We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

What security policies and systems are in place to prevent unauthorized access to the EMR and other sources of sensitive patient information - Essay Example

Comments (0) Cite this document
An Electronic Medical Record (EMR) is a programmed medical record which is generated in the organization that provides care to the patients such as healthcare centers or hospitals (Carter, 2001). Electronic medical records incline to be a part of the system of healthcare information which facilitates storage, repossession and alteration of the records…
Download full paperFile format: .doc, available for editing
Polish This Essay93.8% of users find it useful
What security policies and systems are in place to prevent unauthorized access to the EMR and other sources of sensitive patient information
Read TextPreview

Extract of sample
"What security policies and systems are in place to prevent unauthorized access to the EMR and other sources of sensitive patient information"

Download file to see previous pages Electronic medical records incline to be a part of the system of healthcare information which facilitates storage, repossession and alteration of the records. EMR enables to augment sharing as well as accessibility of health related records among certified individuals (Skolnik, 2010). Policies in Place to Prevent Unauthorized Access to the EMR The security policies related to EMR have been considered as a major concern under the Health Information and Accessibility Act (AnestaWeb, Inc, 2011). The security policies should be provided major consideration in any organization in order to create an effective functioning environment. Various security policies in relation to EMR have been initiated under certain important measures which are needed to be considered for its development. They are as follows: 1. What the operators want to obtain from the system (i.e. functional requirements). 2. The objects that are required to be protected 3. The objectives which are needed to be acquired with the resources in hand. In the first part, the function of the security policy is to maintain equilibrium between the functional as well as the security aspects of the systems. The requirements for security can be quite difficult due to the costs incurred for the systems and also with the problems faced by the operators while implementing the security systems (Barrows & Clayton, 1996). In the second part, “Inside attacks” is another important aspect of security policy in relation to EMR (Barrows & Clayton, 1996). These attacks are mainly faced by individuals who are the actual users of the system. The actual users can manipulate or abuse the rights for searching different data for their personal motive or to harm the financial viability of the organization. If the information is leaked it can bring disastrous consequences and can affect the functioning environment of the organization. Policies such as management of access control as well as encryption method can enable to prevent such occurrences. Another important aspect for the security policy of EMR depicts threats generated from managed care corporations and insurance companies among others (Barrows & Clayton, 1996). These organizations can attempt to reveal protected patient information for their own benefits. The threats which are discussed describe about the secrecy of the patients information and also about the data available to be kept secure. If such information is leaked, it would be disastrous for the organizations’ welfare. In the third part, the security policies or standards for the data, which are needed to be safeguarded for the organization, are depicted in the threat model, which is provided by the Mayo Clinic/Foundation. These policies are as follows: a. Physical security in relation to data center sites: It deals with issues relating to prevention of theft, disaster recovery, backup of the required data and security of susceptible terminal locations among others (Barrows & Clayton, 1996). b. ‘Access control to system resources’: Issues related to controlling the physical devices as well as logical mechanism including computer programs (Barrows & Clayton, 1996). c. Data protection policies: Certain issues related to ensuring consistent protection of crucial data of organizational system is ascertained under this policy. Moreover, measures to be taken against the users who misuse the rights to use the systems properly (Barrows & Clayton, 1996). d. Security of hard copy materials: This security policy ensures to take relevant measures against security breaches of certain delicate documents, which can occur from paper copies of susceptible patient related data and electronic documents (Barrows & ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“What security policies and systems are in place to prevent Essay”, n.d.)
Retrieved from https://studentshare.org/nursing/1460656-what-security-policies-and-systems-are-in-place-to
(What Security Policies and Systems Are in Place to Prevent Essay)
“What Security Policies and Systems Are in Place to Prevent Essay”, n.d. https://studentshare.org/nursing/1460656-what-security-policies-and-systems-are-in-place-to.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
Electronic Medical Data Storage
A medical record is a comprehensive report that lists all the data that is created or acquired during a person’s course through a healthcare facility. It records details of any treatment plans of present or past, medical reports, tests, diseases, illnesses, medical checkups, etc. that a person has had in his life.
24 Pages(6000 words)Research Paper
Evidence informing policies regarding positioning lithotomy patient to prevent compartment syndrome
The literature review of the orthopaedic part also encloses reports of this complication in legs located as a fracture or break in the hemilithotomy position. Compartment Syndrome is a situation in which augmented pressure in a closed compartment compromise or negotiate the function and circulation of the various tissues in that space.
10 Pages(2500 words)Essay
Electronic Medical Record (EMR)
It is a 469-bed children hospital and it operates the Texas Children’s Pediatrics the biggest primary pediatric care network in the country. The hospital enjoys lead ranking in the United States in different service spheres owing to its dedicated commitment to providing excellent pediatric clinical care and research.
15 Pages(3750 words)Essay
Place/Distribution & Information Systems
In some industries, middlemen such as retailers seem on the verge of extinction. The long predicted elimination of middlemen as opposed to the substitution of one type of middleman for another may just remain to be a dream rather than a reality. In this paper, middlemen are justified to continue being in existence due to their significant roles in the channel of distribution.
3 Pages(750 words)Assignment
Information and Systems Security
It deals with stopping attacks on a network from outer entities such as hackers and from non-intentional attacks. As more and more networks are being introduced every single day, the implementation of network security has become very important. The interconnection of networks has made flow of information easier between organizations or individuals (Curtin, 1997).
3 Pages(750 words)Essay
Information systems security incident
CONOP outlines the key players, their roles and responsibilities in the event of information security incident. The CONOP is defined to control the information & financial loss, for business continuity, security policy review and security awareness program.
8 Pages(2000 words)Essay
Information Systems Security
America paid the heaviest price possible for a lack of security with the events of 9/11 as even the Pentagon was unable to avoid carnage. After the attacks however, security became a paramount concern and that included digital security.
3 Pages(750 words)Essay
Information Systems and Security
At the present time, there are better ways to communicate, transfer data, information retrieval as well as distribution, dealing and especially online business, but all these improvements in the fields of information technology also brought the challenges regarding the security.
8 Pages(2000 words)Essay
Information Security Access Control Methods
Managing user access includes the authorization of the user to a specific resource. The user goes through the procedure of registration. It is the initial process that authorizes the end users to establish the
1 Pages(250 words)Assignment
Information Systems Security Survey
IRS has an information security risk management program that is mainly constructed to balance the company’s security duties alongside other business duties. The company must continue with its operations despite the exposure to
3 Pages(750 words)Essay
Let us find you another Essay on topic What security policies and systems are in place to prevent unauthorized access to the EMR and other sources of sensitive patient information for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us