This website uses cookies to ensure you have the best experience. Learn more

Security And Privacy Essay

1882 words - 8 pages

Security and Privacy
Donetta Bacon
March 14, 2016
HCS 533
Catherine Doughty

Security and Privacy
Case Scenario two takes place in a small town that was hit by hurricane. The concern is the basement of the organization was flooded by the storm. This caused damage to patient files, and some was washed away when the water receded. Developing an idea to address patients who ask about his or her health record is a must. There also has to be a process that is in place in an event, such as a hurricane that protects the records. There will also be a detailed discussion on a management plan. With that comes training provided to staff within the management plan. With a new management ...view middle of the document...

After the hurricane and the possibility of more to come in the following years it would be in the best interest to move to EMR. This plan will be transferring the paper records to EMR following the hurricane. As the administrator of the hospital that is located within an area that is prone to hurricanes the priorities is also placed on prepping the staff for any possible future catastrophes be it hurricanes or other natural disasters.
Training Staff Members
The staff should start using the EMR system as soon as it is implemented. They will have training that shows them how to use the system and how to detect errors when using the system, such as billing mistakes that charge patients too much. Staff will also be trained on privacy issues, as some of the paper records may have gotten out this will be an issue. Privacy training will include Health Information Portability and Accountability Act or HIPAA. This will advert accidental disclosure of health information in the future. Staff will also have to complete yearly education, this will be mandatory so that they can maintain his or her competency in his or her field within the organization. All of those who will work with managers, directors, information, and executive staff will have to be trained of how to request and access medical information in an event of another catastrophe from the offsite facility.
Processes to Protect Records in Anticipation of Future Events
When the hurricane hit it changed the face of the organization and how it would operate in the future. If they had the EMR system before hand the process would be easier. Water from the flooding ruined the paper charts in the basement of the organization. While cleaning up the flooded basement the paper records would have been incinerated protecting the information that was stored on them and, this is because they were scanned into the EMR system before hand. This makes the information accessible to the patients in the event of a catastrophe so they can obtain his or her medical records.
There is a bulletin that was published by the U.S. Department of Health and Human Services that allows HIPAA privacy and disclosures that are in an emergency situation. This bulletin describes that in an emergency situation, such as a hurricane patient information can be shared so he or she can get the treatment they need. This information also can be shared if it is used to; "identify, locate and notify family members, guardians, or anyone else responsible for the individual’s care of the individual’s location, general condition, or death," (Department of Health & Human Services, 2005, p. 49). The information also can be shared if the patient is in immediate danger or if he or she have agreed to be in the facilities directory (Department of Health & Human Services, 2005).
The Federal Response Plan says "during any presidentially declared disaster in the United States, 12 essential functions might have to be...

Other Papers Like Security And Privacy

Critical Regulatory Issue In Health Care

815 words - 4 pages A Critical Regulatory Issue in Health Care A Critical Regulatory Issue in Health Care Congress grants agencies the ability to create regulations to promote and carry out public policy (Fremgen, 2012). A critical health care regulatory issue in today’s world is The Privacy and Security Rule. The Privacy Rule, 45 CFR (Code of Federal Regulations) Part 160 and Subparts A and E of Part 164 govern the privacy of individually identifiable health

Out Sourcing Your Privacy Essay

1769 words - 8 pages liberty except according to procedure established by law". NASSCOM recognized that data privacy was among the major concerns for companies outsourcing to India and urged the Indian government to formulate and pass a data protection law for privacy of information. As a result, The National Task Force on IT submitted an "IT Action Plan" to the government in June 1998 suggesting the creation of a " …National Policy on Information Security, Privacy

Tft2 Cyberlaw, Regulations, And Compliance

1310 words - 6 pages system resources and deter, shield and protect the organization from security breaches. The scenario demonstrates that the organizations overall information security posture is poor. The HIPAA, remote access and retention policies within the information management division need to be addressed due to the healthcare organizations legal obligation to ensure the privacy of protected information. Security safeguards can be addressed through vigilance

Network Security

585 words - 3 pages Network Security Practices and Policies 3.1 Intro A. Regulation 1.To be a good reg, must be measurable by a metric 2. Security and privacy regs issued and quick pace to keep up with technology 3. Used to prevent misuse, mishandling, and misappropriation of sensitive info B. Private vs Gov -When private sector fails, then government is called in to regulate C. 4 areas

Electronic Surveillance Of Employees

962 words - 4 pages . There are several reasons why the employer may monitor both type of workplaces. The reasons given are that video monitoring helps deter theft, maintains security and monitors employees. In an open area anyone can walk by and listen to a conversation. There is no privacy if the area is open. However, on the other hand when the door is closed only the people that are in the office will be able to hear the conversation this will have better

Cloud Computing

415 words - 2 pages Simple Storage Service (Amazon S3) Benefits of Cloud: Cloud computing provides opportunities for companies to become more productive, cost-effective and flexible to deliver new tasks fast. Benefits to name a few are Availability, Flexibility, Faster Application delivery, Reduction in cost and time. Risks in Cloud computing: In spite of cloud's many benefits, the major risks which IT professionals are worried about are security and privacy

Technology Trends Proposal 2

684 words - 3 pages authentication and patient security verifications ("Protector", 2014). With the use of healthcare robots they are required by any state laws to comply with federal HIPAA privacy and security guidelines to ensure a patient’s privacy is guarded. There are some cases were state privacy laws may apply when medical robots are operating under a HIPAA free zone, and this will become the Federal Trade Commission (FTC) responsibility. According to

Stratergies And Methods Of Technology Management

329 words - 2 pages component for the technology systems with a company (“Technology Management”, 2011). By addressing the issue of privacy, the employees and other employers should be aware of the issue. Most jobs require a log-in to be able to access computer information within the workplace. To prevent poor technology, the company has to use legislation and technical decisions or combine them using all 4 methods which are legal, technical, security, and police. When it

Medical Office Procedures

610 words - 3 pages Medical Profession Responsibilities Medical Profession Responsibilities This paper will discuss the federal law that governs Protected Health Information (PHI) and the elements of compliance that must be met. This paper will also describe two examples of improper privacy disclosure and some challenges a medical office might have maintaining strict confidentiality. The federal law that governs Protected Health Information (PHI) is the

Privacy With Regards To Electronic Communication In The Workforce

1674 words - 7 pages carefully think about various factors such as the law, the types of employees that they have, and security issues, and do their best to come up with a policy that fits. One of the main problems in terms of formulating a good electronic communication policy is that many of the laws relating to privacy in the workplace are antiquated. There are very few cases or laws (especially at the Federal level) that address workplace privacy with regards to

Internet Privacy

3257 words - 14 pages written copy shows that individuals are not dealing with hackers. Lastly, investigate about the company individuals are investing with. There are also many government groups that protect our privacy and be safe on the Internet. The Federal Trade Commission (FTC) stresses that protecting individual’s social security number while dealing with things on the Internet is very important. Pay attention to the trash and e-mails that are received from the

Related Essays

Privacy Essay

1250 words - 5 pages new measures about surveillance are introduced. The government can have authorities to wiretap, record or trace orders for email made by all Americans. These security actions do violate the nature of privacy. Airport security regulations also are enhanced after the 2001 attack, such as using X-ray to scan the whole body of a person even the sensitive parts of male or female. I think this act is a serious invasion of privacy and lead me to consider

Information Privacy Essay

1338 words - 6 pages . The analysis trend and information technology’s impact including issues related to security of information, evolution of Internet, and tension of public regarding use of information and IT, is based on a number of efforts, and hence a need arouse for the proper assessment of privacy issues and thus the National Research Council established the Committee based on Privacy in the Information Age which had four basic elements: a) The potential

Asset Identification & Asset Classification Essay

496 words - 2 pages personal information 4. Why is your websites classification minor but its e-commerce server considered critical for your scenario? Because there is customer’s credit card information stored on the servers. 5. Why would you classify customer privacy data and intellectual property assets as critical? These are things that can be damaging to not just an organization but to individuals as well. 6. What are some examples of security

Is3350 Essay

577 words - 3 pages websites classification minor but its e-commerce server considered critical for your scenario? Because there is customer’s credit card information stored on the servers. 5. Why would you classify customer privacy data and intellectual property assets as critical? These are things that can be damaging to not just an organization but to individuals as well. 6. What are some examples of security controls for recent compliance law requirements