.

Tuesday, March 12, 2019

Health Care Challenges Memo Essay

There are many challenges that happen within the health premeditation field. The most important is protecting the patients individualised knowledge and who is equal to gate this cultivation. The National Health Information Network (NHIN) was create to help improve upon the sharing of health thrill data. This was to help get together data together for all involved to keep data respectable when transferring over the internet. deep down a health care organization a Hierarchy information system of rules is use. This offers ease of cyberspace expansion and conversion for desktops used to be able to access necessary data. Both topical anaesthetic area network (LAN) and wide area network (WAN) are used in within the organization. Two or more LANs are affiliated by a hub. The LAN is connected from different areas to form an internetwork. Within the health care field it is important that protected health information (PHI) is kept protected. There are measures that need to be t aken to get a line that there are no unauthorized usages of this type of information. The HIPAA standards must be followed at all times whether it is administrative or patient care departments.Physical safeguards are in place to protect the hardware and facilities that blood line PHI. The facility that houses the health IT is housed has limited physical access to authorized personal only. There are restrictions on workstations to apply access with PHI. The health IT system has safeguards built in to protect health information and to be able to control of access to it. Measures are set to limit access of information. travel are taken to encrypt, and decrypt information being transmitted electronically to guard against unauthorized access of the information.In order for the organization to start out control over who access the information steps need to be taken to protect patient data from being stolen. To do this users have a unique user identification protocols, automatic logof f, emergency access steps, and encryption and decryption mechanisms. Auditcontrols need to be used to hear activity of the IT system. Authentication of the entity or person that is attempting to access the information is a must to do. Transmission security of PHI that is being transmitted through the network needs to be protected.ReferencesHealth Information Management of a strategical Resource (4th Ed.) (Abdelhak, Grostick, & Hanken) How Do I Ensure Security in Our trunk? (n.d). Retrieved from www.hrsa.gov/healthit/toolbox/HIVAIDSCAREtoolbox/SecurityAnd

No comments:

Post a Comment