Thursday, June 13, 2019
Security and Integrity of health care information systems Term Paper
Security and Integrity of health care information systems - Term Paper employmentUnfortunately, maintaining auspices and integrity of the information systems and applications is still a challenge to many hospitals and associated organizations that handle patients records, even after changeover to electronic storage and operations. In the health care industry, different stakeholders such hospitals, governments, insurance companies, pharmaceutical agencies, and the patients have dissimilar privileges to the electronic records where necessary, in order to accomplish their duties. Access to the HIS, information exchange, and disclosure of confidential entropy becomes prone to attack from multiple threats. This paper discusses change in the field of nursing, the use, security measures, and integrity of health information systems, potential threats to the HIS and EPR as identified in various researches, and their effects. It also discusses some measures to insecurity and poor integri ty of health information systems. Keywords Nursing Informatics, Healthcare Information System, Change Theory, Electronic Patient Record, Medical identicalness Theft, Threats, Vulnerabilities, HIPAA, HITECH, Information Exchange, Frauds, Security, Integrity, Privacy, Confidentiality, Authorization, Authentication, Technical And Administrative Safeguards, Information Flow, Audit Logs, Healthcare Organizations, Medical Records, Business Associates, Patients, Stakeholders 1. Introduction With the changes taking place around the globe and especially changes in technology informatics is no longer an option for nurses and other health care providers. It is a requirement (Ball, DuLong &Hannah, 2011, p. 5). The use of computerized information systems in healthcare has undoubtedly increased the efficiency of medical record keeping, but contributed to the risk of security exposure. Sensitive personal and medical information on patients that requires privacy, risks being compromised incase of security breaches on the healthcare information systems. Protecting the healthcare information systems and data is therefore an important factor in improving healthcare quality. The increasing wishing for information sharing between the healthcare stakeholders (patients, providers, and payers) and the modern digital trend in record keeping create a need for better security of information. Whenever insecurity of IS exists, unauthorized access, dissemination of information, and operations on data and systems can occur, whose effect could not only affect the patients, but the healthcare providers and physicians decisions. Medical identicalness theft is one of the major frauds in cases of IS insecurity. Although the EHR pose various benefits to the patients, such that they can routinely review their health records electronically, its a fact that many people can view the EHR simultaneously. The systems is built on a number of compatible information technology tools, whose corruption or hacking is a lead to healthcare IS breaches. Patients information can be stolen for personal gains, or falsified for wrong diagnosis among other effects. Security, privacy, confidentiality, data availability, and integrity are the ethical priorities in EHR. Medical personal identity theft and other breaches can be detected and prevented under various procedures to secure healthcare information and IS against fraud. Several laws have been enacted and continue to be utilize ways to enforce security in healthcare IS and their content. The HITECH Act and HIPAA security rules are various government legislations that assist in
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.