Security of Health Care Records.

Security of Health Care Records.

Security of Health Care Records.


Please respond to the following discussion by Expanding on your colleagues’ postings by providing additional insights in a positive and supportive way with the following 2 references and 2 more APA 6th ed Thanks. 1 Rothstein, M. A. (2010). The Hippocratic bargain and health information technology. Journal of Law, Medicine & Ethics, 38(1), 7–13. 2 Brown, B. (2009b). Privacy provisions of the American Recovery and Reinvestment Act. Journal of Health Care Compliance, 11(3), 37–38, 72–73. Individual digital health care information is a significant concern. “Patient-facing technologies, such as personal health records, patient portals, and mobile health apps, are being adopted at rapid rates” (Baird & Nowak, 2014, p. 1). Security of Health Care Records.


In regards to my current facility and protecting personal health information, my position as an ICU nurse was reviewed. In our intensive care unit, we do not utilize the smaller patient-centered or portable technology tools in comparison to other areas of the hospital. I will be reviewing how we strive to protect our current patients’ information within the intensive care setting. How is the electronic health information stored and what if there is a breach? According to the American Recovery and Reinvestment Act of 2009, “if a breach of “unsecured protected health information (PHI)” is discovered by a covered entity, the HITECH Act requires the covered entity to “notify each individual whose unsecured protected health information has been, or is reasonably believed to have been, accessed, acquired, or disclosed as a result of such breach” (Brown, 2009b). Security of Health Care Records. To be considered a breach where notification is mandated requires involvement affecting more than 500 individuals (Brown, 2009b). This is a considerable number and nurses along with other healthcare workers that must be vigilant in protecting the information of our patients. The specific strategies my facility uses on an individual basis are password protected sign on, automatic sign off at set intervals, protective screen covers, and not using personal identifiers in public view are just a few. Overall facility protection goes into great details with IT at the forefront. It requires regular audits, encrypting of data, backup capabilities, notifications in access of records, along with spyware protection are the novice approach I am aware of that we take in protecting health information, greater detailed specifics can be obtained via request on how IT is protecting data. Security of Health Care Records. The advancement in technology in healthcare is remarkable. Patients are now able to download applications (apps) to personal cell phones for such things as real-time EKGs for the cardiologist and other physicians to view. The capabilities allowing real-time view for care and prevention is fantastic, but the threat of misuse along with ethical dilemmas of having protected health information available in the poorly protected database needs to be addressed. Another ethical dilemma that immediately comes to mind is who has access at the other end of the device, on either side. Security of Health Care Records. How does the patient verify it is their provider making decisions on their medical care, and how does the provider verify it is their patient’s information they are viewing and basing care on? “As science and technology advance and policymakers and healthcare providers continue to shape healthcare practices including information management, it is paramount that ethical decisions are made” (McGonigle & Mastrian, 2018, p. 95). Overall strategies to ensure safety on medical information is imperative. “Given that health care is the largest part of the U.S. economy, safeguarding ePHI is considered a matter of national security, with severe consequences for organizations at which PHI protections are compromised by data breaches” (Parikh, 2018, para. 1). Each facility must ensure this safety to their patients to the fullest of their capabilities. “Healthcare leaders need to have appropriate policies, solutions, and processes—and the overall mindset—to defend against” cyber attacks (Parikh, 2018, para. 2). Security of Health Care Records. An area that I witness needing improvement would be a need for adopting a culture of full transparency in communication; a lack or poor communication between upper management and IT about the importance and significance of damage if a breach occurs (Parikh, 2018). The communication between IT and management are based usually on agendas immediately affecting the facility dealing with specific fixes needing attention now, as this is crucial, an open forum would allow both sides a more comprehensive understanding at information pertinent to this matter. References Baird, A. & Nowak, S. (2014). Security of Health Care Records.Why primary care practices should become digital health information hubs for their patient. BMC Family Practice, 15(190), 1-5. Retrieved from the Walden Library Database Brown, B. (2009b). Privacy provisions of the American Recovery and Reinvestment Act. Journal of Health Care Compliance, 11(3), 37–38, 72–73. Retrieved from the Walden Library databases McGonigle, D., & Mastrian, K. G. (2018). Nursing informatics and the foundation of knowledge (4th ed.). Burlington, MA: Jones and Bartlett Learning Parikh, C. (2018, February 1). Safeguarding electronic protected health information: A non-techie guide for healthcare leaders. Retrieved January 28, 2019, from Security of Health Care Records.

The emergence of electronic health records (EHRS), utilization of mobile devices, medical identity theft and exchange of information among and between clinicians, patients, organizations and clinician has resulted to increased concern over the privacy and security of patient health information. Although there are guidelines on the said privacy and security, EHRS might still be predisposed to breaches that act as a threat to patient privacy. Therapeutic alliance and trust is vital to the patient-provider relationship and quality of care (Shenoy & Appel, 2017).  Security of Health Care Records.

Benefits of EHRs can be achieved only if patient maintain the accuracy and security of their health records. Protecting the privacy of patient records in the electronic era is crucial because of dissemination of treatment responsibilities. Rothstein (2010) argues that patient records are usually shared among physicians and other providers. Thus, to safeguard privacy, patients must regulate the amount of information to be disclosed to physicians and other entities involved in care delivery. Security of Health Care Records.

Inadequacies in the HIPPA security rule concerning business associates, infringement notifications, and standards of data transmission.  Brown(2009) claims that the American Recovery and Reinvestment Act  strengthens  the degree of  a person’s access to and control over information  included  an electronic health record  and  offers individuals more authority to  limit exposure of their  Patient health information Additionally, the Act prohibits business associates  from divulging  protected health information(PHI)  outside  the provisions of the HIPPA business affiliate contract and  requires business entities to inform  persons on disclosure of their unsecured PHI following a security or privacy breach. Security of Health Care Records.

Security and privacy guidelines on PHI are the greatest hurdle to adoption of EHRs. Thus, it is crucial for health firms to recognize techniques to safeguard EHRs. According to Kruse et al (2017), the two most commonly used security techniques are cryptography and firewalls. Firewalls safeguard the information technology system of a healthcare organization while cryptography ensures safety of protected health information within EHRs particularly when there is exchange of information.  Other important security techniques include cloud computing, radio frequency identification, deployment of chief information security officers and antivirus software. Security of Health Care Records.

Our Essay Writing Service Features

Qualified Writers
Looming deadline? Get your paper done in 6 hours or less. Message via chat and we'll get onto it.
We care about the privacy of our clients and will never share your personal information with any third parties or persons.
Free Turnitin Report
A plagiarism report from Turnitin can be attached to your order to ensure your paper's originality.
Safe Payments
The further the deadline or the more pages you order, the lower the price! Affordability is in our DNA.
No Hidden Charges
We offer the lowest prices per page in the industry, with an average of $7 per page
24/7/365 Support
You can contact us any time of day and night with any questions; we'll always be happy to help you out.
$15.99 Plagiarism report
$15.99 Plagiarism report
$15.99 Plagiarism report
$15.99 Plagiarism report
$3.99 Outline
$21.99 Unlimited Revisions
Get all these features for $65.77 FREE
Do My Paper

Frequently Asked Questions About Our Essay Writing Service

Academic Paper Writing Service

Our essay writers will gladly help you with:

Business Plan
Presentation or Speech
Admission Essay
Case Study
Reflective Writing
Annotated Bibliography
Creative Writing
Term Paper
Article Review
Critical Thinking / Review
Research Paper
Thesis / Dissertation
Book / Movie Review
Book Reviews
Literature Review
Research Proposal
Editing and proofreading
Find Your Writer

Latest Feedback From Our Customers

Customer ID:  # 678224
Research Paper
Highly knowledgeable expert, reasonable price. Great at explaining hard concerts!
Writer: Raymond B.
Customer ID: # 619634
Essay (any type)
Helped me with bear and bull markets right before my exam! Fast teacher. Would work with Grace again.
Writer: Lilian G.
Customer ID: # 519731
Research Paper
If you are scanning reviews trying to find a great tutoring service, then scan no more. This service elite!
Writer: Grace P.
Customer ID: #499222
Essay (any type)
This writer is great, finished very fast and the essay was perfect. Writer goes out of her way to meet your assignment needs!
Writer: Amanda B.
Place an Order

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:

Powered by WhatsApp Chat

× How can I help you?