• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

ITGS portfolio Privacy and security issues that arise when using Health Information Technology to manage your information.

Extracts from this document...

Introduction

Portfolio Assignment #2 Privacy and security issues that arise when using Health Information Technology to manage your information. Area of Impact: 3.3 Health October 5, 2010 Word Count: 999 News Item: http://healthinsurance.about.com/od/healthinsurancebasics/a/health_IT_overview.htm Presentation of the Issue Personal Health Records (PHR), Electronic Health Records (EHR) and Electronic Prescribing (eRx) are all forms of the Health Information Technology (HIT). HIT has become very popular in the past few years because it can benefit both the client and the doctors by managing health care information in an efficient way. Advantages that come along with using HIT would be reducing the amount of paperwork needed for medical records, reducing errors in prescriptions when reading doctor's handwriting and reducing the employment salary by eliminating workers that maintain medical records. Although many articles have agreed that "The advantages of EHR are extensive and no one can argue that point. 1"There can be consequences and disadvantages when using this type of technology to store personal information. Just like most communication systems, issues regarding security and privacy can arise. Problems like that can occur because many organizations, doctors, specialists and family members have access to your health information. Another issue that may apply would be the equality of access and the ability to actually use this system. Most family households have access to Internet, but a lot of seniors don't, and the elder population is what makes up most of the clients. Not only would most seniors not be able to access it, users who are not tech-savvy might not be able to access HIT, or it might take the user a while to utilize the system and understand the capabilities of it. Information Technology Background of the Issue Health information first started out to be stored in folders and files in offices and hospitals, which can be very dangerous and hard to manage. Now that new technology is being discovered every second of every day, we no longer need the large amount of space and the complicated pile of paperwork to keep personal health information of individuals in the society. ...read more.

Middle

Over the past several years there have been security breaches in hospitals and doctors' offices resulting in medical identify theft. Access to your personal information may allow thieves to bill for medical services in your name. Through the Health Insurance Portability and Accountability Act (HIPAA) of 1996, the federal government has established strict rules to protect the privacy and security of your electronic information. HIPAA gives you rights over your health information and sets rules and limits on who can look at and receive your health information. Your doctor, other health care providers and your health plan are required to keep your information private by teaching their staff how your information may and may not be used and shared and take appropriate and reasonable steps to keep your health information secure. http://healthinsurance.about.com/od/healthinsurancebasics/a/health_IT_overview.htm EMR Advantages and Disadvantages Article by MandaSpring (14,839 pts ) Edited & published by Anurag Ghosh (37,078 pts ) on Dec 16, 2008 As a brief overview, let me take the time to give an EMR definition in a nutshell. EMR (Electronic Medical Record) is an information sharing system for both patients and doctors. The doctors add their data, research, prescriptions, etc. into this web based file and the patient, as well as the patient's other doctors, have access from anywhere in the world. As with any new system there are advantages and disadvantages. This technology can make storing and sharing information easier and more efficient not to mention convenient. But unfortunately, there are disadvantages with EMR. EMR Advantages The advantages of EMR are extensive and no one can argue that point. Just some of the over all benefits that EMR provides doctors and patients world wide include, but are not limited to: 1. An enhanced quality of care due to the amount of information at hand from every available and viable medical source. 2. Faster and more efficient diagnosis and treatments. ...read more.

Conclusion

They see the tagging as some kind of "Big Brother" operation. Another group, the No VeriChip Inside Movement, likens VeriChip as "cataloguing" humans similar to the way the Nazis have tattooed numbers on the skin of concentration camp detainees. Popular Hollywood films on privacy incursions (e.g. The Net, Public Enemy No. 1) increased further people's paranoia about personal data. Where do we go from here? Without doubt, we have the technology to make EMRs standardized and efficient. Google Health, Microsoft HealthVault and similar online personalized health information accounts are enabling patients to take control of their medical records. The main issues that need to be overcome are data security, protection of privacy and gaining the confidence of the patients. It doesn't seem evident that the use of RFID and similar tagging chips will become acceptable or popular anytime soon. However, we live in a digital world and we cannot hold back progress indefinitely. With improved technology and data protection tools, let us hope the EMR issue will be resolved soon. http://www.submityourarticle.com/articles/Katt-Mollar-5424/electronic-medical-records-54667.php Health Information Privacy Your Health Information Is Protected By Federal Law Most of us believe that our medical and other health information is private and should be protected, and we want to know who has this information. The Privacy Rule, a Federal law, gives you rights over your health information and sets rules and limits on who can look at and receive your health information. The Privacy Rule applies to all forms of individuals' protected health information, whether electronic, written, or oral. The Security Rule, a Federal law that protects health information in electronic form, requires entities covered by HIPAA to ensure that electronic protected health information is secure. http://www.hhs.gov/ocr/privacy/hipaa/understanding/consumers/index.html 1Spring, Manda. "EMR Advantages and Disadvantages." Bright Hub. 16 Dec 2008. 27 Sept 2010. <http://www.brighthub.com/health/technology/articles/7402.aspx> 2Spring, Manda. "EMR Advantages and Disadvantages." Bright Hub. 16 Dec 2008. 27 Sept 2010. <http://www.brighthub.com/health/technology/articles/7402.aspx> 3Mollar, Katt. "Electronic Medical Records-The Pros and Cons." Submit Your Article. 11 Apr 2009. 20 Sept 2010. <http://www.submityourarticle.com/articles/Katt-Mollar-5424/electronic-medical-records-54667.php> ?? ?? ?? ?? ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our International Baccalaureate Misc section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related International Baccalaureate Misc essays

  1. Sample Personal Statement

    Staying true to my personal values in such a challenging ethical environment has not been easy; but when I look in the mirror every day, I like the person I have become, and I sleep well at night knowing that I have done all in my power to be an honest, hard working and loyal person.

  2. Extended Essay: How do different Flavours, Storage Times affect the Effectiveness of Crisps as ...

    what test number each is.) Place them in the flame until they are ignited. 5. Hold each crisp between a copper calorimeter and a tin lid. Let them burn until they become all or mostly black. If the flame goes out before this happens, try to ignite them again.

  1. Internet and computer safety

    3. Look for 3 examples of Internet abuse. http://news.bbc.co.uk/2/hi/technology/2381123.stm - cost http://news.bbc.co.uk/2/hi/business/8396256.stm - phishing http://news.bbc.co.uk/2/hi/business/8543436.stm - phishing (i) Explain an appropriate social and/or ethical issue related to the IT system, (150 words). Phishing is defined as gaining some bodies details via an e-mail requiring bank account details or various methods of doing so, this allows fraudsters to gain

  2. Drugs should not be legal

    When a pregnant woman takes large doses of ?cocaine, the placenta may tear loose, killing the fetus and putting the mother's ?life in danger. Even one use of crack can cause serious damage to fetus or to a ?breast-fed baby.

  1. Proyecto Personal - Anorexia y Bulimia

    la salud, es decir, nuestra alimentaci�n, pensamientos, autoestima, cuerpo, y mente en general. Descripci�n En la elaboraci�n de mi proyecto personal, mi objetivo ha sido informar y tratar de ayudar tanto a mis amigos como a otras personas sobre un tema que, en mi opini�n, es muy relevante hoy en d�a, la anorexia y la bulimia.

  2. What are the concerns of practitioners and patients on Electronic Medical Records?

    Apparently, new threats of the EMRs' security are a concern. Anyone can access to the data system with relevant passwords. Even people can hack into any accounts as long as the system is connected to the internet. Paper records can be copied, scanned or faxed but the occasions rarely happened.

  1. Community Health

    As well as emphasising health in a positive sense, this definition is significant in stressing mental as well as physical aspects of health, and social as well as individual well-being. It has however been criticised for being Utopian, whereas it should perhaps be viewed as an ideal towards which health care and other social actions may be orientated (Twaddle, 1974)

  2. GCSE Welsh Baccalaureate Completed Diary Pages

    I did many laborious tasks, such as walking animals, washing them, cleaning etc? all the work that had to be done, but was very unpleasant. Whilst working with year nine pupils, I helped them particularly when helping decide their GCSE options because as a GCSE pupil myself, I could give

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work