Homework Question on The Electronic Health Records System
- Cryptography; (D6) Data Communications; (D7) Malicious Code/Malware Session Long Project In Module 1, you selected a healthcare organization that you will study throughout your Session Long Project. For this module, consider your organization within the context of material covered by the SSCP (CBK) Domains 5, 6, and 7.
- In 2 to 3 pages, do the following:
- Select and describe a shared information system that contains patient information.
- Draft a high-level paper outlining three security measures and/or systems that you recommend to help prevent vulnerabilities, protect data, and identify/counter potential attacks.
- Write a 2- to 3-page paper, typed and double spaced, using 12pt Times New Roman font and 1-inch page margins.
- The following items will be assessed in particular: Ability to identify, apply, and explain effective methods used to prevent vulnerabilities, counter attacks, and protect data.
Homework Answer on The Electronic Health Records System
This is an interactive electronic system for documenting all health records from admission to discharge with the primary objective of caring for patients (Vacca, 2009). The system has several stakeholders, reviewers including patients and government agencies that are users of the clinical documentation. It involves scanning of the clinical documents into an electronic system immediately a patient gets an admission into the health institution until discharge of patient.
The timeframe for completing the documentation must meet the accreditation and regulatory threshold. The system uses a host of information technology outfits, and it allows multi-viewing simultaneously (Vacca, 2009). The physician or an organization owns the medical records, but the patient owns the information in the health records. The essential elements of a sound information system are privacy and confidentiality, security of data, data integrity and availability.
To prevent vulnerabilities, protect data, identify and counter potential attacks on the EHR, the following security measures are appropriate for Cedar Ridge Hospital:
- Use of controls in accessing the EHR information
This measure incorporates the privilege management concept that involves assignment of roles to users while considering their rights to access specific features of the EHR. In this technique, the individual users are given one or more roles to play (Hanseth & Ciborra, 2007).