With the increase of health information technology used to store and access patient information, the likelihood of security breaches has also risen. In fact, according to the Canadian Medical Association Journal (CMAJ):
In the United States, there was a whopping 97% increase in the number of health records breached from 2010 to 2011… The number of patient records accessed in each breach has also increased substantially, from 26,968 (in 2010) to 49,394 (in 2011). Since August 2009, when the US government regulated that any breach affecting more than 500 patients be publicly disclosed, a total of 385 breaches, involving more than 19 million records, have been reported to the Department of Health and Human Services.
A large portion of those breaches, 39%, occurred because of a lost, stolen, or otherwise compromised portable electronic device—a problem that will likely only get worse as iPads, smartphones, and other gadgets become more common in hospitals. (CMAJ, 2012, p. E215).
Consider your own experiences. Does your organization use portable electronic devices? What safeguards are in place to ensure the security of data and patient information? For this Discussion you consider ethical and security issues surrounding the protection of digital health information.
- Review the Learning Resources dealing with the security of digital health care information. Reflect on your own organization or one with which you are familiar, and think about how health information stored electronically is protected.
- Consider the nurse’s responsibility to ensure the protection of patient information. What strategies can you use?
- Reflect on ethical issues that are likely to arise with the increased access to newer, smaller, and more powerful technology tools.
- Consider strategies that can be implemented to ensure that the use of HIT contributes to an overall culture of safety.
- Ask a probing question, substantiated with additional background information, evidence or research.
- Share an insight from having read your colleagues’ postings, synthesizing the information to provide new perspectives.
- Offer and support an alternative perspective using readings from the classroom or from your own research in the Walden Library.
- Validate an idea with your own experience and additional research.
- Make a suggestion based on additional evidence drawn from readings or after synthesizing multiple postings.
- Expand on your colleagues’ postings by providing additional insights or contrasting perspectives based on readings and evidence.
Nursing Responsibility to Protect Patient Information
Office of the National Coordinator for Health Information Technology (ONC) developed a framework to address privacy and security challenges online related to health information (Brown, 2009). The eight principles are (1) individual access; (2) correction; (3) openness and transparency; (4) individual choice; (5) collection, use, and disclosure limitation; (6) data quality and integrity; (7) safeguards; and (8) accountability (Brown, 2009).
The first four principles describe an individual’s rights regarding the accessibility, disclosure about how their information is collected and treatment of their personal health information…………………..PLACE ORDER FOR COMPLETE AND CUSTOMIZED ANSWER