logo

Protecting Healthcare Staffs', Patients' and Customers' Data Privacy and Intellectual Property

   

Added on  2023-06-08

13 Pages4467 Words174 Views
Creating and Managing
Digital Systems

TABLE OF CONTENTS
INTRODUCTION ..........................................................................................................................3
MAIN BODY...................................................................................................................................3
Reasons why some healthcare organisations have become independent and vulnerable because
of Information Systems:...............................................................................................................3
Explanation of the internet challenges faced in view of protecting healthcare staffs', patients'
and customers' data privacy and intellectual property:................................................................4
Explanation of how the internet users can protect their individual privacy with the help of self
regulation, legislation, and informed consent:.............................................................................6
Discussion of two ways that protect the intellectual property rights:..........................................7
Recommendations:.......................................................................................................................8
CONCLUSION................................................................................................................................8
REFERENCES..............................................................................................................................10

INTRODUCTION
The idea of privacy and fair information practices has raised questions in both the
categories of being in favour as well as being against it. To put it in its simplest form, it can be
defined as the set or standards of information collected about the personal data and highlighting
the issues related to it. It means that are certain ways to obtain data regarding any matter and
keep in mind its privacy policies to eliminate any kind of illegal and unfair practices. The term
privacy deals with the capacity an entity might have in obtaining any data to determine what all
information can be shared with whom and how. The FIP's are different in the opinions of people
as to how they see then term as in the privacy policies. Some of these can be general and provide
guidance while for some it can be conflicting in nature. However, it is advisable to collect
information according to the appropriate means and should be kept in mind as to how can these
not hurt anyone in anyway.
TASK-1
Reasons why some healthcare organisations have become independent and vulnerable because of
Information Systems:
As healthcare is related with the society and its constituents, it has become more
dependent on factors that can prove out to be a great source of protection towards their activities
and to save themselves from outsiders (Handtke. Schilgen. and Mösko. 2019). They are at a risk
because of the attackers' immoral goals to attain information about various sectors and elements
of the healthcare organisation that may hinder the confidentiality of their operations and pose
threat to their safety measures. In cybercrimes, the main goal of the attacker is to gather as much
information about health records as much it is possible to harm the healthcare sector and their
services. These informations can be misused by them in order to acquire a large portion of
resources available with the healthcare organisations. The organisations have become vulnerable
due to the above mentioned reasons due to the nature of information systems being an open
system that imposes the risk of vulnerability that creates possible access to the irrelevant
authorities through system's memory. There is no reliability of these information systems as they
are robotic elements and can be accessed by anyone, anytime and anyhow it wants to be done
(Feldman. Buchalter. and Hayes. 2018). The rapid development of information systems in order
to accelerate its development, has unknowingly created complexity in its authentication and
relevancy. The healthcare organisations and their overall operational activities are disrupted by

these complexities in the form of various man made and natural factors such as humans and
technology with the same motive of conducting malicious activities such as fraud.
To reduce the involvement of such malpractices, there are several measures taken to
create technical and innovative processors that can detect these unwanted factors which hinder
the quality of these creative information systems. There are many relevant possibilities of
internal stealing and possession over the data, the healthcare organisations are vulnerable to both
internal and external environment around them. There are multiple ways in which the internal
illegal attempts can be taken in the form of staffs, outsiders entering the premises, etc. in order to
steal credentials that are extremely confidential for the organisation on which the overall
operational activities are dependent on. The main risk of these information systems initiates
when the details are exposed to the public or the rivalries in terms to commit a variety of crimes.
Usage of such information systems have both pros and cons for an organization as it has many
levels to pass through in order to meet its final collaboration with the authorities. The
intermediaries involved in the process might be the cause of presenting the outdated data
pertaining to the high operational costs. With these high operational and production costs, there
is a threat of duplication of the equipment used in the treatment of the patients without anyone's
knowledge about the exchange of equipment (Rothstein. and Tovino. 2019). Apart form having
these negative point of view of the technical information systems, there are some benefits such as
the reduction in human errors, facilitating coordination, etc. Even though there are numerous
benefits, the human nature is to hinder the privacy concerns and acquire data and information
about health issues of the people and influence terrorism.
Explanation of the internet challenges faced in view of protecting healthcare staffs', patients' and
customers' data privacy and intellectual property:
The procedure and method of operating healthcare organisation has changed
tremendously in the past years in view of its staff, patients and customers. Not only in the form
of rendering services for their benefit and care, but also for protecting their interests and
intellectual rights from the dangerous practices (Greeter. and Reiboldt. 2022). The new
technology and legislative rules and regulations in the territory have provided assistance in the
form of security from the breach of data and other actionable crimes. In the current scenario,
there are many problems faced by the health systems across the globe in order to protect the
rights and interests of their people along with the customers and patients. There is no doubt that

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Challenges to Protection of Individual Privacy and Intellectual Property in Digital Systems
|10
|3547
|348

Creating and Managing Digital Systems
|12
|3912
|393

Creating and Managing Digital Systems for Healthcare Organisations
|13
|4405
|422

Creating and Managing Digital Systems - Task 1 and [optional-Task 2 or Task 3]
|21
|4348
|450

Creating and managing digital systems: Vulnerability and dependency in the context of the information system
|14
|4519
|123

Creating and Managing Digital Systems: Challenges and Solutions
|11
|3583
|102