Saturday, May 11, 2019
Privacy Assesment and Training Research Paper Example | Topics and Well Written Essays - 2250 words
Privacy Assesment and Training - Research Paper ExampleThe release of this data preempt be detrimental to the hospital privacy policy and possibly smudge its reputation. Moreover the safety of the patient can be compromised in result of this release when it is received by malicious individuals. In addition, how the selective information is report is essential. Lastly it demonstrates the procedures followed in notification of any complaints. This policy governs of the entire hospital staff including the management, the physicians and nurses. a. Inappropriate affair of a computer The hospital staff frequently utilizes the computers of the institution in an improper mode. Professionalism of the healthcare providers is deflower when loss of vital information is identified (Hubner, Costas &Pernul, 2007). Unwarranted use of computers entitled to shield the medical details of a patient can cause damage to it of inconvenience confidentiality (Castagna, 2009). Information inputted in th e computer should perplex a medical basis. Procedures As a means of countering this vice, it is necessary to adopt a centralized schema management to enhance data security. This bequeath go over adequate management of sensitive patient information thus enabling accurate distribution of medical assessments specifically to victims. In the incident of any inconsistencies go through when undertaking this task it should be addressed to the central manager (King, 2008). The central manager will then evaluate the situation extensively and carefully categorize how that quandary might have happened. Any aggression or distortion of information of which he is authorized to protect will be viewed as a lapse of the security capacity of the hospital (Hubner, Costas &Pernul, 2007). His expansive knowledge in this field will ensure his expert solutions are applied to incidents of a dire nature. Secondly, to initiate this investigation he is expected to start out a program that will be conne cted to a central point. This will enable him to stock-take the activities that the hospital staff is entering in the computer system. Thirdly, the centralized system office should only make hospital based software thus restricting further use of computers by staff to make out personal functions (Hubner, Costas &Pernul, 2007). This will isolate the use of the computer equipment to hospital functions thus promoting efficiency in the hospital operations. This hospital programs should be comprehensive in recording of patient data. Fourth, the top management of the hospital should organise unprecedented surveys of the computer system to oversee if the abuse of the hospital computers has been abated. This will reassure the hospital of its efforts to mitigate the improper engagement of the hospitals facilities and enhance confidence in the centralized system capabilities. The fifth entails employment of employees who will discreetly monitor their colleagues use of this computer syste m will surely better responsible computing (Hubner, Costas &Pernul, 2007). These doctors will be lieutenants of the top management which will take the prohibitive actions on the perpetrator. Lastly, the application of firewalls and passwords to limit the people accessing information of the patient is crucial. This will diminish the dissemination of information to unscrupulous persons who can have malicious motives towards the patient. Hospital professionals who are considered to be culprits should be addressed appropriately of the on the consequence of their
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.