Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Kaiser Permanente’s EHR System, Term Paper Example
Hire a Writer for Custom Term Paper
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
Kaiser Permanente utilizes an information system referred to as Kaiser the Clinical Information System (CIS), which is an electronic health record system developed by its employees in Colorado. The main purpose of this system to simplify information transfer across the company’s several regions. Although this system was designed to deal with the complete information set that the company manages, it is currently only useful for tracking outpatient medical office data (Shafrin, 2010). As a consequence, the system was further developed into what is now known as KPHealthConnect, which is essentially an off-the-shelf electronic health record program that has been modified for Kaiser Permanente’s use. This system is more comprehensive and includes listings of personal health records, outpatient practice management systems, outpatient clinical data, inpatient billing information, inpatient pharmacy orders, inpatient administrative systems, and inpatient clinical data.
Since it is essential to protect sensitive patient information, it would be ideal to utilize a two-factor authentication method. While it is certainly necessary to utilize username and password authentication for these systems, it would be beneficial to supplement this authentication using a second factor. Some systems can include use of a digital certificate, device ID or risk-based authentication, or biometrics. However, some companies believe that their information is protected to the highest extent if their users are provided with a one-time password with two factor authentication (Pham, 2014). Ultimately, many health care professionals believe that the biggest threat to a security breach is the use of weak passwords; using a one-time password with two factor authentication solves this pertinent issue.
Even in a company as large as Kaiser Permanente, it would be feasible to implement this authentication method. For a security breach to occur, the hacker must first be able to enter the email inbox of an employee or sneak a look at their phone. While this is certainly possible, it is significantly less likely than simply finding the password written down around the employee’s desk space or guessing it based on the employee’s likes and hobbies. Furthermore, if the password that is generated upon each request is a mix of capital and lower case letters, numbers, and symbols, it will be nearly impossible to guess the password, which is strengthened by the fact that it is changed each time the employee wishes to gain access to the health record system.
The main access control policy that is relevant to this authentication method is the use of IP access controllers. To ensure that the patient information is optimally protected, it would be useful to prevent its accessibility from points outside of Kaiser Permanente. This will prevent employees from being able the access this information on their own outside of work without permission; to do so, they will be required to check out a company laptop, which will enable Kaiser Permanente to track the source of a security breach if it occurs. Furthermore, a hacker who is not affiliated with the company and able to gain access to an employee’s email inbox and login will not be able to access this data from their personal computer. This is an essential protection because it ensures that the information is protected from all angles, which is necessary for a company as large as Kaiser Permanente that has amassed a large amount of patient data over the years. Ultimately, IP access control is the only access control methodology I would consider using for my system because due to the protection provided by the one-time password with two factor authentication process, this method is supplementary to the security offered.
Access control should be administered and controlled by Kaiser Permanente’s IT department, but department manager’s should also have some power to work as a checks and balances system to ensure that the IT department isn’t accessing this information for their own personal gain. The department managers will be responsible for determining who will have access to Kaiser Permanente’s electronic health record system. They will then be sent to the IT department to develop a suitable username and to learn how to access the system. To ensure safety, each user will be provided with a username that is completely numerical; each username will begin with their birth month followed by the last four numbers of their social security number. Therefore, the employee will be encouraged to keep his or her username private, making unwanted security breaches even simpler to prevent.
Access control will be regulated through the employee’s cell phone if the company has provided the employee with one for work purposes. Otherwise, access control will be regulated through the employee’s email address. When the employee logins into the system, he or she will type the username into the electronic record system access page and hit send. They will then be sent an email or text message with the password, and be prompted to enter it on the electronic health record system access screen. A wrong password entry will notify the IT department, who will be responsible for determining whether there was an attempt to access the patient information by a hacker or whether it was a failed attempt by an employee to enter the system.
References
Pham T. (2014). Two-Factor Authentication for Electronic Health Record (EHR) Apps. Retrieved from https://www.duosecurity.com/blog/two-factor-authentication-for-electronic-health-record-ehr-apps
Shafrin J. (2010). Kaiser Permanente’s EHR System. Healthcare Economist. Retrieved from http://healthcare-economist.com/2010/12/20/kaiser-permanentes-ehr-system/
Stuck with your Term Paper?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee