The Electronic Health Records.edited
docx
keyboard_arrow_up
School
Rongo University College *
*We aren’t endorsed by this school
Course
201
Subject
Health Science
Date
Nov 24, 2024
Type
docx
Pages
4
Uploaded by SuperFoxPerson919
1
Electronic Health Records
Name
Institution
Course
Date
2
Electronic Health Records(EHRs), are vital digital tools that have been deemed useful in
healthcare facilities. Patients' records and history are stored digitally using the EHR hence they
provide the updated patient's record along with details of medical history. Nonetheless, the
allergies and laboratory results of patients exhibited by the aid of EHR help the care providers
analyze the correct decisions regarding a diagnosis of a patient.
Paying the ransom so as to access their patient’s data was the right move by Anywhere
Hospital as it minimized consumer sovereignty
(Anshari, 2019)
. Also, it helped detain their patient
revenue as this is one of the many objectives of many hospitals. The ability of the EHR to
provide billing tools enables them to manage their income and ensure payment. Primarily, the
records help physicians to provide evidence on individual-based claims on the basis of a patient's
visit. Additionally, incentives from the government act advantageous as hospitals that use EHR
systems are among the beneficiaries. Despite the incentives, Anywhere Hospital was able to
dodge the penalties that come in handy with the lack of EHR. Apart from these, the hospital was
able to increase its efficiency as the EHR is time-conscious and thus increases its scale of
operability
(Anshari, 2019)
. Consequently, more patients are attended to within a single day and
this maximizes the marginal productivity besides lowering the marginal cost.
Risk assessment is crucial in the safeguarding of EHR and regular check-ups are essential
as they evaluate the security gaps in the hospital and act accordingly to prevent destructive data
breaches. Anywhere Hospital should have performed vulnerability scans and penetration tests
that would have potentially saved it from the malware. Per
(Marlow, 2018), v
ulnerability scans
crosscheck potential vulnerabilities across the organization including unpatched systems or holes
in the firewall among others and this helps to identify misconfigurations before a cybercriminal
3
(Marlow, 2018)
. Furthermore, encryption is essential in data protection in case of a data breach.
The utilization of encryption savors penetration of data either at transit or at rest.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
References
Anshari, M. (2019). Redefining Electronic Health Records (EHR) and Electronic Medical
Records (EMR) to Promote Patient Empowerment.
IJID (International Journal on
Informatics for Development)
,
8
(1), 35. https://doi.org/10.14421/ijid.2019.08106
Marlow, M. L. (2018). Should Government Subsidize Electronic Health Records?
SSRN
Electronic Journal
. https://doi.org/10.2139/ssrn.3191451