Data security for network and health information systems makes patients’ information private. Unauthorized people should not access patients’ information. Kaiser introduced an internet patient portal. This portal was subjected to greater insecurity. People accessed patients’ data. Sometimes, the portal would mix the patient’s information. This was an element of concern to the organization. Breaching internet security occurs when unauthorized persons access data online (Wager, 2013).They can edit it. Others can cause communication to be ineffective.
The e-mail security breach was very serious. The portal was at great insecurity. It concatenated patients’ information. Programmers wrote a flawed script that mixed up over eight hundred personal e-mail texts (Wager, 2013). It did not separate them as expected. Consequently, nineteen members received texts containing private information concerning other members. Kaiser noted this. Apologies were made. Investigations followed. Fast resolution was facilitated by a report from a member that same day on problem e-mail.
The exploration to the cause of the problem will be effected by well designed recommendations. The members shall be involved in a discussion focusing on confidentiality of access to the site. The closeness of the clients when opening the portal to load data will be discussed. This will give information concerning privacy and portal security. The information collected shall be filed.
The collection of opinions will be carried out. This will help us to safeguard our data. The staff will be free to provide information. This information will be used to solve portal insecurity problems. Thorough investigative procedures will be applied. The system will also be examined by the technocrats who shall review the program features. When the problematic features have been identified, I will try to find out where the hacking was done and the persons involved. I will also use a sensor. This will help to detect the hackers and alleviate their effort to alter the system. Moreover, I will make follow-ups on how various departments respond to deadlines. Deadlines can be a get-out to unauthorized access to the portal.
The future security breaches would be a big issue (Wager, 2013). The programmers will access the patients’ data and edit it. This means that the prescriptions, accessibility of the rightful patients and more time will be taken in sorting out patient data. This will happen because it will be mixed up and background information of the patients will be interfered with. The payment details of patients will be interrupted. The hospital will not fetch money as expected. The assigning of roles to nurses will be a problem. This will create confusion in the institution when the mixed-up information does not make meaning to the duty persons. Mixed up information will not make sense. E-mails will make it tedious for duty personnel to sort information. The cumulative result is the failure of the institution and low quality services. The institution will eventually close down. This is poor administrative ability.
I will recommend the investigations on the operations, emails and development. In the operations part, I will assign necessary technicians to improve and uplift the system. This will ensure that the system is completely secure. An administrator password shall be utilized to restrict access to the portal. The password strength will be enhanced by use of non-uniform characters. The password should not be easy to memorize. The password should be inaccessible and the site free from hacking. In the emails section, I will ensure that the emails are not linked up. They should be isolated. Their destination should be clear. As well, the emails should be directed to the respective email ID. The development section should ensure the continuous improvement of the system so that its security standard is kept high. I will also program the portal in a way that each staff member can access the portal. However, no option for editing shall be accessible to outside parties. This will be a good limitation. It will perfect administrative process. In conjunction with this, I will assign necessary personnel who will be in charge of monitoring the patient portal. In case of any intrusion, they should communicate to the higher authorities and make confidential changes. The private information should be memorized off head. This information should not be revealed to anybody. It should not be talked about or disclosed to anybody. Only those who hold the relevant office positions will access the portal.
The patient portal is an administrative site to help in running the institution processes. Nobody is allowed to access it. The patient details are private and confidential (Wager, 2013). Exposing these details makes the patient feel humiliated. This can cause distress to patients. In the long run, patients will not be confident to give their details. Some will not visit health institutions to seek medical attention. The health levels of the community will dwindle. These will not be the mission of such institutions. For this reason, security safeguard is very important to exclude unauthorized people from accessing patients’ data information. This will hold the patient as the most respected person.
References
Armoni, A. (2002). Effective healthcare information systems. Hershey, PA: IRM Press.
Wager, K. A., Lee, F. W., & Glaser, J. P. (2013). Health care information systems: A practical approach for health care management.