Critical Thinking Assignment 2:
The Assessment Rubric for Critical Thinking (ARC) Assessment Profile is a written demonstration of your competence to analyze, synthesize, and evaluate a legal problem and create a bridge between theory and application.
A successful ARC project will demonstrate your ability to examine, question, critique, modify, and reflect on a healthcare issue associated with healthcare compliance. This will include utilizing your critical thinking skills to intellectually explore and critically examine a problem/issue, develop a perspective on this problem/issue and provide support in favor of your perspective.
ARC Assignment Profile
The ARC is a ‘tool’ to evaluate critical thinking. The specific 6 elements and tasks of the ARC that you will be graded on include:
Communication: Define the problem in your own words.
Analysis: Compare & contrast the available solutions within the scenario.
Problem Solving: Select one of the available solutions and defend it as your chosen solution.
Evaluation: Identify the weaknesses of your chosen solution.
Synthesis: Suggest ways to improve/strengthen your chosen solution.
Reflection: Reflect on your own thought process after completing the assignment.
“What did you learn from this process?”
“What would you do differently next time to improve?”
Review the scenario described below. Then answer the questions in an APA style format utilizing your textbook, the internet and the information provided within the scenario to support your analysis. Make sure that you thoroughly respond to each goal as well as each of the questions posed within the goal to successfully complete the assignment.
Betsy worked for an insurance company. In her role, she used a laptop computer to access claims, medical records, and PHI. Betsy had attended numerous HIPAA compliance presentations throughout her career but she had also been working with her peers for many years. She trusted them to “do the right thing” with respect to privacy, security and confidentiality.
For that reason, she did not implement each of the available security tools on her laptop – finding them to be both burdensome and time-consuming. Betsy had been working with a team on a project using the large conference room on the first floor. Betsy knew that the door was scheduled to be locked by security at 6:00 PM and decided that it would be safe to leave her laptop in the conference room overnight.
Unfortunately, someone entered the conference room and stole the laptop before security arrived to lock the door. Because Betsy had not implemented the appropriate security mechanisms, the IT department could not prevent the loss of PHI, resulting in a breach.