Discussion:Security of Health Care Records
Discussion:Security of Health Care Records
Nursesshould ensure security of health care information through coming upwith strategies that will ensure that they can achieve such. In mostcases, such a process is usually cumbersome and requires thepossession of necessary skills, resources, as well as concertedefforts so as to make the activity a success. In most cases, nursesneed to bear a culture that is edged in observing the importance ofpatients and the sensitive nature of their information (Rothstein,2010). As such, the management of health facilities needs to pass astrong message to its personnel as well as providing them with thenecessary facilitation to empower them to take actions that are boundto be of great assistance as far as the sustenance of privacy ofpatient information is concerned.
Theadoption of Health Information Technology in the process of keepingpatient data has had great enhancements in terms of sustaining theinformation of patients. For instance, it provides the opportunity tohave limited access to information contained in the system. As aresult, only a few individuals who have been cleared to have accessto the information could actually get to review it. Such a strategyhelps to reduce chances of unauthorized access to such information byunauthorized persons. In most cases, people who are cleared to accessand use the information are those who are of interest in the saidpatient, such as doctors, nurses, and pharmacists. Theseprofessionals are usually bound by the code of conduct and ethicalrules, which go a long way in ensuring that such people do notcontinue to share crucial information that relates to these patientswith other persons as such a process could be a breach of standardsof practice that they always need to profess.
Thereare various security and ethical issues that relate to the use ofportable devices that are used for storing patient information. Oneof them is the fact that, because a given health professional carriessuch devices with him, he creates a major problem of making suchinformation contained in the devices quite vulnerable (Goodman,2010). In case of loss of the said device, it may be hard toestablish who could end up with the said item and whether the saidparty could have the ability to bypass the security features put onthe said piece and, as a result, get to gain access to said pieces ofinformation that are contained in it, regarding the state of patientsat certain health facilities. The health care provider could alsoexpose the device in the open, such as at home. Where the saidindividual could have deactivated the password protection of the saiddevice, other people could snoop and get access to the patientinformation that may have been stored in the said device.
Ina bid to safeguard patient information, there is the need to storepatient information regarding codes on such devices, instead of theuse of names. One of the benefits that will be realized from the useof such method is that, the information contained in the said devicewill be of no use to any unauthorized person who could gain access toit, because he will not know the owner of the piece of information(Hoffman & Podgurski, 2011). Another ethical issue lies in theability of healthcare providers to keep their oath of always keepingpatient information private and not share it with any other party whois not permitted to know about the said information. Such a practiceboils down to the general professional stand of a given healthprofessional. Such people need to bear a strong position that willensure that they can do what is required of them, even when they donot see find it necessary to do so. There is also the need for properpolicies to be laid down as to when a given health professional isallowed to carry the device with him. Such an action will help ensurethat the risk of loss of the said device is highly minimized.
Theorganization has taken various steps that are bound to safeguard thepatient information as well as promote a culture of safety. One ofthem is through passing the personnel of the facility throughcontinuous training sessions which touch on the safety and privacy ofpatient information (Hoffman & Podgurski, 2011). With time, thepersonnel get to understand the importance of sticking to thestandards of practice so as not to predispose patient information tosituations whereby they could get into possession of unauthorizedpersonnel who could, in turn, use it in ways that are not desirable.Another strategy has been the adoption of new technology that isbound to help store patient information in such a manner that itreduces its pilferage to unauthorized persons. One of the areas thatmay need improvement could be proper training of personnel so as toenable them to make proper use of the electronic health records,thereby, protecting patient information.
Goodman,K. W. (2010). Ethics, information technology, and public health: Newchallenges for the clinician-patient relationship. Journal of Law,Medicine & Ethics, 38(1), 58-63.Retrieved from the WaldenLibrary databases.
Hoffman,S., & Podgurski, A. (2011). Meaningful use and certification ofhealth information technology: What about safety? Journal of Law,Medicine & Ethics, 39(3), 425-436.Retrieved from the WaldenLibrary databases.
Rothstein,M. A. (2010). The Hippocratic bargain and health informationtechnology. Journal of Law, Medicine & Ethics, 38(1),7-13. Retrieved from the Walden Library databases.