In the clinical setting, various technological resources can be utilized to boost patientcare and improve the delivery of healthcare services. The following are the main stepsinvolved in developing and implementing technological resources relating to electronic healthrecords. Ethical and Regulatory Practices Needed to Guarantee the Integrity of the HealthcareResourceInformation technology has the potential to improve the […]
To start, you canIn the clinical setting, various technological resources can be utilized to boost patient
care and improve the delivery of healthcare services. The following are the main steps
involved in developing and implementing technological resources relating to electronic health
records.
Ethical and Regulatory Practices Needed to Guarantee the Integrity of the Healthcare
Resource
Information technology has the potential to improve the delivery of healthcare to
patients. However, there are various complexities associated with the implementation of
healthcare systems that deal with patient data. Ethical and regulatory policies revolve around
privacy and confidentiality (Harman, Flite, & Bond, 2012). Privacy in the law is defined as
the right of patients to keep their health information without allowing it to be disclosed to
anyone. The implication is that the system should be designed in such a way that the
information is not revealed to others and can only be accessed by healthcare workers in the
organization for the sole purpose of treating the patients (Harman, Flite, & Bond, 2012). The
information should thus be only used for treatment, payment, and administrative purposes.
One practice that is related to ensuring that confidentiality and privacy are maintained is
ensuring that only authorized individuals have access to the healthcare information. Users
should have usernames and passwords. Passwords need to be strong. The use of biometrics
can also boost the security of the information.
It is also important to establish role-based privileges. Since healthcare workers have
different tasks and responsibilities, they should not have access to the same information.
Instead, the access to patient information should be based on the roles and responsibilities of
each healthcare worker. In the training process, it is important to ensure that all employees
are made aware that they have the duty and responsibility to use the information correctly.
They should also be informed about the legal consequences of the misuse of the information.
Under HIPAA, employers have a responsibility for the actions of the employees (Harman,
Flite, & Bond, 2012). The implication is that strong privacy and security policies need to be
set up to guard patient information.
References
Cresswell, K. M., Bates, D. W., & Sheikh, A. (2013). Ten key considerations for the
successful implementation and adoption of large-scale health information technology.
Journal of the American Medical Informatics Association, 20(e1), e9-e13.
Harman, L. B., Flite, C. A., & Bond, K. (2012). Electronic health records: privacy,
confidentiality, and security. AMA Journal of Ethics, 14(9), 712-719.
Select your paper details and see how much our professional writing services will cost.
Our custom human-written papers from top essay writers are always free from plagiarism.
Your data and payment info stay secured every time you get our help from an essay writer.
Your money is safe with us. If your plans change, you can get it sent back to your card.
We offer more than just hand-crafted papers customized for you. Here are more of our greatest perks.