StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Certification Criteria Used by HIPAA - Essay Example

Cite this document
Summary
The paper "The Certification Criteria Used by HIPAA" explains that the author agrees with the first and third claims made by the healthcare IT staff. The certification criteria used by HIPAA to justify and fund the shift from paper records to electronic ones is also essential…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.1% of users find it useful
The Certification Criteria Used by HIPAA
Read Text Preview

Extract of sample "The Certification Criteria Used by HIPAA"

HIPAA requires such programs to comply with and apply its rough, role-oriented, access control, authorization, and authentication policies. These policies help make sure that patient data is protected appropriately and that healthcare providers adhere to them (Kibbe, 2005). Overseeing and sustaining these kinds of initiatives in an active environment is certainly a heavy burden for healthcare providers. These rules are in some because healthcare providers are equally committed to allocating as many resources as possible and concentrating on the quality of care given to patients.

Translating these functions into convenient and successful security and compliance initiative is difficult (Kibbe, 2005). Second, I disagree with their claim that all application-to-database accesses by any healthcare professional are logged automatically. For a healthcare organization to enjoy automatic logging of applications to database accesses by doctors, nurses, lab technicians, and administrators, it has to employ additional security and identity management solutions. Unfortunately, HITECH does not cover these additional technological solutions even though HIPAA requires that all healthcare providers do (Kibbe, 2005).

When medical practitioners and other healthcare professionals within a single healthcare organization enter data freely into a secure database through application-to-database access, links healthcare providers are authorized to access the same data as well. This approach may eliminate redundant paperwork and lower administrative burden, but increases the risk of intrusion by unscrupulous parties in linked healthcare organizations. Ensuring that applicable system events such as booting and rebooting are logged is important because developers have to support the secure conveying of these logs from the applications to administrators.

Accesses made by healthcare professionals have to be compliant with regulations imposed across all of the different scaled and levels of healthcare provision and services. Some of the regulations present in the HITECH act and HIPAA are unclear (Kibbe, 2005). Lastly, I agree that doctors need quick access to EMRs so that encryption and key management overhead, or simply the loss of decryption keys, cannot slow them down. The password for any encoding or decoding system has to be cleared at some point for it to be entered for logging successfully (Terry, 2015).

If a user locks the system along with the passcode, the passcode will be retrievable from a different location and time. There appears to be no way to circumvent this requirement. Even though many healthcare providers implement tectonic medical records, some practices remain slow. In addition, electronic health records with the above encoding and decoding systems are costly, which healthcare providers treat as a key management overhead (Terry, 2015).

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Essay Example | Topics and Well Written Essays - 500 words - 3”, n.d.)
Retrieved from https://studentshare.org/information-technology/1694966-security
(Security Essay Example | Topics and Well Written Essays - 500 Words - 3)
https://studentshare.org/information-technology/1694966-security.
“Security Essay Example | Topics and Well Written Essays - 500 Words - 3”, n.d. https://studentshare.org/information-technology/1694966-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Certification Criteria Used by HIPAA

Safety at Work and the Unions

In order to provide a real-life example of collective bargaining, authentic electronic sources have been used.... This research paper "Safety at Work and the Unions" presents collective bargaining that can be defined as a process by which negotiations between a group of employees and employer takes place....
6 Pages (1500 words) Research Paper

Profile, incorporate, and compare the health information

APPLICATION PAPER Student's Date: Topic 1: Health Information Exchange Organizations Introduction Healthcare practitioners acknowledge that having full information on a patient during the point of care is crucial for effective and efficient medical care.... ... ... ... In view of this, policy makers, researchers and healthcare experts recognize health information exchange (HIE) as a key element in improving patient care (Brailer, 2005; Acker et al, 2007; Hripcsak et al, 2007; eHealth Initiative, 2005)....
8 Pages (2000 words) Essay

Laboratory Information Management Systems Evaluation

Primarily, it is used as a reporting tool where users enter data about a test sample.... For instance, in the United States of America alone, about 3 to 4% of money spent on healthcare is used up in laboratory testing.... The paper "Laboratory Information Management Systems Evaluation" contrasts three laboratory information management systems vendors who have a common goal which is to efficiently manage the impact of laboratory testing and the cost of patient care....
9 Pages (2250 words) Admission/Application Essay

MemoTrade Secrets and Financial Security

I would like to address each of these issues separately, as they relate to security and monitoring of our computer systems.... I will make recommendations for each issue and explain how they ... ... o our auditors,.... ... ... The U.... .... GAO(General Accounting Office) researched the procedures of 14 Fortune 1,000 companies, and found that most have procedures in place to identify and handle violations of their company computer-use “These companies reported they collect this information to create duplicate or back-up files in case of system disruptions; to manage computer resources such; and to hold employees accountable for company policies”(GAO, 2002)....
9 Pages (2250 words) Essay

The US Health Care: President Bushs Executive Order

In order to address the General Accounting Office's concerns regarding information privacy, HHS initiated several projects including the commission that strategically determines the certification criteria for electronic medical records.... In addition, unresolved debates over whether to employ an individual's Social Security number hampered hipaa implementation standards....
4 Pages (1000 words) Article

Health Care Informatics - Electronic Health Records

The essay "Health Care Informatics - Electronic Health Records" focuses on Electronic Health Records (EHRs) which are digital forms of the paper records for patients that are patient-centered and real-time making access to information instantaneous and secure to users that are authorized.... ... ...
9 Pages (2250 words) Essay

Risk Management Position in Healthcare Designated Record Set HIPAA Privacy Laws

This paper aims to analyze a case study of a doctor who breached the rules of the hipaa and was sentenced.... This research will begin with the statement that Privacy rules and the Health Insurance Portability and Accountability Act (hipaa) regulate what information regarding the health of an individual can be used and disclosed.... Covered entities and practitioners who do not observe the confidentiality of protected health information (PHI) are subject to penalties under the hipaa....
7 Pages (1750 words) Research Paper

Health Information Exchange Organizations

An essay "Health Information Exchange Organizations" reports that Finn (2011) defines health information exchange (HIE) as the making available of health-related patient information electronically between different organizations found in a region or community.... .... ... ... Healthcare practitioners acknowledge that having full information on a patient at the point of care is crucial for effective and efficient medical care....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us