Protection of Digital Health Information With Increase Essay

Total Length: 1333 words ( 4 double-spaced pages)

Total Sources: 5

Page 1 of 4

Protection of Digital Health Information

With increase health information technology store access patient information, likelihood security breaches risen. In fact, Canadian Medical Association Journal (CMAJ): In United States, a whopping 97% increase number health records breached 2010-2011

Ensuring that patient information is protected at all times is vital for any health care institution. Patient information records contain sensitive information that can be used for malicious purposes like identity theft, credit card fraud, and leaking of information for malicious intent. The advancement and use of technology has made it easier for patient information to be accessed within the health care facility Shoniregun, Dube, & Mtenzi, 2010.

This increases the speed of service delivery to the patient and improves the care given to the patient. Technology has allowed for the use of portable electronic devices by the healthcare practitioners in entering and accessing patient records and information. Portable electronic devices are small electronic gadgets that can be carried in the pockets, and used when accessing information from any location. Portable electronic devices have multiple functions, and they can also be used for communication purposes. A smart phone is a good example of a portable electronic device, which can be used by healthcare practitioners for entering, accessing, and storing patient information. Having multiple purposes makes the devices prone to security breaches as threats increase with increased usage. The devices been small in size make them easy to get lost or stolen. Stolen devices can be used by unauthorized persons to access the data stored on the devices. The stolen device can also be used to access patient information from the healthcare servers.

Portable electronic devices have made life easier in certain ways, but they have blurred the thin line between play and work. Workers can now use the portable devices for personal uses, which make it risky especially as the devices are used for sensitive information access. Using the devices for personal usage and official use makes the device more prone to attack. Hackers can store malware on the device.
The malware could be used to access patient records and information when the practitioner accesses the sensitive patient information. This would lead to a breach of privacy, and it would be unethical. Securing the devices then becomes vital for any healthcare institution that allows for the usage of portable devices in accessing, and storing patient information.

Safeguards ensuring security of patient information

The organization does use electronic devices, but the devices are used only within the healthcare facility. The devices used include smart phones, tablets, and laptops. The healthcare practitioners have individual devices, which ensure that the devices are not shared, and each practitioner is responsible for their device. Allowing each practitioner their own device also protects their own privacy as there is no risk of their personal, or private patient information been accessed by other practitioners. Ensuring the devices are used within the facility protects against any theft or accidental loss, which could result in loss of information or data. Lost or stolen devices could be used to access sensitive patient information that is stored on the device.

There should be administrative safeguards to ensure that healthcare professionals adhere to policies and procedures Green & Bowie, 2005.

These policies and procedures address patient privacy, security, and confidentiality. Having policies will allow the healthcare facility to implement a risk assessment, which would allow the institution to identify any vulnerable areas. Portable devices could be seen as risks due to their portability nature. This would result in necessary measure been undertaken to protect the devices and the data stored on the devices. The risk assessment would also identify if there are any unauthorized access to the patient records.

There should also be physical safeguards that protect the devices and the data held in the devices. The physical safeguards include limiting access to the storage rooms for patient records and the devices. The laptops used by the practitioners should be secured safely to prevent any theft. The portable devices should be….....

Need Help Writing Your Essay?