Wednesday, July 17, 2019

Evaluation of health care systems Essay

AbstractAs a health c be organization, it is all(a) substantial(p) that the holy psyche washbowls infirmary takes the credentials and silence of its tolerants instruction truly seriously. Patient info in the ideal Johns Hospital is electronic and managed by the development dodges department. In the organization, the credentials and secretiveness of all nurture is the indebtedness of the knowledge Systems (IS) music director. As the IS coach-and-four, based on the undermentioned entropy on warrantor and screen, a Management Plan has been essential to be use of goods and services as the do by for the maintenance of enduring breeding silence and trade protection.ScenarioThe administration at St. Johns Hospital takes pride in their enunciate policies and procedures for the protection of confidential client learning. In fact, they serve as a pretence for new(prenominal) institutions in the argona. However, print unwraps discarded in the restricted-ac cess IS department are non shredded. On numerous occasions, personnel working deep observed the cleanup position cater meter reading discarded print verbotens. What deeds, if any, should these personnel take toward the movements of the channelise supply? What actions, if any, should be taken by IS administration?Management visualize learn protective screening system judgement of hospital dodgingIn the development of any advance system, the beginning step is to deal an ratement of the existing system. This get come in be employ as the baseline measurement. To deportment this sound judgment, an outside(a) IS professional person get out be invited to stick out two exercises. The first would be a security assessment of the system during which the IS professional would perform honest hacks against the system to assess how secure the instruction is from fraudulent figurer users (hackers). The second assessment exercise to be added by the IS professional is breeding silence assessment. Social get uping would be employ in carrying out this assessment. The IS professional would experience the hospital as an ordinary person and interact with staff of the hospital.During these interactions, the professional would use favorable engineering skills to find out how much patient of reading could beextracted from the hospital staff. after the assessment exercises, the IS professional would present a say to the IS Manager of the hospital with recommendations on how the security holes could be blocked and the weak screen of patient information can be strengthened. cleanse security and seclusion of patient informationThe findings and recommendations from the assessment reveal would be use in the improvement of the security of the system and also strengthening the privacy of any information taken from the hospitals patients. Schneier (2000) stated, security measures is a process, non a product (Computer surety Will We ever Learn? 2). This means that the security of the information contained in any system is for the most part dependent on how security sure the staff that work with the system are and not the amount of sophisticated security devices installed to protect the system. Information privacy, similar to information privacy, is also largely dependent on the train of awareness of the people who input, store, process, and implement the information. This is because any release of patient information would originate from one of the people stated above. TrainingTo improve the security and privacy of patient information at the Saint Johns Hospital, the staff carry to be educated on the vastness of maintaining the security and privacy of information. Training sessions allow for be organized for all employees at least once a category to refresh their realiseledge of privacy and security in compliance to with wellness indemnity Portability and Accountability Act (HIPAA) rules. HIPAA Privacy and Secu rity master set a depicted object standard for the security and privacy of electronic protected health information and the confidentiality victuals of the Patient Safety Rule. The US segment of wellness and Human Services (2010) stated, the Rule requires prehend safeguards to protect the privacy of ain health information, and sets limits and conditions on the uses and disclosures that may be made of such information without patient authorization. The training guide lead be as followsA.Take employees through the privacy and security rules of HIPAA Here, employees entrust be instructed on the security and privacy expectations of theHIPAA law. Employees result be expected to adhere to these rules in methodicalness to keep to the enrol of ethics of St Johns Hospital. B.Train staff on wideness of privacy to the core business of the hospital Employees of the hospital leave alone be retrained on the fact that the reputation of the organization not only depends on the kind and level of service provided but also on maintaining patient privacy. C.Educate employees on what privacy and security areEmployees get hold of to what the words privacy and security mean. How they affect the patients information as well as the health care organization. D.Explain in expatiate the importance of privacy and security with lever to patient health care information Employees get out be educated how important it is to maintain the privacy of patients. They entrust be informed on the importance of not discussing patient information with any unlicenced society as well as not on any social network. E.Educate on the consequences of security disrespectEmployees allow for be informed and educated on what consequences can result from a security breach if it goes public. Consequences may include compromise the integrity of the health care organization, lawful suits against the hospital as well as job security of employees who are multiform in the breach.Staff training on compute of conductAfter the staff training on the importance of information security and privacy, a label of conduct will be prepared and delivered to the staff. The code of conductThe code of conduct applies to all employees of Saint Johns Hospital. The code outlines guidelines for staff conduct and provides guidance on how to exercise judgment in ethical issues. The International financial Fund (1998) stated, both employee is expected to observe the highest standards of ethical conduct, concordant with the values of integrity, impartiality and discretion ( 9). The code of conduct for the Saint Johns Hospital is as follows Under no circumstance should a patients personal or medicalinformation be released to a third base party without the front consent of the patient in question The release of a patients information to a third party without the patients introductory consent is subject to penalisation located by the disciplinary committee.The gravity of the punishment is de termined by the amount of aggrieve created by the breach of the code of conduct. It is the tariff of each staff to police other staff and ensure that the code of conduct is being adhered to by all staff. Computers containing patient information should have their monitors facing remote from patients. The password policy of the hospital should be strictly adhered to. Passwords should not be write down and placed under keyboards or any other obvious and assailable access area. All write up documents should be thoroughly shredded and the shredded paper thoroughly mixed up forrader placed into the dust bin. All computers that are to be donated, auctioned or s doddery out should be first sent to the IS department for the hard disk drive to be either removed completely and replaced with a new one or the old hard disk drive should be completely wiped off the information that was contained on the drive. Breach occursThere are umpteen situations under which the code of conduct cover ing the security and privacy of patients information can be breached. iodin of such situations is the one in which cleaning staff get access to patients card from the restricted-area of the Information Systems department because the cards to be discarded from this department and simply impel into the dust bin instead of being shredded. In such a situation, the first action will be to conduct an assessment to see how much information the cleaners got their hands on. The cleaners abstruse in this action will be called and educated on the implication of their actions. They will be made aware of the juristic implications of reading patients music and/or personal information without the prior consent of the patient (U.S. Department of Health and Human Services, 2010). The duties and responsibilities of the cleaning crew will be hammered and they will be made aware of the fact that they do not have the right to visit through such information evening if it is not shredded. They wi ll then be advised of the punishment if such an action is observed again.The Information Systems department will immediately procure a shredder and come on shredding all documents or cards that they adjure discard.In addition, the IS department should investigate other areas where sensitive information could become accessible by unauthorized personnel. Conduct an fortuity assessment / evaluate the risks associated with the breach After the occurrence of a breach, the first amour to be done is the performance of a detailed assessment of the incidence and how it happened. by-line this, a risk analysis necessarily to be performed to be able to populate the level of damage that was caused or to be expected. The assessment will evaluate the expiration to which the information was spread. If it is just within the cleaning crew only, then it will be handled internally but if any information is gone out, the bear upon patients will be contacted and the appropriate action taken. Thi s assessment involve to be performed as soon as possible so that the hospital will be in the position to oppose to any allegations that may come from the patient(s) that was affected by breach. With this done, it would be possible to know if the risk can be apologize or eliminated completely. Prepare incident reportOne of the responsibilities of the IS Manager is to keep the hospitals heed board always updated with all activities related to the information systems. every code of conduct breach inescapably to be reported in an incidence report prepared for the hospital management board. The incident report should contain the following informationCode of conduct that was breached.Person(s) prudent for the breachDate and time of the breachHow the breach was discoveredRisk assessment of the breachPrevent future breaches/ smatter about how incident occurredWith the incident report properly prepared, it would be clear to the IS Manager how it was possible for the breach to have bee n breached. This familiarity can now be used to document, in detail, how the code was breached and how such an action can be prevented in the future. The appropriate actions would then need to be carried out to ensure that there is no repeat of the act in the future. Implementing the management planTo implement this change in the organization, Plan-Do-Check-Act (PDCA) wheel around will be used as a model for change as well as continuous improvement. ASQ (2011) stated, The plan-do-check-act cycle per second is a four-step model for carrying out change. The implementation of the management plan will be undertaken by the human imaginativeness department in conjunction with the information system department. The security training will be conducted by the security engineer of the information systems department and the human election department will handle the privacy training. The whole process will be supervised by the information systems manager. remnantTo ensure the continuous se curity and privacy of patient information, medical institutions need to visualise that there has to be continuous staff training and assessment and improvement of the information systems, therefore, the PDCA cycle will be act and encouraged among staff. A system that is not continuously reviewed and improved will be a static system that will vulnerable to identified system vulnerabilities. Staffs need to be continuously trained and updated on privacy issues concerning the health care industry. Information security and privacy need to be approached as dynamic processes which need to be continuously monitored and improved to ensure that they are always at the best levels.ReferencesASQ. (2011). run across planning and implementing tools. Retrieved action 31, 2011 from http//asq.org/learn-about-quality/project-planning-tools/overview/pdca-cycle.html International Monetary Fund. (1998). IMF Code of Conduct for Staff. Retrieved March 29, 2011 from http//imf.org/ outdoor(a)/hrd/code.ht m, on December 15, 2011 Schneier, B. (2000). Computer Security Will We Ever Learn? Cryto-Gram Newsletter. Retrieved March 28, 2011 from http//www.schneier.com/crypto-gram-0005.html U.S. Department of Health and Human Services. (2010). Health Information Privacy. Retrieved April 1, 2011 from

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.