Business and Economics Essay
Privacy and security of health information technology
Hospitals have been trying to deal with the issue of using information technology to save, share and protect patient’s information at their disposal. Providence health is a hospital that has implemented this technology in its operations and has reaped benefits and also faced numerous challenges from it. The information manager at the institute narrated to me the process and how it has impacted on the operations of the organization since incorporating it 5 years ago. The organization effected this project after realizing that other organizations had improved their efficiency since adopting information technology. The firm had problems’ retrieving information saved long time ago and was also running out of space to keep files that contained patient’s information and also those containing records of the operations of the hospital. The hospice was already using computers to print receipts and book patients but was not saving patients medical information in the system. The management then decided to acquire a computer information management system that could handle the receipts, bookings, patient’s information, purchases, sales, financial information, assets owned by the hospital among others. The system was bought and installed in the computers that had been purchased to handle the increased traffic and work load. Every department has a number of computers meant to make it possible for all members of staff to access a computer any time they need one since all information they use is available there. The first major challenge was training the employees while they were still supposed to be using the system in their duties. The management did not anticipate the problems that arose from this arrangement since most of the older staff were not conversant with complex computer tasks. Consequently, they took longer to learn and hence were more affected during the translation period when they were required to learn and work simultaneously without a drop in output. The whole hospital was in a mess during the first month as there were mix-ups and omissions that affected the operations of the hospital. The second month involved rectifying the problems that emerged from the first month and also ensuring that all members of staff were equipped to work with the system. Since then, there have been a few problems arising from data mix-ups which are expected to occur occasionally and also system upgrades which have led to loss of some data. However, there has been a serious challenge arising from protecting the information that is stored in the system. Patient information is confidential and should not be shared with outsiders without their consent. However, there have been a few instances where patients have lodged complaints after they found insurance companies in possession of information that they had only shared with this organization. These breaches have been traced down to a few members of staff leaking information to insurance companies, press and other organizations and individuals. There was also an instance when the system was hacked and some crucial information deleted. There are measures implemented to keep this information private. The first is providing login details to only the doctors, nurses and a few other members of staff. This makes it easier to identify where the breach occurred since there are few individuals who have access to the system. The second is restricting access to this information only to one’s computer. This implies that even doctors are not allowed to use their colleagues’ computers when accessing any information in the system. This has helped identify where a breach occurs if a hack occurs. Furthermore, there is a security system that monitors the activities of all computers. This is meant to identify cases where data may be downloaded to an external drive or even shared through an email with an outsider. These strategies have lowered the occurrences of security breaches to less than 5% from a high of 20% a few years ago. The few cases that have been reported this year have involved sharing of information through word of mouth. This implies that the information technology system that is in use here has been upgraded and customized to safeguard the privacy of the information that patients have provided to doctors and other care givers in the institution. Doctors have also been able to share information among them easily which has improved the efficiency of the organization. Monitoring of finances and the resources of the hospital is also very easy which has made it easy for the management to maximize on all it has at its disposal. The organization intends to make the system better by incorporating any new security measures that are deemed useful. The system has improved the efficiency of the organization which means there are no plans of discarding it. The plan is to improve it to minimize any leaks that may occur. This improvement will be achieved through liaising with leading organizations that develop security systems to ensure that any new developments are passed on to the hospital.
The hospital was started in 1905 and has been owned and operated by the Daughters of Charity. This is religious organization under the Catholic Church that provides health services to people in different states in the United States. The mission of the organization is to serve all persons with special attention to the poor and vulnerable. It is also offers services that are spiritually centered, holistic care which sustains and improves the health of individuals and communities. The core values of the organization are service of the poor, reverence, integrity, wisdom, creativity, and dedication. All the clinics are managed by administrators who report to the chief executive officer. This ensures that all clinics are operated in accordance to the set objectives.
The issue of information privacy is a huge problem to my organization. This is because there is a lot of information stored in the computers that should be kept private at all cost. The company keeps all its records in the computers which can be used by our competitors to overcome our strategy. In addition, clients’ details are stored in the system including all the transactions that they have carried out with the organization. This implies that the information is of paramount importance and any leak can have devastating effects on the company and its clients. Information leaks are common and are often hard to prevent especially in big organizations. This is because many employers have access to the system which makes it hard to monitor what each one is doing with the data they are downloading from this system. This has affected many organizations and created a challenge to others that are contending with this problem. This business is concerned that it might one day lose important information through a security breach that might cause irreparable damage. The issue of privacy of information stored in information technology systems is a major concern to most organizations. It needs to be addressed and the right policy developed to ensure that any risks arising from a breach are anticipated and the right checks and balances put in place. Therefore, this research topic is important to the organization since it provides an opportunity to study what the current law states and the challenges that hamper the security of information in different companies. Consequently, this is an issue that needs to be addressed since the organization has implemented a computer information system and is prone to the problems that others have faced. The organization has come up with a number of measures meant to safeguard the information that is stored in the system. The first one has been to implement a system that is hard to hack. This has been achieved through use of the best servers in the market that are hard to access without login details. This is to nullify the threat posed by hackers who access information and then sell it to competitors or use it to tarnish the name of a company. They prey on weak networks and can be overwhelmed when complex networks are adopted that make it hard to access any information. The second strategy has been to restrict access to certain critical information to specific individuals. The system is designed to allow access to people from different levels to different information. Consequently, junior employees have access to very little information while this changes as the ranks change. This implies that it is possible to tell the rank of the people who leaked information making it probable to discipline them. It also ensures that there is accountability and responsibility where information is concerned. Thirdly, all employees are expected to sign a code of conduct that bides and makes them liable to punishment and legal repercussions if they are found to have shared any material without the consent of the company. These measures are expected to minimize the cases of information security breaches. Finally, the organization should ensure that its security system is reviewed regularly to identify any weakness that may be exploited. This should be done at least every month to certify that all changes that arise and are likely to affect the system adversely are dealt with. In addition, the employees should also be sensitized on the need to contribute towards maintaining the security of the information stored here. This is because any breach will also affect them adversely which might affect their job security and their future in the industry. There should also be regular system upgrades to ensure that any bugs are removed to create a strong secure system that is reliable and likely to withstand any form of attack. These recommendations should be adopted to improve the security policy of the organization.