Protection of Proprietary Information Is Term Paper

Total Length: 1206 words ( 4 double-spaced pages)

Total Sources: 3

Page 1 of 4

This education program must include all levels of the institution from the highest level of management, physicians, nurses, technicians and support staff. As much as possible, it should also include all outside vendors and casual hires.

Although employee leaks remain the primary source for the loss of proprietary information attacks on information systems by hackers, viruses, worms and the occasional angry employee are becoming an increasingly more serious problem. The actual seriousness of this problem is skewed due to the fact that most institutions do not report such occurrences in order to avoid the negative publicity associated with such breaches.

Security breaches of this nature have traditionally been relegated to the exclusive province of it personnel. It was believed that such personnel were best able to handle such problems and, for the most part, that remains the case but due to the increase in such occurrences collateral damage must now be addressed as well. It technologists can correct the underlying problem that allowed the breach to occur but it remains the responsibility of management to determine how to handle the after effects.

The problem with security breaches relative to medical records is intensified currently by the increased pressure to utilize digital medical records. The standardization of medical records is seen by many as a way to lower health care costs. Critics argue that in the process a corresponding increase in security problems is likely to develop. Unfortunately the trend toward standardization is a reality that must be dealt with and management must find a way to safeguard their institution's information within the context of standardization.

In order to do so, a system of safeguards should put in place as soon as practically possible. Such safeguards should include controls and guidelines to ensure the protection of data and information, including all clinical records against loss, destruction and tampering.

Stuck Writing Your "Protection of Proprietary Information Is" Term Paper?

They should protect against unwarranted and unauthorized removal of records from the physical premises. Accuracy of all records is a must and the system should be designed so that all information is collected professionally and cannot be falsified or altered.

The cooperation of the it department, the Medical Records department and all other management offices must be facilitated at all costs. Every effort must be made to make communications between these various offices as open and unfiltered as possible. A well disciplined checks and balances system should be utilized. In an era when information is so easily accessed and transferred, it is essential that no one person or department has absolute control over any information. Passwords for access to all vital information should be changed and reset on a frequent basis and subject to strict protocols. Needless to say, daily backup of all data, configuration files and source codes must be done.

Modern technology has brought many important benefits to the operation of large institutions but it has also brought corresponding problems. It is the responsibility of management to ensure that the benefits are realized while at the same time avoiding as many of the problems as possible. The role of a professional information officer is to effectively oversee such operation. By implementing the suggestions offered herein the possible damaging use of any of the hospital's proprietary information should be minimized.

Footnotes

Gallagher, L. (2009). 2009 HIMSS Security Survey. Healthcare Information and Management Systems Society.

2 Id

3 Health Information Privacy. (n.d.). Retrieved November 29, 2010, from Department of Health and Human Services: http://www.hhs.gov/ocr/privacy

4 Nickels, William, McHugh, James, McHugh, Susan, (2008). Understanding Business, McGraw-Hill

5 Security Research in the Computer Science Department at Carnegie Mellon. (2010). Retrieved November 29, 2010, from Computer….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Protection Of Proprietary Information Is" (2010, December 03) Retrieved May 16, 2024, from
https://www.aceyourpaper.com/essays/protection-proprietary-information-6149

Latest MLA Format (8th edition)

Copy Reference
"Protection Of Proprietary Information Is" 03 December 2010. Web.16 May. 2024. <
https://www.aceyourpaper.com/essays/protection-proprietary-information-6149>

Latest Chicago Format (16th edition)

Copy Reference
"Protection Of Proprietary Information Is", 03 December 2010, Accessed.16 May. 2024,
https://www.aceyourpaper.com/essays/protection-proprietary-information-6149