hcs485 final tech data security chg technology of hc 5

13
Data Security in the Changing Technology of Health Care. By: Maile Andrus HCS/483 April 6, 2015 Tanita Durant

Upload: maile-andrus

Post on 10-Apr-2017

192 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: HCS485 final Tech Data Security Chg Technology of HC 5

Technical Data Security in the Changing Technology of Health Care.

By: Maile AndrusHCS/483

April 6, 2015Tanita Durant

Page 2: HCS485 final Tech Data Security Chg Technology of HC 5

Introduction• How has technology changed?• What new laws have been introduced in Health Care?• What are some important needs in security in regards to the

new laws?• Will the security levels put in place today work tomorrow?• Will Management be able to determine any future needs in

security of Health Care Data?• What kind of training and information will the staff need to

know and complete now and in the future to protect this Data the age of computers and technology?

• Will the new EMR and EHR continue to change along with security needs?

Page 3: HCS485 final Tech Data Security Chg Technology of HC 5
Page 4: HCS485 final Tech Data Security Chg Technology of HC 5

Securing Medical Records with Technology

• Information in an orderly and timely manner

• Less Duplicated files

per patient

• Works to reduce document loss

Page 5: HCS485 final Tech Data Security Chg Technology of HC 5

Medical Records Transfers and storage changes over time How to Keeping Files under Secured Conditions

• Flash Drives or Mini Storage• When using such devises what

can happen?• What can a breach like this mean

for the company or Medical Facility?

• When do you need to be notified of a Breach?

• Who needs to be notified?• What and how with this have

been prevented?

Page 6: HCS485 final Tech Data Security Chg Technology of HC 5

How and when there is a Break Down in Information

Technology Data Security in Health Care

• When Management fails to review employees work on a regular basis there is breakdown.

• Lack of communication can create a breakdown in security with costly effects

• When there is a breakdown in technological security patients information is put at risk.

• Patients lose trust and respect for the doctor, staff and facility as a whole.

Page 7: HCS485 final Tech Data Security Chg Technology of HC 5

HIPAA• Do you and your facility use the

internet?• Do you have your facility listed

on social media?• Do your staff members use

social media? (at work for work?)

• In asking these questions we wanted to know just what kind of security system and measures your facility has already put in place and what needed to be changed or improved upon.

Page 8: HCS485 final Tech Data Security Chg Technology of HC 5

How do you up hold the ethical standards of the facility in regards to Social Media ?

Do your staff members use social media? (at home and at work)

What is your policy about social media site usage or personal cell phone and electronics use in the work place?

Other ways can Breaches accrue in a technology based Health Care System?

Page 9: HCS485 final Tech Data Security Chg Technology of HC 5

How is information shared and with Whom?• Your Patients is Information

Security• Access information based on

need to know • What can be accessed

securely for the care of the patient?

• How sharing patients information and for what purpose is more secure?

• How it will help maintain HIPAA Laws and regulations?

Page 10: HCS485 final Tech Data Security Chg Technology of HC 5

Conclusion This scenario opened the city, the lab as well as the staff members up to prosecution, fines to the faculty as well as the city. The cost for loosing this information for the number of individual patients could have reached into the hundred millions of dollars. This is why management has to be consistently involved in the security of Data in a technological age such as this. As Technology continues to grow the breached can become more frequent as well as advanced by such things as cyber-attacks and computer hackers.

Keeping the Management in the need to know and reporting any breaches in HIPAA Laws and Security of patient information I critical and has to be made a higher priority when you are integrating information Security in a Technologic age like this and in Health Care.

Page 11: HCS485 final Tech Data Security Chg Technology of HC 5

ReferencesBarrett, T. (2013, November 16). Mayor of the City of Milwaukee. Milwaukee employee information stolen, Mayor Barrett outraged. (M. Lowe, Interviewer) http://fox6now.com/2013/11/16/milwaukee-employee-information-stolen-mayor-barrett-outraged/#ooid=lqc3FjaDr_jSfx2okoUdeWoUqOjdI10D. Milwaukee.

Docter, C. (2013, November 16). Milwaukee employee information breached when car stolen. Retrieved from http://fox6now.com/: http://fox6now.com/2013/11/15/milwaukee-employee-information-breached-when-car-stolen/

Gomez-Meija, L. B. (2012). Managing Human Resources. In L. B. Gomez-Meija, Managing Human Resources (7 ed.). Upper Saddle River, N.J.: Prentice Hall.

Keller, A. (2007, June 01). Electronic health records; Technological change. Florida Trend, 50(2), p. 28.Kinneer, J. (2013, November 9). Functional roles of human resources. . Retrieved from https://www.youtube.com/watch?v=lT6cbldOzjQ

M.J.Green, A. (2011). Essentials of Health Information, Management: Principles and Practices, Second Edition. (2).Mercuri, R. (2004). The HIPAA-potamus in Health Care Data Security. Security Watch, 47(7), 25-28.

Thompson, J. M. (2011, 2). Effective Communication Paper . Retrieved from StudyMode.com: http://www.studymode.com/essays/Hcs-325-Effective-Communication-Paper-608428.html

Tomes, J. P. (2007). Management of HIPAA Compliance Takes onIncreased Importance with Criminal Enforcement. Journal of Health Care Compliance.

Page 12: HCS485 final Tech Data Security Chg Technology of HC 5

Image References and URL’s

Page 13: HCS485 final Tech Data Security Chg Technology of HC 5