StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

EMR and Other Sources of Sensitive Patient Information - Essay Example

Cite this document
Summary
This essay "EMR and Other Sources of Sensitive Patient Information" discusses electronic medical records that have emerged as an important computerized record of patient information which facilitates medical practitioners to retrieve crucial and pertinent information conveniently…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.9% of users find it useful
EMR and Other Sources of Sensitive Patient Information
Read Text Preview

Extract of sample "EMR and Other Sources of Sensitive Patient Information"

? What security policies and systems are in place to prevent un ized access to the EMR and other sources of sensitive patient information? Introduction An Electronic Medical Record (EMR) is a programmed medical record which is generated in the organization that provides care to the patients such as healthcare centers or hospitals (Carter, 2001). Electronic medical records incline to be a part of the system of healthcare information which facilitates storage, repossession and alteration of the records. EMR enables to augment sharing as well as accessibility of health related records among certified individuals (Skolnik, 2010). Policies in Place to Prevent Unauthorized Access to the EMR The security policies related to EMR have been considered as a major concern under the Health Information and Accessibility Act (AnestaWeb, Inc, 2011). The security policies should be provided major consideration in any organization in order to create an effective functioning environment. Various security policies in relation to EMR have been initiated under certain important measures which are needed to be considered for its development. They are as follows: 1. What the operators want to obtain from the system (i.e. functional requirements). 2. The objects that are required to be protected 3. The objectives which are needed to be acquired with the resources in hand. In the first part, the function of the security policy is to maintain equilibrium between the functional as well as the security aspects of the systems. The requirements for security can be quite difficult due to the costs incurred for the systems and also with the problems faced by the operators while implementing the security systems (Barrows & Clayton, 1996). In the second part, “Inside attacks” is another important aspect of security policy in relation to EMR (Barrows & Clayton, 1996). These attacks are mainly faced by individuals who are the actual users of the system. The actual users can manipulate or abuse the rights for searching different data for their personal motive or to harm the financial viability of the organization. If the information is leaked it can bring disastrous consequences and can affect the functioning environment of the organization. Policies such as management of access control as well as encryption method can enable to prevent such occurrences. Another important aspect for the security policy of EMR depicts threats generated from managed care corporations and insurance companies among others (Barrows & Clayton, 1996). These organizations can attempt to reveal protected patient information for their own benefits. The threats which are discussed describe about the secrecy of the patients information and also about the data available to be kept secure. If such information is leaked, it would be disastrous for the organizations’ welfare. In the third part, the security policies or standards for the data, which are needed to be safeguarded for the organization, are depicted in the threat model, which is provided by the Mayo Clinic/Foundation. These policies are as follows: a. Physical security in relation to data center sites: It deals with issues relating to prevention of theft, disaster recovery, backup of the required data and security of susceptible terminal locations among others (Barrows & Clayton, 1996). b. ‘Access control to system resources’: Issues related to controlling the physical devices as well as logical mechanism including computer programs (Barrows & Clayton, 1996). c. Data protection policies: Certain issues related to ensuring consistent protection of crucial data of organizational system is ascertained under this policy. Moreover, measures to be taken against the users who misuse the rights to use the systems properly (Barrows & Clayton, 1996). d. Security of hard copy materials: This security policy ensures to take relevant measures against security breaches of certain delicate documents, which can occur from paper copies of susceptible patient related data and electronic documents (Barrows & Clayton, 1996). e. Legal and liability issues: Issues related to the use and misuse of the system is considered which involves legal protections and liabilities for the organization to keep the records securely under the jurisdiction of the law so that the penalties cannot be charged (Barrows & Clayton, 1996). Systems in Place for protecting EMR and Other Sources of Sensitive Patient Information Systems as a security of electronic records for sensitive patients information is more safe and vivid than the records taken in paper by healthcare organizations. The accessing of the medical records can be safeguarded through passwords used by individuals who use the system. The advantages of this process are that it provides different levels of usage to the system. Through the EMR process, it is accessible to keep the data of the patients as well as backups which provide additional help in storage facilities which is required for protection against damages done through fire, water and other environmental disasters. Through the procedure of password accessing in the systems, it is possible to provide better systematic schedules for maintaining efficient records systems through which healthcare organization can be benefitted.. It provides effective functioning and it can limit malpractices to be conducted in the organization (South Shore Medical Center, 2012). Data privacy is required in the healthcare organization to safeguard the EMR or any sensitive patient information. In this process, the data of the patients is required to be used with the consents of the patients. It will significantly facilitate to protect sensitive patient information as with the clause of patient consent under the data privacy dimension unauthorized access can be prevented. The medical reports should be properly handled by the efficient doctors and nurses in the organizations who take proper care of the patients. Moreover, in relation to systems that are in place to protect unauthorized access it can be observed that ‘firewall’ system can be used to ensure network security. Similarly, multi-factor authentication can be used to ascertain the validity of the user which can enable to protect mishandling of crucial patient information. Controlled authorization is another option which can be used to provide access to actual and relevant users of patient information (Sadowski, 2012). Data confidentiality is also one of the important aspects as it has become a big challenge for the healthcare organizations to safeguard the information about the patients in particular. Data confidentiality solution is required to protect the access of data to from unwanted individuals who can harm the patients as well as affect the reputation of the organization (Information Governance The Foundation For Effective E-Health, 2010). Conclusion Electronic medical records have emerged as an important computerized record of patient information which facilitates medical practitioners to retrieve crucial and pertinent information conveniently. However, increase in terms of portability or accessibility of medical records can result in unauthorized access to any medical patient related information. In order to protect the misuse of such crucial information aspects such as data privacy, data confidentiality, identification of possible threats and certain crucial data protection policies have been enacted. References AnestaWeb, Inc. (2011). eMedical Records. Retrieved from http://www.emedicalrecords.org/ Barrows, R.C., JR. & Clayton, P.D. (1996). Privacy, Confidentiality and Electronic Medical Records. Journal of the American Medical Informatics Association 3(2), pp. 139-147. Carter, J.H. (2001). Electronic Medical Records: A Guide for Clinicians and Administrators. Australia: ACP Press. Information Governance The Foundation For Effective E-Health. (2010). Institute for Health and Public Service Value. Retrieved from http://www.accenture.com/SiteCollectionDocuments/PDF/Accenture_100473_InfoGovPoV_Final.pdf South Shore Medical Center. (2012). Electronic Medical Records (EMR) At South Shore Medical Center. Retrieved from http://www.ssmedcenter.com/about/emr.cfm Skolnik, N.S. (2010). Electronic Medical Records: A Practical Guide for Primary Care. New Mexico: Springer. Sadowski, R. (2012). Protecting Patient Information within the Cloud. Retrieved from http://www.healthcareitnews.com/blog/protecting-patient-information-within-cloud Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“What security policies and systems are in place to prevent Essay”, n.d.)
Retrieved from https://studentshare.org/nursing/1460656-what-security-policies-and-systems-are-in-place-to
(What Security Policies and Systems Are in Place to Prevent Essay)
https://studentshare.org/nursing/1460656-what-security-policies-and-systems-are-in-place-to.
“What Security Policies and Systems Are in Place to Prevent Essay”, n.d. https://studentshare.org/nursing/1460656-what-security-policies-and-systems-are-in-place-to.
  • Cited: 0 times

CHECK THESE SAMPLES OF EMR and Other Sources of Sensitive Patient Information

Electronic Medical Data Storage

part from the obvious purpose of documenting a person's medical history or care record for emergency situations, a person's medical record is also important for certain legal and financial information.... Since information in medical records has to be shared amongst the professionals forming the healthcare team, the researchers, legal or financial firms, medical records must be in a format that can easily be accessed, transferred, recorded, updated and consulted....
24 Pages (6000 words) Research Paper

Trends in Electronic Health Record

It is thus imminent that the physicians and other health care givers have access to latest technologies that would enable them cope with the overwhelming amount of information and therefore offer services based on latest information.... Hospitals are presently one of the major consumers of the Electronic Health Record (EHR) owing to the large handling of the patients' information and other related medical records.... It is obvious that medical care gets complex as days pass by besides the fact that information gets to the physicians at uncontrollable rate....
3 Pages (750 words) Coursework

How Electronic Medical Record could help to make decisions for patient

While utilizing the EMRs system, government and other public health stakeholders like epidemiologists, social workers and others can protect and promote public health through surveillance, prevention and intervention especially in cases of contagious and communicable diseases.... While utilizing the EMRs system, government and other public health stake holders like epidemiologists, social workers and others can protect and promote public health through surveillance, prevention and intervention especially in cases of contagious and communicable diseases....
11 Pages (2750 words) Article

Data Privacy, Patient Confidentiality, and Public Trust

As a result, patient information gets into unauthorized hands.... 037/ccn2012135Nurses, under law, serve as key parties in ensuring that patient information remains confidential and only authorized personnel receive access to it.... She notes the conflict that arises when family members and friends request patient information from the nurses.... The article however concludes by clearing the air and giving a list of health care providers and other parties authorized to share the patient's information....
11 Pages (2750 words) Essay

Privacy and Confidentiality in the Electronic Medical Records

This research has looked at the privacy and trust issues of the EMR that is an issue of concern amongst the patients over the disclosure of their data and information.... However, the implementation of ERM is hindered by patient concerns over their privacy and confidentiality of their information and data.... Proceedings of the 4th International Conference on information Systems Security, Hyderabad, India, 16-20, volume 5352 14 1 Introduction The use of electronic medical record-keeping has resulted in increased interest in the evaluation of the past records of the patient aimed at improving healthcare delivery....
11 Pages (2750 words) Term Paper

Electronic Medical Record (EMR) Systems

To facilitate widespread adoption and utilization of HITs, the Congress passed the Health information Technology for Economic and Clinical Health (HITECH) provisions of the American Recovery and Reinvestment Act of 2009, with an overarching aim of enhancing the efficiency, quality as well as safety of the American health care system (Silow-Carroll, Edwards, & Rodin, 2012).... Through Medicaid and Medicare EHR programs, HITECH avails financial incentives to eligible health care providers and hospitals that adopt and demonstrate meaningful use of the health information technology....
13 Pages (3250 words) Research Paper

Electronic Health Records Software Analysis

HRs are an improvement from paper-based records of patient information in terms of flexibility and leverage, as illustrated by Figures 1.... Given that the healthcare field is very complex and calls for numerous important decisions to be made, sometimes in difficult scenarios, information must be correct, dependable, and well-timed.... The information held in the EHR can be used to find and assess clinical evidence for treatment (Taylor, 2006), and this may help discover new treatment methods....
16 Pages (4000 words) Research Paper

Electronic Medical Record Systems

The key informants included the head of the quality assurance department, the chief information officer, and other staff members involved in the process.... Various evidence-based reviews aimed at improving the quality of health care provided conclude that some kinds of health information technology (HIT) systems, more so electronic medical records (EMRs) are essential in reducing medication errors, improving adherence to guideline recommendations for various illnesses, and patient satisfaction....
13 Pages (3250 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us