Abstract
Due to issues such as managed care contracting, and the financial impact of indigent care, healthcare providers find themselves in competition for patients with adequate health insurance, or the ability to pay cash for services provided to try to maintain fiscal solvency. E-health applications serve not only to advertise the services of a facility, but also to help the health care provider identify potential patients for the services they offer. In this paper I will explore the ethical considerations of Consumer Relationship Management (CRM) applications and services, which are increasingly being utilized to help target potential consumers for health care providers.
When inquiring about a health condition on the internet, do internet users give up their expectations for privacy regarding their healthcare information? Although consumers may not expect the information they provide to get into the database of marketing firms, this is often exactly what happens. Consumer Relationship Management (CRM) software firms or service providers are a growing industry. The purpose of CRM software in the healthcare field, is to assist providers in identifying potential customers for a service based on information they have supplied. This information can be provided in a number of ways. In some cases, the consumer has knowingly supplied the information to the actual provider via an inquiry sent from the provider's website. In other cases the provider determines a marketing target based upon mining information in their own database by linking relationships which may help identify a potential need. Yet in another scenario, identification of a potential consumer is based on information they provided at another website, which was ...
... middle of paper ...
... an Innovative CRM Solution for Health Care Organizations. Retrieved July 29, 2007, from DM Review Web site: http://www.dmreview.com/editorial/newsletter_article.cfm?nl=dmdirect&articleId=1066948&issue=20423
CPM-Solutions. Retrieved July 29, 2007, from CRM Health Portal Web site: http://www.cpm.com/providers/solutions/emarketing.cfm
Poulsen, Kevin (2007, May 14). Attorneys General demand that MySpace give up sex offenders. Wired, Retrieved July 29, 2007, from http://blog.wired.com/27bstroke6/2007/05/attorneys_gener.html
Richards, Johnathan (2007, July 25). Sex offenders can use social sites say police. Times Online, Retrieved July 29, 2007, from http://technology.timesonline.co.uk/tol/news/tech_and_web/the_web/article2137973.ece
WebMD Privacy Policy. Retrieved July 29, 2007, from WebMD.com Web site: http://www.webmd.com/policies/about-privacy-policy#part7c
...). Privacy and Health Information Technology. Journal of Law Medicine, 37(2), 121-149. Retrieved January 28, 2011 from CINAHL database
The Adam Walsh Child Protection and Safety Act of 2006 was established because an American boy was abducted form a Florida shopping mall and was later found murdered. The act was signed into law by George W. Bush on July 27, 2006. This act is established to protect children from sexual exploitation and violent crime to prevent child abuse and child pornography to promote internet safety. This act is also known as the sex offender registration and notification act. It was established with the intention to strengthen laws related to child sexual predators. This law was instructed for each state and/or territory to apply criteria’s for posting offenders data on the internet.
Higher education law attorney Dana L. Fleming voices her controversial opinion in favor of institutionalized involvement in social network protection in her article “Youthful Indiscretions: Should Colleges Protect Social Network Users from Themselves and Others?” (Fleming). Posted in the New England Journal of Higher Education, winter of 2008 issue, Fleming poses the question of responsibility in monitoring students’ online social networking activities. With a growing population of students registering on social networks like Facebook and MySpace, she introduces the concern of safety by saying, “like lawmakers, college administrators have not yet determined how to handle the unique issues posed by the public display of their students’ indiscretions.” However, while Dana Fleming emphasizes the horror stories of social networking gone-bad, she neglects the many positive aspects of these websites and suggests school involvement in monitoring these sites when the role of monitoring should lie with parents or the adult user.
... Health Information Privacy For Consumers. Retrieved April 22, 2009, from U. S. Department of Health and Human Services: http://www.hhs.gov/ocr/privacy/hipaa/understanding/consumers/index.html
...aker, J. (2007). Public perceptions about sex offenders and community protection policies. Analyses of Social Issues and Public Policy, 7(1), 1-25.
We have all watched television shows, we have heard the warnings, and have read numerous articles that expose internet predators and pedophiles. Most of us are aware of the dangers surrounding children and teenagers as they navigate the internet’s virtual world. There is no shortage of predators online. Chris Hanson has a very popular show called To Catch a Predator that has helped bring awareness to the public of this heinous crime against children, and while this is extremely important to know and prevent, there is another large segment of society that is at risk too. This paper will focus on this “other” population.
Sex offender legislation has been encouraged and written to protect the community and the people at large against recidivism and or to help with the reintegration of those released from prison. Nevertheless, a big question has occurred as to if the tough laws created help the community especially to prevent recidivism or make the situation even worse than it already is. Sex offenders are categorized into three levels for example in the case of the state of Massachusetts; in level one the person is not considered dangerous, and chances of him repeating a sexual offense are low thus his details are not made available to the public (Robbers, 2009). In level two chances of reoccurrence are average thus public have access to this level offenders through local police departments in level three risk of reoffense is high, and a substantial public safety interest is served to protect the public from such individuals.
Salter, Anna C. (2004). Predators: pedophiles, rapists, & other sex offenders: Who they are and how they operate, and how we can protect ourselves and our children. New York, NY: Basic Books.
Health care and health care information are turning to become unity and are working together to facilitate improvement of health care quality and equity. Therefore, health providers and other relevant stakeholders must strive to put in place strong measures capable of effecting heightened privacy and security precautions. More transparency must also be ensured when medical care organizations and institutions are handling patient’s medical data.
Criminal Law. Sex Offender Notification Statute. Alabama Strengthens Restrictions on Sex Offenders. Harvard Law Review Vol. 119, No. 3 (Jan., 2006), pp. 939-946
Explain the connection between the economic model of corporate social responsibility and “free market” or “neoclassical” economic theory.
of Sex Offenders Via the Internet. The John Marshal Journal of Computer and Information Law
Despite good behavior some sex offenders may exhibit, this one standard is not merely enough to allow offenders back onto the streets and into the lives of potential vic...
In 2011 a woman Carole Markin sued Match.com for not screening its users and allowing for the opportunity for her to be raped by convicted sex offender Alan Wurtzel, a man with whom she was paired with through the website (Horcher 1). Markin was subjected to completely unnecessary trauma due to the fact the site she was using did not keep very good track of what kind of people they allowed to sign up. Ideally sites would step up and conduct these procedures without issue or complaint but even after this case was presented, Match.com continued to denounce screening its users until they were forced to settle with Markin and agree to the process. Match also agreed to cross reference members with the national sex registries, but “the agreement is not legally binding or enforceable” (Horcher 2). Match.com is only one example of websites abusing their freedom at the cost of their users safety and peace of mind. Dating fraud is prevalent in today’s society, a world that runs on Wi-Fi. Any person can effortlessly sign up somewhere online, create a new identity for themselves, and no one would be the wiser. Not until scam hits or the registered sex offender organizes a physical meeting, but by then it is too
Foxman, E. R., & Kilcoyne, P. (n.d.). Information technology, marketing practice, and consumer privacy: ethical issues. Journal of Public Policy & Marketing, 12(1), 106-119.