Policies and Procedure Manual

HCAD 635 Assignment 5 Policies and Procedure Manual

Scenario:

You are a part of the corporate leadership of a long term care organization with operations in 32 states, primarily in the mid-west and deep south.

After seven years of being cared for at home for progressive Alzheimer’s disease operated by your organization, Mrs. Dowd has been admitted to a LTC home, also part of your corporate portfolio. Upon visiting his wife one day, Mr. Dowd finds her walking hand-in-hand with a male resident. Staff report Mrs. Dowd has been observed following this male resident into his room, which is immediately next to hers. Mr. Dowd becomes angry and states, “Look, it is your job to protect my wife. Get that man out of here right now. I don’t want her involved with any other man. That’s why I admitted her here.”

  • What are some of the ethical issues in this case?
  • What do you recommend?
  • Is Mrs. Dowd able to understand and appreciate her actions with the male resident?
  • Does the staff have an obligation to intervene to protect Mrs. Dowd?
  • Or at the request of Mr. Dowd?
  • If Mrs. Dowd was capable (competent), would the responsibility of the LTC home staff remain the same?

Consider the experience of retired US Supreme Court Justice Sandra Day O’Connor, described at https://www.telegraph.co.uk/news/uknews/1576716/Judge-lost-husband-to-Alzheimers-and-love.html

Does this change your mind?

Prepare a policy and procedure manual (https://notejoy.com/resources/policy-and-procedure-manual ) for corporate-wide implementation that addresses situations such as this. Include guidelines for facility staff and recommendations for communicating with family members in the procedure manual. Submit BOTH the policy manual and procedure manual documents under one title page.

Attached are the readings and instructions with my notes of trying to do it myself (Epic fail) . Do not use outside sources.

Attachments area
Answer preview

A smartphone-based payment system has more security threats than carrying a traditional wallet. Firstly, cybercriminals tamper with the mobile payment application to capture login details through the back door and send the login details to the attacker’s server. The attacks also use reverse engineering to obtain information on the payment application to crack hardcoded passwords and exploit any vulnerability such as registration of bank details. Additionally, malware infections gather information about smartphone users from social media sites and search engines, exposing them to attack.  Lastly, losing a phone makes the user extremely vulnerable to unauthorized users by bypassing PIN or fingerprint locks. Fingerprints can be accessed from surfaces and used to access the smartphone, and data installed in the phones can easily be accessed and stolen for malpractice (Akinyokun, 2017).  Conversely, there are no security breaches with traditional wallets to your money and personal information.

(693words)