From the given scenario, Dr Busy complains that every time he steps away for just a few minutes, the computer logs him off, thereby slowing him down. Computer auto logoff is critical to protecting medical data from unauthorized access (Kruse et al., 2017). This scenario presents some of the basic issues that face advances in technology, practically information and communications technology. Electronic health records EHR and Electronic medical records EMR. These advances in technology have increased the efficiency of healthcare services rendered to patients in healthcare facilities (Hebda et al., 2019). However, the current security concern is unauthorized access to the medical records of patients. Healthcare practitioners have access to the health records o patients, which is secured by unique user names and passwords. This security is integral in preventing the access of patient records by unauthorized personnel. The current rates of identity thefts, stocking and thefts have been linked to leaked personal data or unauthorized entries.
The maximum time for computers in the nursing station to be inactive is two minutes, while that of an examination room is five minutes. Although timely log of inactive computers at nurse’s stations may seem too much work for the staff, it is deemed necessary to prevent any forms of violation to the medical data available in hospital settings (Hebda et al., 2019). Several other options are available to secure data, including clearance levels that allow nurses and other healthcare practitioners to access data in their clearance levels. Although this measure increases medical data security, nurses stations auto logoffs in computers enter that patients or any other unauthorized personal do not access the computer and medical records (Coventry & Branley, 2018). From professional experiences, once nurses have stepped away for a short lunch or bathroom break, patients in the room or floor patients or intruders may access the computer and collect personal information of patients and healthcare practitioners, which is a considerable security breach.
Delegate your assignment to our experts and they will do the rest.
References
Coventry, L., & Branley, D. (2018). Cybersecurity in healthcare: a narrative review of trends, threats and ways forward. Maturitas , 113 , 48-52.
Hebda, T., Hunter, K. M., & Czar, P. (2019). Handbook of informatics for nurses and healthcare professionals . New York, New York : Pearson. ISBN 0134711017, 9780134711010
Kruse, C. S., Frederick, B., Jacobson, T., & Monticone, D. K. (2017). Cybersecurity in healthcare: A systematic review of modern threats and trends. Technology and Health Care , 25 (1), 1-10.