Before PACS was implemented, records were in physical paper and film format and generally stored in a central location, so access to these documents were controlled and monitored. This prevented breaches of security and confidentially, violating the Health Insurance Portability and Accountability Act (HIPAA). According to the California Department of Health Care Services, HIPAA requires records to be protected and handled with confidentiality, in addition to other regulations about insurance, fraud, and electronic billing (2017). Most security breaches are non-intentional and usually committed by healthcare workers during regular work routing. This causes accidental breached. Other types of breaches could be cyber-attacks by internet hackers, or intentional professional misconduct. Although breaches of HIPAA and confidentially did happen with physical records, concerns are heightened with EHRs because information is so readily transmitted and system breaches are not uncommon, despite security measures” (Sulmasy, Lopez, & Horwitch, 2017). Security measures are put in place to prevent unauthorized access, such as passwords, access codes, and security cards, breaches still occur. Although these breaches do happen, they can be tracked electronically. If a person with no connection, or too much connection such as a familial connection, accesses a patients chart, the Health Information Technology department would be able to see this access and determine whether it is authorized or not (Sulmasy, Lopez, & Horwitch,
Before PACS was implemented, records were in physical paper and film format and generally stored in a central location, so access to these documents were controlled and monitored. This prevented breaches of security and confidentially, violating the Health Insurance Portability and Accountability Act (HIPAA). According to the California Department of Health Care Services, HIPAA requires records to be protected and handled with confidentiality, in addition to other regulations about insurance, fraud, and electronic billing (2017). Most security breaches are non-intentional and usually committed by healthcare workers during regular work routing. This causes accidental breached. Other types of breaches could be cyber-attacks by internet hackers, or intentional professional misconduct. Although breaches of HIPAA and confidentially did happen with physical records, concerns are heightened with EHRs because information is so readily transmitted and system breaches are not uncommon, despite security measures” (Sulmasy, Lopez, & Horwitch, 2017). Security measures are put in place to prevent unauthorized access, such as passwords, access codes, and security cards, breaches still occur. Although these breaches do happen, they can be tracked electronically. If a person with no connection, or too much connection such as a familial connection, accesses a patients chart, the Health Information Technology department would be able to see this access and determine whether it is authorized or not (Sulmasy, Lopez, & Horwitch,