Hospital Administrator Case Study

Improved Essays
1. The message I would have received as a hospital administrator from this video would have been:
The importance of keeping my organization's information secure from anyone else not permitted to have my knowledge, and more specifically the knowledge of my patient's care as well as their demographic information. It is my responsibility as a hospital administrator to keep my data secure, and whether that means hiring a IT security company or maintaining a high security software is my responsibility in order to stay within HIPPA guidelines.
2. I would hope that I as a hospital administrator would already have the appropriate safeguards in place to keep my organizations data secure, and in this case this video would only represent the urgency
…show more content…
Data produced in the world of healthcare is faced with security challenges, maintenance of ethical standards, and affects it has on society. Viruses are one of the main sources of data security breaches, as well as causing many ethical issues. whatever software or IT support is selected to support anti data breaches they must have minimal unnecessary risk exposure. Hacking is another form of data security breaches. Appropriate firewalls need to be installed in order to stop hackers from entering your data systems. firewalls need to be upgraded quite often, since hackers will find out new ways to get through security barriers. Privacy issues are also another acute issue when dealing with company data, and it does not just pertain to information of patients, it can also include information of its employees. Misuse of company data by its employees can also become a type of breach of data. no matter what ype of data breach is involved with a company's data it is the ethical and legal responsibility of each company to implement a sound deterent by either having the best anti breach threat from a particular software or IT support to keep risks to a minimum. Once data is secure it can be such an essential part of a healthcare organization to have all data in one location so that it can make both financial and staffing decisions, and most importantly patient data that allows for the decisions of accurate patient care.

References:

Fortenberry, J. L., (2010), Health Care Marketing: Tools and Techniques, (3rd Ed.), Sudbury,

MA: Jones and Bartlett
OST Video: Mareketing Video Healthcare, Retrieved from:

Related Documents

  • Decent Essays

    Working alone, I immersed myself in this environment and worked toward removing inefficiencies, security oversights, and business continuity issues. As I hope you’ll see, the high-security, HIPAA-compliant environments that I’ve worked in have exposed me to policies, products, and procedures that I can bring to your organization to help strengthen your information security program. Additionally, my expertise in securing iOS and Android mobile devices means that I can help mitigate threats to this increasingly significant portion of your computing…

    • 320 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Wyoming Medical Center, Los Angeles County, and Raymond James all share similar struggles with how to secure the network, computers and mobile devices. Control and security are a concern from both inside and outside of the facilities and organizations. Each organization deployed a multi-level/tier approach was needed to protect the data. The Novell ZenWorks agents are used to manage the operating systems and software that is installed on the desktops/workstations; it allows the information technology group to customize the software for installation and patch management.…

    • 302 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 3

    • 781 Words
    • 4 Pages

    Describe the responsibility of the medical office specialist to protect all protected health information (PHI). When it comes to protecting patient information, it’s about getting employees to understand how to best protect it and what to do if there is a data breach. Training is essential and should include not only administrative employees, like medical office specialist, but also doctors, nurses, and other clinicians throughout the organization. All employees with access to patient information need to have the understanding of how to maintain security protocols when it comes to patient care. Many clinicians tend to look at PHI breaches as simply an IT issue.…

    • 781 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Data security in the healthcare sector must be persistent and sufficient in ensuring the privacy and protection of patient’s information. The developing threat postured by malicious coding, such as viruses and worms, and unethical hackers can by reduced by the utilization of government standardize security controls. For instance, the Health Insurance Portability and Accountability Act has established security necessities regulations to ensure the protection of health information. However, organization must address the potential risk existing an internal and external networks to tackle threats effectively. Developing an effective network infrastructure by using resource hardware components as switches and routers to boost network security can reduces business operations interruption from attacks.…

    • 782 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    HIPAA Violations

    • 355 Words
    • 2 Pages

    In order to achieve interoperability there are basic security standards that must be accounted for to ensure safe and secure exchange. Without adequate safe measures in place, personal health records cannot be safely transmitted electronically. Exchanging private health information electronically between medical partners comes with inherent risk however. Those risks include violation of HIPAA regulations and threats, vulnerabilities and malware that threaten electronic health records (EHR) or mainframe servers.…

    • 355 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The security HIPAA data is driven by mandatory requirements and the potential to improve the quality of healthcare delivery meanwhile reducing the costs, these massive quantities of data. To deliver the quality of healthcare information, it is referred to electronic health data is sets to be extremely large and complex which cause difficulty to use with traditional software or hardware in a data management tools or methods. Looking at what the future will hold for security HIPPA data that can identify predictive events and support prevention initiatives, collecting and publishing data on medical procedures, assisting patients in determining the care protocols or regimens that offer the best value and identifying, predicting and minimizing fraud…

    • 1227 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Implementation of policy Appropriate measures must be taken when using workstations to ensure the confidentiality, integrity, and availability of sensitive information, including protected health information (PHI). These measures must ensure that access to sensitive information is restricted to authorized users…

    • 636 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Cost Benefit Analysis

    • 1774 Words
    • 7 Pages

    Choosing the appropriate EMR (electronic medical record) vendor is essential to a successful transition from paper records to electronic medical records. Many factors must be weighed in this selection process. One method to help hospitals and practices make this complex decision is to complete a cost-benefit analysis. Entire books have been written on how to conduct cost-benefit analysis and an in-depth analysis goes well beyond the scope of this paper. Instead, this discussion will focus on how cost-benefit analysis can help to determine an appropriate EMR vendor.…

    • 1774 Words
    • 7 Pages
    Great Essays
  • Great Essays

    Problem Statement: Patient data security is an ongoing and evolving problem in healthcare. According to the US Census Bureau, US Department of Health and Human Services, “143 million patients’ records have been compromised over the past five years…” (Zeadally, Isaac, & Baig, 2016). A patient’s medical record information is a highly sought after commodity among hackers, cyber criminals, and identity thieves because it contains “personal, insurance, and financial information”. They are able to sell this information for “up to $251 per record” as opposed to stolen credit card numbers, which they are only able to sell for “33 cents per number”.…

    • 1371 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Vulnerable Password Effect on HIPAA Introduction The University of Mississippi Medical Center suffered from multiple HIPAA violations. An unofficial visitor to their campus had stolen one of their laptops, and due to the fact that UMMC’s network was unprotected because they used a universal username and password. The active directory containing 67,000 files was exposed to danger! There was an estimation of 10,000 patients files dating back to 2008 and he optical character recognition affirms that the university failed to disclose the individuals whose ePHI was believed to have been accessed.…

    • 544 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    HIPAA Essay

    • 537 Words
    • 3 Pages

    As technology expands provides are using clinical applications such as computerized physician order entry (CPOE) systems, radiology, pharmacy, and laboratory systems. Even though this means health field is becoming more efficient and mobile the rise of technology use increases the potential security risks. The Security Role is designed to be flexible so a covered entity can implement new procedures, policies, and technologies. The Administrative Safeguards provisions in the Security Role require covered entities to preform risk analysis as a part of their security management…

    • 537 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    The dynamic regulatory environment in healthcare can be overwhelming. The protection of information is rooted in national privacy and security laws. Those laws typically match international governing directives, although most countries do not have healthcare-specific laws like the United States. Where U.S. law and international laws differ and healthcare information must be shared, agreements such as Safe Harbor have been enacted to help bridge the differences. However, on a day-to-day basis, most of us rely on local, internal policies and procedures to govern our use of protected health information.…

    • 109 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Hacking In Healthcare

    • 1225 Words
    • 5 Pages

    The Health Insurance Portability and Accountability Act (HIPAA), the Task Force, and the U.S. Department of Health and Human Services’ (HHS) are just a few government organizations trying to tackle this problem. A challenge that they face is that not a lot of firewalls and safeguards for hackers to have to work around to break into these systems. With technology always advancing, one would think that this would be a main area of focus to aid in preventing these cyber-attacks, is building more advanced firewalls that are almost impossible to get around. The purpose of this study is to examine the measures that the government is taking on the issue of healthcare cyber-attacks, risks the consumer needs to be aware of, and the problems with the data protection.…

    • 1225 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Recovery Planning

    • 443 Words
    • 2 Pages

    Hackers and other cybercriminals are taking advantage of security weaknesses within healthcare organizations infrastructure. They infiltrate the defenses of the network, encrypt the data and charge the healthcare organization a premium for the key to unlock and retrieve their patient data. Even more insidious are the recent attacks, such as NotPetya, where the hackers were not interested in ransomed, but rather to destroy the data of whatever organization they compromised. This white paper will help healthcare organizations understand the critical planning components involved in helping their organization to become more resilient to disruptions and adverse events, while maintaining compliance with the contingency plan standard outlined within the Health Information Patient Portability Act (HIPAA) Security Rule.…

    • 443 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Hi Everyone, This is a great discussion on a very contemporary problem that will continue to be an issue in this information age. Take HIPAA out of the equation for a moment, every person has so much personal information in various computer systems, we don’t even know the extent of it all. For instance, to name a few computer databases a nursing professional’s information resides are the Board of Nursing for every state he/she is licensed in, any professional organization he/she is certified through, and professional/trade association he/she is active in as a board member/committee chair.…

    • 356 Words
    • 2 Pages
    Improved Essays