Sunday, October 6, 2019

SLP- Information Sensitivity and Protection of Data Essay

SLP- Information Sensitivity and Protection of Data - Essay Example The reason why the present in-house learning system is that the hospital information system (HIS) has been described as one of the most complex, which if practitioners do not get very familiar with could lead to several health complications for service users (Miller and Sim, 2004). In addition to the in-house learning system, there has also been the acquisition of enough information system equipment and technology tools that caters for modern trends and changes in health service delivery. The assurance of confidentiality of data and information constitutes an ethical consideration for the new hospital information system implemented within the organization (Devaraj and Kohli, 2000). This is because it is important that the organization adheres to national and international provisions of health service delivery such as HIPAA regulations, which enshrines that patients receive maximum security and confidentiality on their data and information (Chaudhry et al, 2006). Presently, the organization uses a technology based policy that makes it impossible for data and information within the database of the organization to be accessed by people who are not directly involved in a given department of the organization to which the information belongs. For example, regardless of the network provision on the system, those in the pharmacy section cannot access information from the laboratory department without prior approval from the laboratory department. Moreover, there is the use o f a password system in the protection of data such that only a limited number of people are allowed access to the system. This policy also goes a long way to ensure reliability of data as the possibility that there will be doctoring of key information is almost an impossibility. Finally, there is a special biometric identification and coding system that identifies patients and people whose information is stored on the system rather than the use

No comments:

Post a Comment