Does your organization use portable electronic devices

Assignment Help Other Subject
Reference no: EM13952805

Security of Health Care Records

With the increase of health information technology used to store and access patient information, the likelihood of security breaches has also risen. In fact, according to the Canadian Medical Association Journal (CMAJ):

In the United States, there was a whopping 97% increase in the number of health records breached from 2010 to 2011... The number of patient records accessed in each breach has also increased substantially, from 26,968 (in 2010) to 49,394 (in 2011). Since August 2009, when the US government regulated that any breach affecting more than 500 patients be publicly disclosed, a total of 385 breaches, involving more than 19 million records, have been reported to the Department of Health and Human Services.

A large portion of those breaches, 39%, occurred because of a lost, stolen, or otherwise compromised portable electronic device-a problem that will likely only get worse as iPads, smartphones, and other gadgets become more common in hospitals. (CMAJ, 2012, p. E215).

Consider your own experiences. Does your organization use portable electronic devices? What safeguards are in place to ensure the security of data and patient information? For this Discussion you consider ethical and security issues surrounding the protection of digital health information.

To prepare:

· Review the Learning Resources dealing with the security of digital health care information. Reflect on your own organization or one with which you are familiar, and think about how health information stored electronically is protected.

· Consider the nurse's responsibility to ensure the protection of patient information. What strategies can you use?

· Reflect on ethical issues that are likely to arise with the increased access to newer, smaller, and more powerful technology tools.

· Consider strategies that can be implemented to ensure that the use of HIT contributes to an overall culture of safety.

1. an analysis of the nurse's responsibility to protect patient information and the extent that HIT has made it easier or more difficult to protect patient privacy.

2. Comment on any security or ethical issues related to the use of portable devices to store information.

3. Assess the strategies your organization uses to safeguard patient information and how these promote a culture of safety.

4. Describe an area where improvement is needed and one strategy that could address the situation.

Course Readings

· McGonigle, D., & Mastrian, K. G. (2012). Nursing informatics and the foundation of knowledge(Laureate Education, Inc., custom ed.). Burlington, MA: Jones and Bartlett Learning.

o Chapter 5, "Ethical Applications of Informatics"

This chapter examines the ethical dilemmas that arise in nursing informatics. The authors explore the responsibilities for the ethical use of health information technology.

o Chapter 15, "Information Copyright and Fair Use and Network Security"

In this chapter, the author explains information fair use and copyright restrictions. The chapter describes processes for ensuring the security of a computer network.

· Brown, B. (2009a). Improving the privacy and security of personal health records. Journal of Health Care Compliance, 11(2), 39-40, 68.

Retrieved from the Walden Library databases.

The author of this article examines the use of the document titled "Nationwide Privacy and Security Framework for Electronic Exchange of Individually Identified Health Information." The article describes how the framework aims to construct an approach to address the privacy and security challenges that come with health information exchanges and personal health records.

· Dimitropoulos, L., Patel, V., Scheffler, S. A., & Posnack, S. (2011). Public attitudes toward health information exchange: Perceived benefits and concerns. American Journal of Managed Care, 17,SP111-SP116.

Retrieved from the Walden Library databases.

This article describes a study that sought to determine the attitude of consumers toward electronic health information exchanges (HIE), HIE privacy and security concerns, and the relationship between these concerns and the perceived benefits of HIE. The authors recommend solutions to some of the privacy challenges stimulated by HIE.

· Goodman, K. W. (2010). Ethics, information technology, and public health: New challenges for the clinician-patient relationship. Journal of Law, Medicine & Ethics, 38(1), 58-63.

Retrieved from the Walden Library databases.

This article focuses on the challenges generated by the increased level of adoption of health information technology tools. The author emphasizes the ethical issues raised by electronic public health surveillance and the secondary use of health data.

· Hoffman, S., & Podgurski, A. (2011). Meaningful use and certification of health information technology: What about safety? Journal of Law, Medicine & Ethics, 39(3), 425-436.

Retrieved from the Walden Library databases.

This article stresses the necessity of sufficient safeguards for EHR systems. The author explores current safety regulations for EHR system design and deployment. The author makes additional recommendations for protecting public health in the digital area.

· Rothstein, M. A. (2010). The Hippocratic bargain and health information technology. Journal of Law, Medicine & Ethics, 38(1), 7-13.

Retrieved from the Walden Library databases.

The increasing availability of sensitive patient information granted by electronic health records has generated significant debate about patient privacy. This article examines the potential ethical and legal consequences of patient-directed sequestering of sensitive health information.

Reference no: EM13952805

Questions Cloud

How is the use of variable costing limited : How is the use of variable costing limited? How does lean production reduce or eliminate the difference in reported operating income between absorption and variable costing?
How would you go about indicating to investors : How would you go about indicating to investors that all account balances are valid and free from potential errors? What types of financial records and information would you use to support your claims? Explain. Use and cite references used.
What is your current job or future career objective : What is your current job or future career objective? How can an understand- ing of statistics be helpful in your career? What are some job roles for statisticians in the health field?
How many cars will be served per hour : If a total of more than 4 cars are in line (including the car at the window) a car will not enter the line. It takes an average of 4 minutes(exponentially distributed) to serve a car. What is the average number of cars waiting for the drive-in win..
Does your organization use portable electronic devices : Consider your own experiences. Does your organization use portable electronic devices? What safeguards are in place to ensure the security of data and patient information? For this Discussion you consider ethical and security issues surrounding th..
Organization in the kingdom of saudi arabia : If presently not working, choose an organization in the Kingdom of Saudi Arabia and investigate its practices.
Implementation of the rmi presuppose a change : Does the successful implementation of the RMI presuppose a change in NHS' culture, and if so will this damage the organization?
Design a health information document on a topic : One of the pivotal goals of consumer health literacy efforts is to design educational materials thatattract as well as educate users. In this Assignment, you design a health information document on a topic that is of interest to you
Decision-making process and based on process : 1. Discuss in scholarly detail the management by objectives approach (MBO) and explain the three basic parts included in most MBO programs. Also discuss factors that are essential to the success of a management by objectives (MBO) program. 2. Expl..

Reviews

Write a Review

Other Subject Questions & Answers

  Analysis of strengths and weaknesses of author-s effort

C omputer for home and school use. Actually, article in Business Week in 2001 estimated which more than 80% of all high school students were "plugged in."

  Presents the greatest threat to civil society

presents the greatest threat to civil society: a corporation that commits crimes (e.g., murder, environmental crimes, or bribery, etc.), or persons who commit crimes that harm businesses

  Measure to operationalize poverty

Which one is the best measure to operationalize poverty?

  Cognitive-behavioral techniques

According to behavioral theorists, cognitive-behavioral techniques produce immediate behavioral changes.

  Question 1ausing your awareness of typography and design

question 1ausing your awareness of typography and design make a new logo manually for only one of the following-i

  Social norms-major depressive disorder

Major depressive disorder is characterized by 2 consecutive weeks of. Normative social influence would be most likely to produce conformity for which of the following individuals? Social norms are.

  Sky-oriented architecture

Sky-oriented architecture may do all of the following, except:

  Network of trade routes called the silk roads

What ways did the network of trade routes called the silk roads make life during the classical era a significantly different from life in the preclassical world? Consider all the different effects and the various cultures involved.

  Socrates and antigone and the ethics of aristotle

What is the difference between the view of ethics that we get through socrates and antigone and the ethics of aristotle

  What causes this phenomenon to occur

In a perfect world, reciprocal classes would be equally represented since they result from the same meiotic event.  It is likely that your data suggests the parental classes are NOT equal.  What causes this phenomenon to occur?

  Drafting the shorthand/broad statement

Definition of Shorthand/broad statement: A broad formulation of the issue that usually does not include reference to the specific facts of the case or the applicable law.

  Fixed-price-cost-reimbursable

Fixed-price, cost-reimbursable, and time and material contracts are all potential agreements that could be reached between organizations. Describe each type of contract, and explain the range of risk for each of these types of contracts.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd