In Chapter 15, it is said that “Technology changes so quickly that even the most diligent user will likely encounter a situation that could constitute a threat to their network” (p. 260). Given the increasingly mobile nature of technology (especially HIT), I believe this to be more the case than ever. It has already been mentioned that stolen devices will often lead to security breaches in EHRs and other organizational information; given that we often check in on mobile devices like smartphones and iPads, which we take with us into our civilian lives as well, there are that many more chances to have these records stolen and accessed outside of the normal sphere of approved personnel. Because it is so much easier to steal this information than ever before, the nurse has to be even more diligent about protecting said data.
For one thing, I believe it should be considered unethical to access medical databases and private information related to your organization through personal mobile devices. If needed for mobility, and possible given budgets, on-site mobile devices should be used that stay on organization or hospital grounds, and are only used to access the org’s electronic records. This keeps a separation between personal devices and professional devices, allowing dedicated HIT to be used without fear of compromising the information outside the confines of actual health practice. Having to ‘check in’ and ‘check out’ these devices when arriving for a shift can help increase accountability for these devices, ensuring that nurses will be very protective of them and not allow them to be accessed by others. While there may be cost issues in having dedicated devices, it may help prevent breaches and keep mobile HIT devices to stay under the supervision of organizational staff.
References
McGonigle, D., & Mastrian K. (2011). Nursing informatics and the foundation of knowledge.
Jones & Bartlett Learning.