Fill in Order Details

  • Submit paper details for free using our simple order form

Make Payment Securely

  • Add funds to your account. There are no upfront payments. The writer will only be paid once you have approved your paper

Writing Process

  • The best qualified expert writer is assigned to work on your order
  • Your paper is written to standard and delivered as per your instructions

Download your paper

  • Download the completed paper from your online account or your email
  • You can request a plagiarism and quality report along with your paper

Security of Health Care Records

Security of Health Care Records

PLEASE ADDRESS/ANSWER THESE QUESTIONS AS THE CONTENT OF MY ASSIGNMENT

1.     An analysis of the nurse’s responsibility to protect patient information and the extent that HIT has made it easier or more difficult to protect patient privacy.

2.     Comment on any security or ethical issues related to the use of portable devices to store information.

3.     Assess the strategies your organization uses to safeguard patient information and how these promote a culture of safety.

4.     Describe an area where improvement is needed and one strategy that could address the situation.

 

*Kindly follow APA format for the citation and references! References should be between the period of 2010 and 2016.

*Make heading each question, so I need 4 headings that address the 4 questions above.

 

 

Background information of this assignment

With the increase of health information technology used to store and access patient information, the likelihood of security breaches has also risen. In fact, according to the Canadian Medical Association Journal (CMAJ)

In the United States, there was a whopping 97% increase in the number of health records breached from 2010 to 2011… The number of patient records accessed in each breach has also increased substantially, from 26,968 (in 2010) to 49,394 (in 2011). Since August 2009, when the US government regulated that any breach affecting more than 500 patients be publicly disclosed, a total of 385 breaches, involving more than 19 million records, have been reported to the Department of Health and Human Services.

A large portion of those breaches, 39%, occurred because of a lost, stolen, or otherwise compromised portable electronic device—a problem that will likely only get worse as iPads, smartphones, and other gadgets become more common in hospitals. (CMAJ, 2012, p. E215).

Consider your own experiences. Does your organization use portable electronic devices? What safeguards are in place to ensure the security of data and patient information? For this Discussion you consider ethical and security issues surrounding the protection of digital health information.

To prepare

·         Review the Learning Resources dealing with the security of digital health care information. Reflect on your own organization or one with which you are familiar, and think about how health information stored electronically is protected.

·         Consider the nurse’s responsibility to ensure the protection of patient information. What strategies can you use?

·         Reflect on ethical issues that are likely to arise with the increased access to newer, smaller, and more powerful technology tools.

·         Consider strategies that can be implemented to ensure that the use of HIT contributes to an overall culture of safety.

 

Required Resources

Note To access this week’s required library resources, please click on the link to the Course Readings List, found in the Course Materials section of your Syllabus.

Readings

·         McGonigle, D., & Mastrian, K. G. (2012). Nursing informatics and the foundation of knowledge(Laureate Education, Inc., custom ed.). Burlington, MA Jones and Bartlett Learning.

o    Chapter 5, “Ethical Applications of Informatics” 

This chapter examines the ethical dilemmas that arise in nursing informatics. The authors explore the responsibilities for the ethical use of health information technology.

o    Chapter 15, “Information Copyright and Fair Use and Network Security”

In this chapter, the author explains information fair use and copyright restrictions. The chapter describes processes for ensuring the security of a computer network.

·         Brown, B. (2009a). Improving the privacy and security of personal health records. Journal of Health Care Compliance11(2), 39–40, 68.
Retrieved from the Walden Library databases. 

The author of this article examines the use of the document titled “Nationwide Privacy and Security Framework for Electronic Exchange of Individually Identified Health Information.” The article describes how the framework aims to construct an approach to address the privacy and security challenges that come with health information exchanges and personal health records.

·         Dimitropoulos, L., Patel, V., Scheffler, S. A., & Posnack, S. (2011). Public attitudes toward health information exchange Perceived benefits and concerns. American Journal of Managed Care17,SP111–SP116. 
Retrieved from the Walden Library databases.

This article describes a study that sought to determine the attitude of consumers toward electronic health information exchanges (HIE), HIE privacy and security concerns, and the relationship between these concerns and the perceived benefits of HIE. The authors recommend solutions to some of the privacy challenges stimulated by HIE.

·         Goodman, K. W. (2010). Ethics, information technology, and public health New challenges for the clinician-patient relationship. Journal of Law, Medicine & Ethics38(1), 58–63. 
Retrieved from the Walden Library databases. 

This article focuses on the challenges generated by the increased level of adoption of health information technology tools. The author emphasizes the ethical issues raised by electronic public health surveillance and the secondary use of health data.

·         Hoffman, S., & Podgurski, A. (2011). Meaningful use and certification of health information technology What about safety? Journal of Law, Medicine & Ethics39(3), 425–436. 
Retrieved from the Walden Library databases.   

This article stresses the necessity of sufficient safeguards for EHR systems. The author explores current safety regulations for EHR system design and deployment. The author makes additional recommendations for protecting public health in the digital area.

·         Rothstein, M. A. (2010). The Hippocratic bargain and health information technology. Journal of Law, Medicine & Ethics38(1), 7–13. 
Retrieved from the Walden Library databases. 

The increasing availability of sensitive patient information granted by electronic health records has generated significant debate about patient privacy. This article examines the potential ethical and legal consequences of patient-directed sequestering of sensitive health information.

Optional Resources

·         Brown, B. (2009b). Privacy provisions of the American Recovery and Reinvestment Act. Journal of Health Care Compliance11(3), 37–38, 72–73. 
Retrieved from the Walden Library databases.

 

 

WHAT OUR CURRENT CUSTOMERS SAY

  • Google
  • Sitejabber
  • Trustpilot
Zahraa S
Zahraa S
Absolutely spot on. I have had the best experience with Elite Academic Research and all my work have scored highly. Thank you for your professionalism and using expert writers with vast and outstanding knowledge in their fields. I highly recommend any day and time.
Stuart L
Stuart L
Thanks for keeping me sane for getting everything out of the way, I’ve been stuck working more than full time and balancing the rest but I’m glad you’ve been ensuring my school work is taken care of. I'll recommend Elite Academic Research to anyone who seeks quality academic help, thank you so much!
Mindi D
Mindi D
Brilliant writers and awesome support team. You can tell by the depth of research and the quality of work delivered that the writers care deeply about delivering that perfect grade.
Samuel Y
Samuel Y
I really appreciate the work all your amazing writers do to ensure that my papers are always delivered on time and always of the highest quality. I was at a crossroads last semester and I almost dropped out of school because of the many issues that were bombarding but I am glad a friend referred me to you guys. You came up big for me and continue to do so. I just wish I knew about your services earlier.
Cindy L
Cindy L
You can't fault the paper quality and speed of delivery. I have been using these guys for the past 3 years and I not even once have they ever failed me. They deliver properly researched papers way ahead of time. Each time I think I have had the best their professional writers surprise me with even better quality work. Elite Academic Research is a true Gem among essay writing companies.
Got an A and plagiarism percent was less than 10%! Thanks!

ORDER NOW

CategoriesUncategorized

Consider Your Assignments Done

“All my friends and I are getting help from eliteacademicresearch. It’s every college student’s best kept secret!”

Jermaine Byrant
BSN

“I was apprehensive at first. But I must say it was a great experience and well worth the price. I got an A!”

Nicole Johnson
Finance & Economics

Our Top Experts

See Why Our Clients Hire Us Again And Again!


OVER

10.3k
Reviews

RATING
4.89/5
Average

YEARS
13
Mastery

Success Guarantee

When you order form the best, some of your greatest problems as a student are solved!

Reliable

Professional

Affordable

Quick

Using this writing service is legal and is not prohibited by any law, university or college policies. Services of Elite Academic Research are provided for research and study purposes only with the intent to help students improve their writing and academic experience. We do not condone or encourage cheating, academic dishonesty, or any form of plagiarism. Our original, plagiarism-free, zero-AI expert samples should only be used as references. It is your responsibility to cite any outside sources appropriately. This service will be useful for students looking for quick, reliable, and efficient online class-help on a variety of topics.