Friday, May 3, 2019

SLP- Information Sensitivity and Protection of Data Essay

SLP- Information Sensitivity and security of Data - Essay ExampleThe reason why the present in-house learning system is that the hospital cultivation system (HIS) has been described as one of the most complex, which if practitioners do not get very old(prenominal) with could lead to several health complications for service users (Miller and Sim, 2004). In addition to the in-house learning system, on that point has also been the achievement of enough information system equipment and technology tools that caters for modern trends and changes in health service delivery.The assurance of confidentiality of information and information constitutes an ethical consideration for the new hospital information system implemented within the system of rules (Devaraj and Kohli, 2000). This is because it is important that the organization adheres to national and international provisions of health service delivery such as HIPAA regulations, which enshrines that patients receive maximum security and confidentiality on their data and information (Chaudhry et al, 2006). Presently, the organization uses a technology base insurance policy that makes it impossible for data and information within the database of the organization to be accessed by people who ar not directly involved in a given section of the organization to which the information belongs. For example, heedless of the network provision on the system, those in the pharmacy section cannot access information from the laboratory department without prior approval from the laboratory department. Moreover, there is the use of a password system in the security of data such that only a limited number of people are allowed access to the system. This policy also goes a long way to ensure reliability of data as the possibility that there will be doctoring of key information is almost an impossibility. Finally, there is a special biometric identification and secret writing system that identifies patients and people whose information is stored on the system rather than the use

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.