Protection Of Digital Health Information With Increase Essay

Protection of Digital Health Information With increase health information technology store access patient information, likelihood security breaches risen. In fact, Canadian Medical Association Journal (CMAJ): In United States, a whopping 97% increase number health records breached 2010-2011

Ensuring that patient information is protected at all times is vital for any health care institution. Patient information records contain sensitive information that can be used for malicious purposes like identity theft, credit card fraud, and leaking of information for malicious intent. The advancement and use of technology has made it easier for patient information to be accessed within the health care facility Shoniregun, Dube, & Mtenzi, 2010.

This increases the speed of service delivery to the patient and improves the care given to the patient. Technology has allowed for the use of portable electronic devices by the healthcare practitioners in entering and accessing patient records and information. Portable electronic devices are small electronic gadgets that can be carried in the pockets, and used when accessing information from any location. Portable electronic devices have multiple functions, and they can also be used for communication purposes. A smart phone is a good example of a portable electronic device, which can be used by healthcare practitioners for entering, accessing, and storing patient information. Having multiple purposes makes the devices prone to security breaches as threats increase with increased usage. The devices been small in size make them easy to get lost or stolen. Stolen devices can be used by unauthorized persons to access the data stored on the devices. The stolen device can also be used to access patient information from the healthcare servers.

Portable electronic devices have made life easier in certain ways, but they have blurred the thin line between play and work. Workers can now use the portable devices for personal uses, which make it risky especially as the devices are used for sensitive information access. Using the devices for personal usage and official use makes the device more prone to attack. Hackers can store malware on the device. The malware could...

...

This would lead to a breach of privacy, and it would be unethical. Securing the devices then becomes vital for any healthcare institution that allows for the usage of portable devices in accessing, and storing patient information.
Safeguards ensuring security of patient information

The organization does use electronic devices, but the devices are used only within the healthcare facility. The devices used include smart phones, tablets, and laptops. The healthcare practitioners have individual devices, which ensure that the devices are not shared, and each practitioner is responsible for their device. Allowing each practitioner their own device also protects their own privacy as there is no risk of their personal, or private patient information been accessed by other practitioners. Ensuring the devices are used within the facility protects against any theft or accidental loss, which could result in loss of information or data. Lost or stolen devices could be used to access sensitive patient information that is stored on the device.

There should be administrative safeguards to ensure that healthcare professionals adhere to policies and procedures Green & Bowie, 2005.

These policies and procedures address patient privacy, security, and confidentiality. Having policies will allow the healthcare facility to implement a risk assessment, which would allow the institution to identify any vulnerable areas. Portable devices could be seen as risks due to their portability nature. This would result in necessary measure been undertaken to protect the devices and the data stored on the devices. The risk assessment would also identify if there are any unauthorized access to the patient records.

There should also be physical safeguards that protect the devices and the data held in the devices. The physical safeguards include limiting access to the storage rooms for patient records and the devices. The laptops used by the practitioners should be secured safely to prevent any theft. The portable devices should be monitored to determine who has a specific device. The…

Sources Used in Documents:

References

Green, M.A., & Bowie, M.J. (2005). ESSENTIALS OF HEALTH INFORMATION Management: PRINCIPLES AND PRACTICES: Principles and Practices. Independence, KY: Thomson/Delmar Learning.

Harman, L.B., & Association, A.H.I.M. (2006). Ethical Challenges in the Management of Health Information. Burlington, MA: Jones and Bartlett Publishers.

Laurinda B. Harman, C.A.F., and Kesa Bond. (2012). Electronic Health Records: Privacy, Confidentiality, and Security. American Medical Association Journal of Ethics, 14(9), 712-719.

Shoniregun, C.A., Dube, K., & Mtenzi, F. (2010). Electronic Healthcare Information Security. New York / Heidelberg: Springer.


Cite this Document:

"Protection Of Digital Health Information With Increase" (2013, August 07) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/protection-of-digital-health-information-94139

"Protection Of Digital Health Information With Increase" 07 August 2013. Web.19 April. 2024. <
https://www.paperdue.com/essay/protection-of-digital-health-information-94139>

"Protection Of Digital Health Information With Increase", 07 August 2013, Accessed.19 April. 2024,
https://www.paperdue.com/essay/protection-of-digital-health-information-94139

Related Documents

A1. Advantages and Disadvantages of a System All health information systems (HIS) come with great advantages and some disadvantages that must be taken in account to keep patients safe. A HIS is a system that captures, retains information, and helps manage it. A HIS can be used to send health information within an organization and outside of the organization. Several items within a healthcare organization have interoperability with the HIS such

This education program must include all levels of the institution from the highest level of management, physicians, nurses, technicians and support staff. As much as possible, it should also include all outside vendors and casual hires. Although employee leaks remain the primary source for the loss of proprietary information attacks on information systems by hackers, viruses, worms and the occasional angry employee are becoming an increasingly more serious problem. The

Health-Care Data at Euclid Hospital Security and Control: A White Paper Protecting Health-Care Data The efficiency of the modern healthcare system is increasingly becoming reliant on a computerized infrastructure. Open distributed information systems have been initiated to bring professionals together on a common platform throughout the world. It needs to be understood that easy and flexible methods of processing and communication of images; sound and texts will help in visualizing and thereby

Implementation of Patient-centric health information management system 4AbstractPatient-centered care is a philosophy and a level of care that explains how to organize the well-being program around the individual to increase healthcare outcomes. The approach has become increasingly popular in many health care systems. Our company intends to utilize the process while still looking at the patients' health care costs and safety. Patient-centric software can help or hinder personalized treatment. However,

Optimizing Merged Health Information Systems Although the merger of two comparably sized companies competing in the same industry is a relatively commonplace business strategy, the process is fraught with obstacles and challenges and a significant percentage of merged entities fail outright because of these problems (Murphy, 2019). These types of problems are further compounded when there are sophisticated information systems involved that must also be merged successfully. The purpose of this

Managing Medical Records and the Implementation of Tools and Safeguards Required within HIS Introduction Few practices are more important in managing health information systems than managing medical records, safeguarding patients’ medical history, and ensuring that all end users of medical information technology are approved and trained. Some of the biggest factors in security breaches are end users themselves (Rhee, Kim & Ryu, 2009). This is why training of staff on how to