Ethical and Security Issues of HIT
Order Description
Recent headlines have covered a rash of security breaches at companies around the globe. Millions of customers and clients have had their information stolen by hackers
or lost through careless data handling. With the push for switching medical records from paper to digital people have expressed concerns about the safety and security
of this information. How much faith can patients put into a health care providers commitment to privacy ethical standards and careful protection of health care
information?
The transition to digital communication presents ethical and security issues never before encountered. Despite the concerns generated by the digital paradigm shift
the key values of privacy confidentiality autonomy and non-maleficence still can provide a framework for decision making in the context of health information
technology. The question that health care professionals encounter when contemplating HIT is how well these ethical and security frameworks withstand the test of time
as privacy and security issues grow more complex.
This week you explore the ethical and security issues that nurses need to be aware of when working with sensitive private information. You also appraise strategies
for ensuring the security of patient information.
Post
1)An analysis of the nurses responsibility to protect patient information
2) The extent that HIT has made it easier or more difficult to protect patient privacy.
3)Comment on any security or ethical issues related to the use of portable devices to store information.
4)Assess the strategies your organization uses to safeguard patient information
5) how these promote a culture of safety.
6) Describe an area where improvement is needed and one strategy that could address the situation.
McGonigle D. & Mastrian K. G. (2015). Nursing informatics and the foundation of knowledge (3rd ed.). Burlington MA: Jones and Bartlett Learning.
Chapter 5 Ethical Applications of Informatics
This chapter examines the ethical dilemmas that arise in nursing informatics. The authors explore the responsibilities for the ethical use of health information
technology.
Review Chapter 23 Research: Data Collection Processing and Analytics (pp. 415416)
In this section the author explains information fair use and copyright restrictions. The section describes processes for ensuring the security of a computer network.
Brown B. (2009a). Improving the privacy and security of personal health records. Journal of Health Care Compliance 11(2) 3940 68.
Retrieved from the Walden Library databases.
The author of this article examines the use of the document titled Nationwide Privacy and Security Framework for Electronic Exchange of Individually Identified Health
Information. The article describes how the framework aims to construct an approach to address the privacy and security challenges that come with health information
exchanges and personal health records.
Dimitropoulos L. Patel V. Scheffler S. A. & Posnack S. (2011). Public attitudes toward health information exchange: Perceived benefits and concerns. American
Journal of Managed Care 17 SP111SP116.
Retrieved from the Walden Library databases.
This article describes a study that sought to determine the attitude of consumers toward electronic health information exchanges (HIE) HIE privacy and security
concerns and the relationship between these concerns and the perceived benefits of HIE. The authors recommend solutions to some of the privacy challenges stimulated
by HIE.
Goodman K. W. (2010). Ethics information technology and public health: New challenges for the clinician-patient relationship. Journal of Law Medicine & Ethics 38
(1) 5863.
Retrieved from the Walden Library databases.
In this article the authors focus on how nurses can use health information technology to help transform health care using the recommendations included in the 2010
Institute of Medicine report The Future of Nursing Leading Change Advancing Health. The author also discusses the 2011 National Strategy for Quality Improvement in
Health Care.
Hoffman S. & Podgurski A. (2011). Meaningful use and certification of health information technology: What about safety? Journal of Law Medicine & Ethics 39(3)
425436.
Retrieved from the Walden Library databases.
This article stresses the necessity of sufficient safeguards for EHR systems. The author explores current safety regulations for EHR system design and deployment. The
author makes additional recommendations for protecting public health in the digital area.
Rothstein M. A. (2010). The Hippocratic bargain and health information technology. Journal of Law Medicine & Ethics 38(1) 713.
Retrieved from the Walden Library databases.
The increasing availability of sensitive patient information granted by electronic health records has generated significant debate about patient privacy. This article
examines the potential ethical and legal consequences of patient-directed sequestering of sensitive health information.
Optional Resources