Why are Electronic Health Record's Privacy and Security an Individual Concern?

2019 Words5 Pages

For years the medical industry had control of how medical information was preserved. For years past the medical system had control of how medical information was used. The medical records were previously handwritten on paper and stored in file archives. Today medical records are more frequently being stored in a digital format. The digital format varies from document style to databases. Electronic health records quickly changed the medical system and the governing policies that oversees them. Health care providers along with patients have both expressed great concerns that having a centralized location for health records may increase the inappropriate use the stored information. Many of the articles I researched used the constitution, state and federal regulations, and court cases to base the current security measures on health records. The styles of writing among authors varied, but most were written in APA format. Information that was researched came from various government organizations, scholars of business, nursing and engineering. Research performed for the studies ranged from test trials to referencing other published journals. The research suggested why privacy and security were an individual concern with electronic health records?

Different incentives that were used to help boost the use of electronic health records also drove the need to further expand our regulations. One idea was aimed at hospitals to be ready and have updated IT systems to process all the data requests from the patients. This showed how it is up to the hospitals to collect every dime they are entitled to for using electronic health records. This process was aimed at helping the hospital revenue cycles. Furthermore, requests from pat...

... middle of paper ...

...records. Computers in Biology and Medicine, 39(9), 743-750. doi:http://dx.doi.org/10.1016/j.compbiomed.2009.06.004
Katos, V., & Patel, A. (2008). A partial equilibrium view on security and privacy. Information Management & Computer Security, 16(1), 74-83. doi:http://dx.doi.org/10.1108/09685220810862760
McCandlish, S. (2002, April). EFF's Top 12 Ways to Protect Your Online Privacy. Retrieved from https://www.eff.org
McKinney, M. (2009). HIPAA and HITECH: Tighter control of patient data. H&HN: Hospitals & Health Networks, 83(6), 50-52. Http://www.hhnmag.com
O'Connor, J., & Matthews, G. (2011). Informational privacy, public health, and state laws. American Journal of Public Health, 101(10), 1845-1850. doi:10.2105/AJPH.2011.300206
Shepard, S., Kresman, R., & Dunning, L. (2009). Data mining and collusion resistance. World Congress on Engineering 2009 (Volume 1), 283-288.

Open Document