0 Comments

Feb 23, 2024 NR 512 Health IT Topic of Week Assignment

NR 512 Health IT Topic of Week Assignment
NR 512 Health IT Topic of Week Assignment
The health Information Technology (HIT) department has implemented successful strategies for healthcare security and privacy as electronic health information records are constantly shared among different providers’ systems (Rezaeibagha, Khin, & Susilo, 2015).  In my practice they use multiple strategies to help protect patient health information some of them I am aware of.  Among these strategies they have integrated a collective approach that include administration, staff, and technology to maintain that safety of their data.  All employees have a mandatory education module to complete about information security awareness.  They have eliminated the access of work related software from home.  Now in an effort to keep health information technology safe, employees are not able to access their email from home, nor are they able to view their payroll data.  Staff at the management and supervisory level are able to use an app called entrust that generates a special password that employees can use to access organizational email, and payroll data.  Other strategies used are prompts that make us aware of outside incoming emails to avoid phishing scams.  Measures implemented to reduce risks, increase safety of sensitive health information continue to improve with technological advances.
References Rezaeibagha, F., Khin Than, W., & Susilo, W. (2015). A systematic literature review on security and privacy of electronic health record systems: Technical perspectives. Health Information Management Journal, 44(3), 23-38. doi:10.12826/18333575.2015.0001
I currently work as an epic consultant; implementing “go live” projects throughout the states when my health permits and we have several strategies in place to secure patient information.  Our company many times are assisting facilities to go from paper to computerized charting for the first time and PIH security is one of the major concerns during this implementation. One of the major secure strategies we have put in place is assisting all health care providers to creating a personal and secure login to the epic system. This secure login is personal to the user and should not be shared with anyone. Accessing a patient’s chart should be done on a need to know basis and login activity is frequently monitored to unsure patient safety and security. Nurses, providers, and ancillary staff are required to undergo epic training which includes HIPPA guidelines, safe and secure login/logouts, and policies and procedures related to facility’s guidelines to accessing a chart. We also have “hard stops” that require health care providers to indicate the role and reason for accessing a chart for patients we consider to be VIP: employees, individuals with very sensitive information in their chart, public figures, individuals in police custody, patient’s suspected of being abused, and psych patients. All access into these charts are closely monitored and unauthorized access can lead to immediate termination. Patient security of information is everyone responsibility and during “go lives” it takes a village to remind end users to login, logout, protect screens on WOWS from on lookers, and be mindful of surroundings. PHIs are shared among different systems and health care providers and this openness raises considerable concern about patient privacy owing to the possibility of unauthorized access or misuse owing to improper security implementation (Rezaeibagha, Than, and Susilo, 2015).
Struggling to Meet Your Deadline?
Get your assignment on NR 512 Health IT Topic of Week Assignment done on time by medical experts. Don’t wait – ORDER NOW!
Meet my deadline
Click here to ORDER an A++ paper from our Verified MASTERS and DOCTORATE WRITERS NR 512 Health IT Topic of Week Assignment:
Reference:
Rezaeibagha, F., Khin Than, W., & Susilo, W. (2015). A systematic literature review on security
            and privacy of electronic health record systems: technological perspectives: Health
            Information Management Journal, 44(3), 23-38. Doi:10.12826/18333575.2015.0001.
            Rezaeibagha.
We have quite a few strategies and resources to secure patient health information that come to mind. I will start with being an authorized user who must have a log-on and password in order to enter our system. The password will change every 90 days or less and after 3 failed attempts to log-on into the system the users account will be locked until the IT department corrects the issue with a verified user.
All computers in my facility have an automatic log-off feature when not in use for more than 3 minutes. This is an extra layer of security incase an employee forgot to log-off or had to run-off for an emergency. We are also not allowed to leave even a single sheet of paper with patient information unattended. Even if turned over, the fact that someone can turn it back over makes it a risk for privacy.
Any family member or friend who calls to inquire about a patient’s condition must be able to give a 4-digit code that is only given to the patient. So, if the patient has given the family member or friend the code then you may give information about their status, however I still attempt to sway away from that if the patient is A&O x’s4. If the patient needs more education on their condition I would rather do that so they can relay the info themselves. If the patient is simply having a hard time explaining a situation I’m always more than happy to help.
We also have annual required and updated education for HIPAA which covers many topics and now even includes violations for social-media and personal electronic devices. Other topics include use of email, fax machines and talking is public areas to name a few. We go to great lengths at my facility to protect patient privacy with even our IT department sending us notifications of new and potentially dangerous email threats. It takes a whole department to constantly be surveilling for potential dangers and sometimes that still isn’t enough
HealthIT Topic of Week Assignment
Guidelines with Scoring Rubric
Purpose
This assignment is designed to help students
· Develop an appreciation for informatics, basic skills and knowledge required in practice settings. Students will select a “hot” or popular topic of particular interest to their practice to discuss. The topic will be selected from the website using the link provided in the course Assignments section.
Due Date:Sunday 11:59 p.m. MT at the end of Week 5.
Total Points Possible: 175
 
NR512 Health IT Topic of Week Assignment
Requirements
Students will login to FierceEMR and FierceHealthIT using the link provided in the reading assignment module for Week 5and select a “current/popular” topic of the week that may impact their practice. Students, in a professionally developed paper, will discuss the rationale for choosing the topic, how it will impact practice in a positive or negative manner, citing pros and cons. Include a discussion of how informatics skills and knowledge were used in the process relevance to developing the assignment. In the conclusion, provide recommendations for the future. Submit completed FierceHealthIT Topic paper for Wk. 5 to dropbox by end of Week 5.
Preparing the paper
1. TheFierceEMR and FierceHealthITCurrent/Popular Topic of the Week assignmentmust be a professional, scholarly prepared paper. See the guidelines for writing a professional, scholarly paper in the Course Resources. The professional paper will have an introduction, body of paper to explain what you are doing, summary/conclusion, and at least three scholarly references.
2. Required texts may be used as references, but a minimum of three sources must be from outside of course readings.
3. All aspects of the paper must be in APA format as expressed in the 6th edition.
4. The paper (excluding the title page, introduction and reference page) is 4-6 pages in length.
5. Ideas and information from professional sources must be cited correctly.
6. Grammar, spelling, punctuation, and citations are consistent with formal academic writing.
 

Order a similar assignment, and have writers from our team of experts write it for you, guaranteeing you an A

Order Solution Now

Categories: