tristayn Owen, Nikita Sathiaprakash
Conflict With Administrators: Patient Confidentiality, Terry Buford-Pendergast, Marlee Hewitt, Alyssa Kalsbeek, Cedric Mutebi, Tristayn Owen, Nikita Sathiaprakash
Patient Education Projects
No abstract provided.
Conflict With Patients: Requesting Partner's Health Information, Daniel Bota, Emilia Clementi, Jamil Jomaa, Sami Nassar, Darby Richards, Alison Rousseau
Conflict With Patients: Requesting Partner's Health Information, Daniel Bota, Emilia Clementi, Jamil Jomaa, Sami Nassar, Darby Richards, Alison Rousseau
Patient Education Projects
No abstract provided.
Conflict With Patients: Inappropriate Request From Family Member, Esther Bae, Sahar Elmenini, Myles Hardeman, Jacob Kalkman, Riley Reed, Jason Valencia
Conflict With Patients: Inappropriate Request From Family Member, Esther Bae, Sahar Elmenini, Myles Hardeman, Jacob Kalkman, Riley Reed, Jason Valencia
Patient Education Projects
No abstract provided.
Conflict With Peers: Peer Behavior, Dominic Alessio-Bilowus, Victoria Allard, Shivansh Desai, Iyanna Peppers, Zoha Qureshi, Shivang Shah
Conflict With Peers: Peer Behavior, Dominic Alessio-Bilowus, Victoria Allard, Shivansh Desai, Iyanna Peppers, Zoha Qureshi, Shivang Shah
Patient Education Projects
No abstract provided.
Conflict With Peers: Respecting Patient Information, Ian Detroyer, Emily Fisher, Raeann Hill, Alexander Jurayj, Saad Masud, Madison Wang
Conflict With Peers: Respecting Patient Information, Ian Detroyer, Emily Fisher, Raeann Hill, Alexander Jurayj, Saad Masud, Madison Wang
Patient Education Projects
No abstract provided.
Cognitive Continuum Theory: Can It Contribute To The Examination Of Confidentiality And Risk-Actuated Disclosure Decisions Of Nurses Practising In Mental Health?, Darren Conlon, Toby Raeburn, Timothy Wand
Cognitive Continuum Theory: Can It Contribute To The Examination Of Confidentiality And Risk-Actuated Disclosure Decisions Of Nurses Practising In Mental Health?, Darren Conlon, Toby Raeburn, Timothy Wand
Nursing Papers and Journal Articles
Nurses practising in mental health are faced with challenging decisions concerning confidentiality if a patient is deemed a potential risk to self or others, because releasing pertinent information pertaining to the patient may be necessary to circumvent harm. However, decisions to withhold or disclose confidential information that are inappropriately made may lead to adverse outcomes for stakeholders, including nurses and their patients. Nonetheless, there is a dearth of contemporary research literature to advise nurses in these circumstances. Cognitive Continuum Theory presents a single-system intuitive-analytical approach to examining and understanding nurse cognition, analogous to the recommended single-system approach to decision-making in …
Palliative Privacy, Lina Fernandez, Jarratt Burton Banks, Stephen Meyer
Palliative Privacy, Lina Fernandez, Jarratt Burton Banks, Stephen Meyer
South Atlantic Division GME Research Day 2022
No abstract provided.