Healthcare It Security and Cloud Computing

2587 words 11 pages
-------------------------------------------------
Security Issues
Healthcare I.T. and Cloud Computing

BSAD 310

TABLE OF CONTENTS

INTRODUCTION 5 Purpose 5 Scope 5 Methodology 6 Healthcare Information Technology 6 Applications 6 Data 6 Challenges 7 Cloud Computing 8 What is Cloud Computing? 8 Benefit to Implementing in Healthcare Environment 8 CONCLUSION 9 REFERENCES 10

Illustrations

Illustration 1: Do you currently have an EMR system in your office?......... 9

Abstract
Through the passage of the Patient Protection and Affordable Care Act of 2010, the federal government is pushing healthcare providers and hospitals to quickly move towards electronic documentation systems or be penalized for
…show more content…

Financial systems have been adopted in most hospitals and physician offices, largely due to requirements from insurance companies and government bodies that require data to be transmitted electronically for payment. Clinical systems, however, have not been implemented wide due to lack of knowledge and workflow interruption concerns. “Elaborate training in new e-healthcare systems is not a luxury that is typically available to healthcare professionals – i.e., doctors, paraprofessionals, (e.g., nurses) and administrative personnel—because of the 24x7 nature and criticality of operations of healthcare organizations, especially hospitals, thus making peer interactions and support a key driver of or barrier to such e-healthcare system use” (Venkatesh, Zhang, & Sykes, 2011).
Data and security While a paper could be written solely regarding the storage and maintenance of electronic data, for the purposes of this paper only an overview and best practices will be discussed. Data can be stored in a multitude of different manners, all of which have benefits and downfalls. Saving data locally to a particular computer or other device can be dangerous. Should that device fail, the data saved to it could be lost. Also, data that has been saved locally to a device is more difficult to secure and guarantee that the data will only be accessed by the appropriate person or persons. From an enterprise or business level, the best practice for data storage is to ALWAYS

Related

  • Management Information Systems
    1839 words | 8 pages
  • Comparisons of Information Security Management Frameworks
    1202 words | 5 pages
  • Sunzi Assignment- Ibm
    4648 words | 19 pages
  • Computerized Management in Healthcare
    3764 words | 16 pages
  • The Need for a Strategic Approach to Enterprise Mobility
    6846 words | 28 pages
  • wipro ceo structure
    12545 words | 51 pages
  • Electronic Commerce and Page Ref
    4989 words | 20 pages