Security measures used in healthcare agencies

The privacy of patients, together with their information security, is considered among the major barriers to entry when considering the adoption of electronic health records in healthcare (Kruse et al., 2017). Sewell (2019) claims that firewalls are commonly used to safeguard against unauthorized access. Firewalls operate by examining all messages that enter and leave a system, and those that fail to meet certain criteria are blocked. They also function by denying messages depending on whether the destination port is considered acceptable. It is imperative to ensure constant maintenance of the firewalls and safeguard the system from any prying eyes. White hat hackers can be used to identify any security weakness, thereby enabling actions to safeguard against security breaches found. However, it is important to note that firewalls are unable to enforce password policy or even prevent any misuse of passwords used to ensure data integrity and confidentiality (Thomas & Stoddard, 2017). When there is a lax security policy or poor decisions are made, then firewalls become ineffective.

Audit trails are also commonly used as security measures. An audit trails give a list of individuals that accessed the system as well as activity and time of access (Langer, 2017). Audit trails help safeguard data from prying eyes. Whereas all healthcare professionals should gain access to patient records, this should be followed by an audit trail, which is routinely examined to find out if any breaches have occurred. These trails identify the individual’s username, pages accessed, internet protocol address, and the length of time used to access the information (Sewell, 2019). Audit trails can be highly time-consuming and slow operations, but they are worth the time. Generally, for security measures to be effective, organizations should be committed to training and educating employees on the importance of ensuring data security and ways of protecting patient data.

References

Kruse, C. S., Smith, B., Vanderlinden, H., & Nealand, A. (2017). Security techniques for the electronic health records. Journal of medical systems41(8), 1-9.


Work with us at nursingstudyhub, and help us set you up for success with your nursing school homework and assignments, as we encourage you to become a better nurse. Your satisfaction is our goal


Claim your 20% discount!