Thursday, July 25, 2019
New Technology in the Medical Field Essay Example | Topics and Well Written Essays - 500 words - 1
New Technology in the Medical Field - Essay Example many healthcare organizations have come up with privacy and security policies that govern the access, use and exposure of organizationââ¬â¢s information in order to minimize such risks. An analysis of the privacy and security policies of three recognized healthcare organizations namely Beth Israel Deaconess Medical Center (BIDMC), Mayo Foundation and Georgetown University Medical Centers reveals some themes that are among them. For all the three healthcare organisations unauthorised access of the organisationââ¬â¢s information is not allowed. This could be those that are stored in computers or those produced as hard copies. In relation to this, there is no unauthorised alteration, revision, transmission or modification of the organisations information or other information within the organisationââ¬â¢s system (Georgetown University Medical Centers, 2007, Mayo Foundation, 2002 and BIDMC Technology Resources Policy, 2007). For all confidential information or programs installed in the organisationââ¬â¢s computers, the staff must get authority from the organisations information officer or office in order to access, delete or modify them. All information deemed to be confidential is protected from external access and their release or exposure constitutes a breach of the security and privacy policies. All staff are not allowed to use the organisations IT for activities that are not related to the organisationââ¬â¢s business activities so as to limit the availability of the network resources to other people. Remote access to organisationââ¬â¢s information is not allowed except for selected workstations or persons authorised by the chief information officer. There are some security and privacy policies that differ significantly between the three healthcare organizations. An example are policies relating to personal privacy when using the organizationââ¬â¢s computer information or technology resources. In Mayo Foundation, no one has the permission to access a computer using another
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.