preview

Health Informatics

Better Essays

In the research conducted in this study will identify the importance of health informatics and technology pertaining to the failures and benefits with healthcare technology. According to Journal of Health and Technology and Informatics, (2013) Information security governance processes the need to be understood, in order to protect the data to support and facilitate systems availability (Williams, 2013). In healthcare organization’s CEO’s and Directors are primarily responsible for the safety and security of information within the organization, and corporate governance deals with accountability and fiduciary duties (Williams, 2013). These terms identify the roles of information security, such as confidentiality, integrity and availability regarding …show more content…

The objective is to adopt new data management that challenges IT executives in developing new EHR system data. These processes of data, involves new applications that creates an enormous amounts of data, which must be accessed in real time across various sites of healthcare (Ranajee, 2012). The outcomes with downtime, is not about options and may be critical to a patient’s treatment. Healthcare organizations will become increasingly reliant on electronic data over the next few years, another significant factor to consider would be the enforcement of Health Insurance Portability and Accountability Act (Ranajee, 2012). Within the security section (S.164.308) of HIPAA requires a data backup system, disaster recovery and emergency-mode operations planning. Disaster recovery is the focus on technology infrastructure, and the outcomes of disaster events that can compromise the security operations for the organization's systems data and networks (Ranajee, …show more content…

Disaster recovery is a subset of business continuity planning, which focuses on non-related aspects of IT, such as facilities, crisis communication, and personnel; whereas disaster recovery planning focuses on the IT-related infrastructure recovery and continuity (Ranajee, 2012). Disaster recovery planning must be a collaborative effort between company executives and IT team. These methods are examples of physical security systems, strict access protocols, and access authorization procedures required by HIPAA. The organization should provide layers of physical security within their infrastructure, such as 24-hour monitoring, biometrics, and higher levels of redundancy, with strong connectivity networks and back-up generators (Ranajee,

Get Access