Data security involves protecting data from destructive forces and unwanted actions of unauthorized individuals. Software-based security encrypts data to protect it from theft although a hacker or malicious program could corrupt data and make the system unusable. Hardware based security provides an alternative to software computer security (Jooste, 2009) . Some of the policies that cover data security include e-security, control data recovery, and data recovery planning. The task of data protection and the aspect of storing information in computers has been a great concern for every internet user. The internet offers great opportunities to reach out to new markets and more customers (Jooste, 2009) . However, such opportunities can have some risks associated with e-security since unwanted intruders can install malicious software, which can steal business information that is considered sensitive.
Internet security services and e-security is a modest effort aimed at providing professional services to the internet. Data recovery services offers comprehensive professional data recovery services and advanced database repair through a wide range of network facilities (Glaser, 2004). Control data recovery can include proprietary database or SQL variant, which can be used to quickly restore the system while maintaining excellent form of security controls. Damaged databases can be treated without working directly with the hardware (Glaser, 2004). The database files can effectively be repaired by designing a perfect clone of the computer system. Most databases store personal and protected information, so there is need of putting in place a data recovery system that work with proper security controls.
Delegate your assignment to our experts and they will do the rest.
In order for data recovery plan to be effective and meaningful, there is need of ensuring that the right data has been put place. Right data refers to a kind of data that is necessary for recovery and is relevant for critical business processes. The data should be safeguarded against any loss, and then availed within an acceptable timeframe (Glaser, 2004) . In addition to machine-readable or electronic data, data recovery planning should involve identifying critical information that is stored. This process can be time-consuming and laborious.
Computerized systems are often used science industry in supporting a range of regulated activities and then generate several forms of electronic records. Most systems related to electronic signatures, data correction, and audit logs do not conform to the existing regulatory requirements (Glaser, 2004) . There is need to put up electronic records that are capable of meeting all regulatory requirements. Concerning audit trails, there is a range of requirements described within the laid out regulations, hence allowing people to develop specifications under which the conformity of the system can be verified. However, this has not always been the case in most systems since some questions that are not explicitly covered in the regulations often come up (Glaser, 2004) . The major purpose of audit trail is to offer assurance regarding the integrity of electronic records. Several agency regulations and guidance documents provide a list of features that an audit trail must possess in order to be considered a compliant.
Cognitive demands of clinical work environment will constrain attentional clinical resources, and affect the ability to make efficient and safe patient care decisions. The human factors and user interface design of health information technologies include perceived usefulness, attitude towards using, and actual system usage. Recent federal incentives and mandates have spurred rapid development, growth, and adoption of health information technology. While providing benefits for better organization, integration, and availability, questions have been raised about their potential to bring about medication errors, lowered efficiency, and decreased clinician performance. There is the need outline foundational and theoretical models of ergonomics and human factors that are being advocated for in order to realize patient quality and safety. Making use of HFE methods is still at infancy stage, although it needs to be integrated in the design lifecycle. Quality improvement efforts can be used to improve the ability of informatics to address key concerns concerning the complexity of clinical settings. Application of HFE in the implementation and design of HIT is still limited and incorporating principles of HFE on the safety of patients is still undervalued in the healthcare sector. It is therefore important to conduct future works in order to advance the field of research. This will ensure that the quality and safety of patients are not compromised in any way by the adoption of HIT. As much as health information technology has promised to enhance patient care safety, efficiency, and quality, there have been significant concerns towards its unintended consequences. Lack of consideration for ergonomics and human factors in the implementation of a system has been considered a serious barrier to the success of health information technology.
Most healthcare processes involve several patient visits or outcomes. Modeling of outcomes associated with healthcare processes is different from standard industry environments. Because of this, typical multidimensional data warehousing designs frequently observed in other industries are normally not a good match for data found in the healthcare processes. There is the dimensional modeling, which is a warehouse design technique having a data structure that is similar to easily understood entity relationship model (Adair, 2010) . Dimensional technique involves the process formulating a structure of data warehouse by using illustrations showing relationships between data tables. Enterprise data warehouses are notoriously expensive and difficult. In addition, the rate of failure of data warehouses across all the industries is very high. However, if data housing is done well, there is the possibility of it becoming a strategic asset. The healthcare administrators who face value based payment models require ways of cutting waste, reducing costs, and vastly improving care delivery. Building data warehouse needs serious consideration of the types of risks involved (Adair, 2010) . This involves establishing ways of doing things right the first time so as to limit the risk of complete failure. The purpose of data warehouse involves organizing complex data from a range of places to form a single source. This makes it possible for an organization to be successful in a value-based care.
The issues related to corporate strategic plan, information management plan, operation improvement planning, and disaster and recovery planning include the goals and objectives of the organization, technological level of the organization, and the kind of workforce recruited to work in the company (Adair, 2010) . The goals and objectives of an organization influences the operation improvement plan since this will make an organization lay down strategies that will ensure it achieves such goals and also improve its operational management. The other issue is technological level of the organization , which will make sure that the company has protected its data and no unwanted user is allowed to access the company’s data. The third issue is the type of workforce recruited by the company since the kind of employees that the company has will determine whether it improves its planning operation or it fails (Adair, 2010) . These three issues are important as relates to the operation of ay organization and should be embraced by every company that seeks to be successful in protecting its data.
The challenges that exist in each phase of the systems development life cycle include lack of proper co-ordination between different IT departments, financial constraints, and failing t design proper security systems that will ensure that the privacy of the organization’s data is upheld (Adair, 2010) . These challenges are equally likely to affect the implementation of systems in EHRs, HIEs, and RECs within the system of an organization.
References
Adair, J. E. (2010). Strategic leadership: How to think and plan strategically and provide direction . London: Kogan Page.
Glaser, J. P. (2004). The Strategic Application of Information Technology in Health Care Organizations . Hoboken: John Wiley & Sons.
Jooste, K. (2009). Leadership in health services management . Lansdowne: Juta.
McCormick, K. A., & Gugerty, B. (2013). Healthcare Information Technology exam guide for CompTIA Healthcare IT Technician and HIT Pro certifications . New York: McGraw-Hill.