Does your organization use portable electronic devices

Assignment Help Other Subject
Reference no: EM131154929

Ethical and Security Issues of HIT

Recent headlines have covered a rash of security breaches at companies around the globe. Millions of customers and clients have had their information stolen by hackers or lost through careless data handling. With the push for switching medical records from paper to digital, people have expressed concerns about the safety and security of this information. How much faith can patients put into a health care provider's commitment to privacy, ethical standards, and careful protection of health care information?

The transition to digital communication presents ethical and security issues never before encountered. Despite the concerns generated by the digital paradigm shift, the key values of privacy, confidentiality, autonomy, and non-maleficence still can provide a framework for decision making in the context of health information technology. The question that health care professionals encounter when contemplating HIT is how well these ethical and security frameworks withstand the test of time as privacy and security issues grow more complex.

This week you explore the ethical and security issues that nurses need to be aware of when working with sensitive, private information. You also appraise strategies for ensuring the security of patient information.

Learning Objectives

Students will:

• Analyze the responsibility of nurses to protect patient information

• Appraise strategies for ensuring the appropriate use of technology that facilitates the security of patient information
Photo Credit: [nullplus]/[E+]/Getty Images
New section id="resources"

Learning Resources

Note: To access this week's required library resources, please click on the link to the Course Readings List, found in the Course Materials section of your Syllabus.

Required Readings

McGonigle, D., & Mastrian, K. G. (2015). Nursing informatics and the foundation of knowledge (3rd ed.). Burlington, MA: Jones and Bartlett Learning.

• Chapter 5, "Ethical Applications of Informatics" This chapter examines the ethical dilemmas that arise in nursing informatics. The authors explore the responsibilities for the ethical use of health information technology.

• Review Chapter 23 "Research: Data Collection, Processing, and Analytics" (pp. 415-416) In this section, the author explains information fair use and copyright restrictions. The section describes processes for ensuring the security of a computer network.

Brown, B. (2009a). Improving the privacy and security of personal health records. Journal of Health Care Compliance, 11(2), 39-40, 68.
Retrieved from the Walden Library databases.

The author of this article examines the use of the document titled "Nationwide Privacy and Security Framework for Electronic Exchange of Individually Identified Health Information." The article describes how the framework aims to construct an approach to address the privacy and security challenges that come with health information exchanges and personal health records.

Dimitropoulos, L., Patel, V., Scheffler, S. A., & Posnack, S. (2011). Public attitudes toward health information exchange: Perceived benefits and concerns. American Journal of Managed Care, 17, SP111-SP116.

Retrieved from the Walden Library databases.

This article describes a study that sought to determine the attitude of consumers toward electronic health information exchanges (HIE), HIE privacy and security concerns, and the relationship between these concerns and the perceived benefits of HIE. The authors recommend solutions to some of the privacy challenges stimulated by HIE.

Goodman, K. W. (2010). Ethics, information technology, and public health: New challenges for the clinician-patient relationship. Journal of Law, Medicine & Ethics, 38(1), 58-63.

Retrieved from the Walden Library databases.

In this article, the authors focus on how nurses can use health information technology to help transform health care using the recommendations included in the 2010 Institute of Medicine report "The Future of Nursing, Leading Change, Advancing Health." The author also discusses the 2011 National Strategy for Quality Improvement in Health Care.

Hoffman, S., & Podgurski, A. (2011). Meaningful use and certification of health information technology: What about safety? Journal of Law, Medicine & Ethics, 39(3), 425-436.

Retrieved from the Walden Library databases.

This article stresses the necessity of sufficient safeguards for EHR systems. The author explores current safety regulations for EHR system design and deployment. The author makes additional recommendations for protecting public health in the digital area.

Rothstein, M. A. (2010). The Hippocratic bargain and health information technology. Journal of Law, Medicine & Ethics, 38(1), 7-13.

Retrieved from the Walden Library databases.

The increasing availability of sensitive patient information granted by electronic health records has generated significant debate about patient privacy. This article examines the potential ethical and legal consequences of patient-directed sequestering of sensitive health information.

Optional Resources

Brown, B. (2009b). Privacy provisions of the American Recovery and Reinvestment Act. Journal of Health Care Compliance, 11(3), 37-38, 72-73.

Retrieved from the Walden Library databases.

New section id="discussion"

ASSIGNMENT

Security of Health Care Records

With the increase of health information technology used to store and access patient information, the likelihood of security breaches has also risen. In fact, according to the Canadian Medical Association Journal (CMAJ):

In the United States, there was a whopping 97% increase in the number of health records breached from 2010 to 2011... The number of patient records accessed in each breach has also increased substantially, from 26,968 (in 2010) to 49,394 (in 2011). Since August 2009, when the US government regulated that any breach affecting more than 500 patients be publicly disclosed, a total of 385 breaches, involving more than 19 million records, have been reported to the Department of Health and Human Services.

A large portion of those breaches, 39%, occurred because of a lost, stolen, or otherwise compromised portable electronic device-a problem that will likely only get worse as iPads, smartphones, and other gadgets become more common in hospitals. (CMAJ, 2012, p. E215).

Consider your own experiences. Does your organization use portable electronic devices? What safeguards are in place to ensure the security of data and patient information? For this Discussion you consider ethical and security issues surrounding the protection of digital health information.

To prepare:

• Review the Learning Resources dealing with the security of digital health care information. Reflect on your own organization or one with which you are familiar, and think about how health information stored electronically is protected.

• Consider the nurse's responsibility to ensure the protection of patient information. What strategies can you use?

• Reflect on ethical issues that are likely to arise with the increased access to newer, smaller, and more powerful technology tools.

• Consider strategies that can be implemented to ensure that the use of HIT contributes to an overall culture of safety.

Post the following: (APA format; 1-2 pages; references)

1. Post an analysis of the nurse's responsibility to protect patient information and the extent that HIT has made it easier or more difficult to protect patient privacy.

2. Comment on any security or ethical issues related to the use of portable devices to store information.

3. Assess the strategies your organization uses to safeguard patient information and how these promote a culture of safety.

4. Describe an area where improvement is needed and one strategy that could address the situation.

Reference no: EM131154929

Questions Cloud

Analyze a historical event outside the realm of history : Students will analyze a historical event or figure outside the realm of history for its/their implications concerning class, race, and/or gender.
By using mesh and nodal analysis find i1 and i2 : First transform all the current sources to a voltage then by using mesh and nodal analysis, find I1 and I2 for the fig.
Teaching multiplication before subtraction : Some teaching thought is to teach addition followed by multiplication then after those are mastered teach subtraction followed by division. What are your thoughts on teaching multiplication before subtraction?
What is a practical current source : What is a Practical Current source; Explain its V-I characteristics. Convert an a.c. current source of 2A in parallel with an impedance of 100? into its equivalent voltage source
Does your organization use portable electronic devices : Comment on any security or ethical issues related to the use of portable devices to store information. Assess the strategies your organization uses to safeguard patient information and how these promote a culture of safety. Describe an area where..
Describe the main purpose of the hajj in the muslim faith : Describe the main purpose of the Hajj in the Muslim faith, and identify two specific aspects of the Hajj that you find fascinating or significant.
Manipulatives could you use to teach integers : Problem: What are the different ways that you could relate integers to real life? What manipulatives could you use to teach integers?
What is an opamp : What is an OPAMP? Why is it called so? Briefly explain the following for an OPAMP (i) Input offset voltage (ii) Input bias current
How are zener diodes specified : How are Zener diodes specified? Define the important specification factors for the device

Reviews

Write a Review

Other Subject Questions & Answers

  Highly dangerous acts or nondelegable duties

A principal may be held liable for the torts of a(n) ________ only in extraordinary circumstances, usually involving highly dangerous acts or nondelegable duties.

  Prepare a sample request for inventory of documents

Prepare a Sample Request for Inventory of Documents for Best Practice/Gap Analysis for General Risk Assessment.

  Write about domestic abuse within the elderly community

The paper has to to be abstract using level 1 & 2 headings. Five scholarly review references and five internet references. I have to come up with a question to complete assignment. I want to write about domestic abuse within the elderly community

  Explain the stages of conflict resolution

Discuss the advantages and disadvantages of technology in law enforcement. Identify issues affecting communication with diverse groups.

  Analyse a famous speech

MPM732: Critical thinking Assessment. Task: Critically analyse a famous speech (chosen from the list of speeches provided on CloudDeakin) and structurally compare it with a statement by the head of a company (chosen from the list of companies prov..

  Who was the president of the confederate

Who was the president of the Confederate states during the US Civil War?

  Is anything still unclear that could be clarified

What were the most compelling topics learned in course - How did participating in discussions help your understanding of the subject matter?

  Preparing taxes in mind that your client

You are preparing taxes in mind that your client is a divorce from his wife has five children. His ex wife only need to claim four of their children to make her tax liability 0

  Discuss the value of separating duties in the organization

The value of separating duties in the organization. The value of using roles to segregate the data and system access needs of individuals in the organization

  Choose physical geography

For example, if you choose physical geography as your specific area of geography, then you will describe the physical geography of each of the six geographic regions listed above.

  Introduction to the key concepts of change management

Introduction to the key concepts of Change Management - A "desktop" review of potential barriers and safety concerns.

  Choose to pattern his epic after homer''s iliad and odyssey

Why did he choose to pattern his epic after Homer's Iliad and Odyssey? How does Virgil's context help to clarify how Augustus ushered in the era of the Pax Romana?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd