100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Case

NR 512 Week 7 Discussion, Safeguarding Health Information and Systems (Two Versions)

Rating
-
Sold
-
Pages
2
Grade
A+
Uploaded on
22-01-2021
Written in
2020/2021

Week 7: Safeguarding Health Information and Systems A new concept for some organizations is to allow nurses to bring in their own devices known as bring your own devices (BYOD) to use at work. What are some of the security issues you might encounter if this were allowed? How would you address these issues? How is this issue addressed in your practice setting? Professor and Class, In today’s world of rapid advancing technology, healthcare companies have multiple lines of risk with breaches in their organizational system. The first risk that is most prevalent is employees who access the system by using their cellphones to access network information. If the person does not have the proper spyware or a strong authentication process like Symantec VIP Access which helps protect online accounts as well as blocking hackers from gaining access to your passwords to steal your information. Sebescen & Vitak (2017) state that: …. “hackers are using a number of techniques to exploit employee vulnerabilities, including social engineering techniques (Symantec, 2011), employees’ insecure password habits (Vaas, 2016), and employees’ use of personal devices in organizational settings (Olavsurd, 2014; Pescatore, 2014), (p. 2237). Some of the complications that can occur if an employee lost their personal device that has access to the organizational network, would be risk to patient and employee personal information. Once a hacker has access into an organization’s network this could cause areas of risk to the financial framework and risk of money being stolen from the company, or fraudulent charges to patients and insurance payers. One of the ways of addressing these issues is providing regular education to all employees about corporate integrity and security. It is necessary to educate employees on risk that can be prevented due to hackers or carelessness of the organization’s information. In my current position I have access to my company email. This is where I get regular updates to surgical scheduling or issue needed to fix errors to a patient’s surgical procedure. I also receive as well as provide personal information in reference to the employees I supervise. Therefore, all of this information is protected under the HIPPA laws. Through my device I had to sign a release which gives my security IT department access to the personal information on my device. If my device is stolen or lost, I must report this immediately to my IT department. I am not allowed to leave my device unsecured or unattended to prevent any breaches in privacy. Due to having access to my company email I have to change my password every 90 days to prevent memorization of my security code. These steps are necessary as new methods of hacking are created to breakthrough systems that keep same codes. References Sebescen, N., & Vitak, J. (2017, September). Securing the human: employee security vulnerability risk in organizational settings. Journal of the Association for Information Science & Technology, 68(9), .

Show more Read less








Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
January 22, 2021
Number of pages
2
Written in
2020/2021
Type
Case
Professor(s)
Professor
Grade
A+

Subjects

  • nr 512 week 7 discussion

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Kaycie Chamberlain College Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
16
Member since
4 year
Number of followers
15
Documents
427
Last sold
5 months ago

4.0

3 reviews

5
1
4
1
3
1
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions