StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Sensitivity and Protection of Data - Essay Example

Cite this document
Summary
First of such themes touches on the access that patients get on protected health information collected about them. In this regard,…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.3% of users find it useful
Information Sensitivity and Protection of Data
Read Text Preview

Extract of sample "Information Sensitivity and Protection of Data"

INFORMATION SENSITIVITY AND PROTECTION OF DATA Obvious themes common among each organizations policies Scanning through the information protection policies of the various organizations, there are some key themes that run through almost all of them. First of such themes touches on the access that patients get on protected health information collected about them. In this regard, each of the organizations identifies the patient as the sole owner of the health information collected about him or her (Mayo Foundation, 2002).

As the legal owner of the information, patients are considered by the various organizations as having total control as to how the information collected about them are going to be used and in what manner they are going to be used. More importantly, public access to information collected on patients is an instrumental component of the themes because all the organizations give recognition to the fact that people information are the private ownership of the patients, the information cannot be put out to public domain without necessary due course and procedure followed (Fielding.

, Teutsch and Koh, 2012). In some cases, the organizations even consider the possibility of the information being put on public domain as a last resort. Another important theme also has to do with the right to amend health records. This is an important theme to the organizations because they consider health state of patients as something that is not perpetual but periodically changes with time. As these changes take place, right is given for the amendment of the health records. Finally, the theme of privacy complaint reporting and tracking runs through almost all the organizations as the organizations use this as a medium for ensuring that there is an effective evaluation and monitoring system by which all forms of irregularities with information practices can be tracked and appropriately addressed (Mayo Foundation, 2002).

Differences in Policies In terms of aim and purpose, it would be said that almost all the organizations have a common objective to attain with protected health information. However, a line of significant difference is drawn when it comes to the mode of implementation of this all important goal of ensuring that health information of patients are protected. Between Mayo Foundation and Georgetown for instance, it would be observed that there is a clear cut different in the approach to ensuring that there is implementation whereby Mayo Foundation prefers the use of information security program, which is an integrated action plan, whereas Georgetown uses Privacy Complaint Reporting and Tracking to achieve the same goal.

Between the two the major difference that can be seen is that the approach used by Mayo Foundation is decentralized whiles the approach used by Georgetown is decentralized. What this means is that Mayo Foundation tries to use a system that is based on the internal operations of the organization. For example there are departments within the organization that strictly ensures that the information security program is undertaken successfully (Georgetown University, 2003). Georgetown on the other hand opens up the Privacy Complaint Reporting and Tracking to every member within the organization that can produce useful results.

All said and done, Beth Israel Deaconess Medical Center uses Protection of BIDMC Data (Beth Israel Deaconess Medical Center, 2004), which is also a form of centralized approach to information security.Key Security Principles and Elements The key security principles and elements that can be stressed as the most important to information security are confidentiality and propriety of information. This is because the principles and elements of confidentiality and propriety of information help in giving so many premiums to health information that is coming from patients.

If for nothing at all, it helps in making the patient so important and feels secure about the fact that their information can be safe with service providers (Georgetown University, 2003).REFERENCE LISTFielding, J. E., Teutsch, S., & Koh, H. (2012). Health Reform and Healthy People Initiative. American Journal of Public Health, 102(1), 30-33.Georgetown University (2003). Protection of Health Information Policies and Procedures Manual. University Press: GeorgetownMayo Foundation (2002). Developing Policies, Procedures, and Practices.

CPRI Toolkit: Managing Information Security in Healthcare. Beth Israel Deaconess Medical Center (2004). Beth Israel Deaconess Medical Center Manual. Retrieved March 13, 2013 from http://mycourses.med.harvard.edu/ec_res/nt/71892383-6722-4b2a-a7e9-24ce21ae356d/adm04new.pdf

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Sensitivity and Protection of Data Essay - 4”, n.d.)
Information Sensitivity and Protection of Data Essay - 4. Retrieved from https://studentshare.org/health-sciences-medicine/1617855-information-sensitivity-and-protection-of-data
(Information Sensitivity and Protection of Data Essay - 4)
Information Sensitivity and Protection of Data Essay - 4. https://studentshare.org/health-sciences-medicine/1617855-information-sensitivity-and-protection-of-data.
“Information Sensitivity and Protection of Data Essay - 4”, n.d. https://studentshare.org/health-sciences-medicine/1617855-information-sensitivity-and-protection-of-data.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Sensitivity and Protection of Data

Data Governance, Quality, Integration, and Security

The policy change recommendations are aimed at improving quality of data, promoting efficient ways of sharing information, offering protection to sensitive data, managing information in its life cycle and availing trusted data critical to business.... The processes ensure that data is trustworthy and employees can be held accountable for any harmful occurrences that take place due to low quality of data.... The process needs to cover initial input of data, its standardization and refinement along the whole information flow path (Resnik & Yarowsky, 2000)....
4 Pages (1000 words) Essay

Information Sensitivity and Protection of Data (SLP)

Information Sensitivity and Protection of Data (SLP) Effectiveness of Information Security Policies of OSF Healthcare and its developed nature OSF Healthcare is one of the renowned healthcare organizations operating in the US for a considerable time period now.... The ways through which OSF could protect from the loss of its data and steps to make sure that data remains accessible in the event of a catastrophe protection of data Lost Losing any important information or data from the data base and other data storage system might significantly impact the operations of OSF, hindering its strategic goal to suffice the medical needs of the patients within due time and involving minimum costs....
3 Pages (750 words) Essay

Protecting Operating Systems, Security Vulnerabilities

Authentication This is the act of verification of a user's identity before they can log into a system and be able to execute any programs or do any changes to data in it.... Authorization is important in that it keeps away malicious or illiterate users from accessing otherwise vital resources in a computer system therefore preventing potential damage to the computer systems or the data stored inside.... Identification is crucial in safeguarding the integrity, privacy, and availability of any information technology infrastructure or system (Lakshmana, 2007)....
8 Pages (2000 words) Essay

SLP- Information Sensitivity and Protection of Data

Components that constitutes… r the present rating may be based on factors including the fact that the organization has already put in place an in-house learning system whereby all employees and other human resource personnel within the organization are getting themselves acquainted with the new information Information Sensitivity and Protection of Data Development level of organization's information security policies On a scale from to 10, the development stage of the organization's information security policy will be placed at 7 out of 10....
2 Pages (500 words) Essay

Risk Management in Practice (an air-monitoring programme is planned)

Using direct reading instruments is however limited to the fact that only the qualitative data of specific classes of chemicals is detected and measured.... This implies that this approach is not appropriate in providing qualitative data when there are multiple classes of contaminants in the...
4 Pages (1000 words) Essay

Information Sensitivity and Protection of Data (CASE) module 5

However, with the implementation of the HIPAA Act, various problems have been witnessed as Information Sensitivity and Protection of Data: HIPAA Affiliation: Summary According to Jarrell, Welker, Silsbee, and Tucker (2012) in their article entry in the journal of American business review on effects of unintended consequences, the effecting of HIPAA Act to regulate information security has a couple of ripples that were not intended in the initial plan.... iscuss what the authors uncovered about the follow of information between staff before and after HIPAA The authors of the article “Unintended Effects of…” uncovered that the flow of data before the introduction of the HIPAA was reliable as information would travel from different personnel within limited time....
2 Pages (500 words) Essay

Information Governance as a New Area of Investment

However, in the past few decades, formation of data has escalated as much as the issues associated with its regulations and acquiescence, rendering the traditional method of records keeping unable to keep up with the pace.... A company's records can either be in form of a substantial, tangible item or digital data such as application data, e-mail and database.... Consequently, the need for a more inclusive platform for organizing data and records became apparent so as to tackle every stage involved the information lifecycle (Hovenga & Grain, 2013)....
13 Pages (3250 words) Essay

Restricted Earth Fault Protection System

The position is also referred to as unit protection zone.... As per US Standards, Restricted Earth Fault protection corresponds to the Impedance Grounded Fault protection.... Restricted earth fault protection is provided in a transformer for sensing the internal fault of the transformer.... However, the part needs to coordinate with any other protection thus; there need be noIntentional delay for operation.... However, protection is reliable if and only accurate connection of CT selection is properly done....
8 Pages (2000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us