Monday, May 27, 2019

Health Care Challenges Memo Essay

There are many challenges that happen within the health care field. The most important is protecting the endurings in-person breeding and who is able to access this reading. The National Health Information Network (NHIN) was formed to help improve upon the sharing of health care data. This was to help link data together for all involved to keep data secure when transferring over the internet. Within a health care organization a Hierarchy information system is used. This offers ease of network expansion and alteration for desktops used to be able to access necessary data. Both local area network (LAN) and large area network (WAN) are used in within the organization. Two or more LANs are committed by a hub. The LAN is connected from different areas to form an internetwork. Within the health care field it is important that protected health information (PHI) is kept protected. There are measures that contend to be taken to ensure that there are no unlicensed usages of this type o f information. The HIPAA standards must be followed at all times whether it is administrative or patient care departments.Physical safeguards are in place to protect the hardware and facilities that store PHI. The facility that houses the health IT is housed has limited physical access to authorized personal only. There are restrictions on workstations to have access with PHI. The health IT system has safeguards built in to protect health information and to be able to conceal of access to it. Measures are set to limit access of information. Steps are taken to encrypt, and decrypt information being ancestral electronically to guard against unauthorized access of the information.In order for the organization to have control over who access the information steps need to be taken to protect patient data from being stolen. To do this users have a unique user identification protocols, automatic logoff, emergency access steps, and encryption and decryption mechanisms. Auditcontrols need to be used to check activity of the IT system. Authentication of the entity or person that is attempting to access the information is a must to do. Transmission security of PHI that is being transmitted through the network needs to be protected.ReferencesHealth Information Management of a Strategic Resource (4th Ed.) (Abdelhak, Grostick, & Hanken) How Do I Ensure Security in Our System? (n.d). Retrieved from

No comments:

Post a Comment