over personal health record. (HealthIT.gov) (parr. 2) Personal health records are only meant for the patients.
Not all of their providers have the same health records. If they were in Mexico and needed to know what the patient was allergic to or if the producer was okay to move on with they wouldn’t be able to know any of that because the file is at their original physician in the file cabinet. Some people would rather take the chance of only having the file at their physician’s because it makes them feel secure about their personal information. Others, like me, want to have electronic health records that way someone doesn’t give me an injection of something that I am allergic to if I am unconscious. (HealthIT.gov)
(parr.4) The security of electronic health records is enforced majorly. HIPAA is included in what they are allowed to put and do on the records. They watch for confidentially authentication, integrity, availability and accountability are all considered carefully. “The government also created the HIPAA Security Rule to require specific protections to safeguard your electronic health information. A few possible measures that can be built in to EHR systems may include: “Access control” tools like passwords and PIN numbers, to help limit access to your information to authorized individuals. “Encrypting” your stored information. That means your health information cannot be read or understood except by those using a system that can “decrypt” it with a “key.” An “audit trail” feature, which records who accessed your information, what changes were made and when.” (www.hhs.gov/ocr/privacy/.) (Parr. 8) HIPAA security complainants include understand why computer security is important, make certain your colleagues and staff take security as seriously as you do, catalog all the information system components that interact with protected health information in your office, prepare for disaster before it occurs, make sure your network and communications safeguards are intact and robust, be certain that you have anti-virus software and keep it up to date, understand what encryption will do and when it is necessary, consider chains of trust and your business relationships, demand that your vendors fully understand the HIPAA security standards, and start with a plan and the end in mind. (Kibbe, 2005) (parr. 6)