This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Business Research Paper

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

 

Business Research Paper

 

 

 

 

 

 

Name of Student

Name of Institution

Instructor’s Name

Date

 

 

 

 

 

Introduction

This proposal is intended to solve the issue of patient’s data privacy by healthcare providers. Different healthcare providers are taking advantage of technology’s potential in improving the overall services they provide to patients. For healthcare providers to maintain their patient’s database, they are integrating EHR and health information technology (Sharma et al., 2016). The primary goal or objective of embracing these systems is to facilitate the process of obtaining the patient’s medical history. Using these systems makes the process easy and fast, especially in acquiring data for emergencies and in treatment and diagnosis. However, the integration of EHR and HIT may be prone to cyber-attacks and violation of patient data privacy (Kruse et al., 2016). The technology potential has become quite massive, and the data found in the healthcare systems are increasingly vulnerable. Therefore, the healthcare provider should ensure their systems secure the patients’ data and prevent any unauthorized access or type of data leakage that can affect the patient. Healthcare administrators should develop ways to ensure the patient’s data is secure and to eliminate any data privacy violation.

Input

The Healthcare Management, Insurance Providers, Patients, and their families and Hospital Staff are the stakeholders who should ensure patients’ private information are secure. Healthcare management should provide record management services that ensure the privacy of patient’s data privacy. Such services should include data quality management, data collection, standard, coding, disclosure, the privacy of health records, and information and disclosure. Healthcare management should undertake a detailed analysis of the healthcare records to facilitate patient safety, health care delivery, and decision support. The management should create an environment of confidentiality of patient’s private data and be advocates of the patients to ensure they are accorded high levels of privacy (Lapke et al., 2017). The healthcare managers should be engaged in the implementation of Electronic health records by meting the timeline for HER design, selection, and implementation. Healthcare management can create a department that oversees Electronic Health Records’ safety and operations due to the overlap in healthcare information during the healthcare cycle.

The core objective of documenting patients’ data is to ensure the information supports the care the healthcare practitioners will provide. Such documentations are usually scanned in an electronic system and is considered complete once a patient is discharged. The stakeholders should ensure the patients’ private information is released to third parties only when the law allows or after the patient grants permission. However, the management of EHR should in such a way that the physicians have ease in accessing the record through payment, treatment, and administrative purposes, even in situations where the patient has not authorized. The EHR should also be availed to the patient who has the right by law to obtain a record of the personal health record. The stakeholders can preserve the confidentiality of the EHR by ensuring the information is only available to authorized individuals. For a physician or a clinical officer, the administrator should determine the information required and assign passwords and usernames to regulate the access to such information (Chenthera et al., 2019). The passwords controlling the EHR should be frequently changed, and the reuse of passwords should also not be allowed to ensure the high safety of the information. The Privacy and Security Rules usually hold the healthcare practitioners accountable for any breach of the information system. Unauthorized to patients’ private data with the intention of causing harm or using the information for manipulation purposes is chargeable by law.

This business proposal will need intranet access for storing private information in the cloud system. The storage in the cloud is important in case of failure or damage to the facility’s systems. The cloud system will also provide back-up for private information. A renovated work station where the primary patients’ data will be stored. The staff should also have a fair level of computer literacy to make the process of data input easier and not to rely on a few experts (Ben-Zion, 2014). Patients’ legal issues and cyber-crimes should be covered by insurance to minimize the losses and damages that may arise from such events.

Output

The procurement team shall establish the project’s financial budget. The team has sufficient knowledge of the facility’s income and the possible way of budgeting for the EHR. The budget should be in line with the facility’s present need for a sophisticated record system. An in-house questionnaire in the facility will be conducted for all the staff. The purpose of the questionnaire will be to determine their input about the EHR and what needs to be done to ensure its successful implementation in the facility (Wetzel et al., 2018). The project’s sponsors are various stakeholders whose purpose is to fund the input of the project. The sponsors have an interest in the project and thus are willing to fund it. Families and patients will be educated about the new security system. The education is intended to ensure cooperation and adherence by the patients and families. Cooperation is important for the project as it makes the stakeholders confident in the EHR.

 

Project

A goal of the project is to ensure the staff has the capability of using the EHR systems. The staff’s ability to use the system will make the implementation of EHR easier. The successful implementation of the EHR system will also raise the patients’ confidence in the data security of the healthcare system (Choi et al., 2019). The hospital management will also have an easy time monitoring a patient’s care. Since the HER system will remain in the facility on a permanent basis, there shall be the digitalization of the healthcare system.

Organizational and Strategical Development Structures

The implementation of EHR in an organization is a continuous process without any end due to the possibility of improving data use or optimization of workflows. The steps for EHR will include planning, selection, and contraction with a vendor, implementation of the HER in the facility, and finally, its optimization. The implementation of the EHR system is continuous through processes such as the addition of new patients to the portal, connection to another information exchange system, and participation in new models (Tucker et al., 2016). The successful adoption of EHR will involve two steps of implementation. In the first step, the following shall be undertaken; communication with the staff and education, redesigning the workflow, and establishment of a governance system that will create a stewardship plan and guidance that ensures data integrity. The data integrity will ensure the sustainability and effectiveness of the EHR.

 

 

 

 

 

References

 

Ben-Zion, R., Pliskin, N., & Fink, L. (2014). Critical success factors for adoption of electronic health record systems: literature review and prescriptive analysis. Information Systems Management, 31(4), 296-312.

Chenthara, S., Ahmed, K., & Whittaker, F. (2019). Privacy-Preserving Data Sharing using Multi-layer Access Control Model in Electronic Health Environment. EAI Endorsed Transactions on Scalable Information Systems, 6(22).

Choi, S. J., Johnson, M. E., & Lehmann, C. U. (2019). Data breach remediation efforts and their implications for hospital quality. Health services research, 54(5), 971-980.

Lapke, M., Garcia, C., & Henderson, D. (2017). The disconnect between healthcare provider tasks and privacy requirements. Health Policy and Technology, 6(1), 12-19.

Tucker, K., Branson, J., Dilleen, M., Hollis, S., Loughlin, P., Nixon, M. J., & Williams, Z. (2016). Protecting patient privacy when sharing patient-level data from clinical trials. BMC medical research methodology, 16(1), 77.

Wetzels, M., Broers, E., Peters, P., Feijs, L., Widdershoven, J., & Habibovic, M. (2018). Patient perspectives on health data privacy and management: “Where is my data, and whose is it?”. International Journal of telemedicine and applications, 2018.

 

 

 

 

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask