SlideShare una empresa de Scribd logo
1 de 11
Descargar para leer sin conexión
CONFIDENTIALITY
Effective Training for Healthcare
Employees
MHA 690 Health Care Capstone
By Jacqueline C Winston
TERMS TO KNOW
HIPAA
First comprehensive federal protection for
privacy and individually identifiable
protected health information (PHI), 1996
Terms to Know
(HITECH) Health Information Technology
for Economic and Clinical Health Act is
part of the American Recovery and
Reinvestment Act (ARRA) of 2009.
Purpose of HITECH Act
Portions of the HITECH Act are designed
to strengthen HIPAA rules that address
privacy and security matters concerning
electronic transmission of health
information (Cascardo, 2012).
Health and Human Services
Health and Human Services (HHS):
Under ARRA, a healthcare organization
must notify individuals of any security
breach and keep a log of breaches to
submit annually to HHS (Cascardo,
2012).
WARNING
If there is a breach of “unsecured PHI,” a
healthcare organization is required by
law to notify each individual whose PHI
was breached within 60 days of
discovery of breach (Cascardo, 2012).
Security Breach
Any notification of a security breach must
be sent in writing by first-class mail;
email may also be used.
Security Breach
HHS must be notified immediately if the
breach involves more than 500
individuals; media must also be notified.
Review of Policies &
Procedures
 Staff will be trained on appropriate measures
required to review patient files and maintain
confidentiality (Cascardo, 2012).
 Staff will be trained with respect to the
reporting of breaches.
 Reprimands will be imposed on any staff that
does not comply with breach notification
procedures.
Review of Policies and
Procedures
 Procedures will be discussed on how to
file a complaint under the HHS rules.
 Individuals are within their rights to file a
complaint under HHS regulations.
 All staff will be properly trained in
HIPAA compliance.
Reference
Cascardo, D. (2012). What to do before the office for civil rights
comes knocking: Part I. The Journal of Medical Practice
Management: MPM, 27(6), 337-40. Retrieved from http://search
.proquest.com/docview/1242495446?accountid=32521

Más contenido relacionado

La actualidad más candente

HIPAA Training Basics
HIPAA Training BasicsHIPAA Training Basics
HIPAA Training Basicssecky65
 
Maintaining patient privacy
Maintaining patient privacyMaintaining patient privacy
Maintaining patient privacyspoullard1
 
Confidentiality Rules
Confidentiality RulesConfidentiality Rules
Confidentiality Ruleskholman1
 
HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...
HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...
HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...Quinnipiac University
 
Introduction hippaa
Introduction hippaaIntroduction hippaa
Introduction hippaaTina Peña
 
Healthcare captstone mha690
Healthcare captstone   mha690Healthcare captstone   mha690
Healthcare captstone mha690amiddleton5
 
Healthcare captstone mha690
Healthcare captstone   mha690Healthcare captstone   mha690
Healthcare captstone mha690amiddleton5
 
Mha690 confidentiality training-week 1, discussion 2
Mha690 confidentiality training-week 1, discussion 2Mha690 confidentiality training-week 1, discussion 2
Mha690 confidentiality training-week 1, discussion 2Kristen Zimmer
 
Patient Confidentiality
Patient Confidentiality Patient Confidentiality
Patient Confidentiality Nadia Rowell
 

La actualidad más candente (16)

HIPAA Training Basics
HIPAA Training BasicsHIPAA Training Basics
HIPAA Training Basics
 
Maintaining patient privacy
Maintaining patient privacyMaintaining patient privacy
Maintaining patient privacy
 
Got Compliance? Staying within the HIPAA law
Got Compliance?Staying within the HIPAA law  Got Compliance?Staying within the HIPAA law
Got Compliance? Staying within the HIPAA law
 
Hippa presentation
Hippa presentationHippa presentation
Hippa presentation
 
HIPAA Compliance
HIPAA Compliance HIPAA Compliance
HIPAA Compliance
 
Confidentiality Rules
Confidentiality RulesConfidentiality Rules
Confidentiality Rules
 
HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...
HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...
HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...
 
Introduction hippaa
Introduction hippaaIntroduction hippaa
Introduction hippaa
 
Hm300 week 1 part 1 of 2
Hm300 week 1 part 1 of 2Hm300 week 1 part 1 of 2
Hm300 week 1 part 1 of 2
 
HIPAA TITLE II (2)
HIPAA TITLE II (2)HIPAA TITLE II (2)
HIPAA TITLE II (2)
 
Healthcare captstone mha690
Healthcare captstone   mha690Healthcare captstone   mha690
Healthcare captstone mha690
 
Healthcare captstone mha690
Healthcare captstone   mha690Healthcare captstone   mha690
Healthcare captstone mha690
 
Mha690 confidentiality training-week 1, discussion 2
Mha690 confidentiality training-week 1, discussion 2Mha690 confidentiality training-week 1, discussion 2
Mha690 confidentiality training-week 1, discussion 2
 
Patient Confidentiality
Patient Confidentiality Patient Confidentiality
Patient Confidentiality
 
HIPAA Tittle II
HIPAA Tittle IIHIPAA Tittle II
HIPAA Tittle II
 
Facts about privacy
Facts about privacyFacts about privacy
Facts about privacy
 

Similar a Confidentiality: Effective Training for Healthcare Employees

The challenges to clinical system adoption
The challenges to clinical system adoptionThe challenges to clinical system adoption
The challenges to clinical system adoptionrain2bow
 
The Health Insurance Portability And Accountability Act Essay
The Health Insurance Portability And Accountability Act EssayThe Health Insurance Portability And Accountability Act Essay
The Health Insurance Portability And Accountability Act EssayJamie Boyd
 
Which of the following parties is not among those who should .pdf
 Which of the following parties is not among those who should .pdf Which of the following parties is not among those who should .pdf
Which of the following parties is not among those who should .pdfprakashudhwani
 
Health Insurance Portability And Accountability Act (HIPAA
Health Insurance Portability And Accountability Act (HIPAAHealth Insurance Portability And Accountability Act (HIPAA
Health Insurance Portability And Accountability Act (HIPAAKatie Gulley
 
Economic Stimulus Package V4
Economic Stimulus Package V4Economic Stimulus Package V4
Economic Stimulus Package V4bakerdb
 
Mha690 presentation by rachael javidan
Mha690 presentation by rachael javidanMha690 presentation by rachael javidan
Mha690 presentation by rachael javidanRachaelJavidan
 
Hipa Health Insurance Portability And Accountability Act
Hipa Health Insurance Portability And Accountability ActHipa Health Insurance Portability And Accountability Act
Hipa Health Insurance Portability And Accountability ActAmy Williams
 
Welcome to HIPAA Training
Welcome to HIPAA TrainingWelcome to HIPAA Training
Welcome to HIPAA TrainingJonathan Montes
 
HIPAA | HITECH
HIPAA | HITECHHIPAA | HITECH
HIPAA | HITECHrcabarloc
 
Privacy and security of information Consider this scenario.docx
Privacy and security of information Consider this scenario.docxPrivacy and security of information Consider this scenario.docx
Privacy and security of information Consider this scenario.docxChantellPantoja184
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippamaggie_Platt
 
Confidentiality power point
Confidentiality power pointConfidentiality power point
Confidentiality power pointDoug Miller
 
Protecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH EraProtecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH EraRapid7
 
Week 1 discussion 2-confidentiality power point training
Week 1 discussion 2-confidentiality power point trainingWeek 1 discussion 2-confidentiality power point training
Week 1 discussion 2-confidentiality power point trainingRonRATIA
 
Patients Privacy and Confidentiality
Patients Privacy and ConfidentialityPatients Privacy and Confidentiality
Patients Privacy and ConfidentialityOluseyi Ilesanmi
 
HIPAA , REGULATORY AFFAIRS , M.PHARM ...
HIPAA , REGULATORY AFFAIRS , M.PHARM ...HIPAA , REGULATORY AFFAIRS , M.PHARM ...
HIPAA , REGULATORY AFFAIRS , M.PHARM ...susmitaghosh93
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentialityscarollo
 
Mha 690 wk1 d2 confidentiality
Mha 690 wk1 d2 confidentialityMha 690 wk1 d2 confidentiality
Mha 690 wk1 d2 confidentialitysolifen2
 
HIPAA breach report submitted to Congress by DHHS OCR
HIPAA breach report submitted to Congress by DHHS OCRHIPAA breach report submitted to Congress by DHHS OCR
HIPAA breach report submitted to Congress by DHHS OCRDavid Sweigert
 

Similar a Confidentiality: Effective Training for Healthcare Employees (20)

The challenges to clinical system adoption
The challenges to clinical system adoptionThe challenges to clinical system adoption
The challenges to clinical system adoption
 
The Health Insurance Portability And Accountability Act Essay
The Health Insurance Portability And Accountability Act EssayThe Health Insurance Portability And Accountability Act Essay
The Health Insurance Portability And Accountability Act Essay
 
Which of the following parties is not among those who should .pdf
 Which of the following parties is not among those who should .pdf Which of the following parties is not among those who should .pdf
Which of the following parties is not among those who should .pdf
 
Health Insurance Portability And Accountability Act (HIPAA
Health Insurance Portability And Accountability Act (HIPAAHealth Insurance Portability And Accountability Act (HIPAA
Health Insurance Portability And Accountability Act (HIPAA
 
Economic Stimulus Package V4
Economic Stimulus Package V4Economic Stimulus Package V4
Economic Stimulus Package V4
 
Mha690 presentation by rachael javidan
Mha690 presentation by rachael javidanMha690 presentation by rachael javidan
Mha690 presentation by rachael javidan
 
Hipa Health Insurance Portability And Accountability Act
Hipa Health Insurance Portability And Accountability ActHipa Health Insurance Portability And Accountability Act
Hipa Health Insurance Portability And Accountability Act
 
Welcome to HIPAA Training
Welcome to HIPAA TrainingWelcome to HIPAA Training
Welcome to HIPAA Training
 
Hipaa Goes Hitech
Hipaa Goes HitechHipaa Goes Hitech
Hipaa Goes Hitech
 
HIPAA | HITECH
HIPAA | HITECHHIPAA | HITECH
HIPAA | HITECH
 
Privacy and security of information Consider this scenario.docx
Privacy and security of information Consider this scenario.docxPrivacy and security of information Consider this scenario.docx
Privacy and security of information Consider this scenario.docx
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
Confidentiality power point
Confidentiality power pointConfidentiality power point
Confidentiality power point
 
Protecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH EraProtecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH Era
 
Week 1 discussion 2-confidentiality power point training
Week 1 discussion 2-confidentiality power point trainingWeek 1 discussion 2-confidentiality power point training
Week 1 discussion 2-confidentiality power point training
 
Patients Privacy and Confidentiality
Patients Privacy and ConfidentialityPatients Privacy and Confidentiality
Patients Privacy and Confidentiality
 
HIPAA , REGULATORY AFFAIRS , M.PHARM ...
HIPAA , REGULATORY AFFAIRS , M.PHARM ...HIPAA , REGULATORY AFFAIRS , M.PHARM ...
HIPAA , REGULATORY AFFAIRS , M.PHARM ...
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentiality
 
Mha 690 wk1 d2 confidentiality
Mha 690 wk1 d2 confidentialityMha 690 wk1 d2 confidentiality
Mha 690 wk1 d2 confidentiality
 
HIPAA breach report submitted to Congress by DHHS OCR
HIPAA breach report submitted to Congress by DHHS OCRHIPAA breach report submitted to Congress by DHHS OCR
HIPAA breach report submitted to Congress by DHHS OCR
 

Último

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Último (20)

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Confidentiality: Effective Training for Healthcare Employees

  • 1. CONFIDENTIALITY Effective Training for Healthcare Employees MHA 690 Health Care Capstone By Jacqueline C Winston
  • 2. TERMS TO KNOW HIPAA First comprehensive federal protection for privacy and individually identifiable protected health information (PHI), 1996
  • 3. Terms to Know (HITECH) Health Information Technology for Economic and Clinical Health Act is part of the American Recovery and Reinvestment Act (ARRA) of 2009.
  • 4. Purpose of HITECH Act Portions of the HITECH Act are designed to strengthen HIPAA rules that address privacy and security matters concerning electronic transmission of health information (Cascardo, 2012).
  • 5. Health and Human Services Health and Human Services (HHS): Under ARRA, a healthcare organization must notify individuals of any security breach and keep a log of breaches to submit annually to HHS (Cascardo, 2012).
  • 6. WARNING If there is a breach of “unsecured PHI,” a healthcare organization is required by law to notify each individual whose PHI was breached within 60 days of discovery of breach (Cascardo, 2012).
  • 7. Security Breach Any notification of a security breach must be sent in writing by first-class mail; email may also be used.
  • 8. Security Breach HHS must be notified immediately if the breach involves more than 500 individuals; media must also be notified.
  • 9. Review of Policies & Procedures  Staff will be trained on appropriate measures required to review patient files and maintain confidentiality (Cascardo, 2012).  Staff will be trained with respect to the reporting of breaches.  Reprimands will be imposed on any staff that does not comply with breach notification procedures.
  • 10. Review of Policies and Procedures  Procedures will be discussed on how to file a complaint under the HHS rules.  Individuals are within their rights to file a complaint under HHS regulations.  All staff will be properly trained in HIPAA compliance.
  • 11. Reference Cascardo, D. (2012). What to do before the office for civil rights comes knocking: Part I. The Journal of Medical Practice Management: MPM, 27(6), 337-40. Retrieved from http://search .proquest.com/docview/1242495446?accountid=32521