Security Of Health Care Records Essay

PAGES
2
WORDS
620
Cite

" (Harman, Flite, and Bond, 2012) the key to the preservation of confidentiality is "making sure that only authorized individuals have access to that information. The process of controlling access -- limiting who can see what -- begins with authorizing users." (Harman, Flite, and Bond, 2012) Employers are held accountable under the HIPAA Privacy and Security Rules for their employee's actions. The federal agency that holds responsibility for the development of information security guidelines is the National Institute of Standards and Technology (NIST). NIST further defines information security as "the preservation of data confidentiality, integrity, availability" stated to be commonly referred to as "the CIA triad." (Harman, Flite, and Bond, 2012) III. Risk Reduction Strategies

Strategies for addressing barriers and overcoming these barriers are inclusive of keeping clear communication at all organizational levels throughout the process and acknowledging the impact of the organization's culture as well as capitalizing on all the organizational strengths and the maintenance of realistic expectations. (Kopala and Mitchell,...

...

Achieving user buy-in, providing quality adequate training that sufficiently prepares staff and fits staff needs, attending to workflow needs and patterns, having adequate and sufficient policies to guide implementation and maintenance of the system, ensuring awareness of those policies, and having a contingency plan for anticipated system downtime and other potential malfunctions are also suggested strategies." (Kopala and Mitchell, 2011)
Bibliography

Harman, LB, Flite, CA, and Bond, K. (2012) Electronic Health Records: Privacy, Confidentiality, and Security. State of the Art and Science. Virtual Mentor. Sept. 2012, Vol. 14 No. 9. Retrieved from: http://virtualmentor.ama-assn.org/2012/09/stas1-1209.html

Kopala, B. And Mitchell, ME (2011) Use of Digital health Records Raises Ethical Concerns. JONA's Healthcare Law, Ethics, and Regulation. Jul/Sep 2011. Lippincott's Nursing Center. Retrieved from: http://www.nursingcenter.com/lnc/cearticle?tid=1238212#P77 P85 P86 P87

Sources Used in Documents:

Bibliography

Harman, LB, Flite, CA, and Bond, K. (2012) Electronic Health Records: Privacy, Confidentiality, and Security. State of the Art and Science. Virtual Mentor. Sept. 2012, Vol. 14 No. 9. Retrieved from: http://virtualmentor.ama-assn.org/2012/09/stas1-1209.html

Kopala, B. And Mitchell, ME (2011) Use of Digital health Records Raises Ethical Concerns. JONA's Healthcare Law, Ethics, and Regulation. Jul/Sep 2011. Lippincott's Nursing Center. Retrieved from: http://www.nursingcenter.com/lnc/cearticle?tid=1238212#P77 P85 P86 P87


Cite this Document:

"Security Of Health Care Records" (2013, May 07) Retrieved April 27, 2024, from
https://www.paperdue.com/essay/security-of-health-care-records-99940

"Security Of Health Care Records" 07 May 2013. Web.27 April. 2024. <
https://www.paperdue.com/essay/security-of-health-care-records-99940>

"Security Of Health Care Records", 07 May 2013, Accessed.27 April. 2024,
https://www.paperdue.com/essay/security-of-health-care-records-99940

Related Documents

Healthcare Information Technology Electronic Medical Record: User friendliness is among the significant factors- probably the most essential factor- hampering extensive usage of Electronic Medical Record EMRs in respiratory therapy within my organization. User friendliness features a powerful, usually direct connection with my organization's efficiency, error level, operator exhaustion and operator satisfaction- are all essential elements for EMR usage. Moreover, within my organization, it's been observed that efficient coaching and execution techniques impact

Periodically I would want to make sure the data was audited to make sure the underlying processes and systems used for capturing it were working correctly. In conjunction with these measures of ensuring patient data is being correctly captured processes for data reliability assessment would be used (Alhaqbani, Josang, Fidge, 2009). While these two areas of capturing patient data accurately, auditing it to make sure the underlying processes are

Healthcare Costs Electronic Records Healthcare As a member of the committee charged with designing an EHR at the facility, it is important to note that the new EHR process must not interfere with the nursing staff's ability to deliver safe, cost-effective care for their patients. The system would have to offer a method of comparing a patient's data from previous, current and past events. The system would also have to be able

Security in Healthcare The recent advances in technology -- databases that store personal medical records and information -- are bringing tools to patients, doctors and other healthcare professionals that were simply not available just a few years ago. There is hope that eventually, a doctor in Hawaii that is treating a medical emergency for a tourist from Florida, will be able to access the digitally kept medical and healthcare records

CMS has actually planned a phased technique to significantly use of EHRs, with the meaning and use of EHRs advancing with 3 phases of significantly durable standards (Meaningful Use and Certified Electronic Health Record Technology Rules Unveiled, 2010). Medical records are now being changed from paper into the more quickly accessed electronic medium. Due to this brand-new technological application, government rewards and invests in programs that are assisting healthcare service

HEALTHCARE & INFORMATION TECHNOLOGY The state of healthcare in the United States is very much influenced and improved through the increased use of technology solutions. Whether it be the use of tablets, laptops, electronic healthcare records and some others, the use of technology has become more and more pervasive as the years and decades roll on. However, not everyone is sold on technology being a saving grace and those same people