PSYC 3430 Lecture Notes - Lecture 13: University Health Network

14 views2 pages

Document Summary

Computerized records and networked systems increase healthcare efficiency but are prone to breaches. Patient confidentiality violations can occur if: network login ids and passwords are shared, workstations are left unattended while logged in, weak, easy to guess passwords are used. In addition, as with paper records, reading, copying, forwarding, or changing electronic patient records by those not authorized to do so are all patient confidentiality violations. Case example #1: this example of a privacy breach in british columbia (labeled as. It is important to take note of island. Health"s reaction, as well as the important fact that these breaches were discovered on an audit, which speaks to the importance of safeguards to check inappropriate behaviour. Case example #2: from the 2000s, this early example of a medical office clerk who illegally checked the health records of her lover"s wife, reveals how longstanding this issue remains.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents