Technical Data Security in the Changing Technology of Health Care.
By: Maile AndrusHCS/483
April 6, 2015Tanita Durant
Introduction• How has technology changed?• What new laws have been introduced in Health Care?• What are some important needs in security in regards to the
new laws?• Will the security levels put in place today work tomorrow?• Will Management be able to determine any future needs in
security of Health Care Data?• What kind of training and information will the staff need to
know and complete now and in the future to protect this Data the age of computers and technology?
• Will the new EMR and EHR continue to change along with security needs?
Securing Medical Records with Technology
• Information in an orderly and timely manner
• Less Duplicated files
per patient
• Works to reduce document loss
Medical Records Transfers and storage changes over time How to Keeping Files under Secured Conditions
• Flash Drives or Mini Storage• When using such devises what
can happen?• What can a breach like this mean
for the company or Medical Facility?
• When do you need to be notified of a Breach?
• Who needs to be notified?• What and how with this have
been prevented?
How and when there is a Break Down in Information
Technology Data Security in Health Care
• When Management fails to review employees work on a regular basis there is breakdown.
• Lack of communication can create a breakdown in security with costly effects
• When there is a breakdown in technological security patients information is put at risk.
• Patients lose trust and respect for the doctor, staff and facility as a whole.
HIPAA• Do you and your facility use the
internet?• Do you have your facility listed
on social media?• Do your staff members use
social media? (at work for work?)
• In asking these questions we wanted to know just what kind of security system and measures your facility has already put in place and what needed to be changed or improved upon.
How do you up hold the ethical standards of the facility in regards to Social Media ?
Do your staff members use social media? (at home and at work)
What is your policy about social media site usage or personal cell phone and electronics use in the work place?
Other ways can Breaches accrue in a technology based Health Care System?
How is information shared and with Whom?• Your Patients is Information
Security• Access information based on
need to know • What can be accessed
securely for the care of the patient?
• How sharing patients information and for what purpose is more secure?
• How it will help maintain HIPAA Laws and regulations?
Conclusion This scenario opened the city, the lab as well as the staff members up to prosecution, fines to the faculty as well as the city. The cost for loosing this information for the number of individual patients could have reached into the hundred millions of dollars. This is why management has to be consistently involved in the security of Data in a technological age such as this. As Technology continues to grow the breached can become more frequent as well as advanced by such things as cyber-attacks and computer hackers.
Keeping the Management in the need to know and reporting any breaches in HIPAA Laws and Security of patient information I critical and has to be made a higher priority when you are integrating information Security in a Technologic age like this and in Health Care.
ReferencesBarrett, T. (2013, November 16). Mayor of the City of Milwaukee. Milwaukee employee information stolen, Mayor Barrett outraged. (M. Lowe, Interviewer) http://fox6now.com/2013/11/16/milwaukee-employee-information-stolen-mayor-barrett-outraged/#ooid=lqc3FjaDr_jSfx2okoUdeWoUqOjdI10D. Milwaukee.
Docter, C. (2013, November 16). Milwaukee employee information breached when car stolen. Retrieved from http://fox6now.com/: http://fox6now.com/2013/11/15/milwaukee-employee-information-breached-when-car-stolen/
Gomez-Meija, L. B. (2012). Managing Human Resources. In L. B. Gomez-Meija, Managing Human Resources (7 ed.). Upper Saddle River, N.J.: Prentice Hall.
Keller, A. (2007, June 01). Electronic health records; Technological change. Florida Trend, 50(2), p. 28.Kinneer, J. (2013, November 9). Functional roles of human resources. . Retrieved from https://www.youtube.com/watch?v=lT6cbldOzjQ
M.J.Green, A. (2011). Essentials of Health Information, Management: Principles and Practices, Second Edition. (2).Mercuri, R. (2004). The HIPAA-potamus in Health Care Data Security. Security Watch, 47(7), 25-28.
Thompson, J. M. (2011, 2). Effective Communication Paper . Retrieved from StudyMode.com: http://www.studymode.com/essays/Hcs-325-Effective-Communication-Paper-608428.html
Tomes, J. P. (2007). Management of HIPAA Compliance Takes onIncreased Importance with Criminal Enforcement. Journal of Health Care Compliance.
Image References and URL’s