Topic > Threats to health information technology

Threats to health information technology In his article, Strauss takes inspiration from the Hippocratic oath, according to which the healthcare professional will guarantee the privacy of the patient through the statement: "All that I see or hear in the lives of my patients, whether in relation to my professional practice or not, which should not be spoken about externally, I will keep secret, as I consider all these things private” (2012, p. 19). In the early days of medicine, patient privacy was a concern. With advances in information technology (IT) and its many applications in healthcare, maintaining patient privacy remains more important than ever of healthcare systems means that protected health information (PHI) remains protected. Only medical personnel who need access to the information should have access to it. Measures must be taken to ensure that prying eyes who do not need to know are not able to access and expose a patient's private health information (Strauss, 2012, p. 19) or sell it to others who may profit from the information. When planning and implementing a healthcare management information system (HMIS), especially from scratch, healthcare systems privacy must be one of the key aspects to consider. Limit assigned access, limit the ability of laypersons or end users to access information outside their scope, and ensure that if breaches occur, they can be tracked and limited. Involvement at the beginning of a system provides the opportunity to work with the team in creating built-in privacy measures. Laws, regulations and ethics. Dimitropoulos and Rizk noted that HMIS and Health Information Exchanges (HIE) in general receive protection from “a patchwork of… half of the document… a721-446c-8c66-c2b61252fda0%40sessionmgr115&vid=4&hid=106Dimitropoulos , L., & Rizk, S. (2009, March/April). State approach to privacy and security for interoperable health information exchange. Health Affairs, 28(2), 428-434. 10.1377/hlthaff.28.2.428Michelman, A. (2009, March/April). An update on what is being done to keep protected health information safe. Journal of Health Care Compliance, 1(1), 57-70 from https://eds-b-ebscohost-com.csuglobal.idm.oclc.org/ehost/pdfviewer/pdfviewer?sid=0c60a0e5-a721-446c-8c66-c2b61252fda0%40sessionmgr115&vid=4&hid=106Strauss, L.J. (2012, May /June).Patient Privacy: Then and Now. Journal of Health Care Compliance, 14(3), 19-61. /pdfviewer/pdfviewer?sid=0c60a0e5-a721-446c-8c66-c2b61252fda0%40sessionmgr115&vid=4&hid=106