need help writing a 700+ essay

TECHNOLOGY PROPOSAL PART II 6




Technology plays a big role in the medical field. Keeping patient information safety is the number one factor for the organizations. The trust on medical technology in the health care cannot be over stated and new trends emerge all the time. When implementing new technologies in a healthcare organization comes the increased risk of privacy violation, and security breach. Though the age of information demands that the health care industry evolve with it, it is important to know and understand what risks are associated with the technology and how to protect the organization from getting hacked. Medical staff has progressively expanded into telemedicine since they find it to be more effective and fewer errors are done. Furthermore, EHR-based medication reconciliation process to improve the accuracy of the reconciliation process and the discharge medication list EHR-based medication reconciliation process to improve the accuracy of the reconciliation process and the discharge medication list. EHR’s based medication reconciliation process to improve the accuracy of the reconciliation process and the discharge medication list (AHRQ, 2012). For professionals in health care to reach the strategic aim of the organization and provide efficient and effective health services, they need access to precise, reliable, and complete information (Wager, Lee, & Glaser, 2013). EHR-based medication reconciliation process to improve the accuracy of the reconciliation process and the discharge medication listWhen transmitting patient health information via electronically medical organizations needs to keep in mind those they some secure the confidentiality of the patient. A security safeguard must be already implemented so the information does not go to the wrong hands. The paper will talk about the privacy and safety risks related with electronic health records as well some plans to protect private information.

When it comes to health care organizations there are a few risk involved when applying Electronic Medical Records to meeting the needs of the company. There are steps that need to be placed and looked at. For example, the health care facility purpose is to obtain an EHR system that helps improve the efficiency and productivity of the company. Before they can embrace its purpose they need to look at the risks and security safeguard that the system maybe not conduct. The must look at how patient information will be kept secured on not available to other individuals that do not have a need to access it. Only teammates that work within the department will have access to view patient information, it could be by login in and having user names and passwords. Some organization are now implementing the use of tokens to access patient information, each employee will be provided with a token that will allow them to access private medical information. Only the staff with token will be able to access it, any other non-medical will not have access.

EHRs reduce the amount of paperwork that is usually inside a patient’s chart of various exams. This also allows the billing departments submit claims electronically it makes it more efficient.  The use of Electronic Medical Records in organization opens the company to possible hacking, security breaches, and theoretically the mismanage of patient private information. There must be security breaches set in place that meet security standards. To develop and implement security safeguards to electronic health records can be somewhat lengthy and long, although ultimately it needs to be done. Organizations can track and inspect each employee’s access, to make sure that they are only using database that is allowed. Making sure that they are not viewing more than what they should.

Privacy risks need to be evaluated for the effectiveness of Electronic Medical Records. Every risk needs a safeguard to be in place. In addition, further steps may be required to assure the security of electronic medical records. We will open ourselves up for security breaches, mishandling of information, and treats of possible hacking. Because of this we will have to put in place some security standards. Security safeguards that we will have to implement needs to begin with starting a system to track and review each employee’s access, and what they have reviewed in the system. That will mean giving the employees a unique login and pass code required for each access. We need to ensure that all of the staff is well trained and knows that it is a violation to look at patient’s medical information if they are not authorized. There are Administrative safeguard required under the HIPAA security which are required with Electronic health records. Implementing a risk management program is one of the key factors to preventing any hacks from occurring. Identify relevant information systems that can help prevent hackers from entering into the EHR.

References

Elizabeth L. Ciemins, PhD, MPH, MA, (2012) Health Information Technology, Agency for

Healthcare Research and Quality, Retrieve from: https://healthit.ahrq.gov/ahrq-funded-projects/evaluation-effectiveness-health-information-technology-based-care-transition

Jock Hicks (2015) Implementing a New Healthcare Information System. Planning for a

Medical office or Organization Retrieve from: https://www.verywell.com/implementing-a-new-information-system-2317459

Wagner, K. A., Lee, F. W., & Glaser, J. P. (2013). Health care information systems:

A practical approach for health care management. (3rd ED). Retrieved from the

University of Phoenix eBook collection database.