Verified Document

Policies And Procedures Reliance Healthcare Computer Policies Term Paper

Policies and Procedures Reliance Healthcare Computer Policies and Procedures

The installation of a new computer system requires many considerations from a managerial standpoint. Computer usage, particularly access to the Internet is controversial, as there is significant room for abuse by staff. The new system will help to streamline processes in the organization, but it will also provide opportunities for non-productive time. The forthcoming policies and procedures are designed to allow employees access to the technology that will make their lives better, but also limit liability and loss due to unauthorized Internet use.

Security is of utmost importance in the new system. The computer system will need to have the highest level of security possible, as it contains personal information about patients. It contains private healthcare information that is protected by the Federal Government. It also contains sensitive company information. The nature of the information makes it necessary to have the highest level of information possible. In addition, only certain staff members need to have access to certain types of patient information. The system must protect and limit access of patient and company sensitive information. For this reason, a firewall and proxy server will be used to limit access to the information. Data management software, such as Agile, will be installed to help limit access to information that must only be available to certain...

HIPAA compliance and security software such as EpiForce. A firewall such as McAfee or Norton's would also be used for general security concerns. All systems and software would be windows driven to allow for cross-platform usability.
In terms of Internet usage, employees would be able to access the Internet through the firewall. A system administrator would make certain that they could only access approved content. Employees would not be allowed to answer or send private email while during working hours, or from a company computer. This opens the system up to risk of intrusion and potentially the sharing of confidential information. Absolutely no personal surfing or usage of social networking would be tolerated from company computers. The system administrator would restrict computers from accessing websites such as Ebay, Facebook, MySpace, and Twitter. Any employee found to be attempting such access would be counseled and face disciplinary actions if they are found to do so again. The company computer will be for company business only.

Security and data management in the healthcare industry are strict due to the nature of the information. The facility will need to handle many different types of data. Some will include patient information, test results, patient treatment records, and personally sensitive information. It will include patient bank account information, financial information, social security information and other…

Sources used in this document:
Reference: CPP 001 2009

Definition: Computer access means use of the computer system as the job description dictates

Procedure:

1. Reliance Healthcare personnel will refrain from utilizing computer systems for personal purposes both during and after working hours. They will refrain from utilizing social networking and other non-work related websites using company computers. Prohibited websites include, but are not limited to, Ebay, Facebook, MySpace, Twitter and other social networking websites that are not work related.

Any infractions of this policy will be reported to their supervisor immediately.
Cite this Document:
Copy Bibliography Citation

Related Documents

Healthcare in Saudi Arabia Project
Words: 13191 Length: 40 Document Type: Research Proposal

Lack of accountability, transparency and integrity, ineffectiveness, inefficiency and unresponsiveness to human development remain problematic (UNDP). Poverty remains endemic in most Gulf States with health care and opportunities for quality education poor or unavailable, degraded habitats including urban pollution and poor soil conditions from inappropriate farming practices. Social safety nets are also entirely inadequate and all form part of the nexus of poverty that is widely prevalent in Gulf countries.

Training Program in Healthcare
Words: 4682 Length: 16 Document Type: Proposal

Training Program ProposalTraining is an essential part of customer satisfaction since better-equipped employees would give better services to the customers. The world population has become a consumer of health care, which is considered one of the major necessities for human survival and well-being. This paper aims to develop a training program proposal for the healthcare organization, including company policies, performance, and expectations. Patient confidentiality is also essential, and it would

Computer Security People, Process and Technology Are
Words: 4780 Length: 15 Document Type: Capstone Project

Computer Security People, process and technology are three things which are involved in information security. Biometrics, passwords and firewalls are some of the technical measures and these are not enough in justifying threats to information. In order to protect information from destruction and to secure systems, a blend of different procedures is required. While deploying information security some factors need to be considered for instance processes like de-registration and registration

Computer Security Information Warfare Iw
Words: 5531 Length: 20 Document Type: Research Paper

His study includes the following; The U.S. government through the executive to provide appropriate leadership to steer the country in the domain of cyber security. The state to conduct immediate risk assessment aimed at neutralizing all the vulnerabilities. The creation of an effective national security strategy as well as the creation of an elaborate national military strategy. Molander (1996) uses a qualitative research approach and methodology .The method used is constructive. The constructive

Insights on Access to Care During COVID
Words: 21382 Length: 71 Document Type: Capstone Project

How Did Mayor Bill de Blasio’s COVID Lockdowns Affect Access to Healthcare for the Minority Population in Tremont?Chapter 1IntroductionThe panic regarding the 2020 COVID-19 pandemic led to new administrative challenges regarding protecting and serving communities at the same time. Many cities across America reacted to COVID by trying to curb the virus\\\'s spread through the implementation of lockdowns. Local governments implemented strict measures that changed daily life overnight and exposed

Nursing Finance
Words: 6762 Length: 20 Document Type: Term Paper

Healthcare Practices in Nursing Today Over the last 50 years, health care systems all over the world have experienced rapid and significant changes. Some of these changes have been the result of innovative developments in medical science and technology that have greatly benefited patients, prolonging and saving the lives of millions. Some of these changes, however, have had the unfortunate result of limiting patient access to prescribed treatment and diminishing

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now