Unit 3 Assignment 1 Patient Data Security

Great Essays
Problem Statement:
Patient data security is an ongoing and evolving problem in healthcare. According to the US Census Bureau, US Department of Health and Human Services, “143 million patients’ records have been compromised over the past five years…” (Zeadally, Isaac, & Baig, 2016). A patient’s medical record information is a highly sought after commodity among hackers, cyber criminals, and identity thieves because it contains “personal, insurance, and financial information”. They are able to sell this information for “up to $251 per record” as opposed to stolen credit card numbers, which they are only able to sell for “33 cents per number”. (Zeadally, Isaac, & Baig, 2016) Breaches of patient data security have hefty financial penalties for
…show more content…
These files took up a lot of physical storage space which cost a facility and provider a lot of money and they were mostly stored off site (Harman, Flite, & Bond, 2012; Malhotra & Lassiter, 2014). In some cases, these files were kept in the medical records department (Veronesi,1999). In some facilities, the medical records department was just a locked room that anyone with an id card could access (Harman, Flite, & Bond, 2012). This made it difficult to monitor user’s access to the file room and made it easy for anyone with access to the room to view any or all of the files (Whetton, 2005; Bakker, 2007). In addition, there was no way to keep track of what user accessed a file or files and what actions they performed when they accessed it (Bakker, 2007). Some facilities had a medical records clerk, who controlled access to the files and made users “sign-out” the files that they wanted to access, that oversaw the medical records department (Harman, Flite, & Bond, 2012; Veronesi,1999). In either case, whether there was or was not a file clerk in the medical records department, there were no alerts that showed that files were accessed by unauthorized users, there was a breach or evidence of a breach, or tampering of files (Harman, Flite, & Bond, 2012). There also was no way of knowing if pages have been stolen which made it hard to know if the patient’s data was compromised …show more content…
They tend to only have one copy, so if pages from it get lost, stolen, or damaged there is no way to restore that data or even realize it no longer exists (Whetton, 2005). Patient data security could become compromised if there was a disaster that occurred at the storage facility for the paper files which could cause the paper files to have to be removed from their storage facility. For example, this could occur as a result of an earthquake at the file storage facility causing the building to collapse. When a clean-up crew, who are unauthorized to view or handle the files, is sent to clean up the collapsed building, this could send the papers from the patient files scattering throughout the cleanup site and beyond where even more unauthorized individuals potentially could access it.
Conclusion:
This review depicts, that both electronic health records and paper health records have vulnerabilities that have the potential to compromise patient data security. There are many who argue that the paper health records are more secure than the electronic health records. While electronic health records have their security vulnerabilities and have been more prevalent in the news, paper health records are not much more secure. Patient data security breaches in paper health records were not publicized as much as the electronic health records, because there is no way of knowing that they exist in order to report

Related Documents

  • Improved Essays

    I am so glad to have you in the clinic! Thanks for the work you have done the past 4 weeks! Now, it is your turn to take the reins! Finally chances to put into place all of those wonderful things you learned in college! Much to your surprise, your first morning on your own and you walk into the following situation: 1.…

    • 724 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    When filing electronic or personal health records online, anything is possible in regards to security breaches. Sometimes they can be avoided. Other times hackers are able to crack codes in encrypted data. When this happens, the clinic or hospital is held responsible for patients’ confidential information such as social security numbers and credit cards becoming accessible by an unauthorized third party. In July 2010, the Attorney General’s office was informed of a security breach involving at least 800,000 patients at South Shore Hospital in Massachusetts.…

    • 425 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Telichia Johnson HIMS 417 March 07, 2015 Summary: Redefining HIM Privacy and Security Role In the article “Redefining Health Information Management Privacy and Security Role,” the authors report on the historical role of the Health Information Management (HIM) professional in privacy and security, several evolutionary changes, and the need to extend access to patient information beyond normal patient care. In a period of constantly changing regulations and continual evolutions in technology, the Health Information Management profession’s roles and responsibilities will have to be extended to meet industry demand, and more reliance on Health Information Technology (HIT) to process and manage data and information. A more increased role…

    • 371 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    It’s no secret that the business of health care is a BIG business, being 15% of the gross national product. This creates loads of pressure on hospital/facility commanders to properly and sufficiently run and manage their organizations. Having consistent services, quality, keeping up with consumer demands and proper reimbursement is a key to survival. I think we all can agree that having a paper based system has the power to complicate the quality of our services, organization, consistency and reimbursement. From setting a new appointment for an established patient, to properly processing payments, electronic health records (EHR) have the power to store all of our paper based records into one, consistently up-to-date system.…

    • 1118 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Lisa Eramo Cloning

    • 602 Words
    • 3 Pages

    In her article Is It Possible to Curtail Copy & Paste? Lisa Eramo (2017) discusses the prevalence of copy-and-paste documentation in electronic health records, along with its challenges and benefits, and strategies to prevent documentation errors. This article utilized qualitative methodologies to examine issues caused by cloning of electronic documentation in patient’s medical files, using examples from a report published by the ECRI institute and Patient Safety Organization (PSO). This special report evaluated 13 studies and based on the examination of the frequency of copy-and-pasting, it was found that the copying over of electronic documentation by health care professionals is alarmingly high.…

    • 602 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    A. Introduction Safe sharing of healthcare data has the potential of significantly benefiting healthcare organizations. For instance, sharing of patient data may help healthcare providers in reducing the rates of readmission, avoiding medical errors as well as decreasing repeated testing. However, healthcare facilities should consider all the regulations and policies when it comes to sharing any information. B. Need to Share Data Considering Midtown Family Clinic case study analysis, there are quite some organizations that the center communicates with including laboratories, other healthcare facilities, insurance companies, just to name but a few. However, this discussion focuses on the major two organizations that Midtown Family Clinic communicates with on a regular basis and which are Midtown Insurance Agency and Midtown Nursing Home.…

    • 1385 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    A good resource for the patient is the patient portal available online via the website which allows patient access to their information at different times of the day. This facility utilized paper and electronic medical records that are consisted of hybrid medical record system. The authorized users access this electronic system via login and password the other access such as the paper medical record would be a lock file…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    A breach is a breach, no matter how insignificant the incident. A myriad of scenarios available by patient data includes identity theft to the sales of patient info for medical and pharmaceutical purposes. Upon further investigation regarding various breaches in data, the numbers are shocking. Moreover, while every individual affected by the breach was not maliciously targeted, the fact remains that the information is/was unsecured in some form or fashion. The table listed below represents the percentage of individuals affected by a breach incident reporting 500 or more in the last 12 months (U.S. Department of Health & Human Services,…

    • 827 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Dr.Briggs and class, A policy is a purposeful plan of action or inaction developed to deal with a problem or a matter of concern in either the public or private sector. A policy includes the authoritative guidelines that direct human behavior toward a set of specific goals and provides the structure to direct action, including guidelines to impose sanctions that affect the conduct of affairs. Policies can be determined by the private or public sector that together can have a significant and long-lasting impact on communities and individuals. It is important to recognize that public policies are result of the politics and values of those determining the policy. governments create public by making decisions regarding a health issue such…

    • 882 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    HIPAA Code Of Privacy

    • 1119 Words
    • 5 Pages

    Computer with patient information on them should also be put in a place where patients and visitors could not view them. This meant the doctors’ offices needed to place their computers in a secured location away from other patients and or visitors. If a computer was going to be used in a public place where other might be able to see. Then a 3M privacy screen should be used in order to keep other patients and or visitors from seeing what might be on the screen at any giving…

    • 1119 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Patient continuity of care could be drastically affected if medical history or record are not accessible to physicians. With electronic medical records…

    • 1800 Words
    • 8 Pages
    Improved Essays
  • Superior Essays

    According to Darzi (2014), the introduction of records sharing schemes is already transforming the medical landscape by reducing errors and improving care. Electronic health records are crucial because ACO’s mange the health of the patient, thus requiring patient care records on every patient in the system. Health information technology provides clinicians with accurate and complete information about a patient’s health and reduces the amount of paperwork for patient and physicians. Additionally, electronic records are an essential part of data recording for the physicians to see the past history of each patient. This would allow the health care staff to take data from all the sources and use it specifically to track and manage the patients.…

    • 976 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Have they ever considered what happens to their paper medical records if they are missing or lost? As of 2014, the federal government has required that all health care providers implement electronic medical records within their systems. Electronic health records provide a better way to treat patients; they are more accurate, easier to read and to be understood, as well as having the ability to share patient information with the healthcare community. Although some doctors believe that paper documents are less expensive than that of electronic documents, they are a better choice because they provide a better healthcare system. Electronic medical records are used to create a more efficient healthcare system, and therefore should be used universally.…

    • 987 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    HIPAA Literature Review

    • 776 Words
    • 4 Pages

    Ball (2011) studies the Ohio legislation regarding medical identity theft and found that the Ohio legislature needs to conduct more research on data breaches before creating any unnecessary statutes related to the privacy of health information. In the Tafoya (2013) Article, a physician conducted a review of his own private practice in order to determine its compliance with HIPAA. This review found that the practice was well in accordance with HIPAA because of its well followed policies regarding topics such as safeguarding information, securing phone information, securely transferring information, and physical protection within the facility. Withrow (2010) created a hypothetical case study in which a HIPAA security breach affected a regional hospital.…

    • 776 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Essay On HIPAA

    • 464 Words
    • 2 Pages

    The Health Insurance Portability and Accountability Act of 1996 (HIPAA) “is a large set of health care regulation and standards that protect the privacy of patients’ medical records and other personal health information. “HIPAA is broad in scope; covers a whole host of health care providers, facilities, and entities; and has had sweeping implications for the health care industry” Pointer, 2006). The HIPAA Privacy regulations require health care providers and companies, including their business partners, to follow and develop the course of action that assure the privacy and security of protected health information (PHI) when it is sent, accepted, managed, or shared. All this are need to be applied to all forms of PHI, including paper, oral, and electronic, etc. In addition, the regulation also increases the purchaser controls, the use and disclosure of individual medical information.…

    • 464 Words
    • 2 Pages
    Improved Essays