Monday, December 2, 2019

Intranet in health and human services organization

Table of Contents Secure and effective intranets Legal and Regulatory compliance Privacy and Patient Information Data Storage Business continuity/ Disaster recovery References We recognize that good health does not just come about. Rather, it is a habit of smart choices and sound clinical care. As per establishment, good care is vital and can only be possible in presence of proper compliance with the health care technology. A company’s technological plan is essential for analysis, growth and development. (Mosenkis, 2005) Intranet should assure broad-based participation of both patients and doctors. In should have value to everyone.Advertising We will write a custom report sample on Intranet in health and human services organization specifically for you for only $16.05 $11/page Learn More These require a user-friendly interface where navigation ought to be consistent with their use and the controlled. Any new technology should encourage and int erest everyone in the organization to using it. It must be one, which employees will use, trust, rely on, and revisit. This paper addresses the issue of intranet and internet in addressing data and information exchange in the health sector. The management of data in any organization is of critical importance. Intranet enables the quick access to information. Quick access of diagnosis and patients information in the health sector has become of hallmark importance. Intranet should be highly appreciated because it plays a vital role of allowing creation of management information system to support operational, planned and strategic decision-making. (HKUST Cyberspace Centre, 1997) Secure and effective intranets The security of information is a very important aspect of protecting corporate, employees’, and patient’s confidential information, integrity of controls associated with human resources systems and financial reporting applications. â€Å"A secure intranet infrastruc ture supports secure connectivity, Strong password, host-based security on all server and client computers, role verification and authentication for certain types of access and effective compliance enforcement mechanisms.† To archive automated life cycle the system need â€Å"user accounts, smart cards for strong authentication and an internal Public Key Infrastructure.† Others requirements include â€Å"automated and manual tracking, monitoring and response to active threats to the network and lastly though customized programs that inform network clients about security threats, risks, policies, and best practices is essential.† (Janczewski, 2000) Firewall is just one of several ways of protecting the network from other un-trusted network users. The actual mechanisms of accomplishing data protection vary in principle. It is a pair of mechanisms that exists to block traffic, or to permit traffic.Advertising Looking for report on it? Let's see if we can help y ou! Get your first paper with 15% OFF Learn More The ability or strength of blocking harmful and suspicious messages depends on the server system’s firewalls. Some have greater power while others place normal or less emphasis on blocking messages interchange. Access of information among health care facilities users ought to be occurring through proper safeguarded or fire walled public network. The controlling machine referred to as the server ensures should have the capability of screening messages in both bearings; messages being sent out and those being received so as to ensure and maintain security and integrity of patient’s and physicians information.. According to Mosenkis (2005), when part of an intranet is accessible to it becomes has higher chances of firewall attack. Legal and Regulatory compliance According to the Healthcare Insurance Portability and Accountability Act of 1996, the security standards implement controls over access to health informati on and provide audit trails for computerized record systems to meet the needs and capabilities of small and rural healthcare providers. There is good transmission of information, which physically, electronically and administratively safeguarded to ensure confidentiality. The Legal and regulatory compliance initiatives encompass Security, Privacy, Data protection, Accountability, Backup and record retention (Anton, n.d). Privacy and Patient Information Privacy is the rights and responsibilities of an individual or organization with respect to the collection, use, retention, and disclosure of personal data. The organization collects sensitive personal data that is private and policies ought to define and govern how to handle and protect information. Individuals ought to be empowered to control the collection, use, and distribution of their personal information. Data Storage According to Anton (n.d.), the least visible but most valuable asset in any organization is working knowledge. T ypical Storage and communication of information is achievable through production processes, standardized procedures for giving services, corporate guidelines and procedures for offering provision for other policies governing the handling of documents. The work supportive documents include â€Å"instructions, supplementary drawings, flowcharts, forms, and other supporting information†. (Anton, n.d.) Important information remains locked to specialized physicians instead of a work setting where it is available when others especially junior physicians need clarification or assistance. This becomes a problem especially in their absence.Advertising We will write a custom report sample on Intranet in health and human services organization specifically for you for only $16.05 $11/page Learn More This information can easily be lost but implementation of a mechanism should be available to confine and avail it to users whenever they need it in a safe and re liable intranet or through the Wide World Web. (Anton, n.d.) Protection of such information provides access from the administrative point of control to authorize access. Anton, (n.d.) indicates that the technology that uses internet closely avails knowledge to user’s mainly the employees in the health sector. The ability to access such information at various locations any time has become a reality today. Availing information at whatever time or location is an excellent way of empowering workers.† Data protection policies apply to everyone who has access the health information regardless of its location, the form it takes, the technology used to handle it, or the purpose it serves. The organization ought to identify and classify important or critical data. Business continuity/ Disaster recovery For continuity, there has to exist a backup process for line-of-business (LOB) applications just in case a disaster may occur. Formulating Record Retention program, which organize s and manages records and keeps information stored and available for the relevant retention periods is essential. Security is the key to continuity. User accounts provide access to, and security for, granting corporate resources enables access to the network. Computerization of other areas allows for extra security, and resources’ owners need to grant permission for users to access these areas. System accounts are accounts used to perform services, such as for SQL  Server, information exchange, backups, or scheduled scripts in a similar way as user accounts. Distribution and security groups for either sending mail or for granting access to resources increases chances for advances. (Janczewski, 2000) References Anton, K., (n.d.) Effective Intranet: Intranet journal from Comprose Inc Web. Janczewski, L. (2000). Internet and Intranet Security Management: Risks and Solutions. Idea Group Inc (IGI). Pp 38Advertising Looking for report on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More Mosenkis, R. (2005 December 14). Intranet Implementation. Retrieved from: https://ezinearticles.com/?Intranet-Implementation:-The-Advantages-of-a-Web-based-Solutionid=113114 This report on Intranet in health and human services organization was written and submitted by user Catherine Riggs to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.