Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Health Care Data Trends, Research Paper Example
Hire a Writer for Custom Research Paper
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
The top five most significant security risks that need to be consideredin governing United States health care compliance laws include the misuse of cellphones, social media, tablets and other portable devices, inadequate privacy and security training, and an increase in health care fraud (Dark Reading, 2012). Cellphones and other mobile devices, such as tablets, have an increased likelihood of being stolen due to their size. Meanwhile, inadequate privacy and security training results in the ease with which criminals can steal sensitive information; the recent trend in health care fraud supports the need for better training programs. Lastly, many employees unknowingly discuss sensitive information both in person and on social media, which creates a need to reinforce the knowledge that employees have concerning the protection of sensitive patient data.
It is important to ensure that cellphones and other mobile devices are never left unsupervised and are password protected in case an unauthorized individual attempts to access the sensitive information contained within it. Although a lot of information security officials focus on laptop and computer safety, it is essential to apply the same safety standards used to protect these devices on their smaller, portable counterparts. One of the U.S. compliance laws that governs this risk is the HITECH Act, which allocates funds in order to increase the use of Electronic Health Record (EHR) systems. Tablets are typically used by HITECH funds in order to serve as a portable means for physicians to access and update health records. By failing to ensure that they are properly kept, physicians and other health care professionals are in violation of HIPAA. Health care institutions could be fined significantly for these violations. To alleviate these problems, it is essential to require physicians to keep their portable devices in their laboratory jacket pocket at all times when they are not being used. Furthermore, an effective password system should be implemented. Users should be required to use an alphanumeric password that is updated every four months. They will be asked to sign an agreement stating that they will not share this password or their mobile device with anyone. An additional precautionary measure that could be taken is to require these items be handed in and locked up at the end of each shift.
Inadequate security and privacy training and an increase in health care fraud are related issues. An effective security and privacy training program should reduce the amount of health care fraud that occurs. Therefore, it is the responsibility of the information technology and security teams to collaborate to develop an effective training program and to determine how to ensure that this information is occasionally reinforced. It is important for each employee to know how to verify the identity of each patient on the basis of the health care insurance information that is being provided. Furthermore, they must ensure that no information that they use in their work is being leaked, because criminals can use this information to their advantage. It is important to stress the necessity of HIPAA compliance from the moment that health care professionals and clerks are hired. They should be provided with an orientation week in which they review the U.S. compliance laws in addition to institutional policies to ensure that they are obeyed. This will include a PowerPoint presentation to summarize the information in addition to a workshop in which the staff is faced with relevant scenarios and asked to determine which workplace behaviors are acceptable and which are not. Training will be followed up by a 10 question quiz; if less than 80% of questions are answered correctly, employees will be expected to repeat training. This session will be required every two years and will adjust according to changing laws and institutional policies.
Lastly, it is essential that employees are aware that patient protection extends to spoken information as well as transmitted written information. It is important for them to remember not to post case information online, which extends to their social media profiles. There have been several cases in which health care workers have boasted that they had the opportunity to admit or treat a celebrity, but it is essential to keep this and all related information off of the internet. This is a severe breach of HIPAA and can result in fines or termination. Therefore, aside from specifically informing employees that this type of behavior is unacceptable, it would be beneficial to block all social media and related recreational sites from computers at health care institutions. Furthermore, employees will only be able to access their work e-mail on these systems, which can be subject to random checks. While it is difficult to ensure that these employees will not publicize the information after they leave work, these procedures will help reduce the frequency with which this type of action occurs.
Although it is difficult to address each specific type of security breach that is possible in the health care setting, progress can be made by working to protect patients against the most common security threats. Requiring health care workers to use strong passwords that are changed frequently, preventing their ability to post private patient information on social media, and enacting effective privacy and security training programs are effective ways to build awareness about patient information protection. It is essential to continue assessing the most stringent problems and alleviating them as they occur.
References
Dark Reading. (2012). Top 11 Trends For 2012 In Healthcare Data, According To Industry Experts. Retrieved from http://www.darkreading.com/risk/top-11-trends-for-2012-in-healthcare-data-according-to-industry-experts/d/d-id/1136887
HHS. (2013). New rule protects patient privacy, secures health information. Retrieved from http://www.hhs.gov/news/press/2013pres/01/20130117b.html
HITECH Answers. (n.d.). About the HITECH Act. Retrieved from http://www.hitechanswers.net/about/about-the-hitech-act-of-2009/
Stuck with your Research Paper?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee