In the case of an emergency, a report and planning management is applied. This is to ensure that the safety and security of the institution is applied. Prevention of complications brought about by the disaster and risks that could endanger the health and public safety is important. Complex strategic safety management is applied to prevent another disaster to happen in the future.
Judging the Relevance and worth of ideas part 2.pptx
Emergency Planning and Information Security Management
1.
2.
3. In the case of an emergency, a report and
planning management is applied. This is to
ensure that the safety and security of the
institution is applied. Prevention of
complications brought about by the disaster
and risks that could endanger the health and
public safety is important. Complex strategic
safety management is applied to prevent
another disaster to happen in the future.
4. The goal of SEA is to secure all information
systems as well as the health of the public.
Collaboration between health care personnel,
information technology employees, and local
government units are important. Collaboration,
delegation, and organizing are key measures to
ensure that risks and hazards will not happen
in the near future.
5. These are the main personnel that will respond
to any disaster and risks that are now affecting
the community.
Health care staff are populated by doctors,
nurses, nursing aid, physical therapists,
laboratory technician, radiologists, and dental
doctors to attend all patients suffering from a
highly contagious disease.
6. Alpha and Bravo are always organized and
planned. However, it is also important to set
up Delta and Omega teams in any case that
Alpha and Bravo are already being utilized.
Satellite health care institutions such as
quarantine stations populated by either Alpha
or Bravo teams should be activated in any case
where there is an existence of a highly
contagious disease outbreak.
7. Information security pertains to a type of
documentation that is specially made in a digital
manner. In this case, the profiles, documents, and
all information of the operating health care
institution are kept in private. It utilizes computer
technology, which is an innovative way to store
information to the operating institution according
to Silverstein (2009).
8. To fasten data collection and storage of all relevant
data that will be used for hospital related affairs.
This includes storing patients profile and medical
records.
To improve confidentiality of records such as using
secured information lock to prevent unauthorized
access to confidential information about the
hospital according to Habib (2010).
9. Pertaining with the privacy, authorized personnel
should be the only ones who are going to relay
information that is only related to medical or legal
related affairs.
Privacy is practiced for doctors, nurses, therapists,
and legal professionals who only need patient’s
profile for medical or legal related activities
according to Blumenthal (2010).
10. Pertaining with the security, all information are
facilitated by the use of a software tool that
helps to lock all information of the hospital and
patients to be always secured in the hospital
facility.
Habib (2010) stated that all security related
issues are then kept by the authorized
computer experts. They are only authorized for
ensuring all information to be intact.
11. Pertaining with the privacy rule, only the staff
members of the health care institutions are the
ones that are solely responsible for managing
patient’s data for the purpose of medical
related activities.
Patient’s information should not be given to
third party that are not connected with the
operating hospital according to Silverstein
(2009).
12. Security rules involves about the monitoring
and management of software that are installed
by the information or computer technology
experts according to Menachemi (2011).
The records section should not allow any other
medical personnel except the records personnel
who will only be authorized to provide
information to health care providers.
13. It is important for each computer facility such
as allowing all electronic health records to be
updated with the latest technology. This could
prevent any issues such as glitches that could
corrupt files.
Updating anti-virus softwares are important so
that files will not be destroyed, which could
disrupt medical processing activities according
to Blumenthal (2010).
14. EHR is an important health records because it
helps to detail all confidential medical records
for the patient. However, it is a fragile facility,
which needs further maintenance action in
order to improve its technical performance.
Honesty should be always implemented so that
employees will be only coordinating
information with authorized personnel
according to Menachemi (2010).
15. Blumenthal, David (2010). "Launching
HITECH". New England Journal of Medicine 362 (5):
382–5.
Habib, J. L. (2010).
"EHRs, meaningful use, and a model EMR". Drug
Benefit Trends 22 (4): 99–101.
Menachemi, Nir (2011). "Benefits and drawbacks of
electronic health record systems". Risk Management
and Healthcare Policy: 47.
Silverstein, Scot (2009).
"2009 a pivotal year in healthcare IT". Drexel
University.
Editor's Notes
Silversteian (2009) states that the pivotal year of hospital’s innovative career is about the development of HER to improve patient’s data processing.
Habib (2010) indicated that HER aims to conceal patient’s profile as well as other profiles that are employees of the hospital.
Blumenthal (2010) stated that privacy can always have the capacity to secure information from fraudulent and unethical practice by information theft offenders.
Habib (2010) further mentioned that with the advent of technology, security can be more sophisticated due to its extensive technological application of software that would enhance confidentiality.
Silverstein (2009) Stated that the pivotal approach applied by EHR have always been responsible for improving health care facilities as well as the capability to secure all confidential information
Menachemi (2011) mentioned that it is important to implement rules and regulations to prevent ethical related offenses.
Blumenthal (2010) mentioned that the launching of EHF helps to lessen time and difficulties of securing patient’s data from legal offenders.
Menachemi (2010) stated that EHR helps a certain information to become more concealed and automated that saves time, effort, and expenses for health care workers and records personnel.