Open Access. Powered by Scholars. Published by Universities.®

Medicine and Health Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Medicine and Health Sciences

Dentistry And The Law: Ex-Employees Who Solicit Patients Using Stolen Information, Dan Schulte Jd Nov 2022

Dentistry And The Law: Ex-Employees Who Solicit Patients Using Stolen Information, Dan Schulte Jd

The Journal of the Michigan Dental Association

This month’s Dentistry and the Law column discusses actions to take with a former employee who solicits patients. In cases where former employees solicit patients using stolen patient information, dental practices can take legal action. Employment agreements and employee handbooks should include confidentiality clauses. Breach of these clauses allows for lawsuits, seeking damages for business loss. Additional claims like tortious interference, unfair competition, and misappropriation may also apply. Michigan's Uniform Trade Secrets Act can provide injunctive relief and damages if the patient information is deemed a "trade secret." Seeking legal advice from an experienced attorney is essential.


A Novel Qkd Approach To Enhance Iiot Privacy And Computational Knacks, Kranthi Kumar Singamaneni, Gaurav Dhiman, Sapna Juneja, Ghulam Muhammad, Salman A Alqahtani, John Zaki Sep 2022

A Novel Qkd Approach To Enhance Iiot Privacy And Computational Knacks, Kranthi Kumar Singamaneni, Gaurav Dhiman, Sapna Juneja, Ghulam Muhammad, Salman A Alqahtani, John Zaki

Journal Articles

The industry-based internet of things (IIoT) describes how IIoT devices enhance and extend their capabilities for production amenities, security, and efficacy. IIoT establishes an enterprise-to-enterprise setup that means industries have several factories and manufacturing units that are dependent on other sectors for their services and products. In this context, individual industries need to share their information with other external sectors in a shared environment which may not be secure. The capability to examine and inspect such large-scale information and perform analytical protection over the large volumes of personal and organizational information demands authentication and confidentiality so that the total data …


Conflict With Administrators: Patient Confidentiality, Terry Buford-Pendergast, Marlee Hewitt, Alyssa Kalsbeek, Cedric Mutebi, Tristayn Owen, Nikita Sathiaprakash Mar 2022

Conflict With Administrators: Patient Confidentiality, Terry Buford-Pendergast, Marlee Hewitt, Alyssa Kalsbeek, Cedric Mutebi, Tristayn Owen, Nikita Sathiaprakash

Patient Education Projects

No abstract provided.


Conflict With Patients: Requesting Partner's Health Information, Daniel Bota, Emilia Clementi, Jamil Jomaa, Sami Nassar, Darby Richards, Alison Rousseau Mar 2022

Conflict With Patients: Requesting Partner's Health Information, Daniel Bota, Emilia Clementi, Jamil Jomaa, Sami Nassar, Darby Richards, Alison Rousseau

Patient Education Projects

No abstract provided.


Conflict With Patients: Inappropriate Request From Family Member, Esther Bae, Sahar Elmenini, Myles Hardeman, Jacob Kalkman, Riley Reed, Jason Valencia Mar 2022

Conflict With Patients: Inappropriate Request From Family Member, Esther Bae, Sahar Elmenini, Myles Hardeman, Jacob Kalkman, Riley Reed, Jason Valencia

Patient Education Projects

No abstract provided.


Conflict With Peers: Peer Behavior, Dominic Alessio-Bilowus, Victoria Allard, Shivansh Desai, Iyanna Peppers, Zoha Qureshi, Shivang Shah Mar 2022

Conflict With Peers: Peer Behavior, Dominic Alessio-Bilowus, Victoria Allard, Shivansh Desai, Iyanna Peppers, Zoha Qureshi, Shivang Shah

Patient Education Projects

No abstract provided.


Conflict With Peers: Respecting Patient Information, Ian Detroyer, Emily Fisher, Raeann Hill, Alexander Jurayj, Saad Masud, Madison Wang Mar 2022

Conflict With Peers: Respecting Patient Information, Ian Detroyer, Emily Fisher, Raeann Hill, Alexander Jurayj, Saad Masud, Madison Wang

Patient Education Projects

No abstract provided.


Cognitive Continuum Theory: Can It Contribute To The Examination Of Confidentiality And Risk-Actuated Disclosure Decisions Of Nurses Practising In Mental Health?, Darren Conlon, Toby Raeburn, Timothy Wand Jan 2022

Cognitive Continuum Theory: Can It Contribute To The Examination Of Confidentiality And Risk-Actuated Disclosure Decisions Of Nurses Practising In Mental Health?, Darren Conlon, Toby Raeburn, Timothy Wand

Nursing Papers and Journal Articles

Nurses practising in mental health are faced with challenging decisions concerning confidentiality if a patient is deemed a potential risk to self or others, because releasing pertinent information pertaining to the patient may be necessary to circumvent harm. However, decisions to withhold or disclose confidential information that are inappropriately made may lead to adverse outcomes for stakeholders, including nurses and their patients. Nonetheless, there is a dearth of contemporary research literature to advise nurses in these circumstances. Cognitive Continuum Theory presents a single-system intuitive-analytical approach to examining and understanding nurse cognition, analogous to the recommended single-system approach to decision-making in …


Palliative Privacy, Lina Fernandez, Jarratt Burton Banks, Stephen Meyer Jan 2022

Palliative Privacy, Lina Fernandez, Jarratt Burton Banks, Stephen Meyer

South Atlantic Division GME Research Day 2022

No abstract provided.