Institute: ONC | Component: 2 | Unit: 9 | Lecture: a | Slide: 12
Institute:Office of National Coordinator (ONC) Workforce Training Curriculum
Component:The Culture of Health Care
Unit:Privacy, Confidentiality, and Security
Lecture:Definitions of privacy, confidentiality, and security
Slide content:Challenges from Proliferation of Technologies and Applications Increased technology use by all care providers Health information exchange and data sharing activities across multiple networks Cloud computing and third-party outsourcing Increased use by patients, families, and consumers of their devices (tablets, smartphones, etc.) New models of care require more care providers to access data across the patient care continuum Clinicians using their own devices Personal laptops, tablet devices, smartphones, and so on Connected medical devices and implantable devices 12
Slide notes:Security challenges are created with the proliferation of health IT technologies and software applications. For example, there is an ever-growing use of electronic data in clinical workflows and use of technology by all health care providers. Likewise, health information exchange (HIE) and data sharing activities across multiple networks and cloud computing greatly expands the required perimeter of data protection. Financial constraints often result in shrinking technology budgets, which presents another point of potential vulnerability for the health care organization because it becomes more difficult to monitor and quickly respond to threats. Patient and family engagement activities are increasing as they become more involved in their care using their own various devices and applications. There are also new models of health care, such as accountable care organizations (ACOs, ay-see- ohs ) and care transitions (care across the patient care continuum) that require more members of a care team to access information. Clinicians also want to use their devices, such as personal laptops, tablet devices, smartphones, and so forth. This causes increased use of cellular and other wireless networks, which may be vulnerable if not properly encrypted, thus threatening security of medical devices and implantable devices. 12