We recognize that good health does not just come about. Rather, it is a habit of smart choices and sound clinical care. As per establishment, good care is vital and can only be possible in presence of proper compliance with the health care technology. A company’s technological plan is essential for analysis, growth and development. (Mosenkis, 2005) Intranet should assure broad-based participation of both patients and doctors. In should have value to everyone.
These require a user-friendly interface where navigation ought to be consistent with their use and the controlled. Any new technology should encourage and interest everyone in the organization to using it. It must be one, which employees will use, trust, rely on, and revisit. This paper addresses the issue of intranet and internet in addressing data and information exchange in the health sector.
The management of data in any organization is of critical importance. Intranet enables the quick access to information. Quick access of diagnosis and patients information in the health sector has become of hallmark importance. Intranet should be highly appreciated because it plays a vital role of allowing creation of management information system to support operational, planned and strategic decision-making. (HKUST Cyberspace Centre, 1997)
Secure and effective intranets
The security of information is a very important aspect of protecting corporate, employees’, and patient’s confidential information, integrity of controls associated with human resources systems and financial reporting applications.
“A secure intranet infrastructure supports secure connectivity, Strong password, host-based security on all server and client computers, role verification and authentication for certain types of access and effective compliance enforcement mechanisms.” To archive automated life cycle the system need “user accounts, smart cards for strong authentication and an internal Public Key Infrastructure.”
Others requirements include “automated and manual tracking, monitoring and response to active threats to the network and lastly though customized programs that inform network clients about security threats, risks, policies, and best practices is essential.” (Janczewski, 2000)
Firewall is just one of several ways of protecting the network from other un-trusted network users. The actual mechanisms of accomplishing data protection vary in principle. It is a pair of mechanisms that exists to block traffic, or to permit traffic.
The ability or strength of blocking harmful and suspicious messages depends on the server system’s firewalls. Some have greater power while others place normal or less emphasis on blocking messages interchange. Access of information among health care facilities users ought to be occurring through proper safeguarded or fire walled public network.
The controlling machine referred to as the server ensures should have the capability of screening messages in both bearings; messages being sent out and those being received so as to ensure and maintain security and integrity of patient’s and physicians information.. According to Mosenkis (2005), when part of an intranet is accessible to it becomes has higher chances of firewall attack.
Legal and Regulatory compliance
According to the Healthcare Insurance Portability and Accountability Act of 1996, the security standards implement controls over access to health information and provide audit trails for computerized record systems to meet the needs and capabilities of small and rural healthcare providers.
There is good transmission of information, which physically, electronically and administratively safeguarded to ensure confidentiality. The Legal and regulatory compliance initiatives encompass Security, Privacy, Data protection, Accountability, Backup and record retention (Anton, n.d).
Privacy and Patient Information
Privacy is the rights and responsibilities of an individual or organization with respect to the collection, use, retention, and disclosure of personal data. The organization collects sensitive personal data that is private and policies ought to define and govern how to handle and protect information. Individuals ought to be empowered to control the collection, use, and distribution of their personal information.
Data Storage
According to Anton (n.d.), the least visible but most valuable asset in any organization is working knowledge. Typical Storage and communication of information is achievable through production processes, standardized procedures for giving services, corporate guidelines and procedures for offering provision for other policies governing the handling of documents. The work supportive documents include “instructions, supplementary drawings, flowcharts, forms, and other supporting information”. (Anton, n.d.)
Important information remains locked to specialized physicians instead of a work setting where it is available when others especially junior physicians need clarification or assistance. This becomes a problem especially in their absence.
This information can easily be lost but implementation of a mechanism should be available to confine and avail it to users whenever they need it in a safe and reliable intranet or through the Wide World Web. (Anton, n.d.) Protection of such information provides access from the administrative point of control to authorize access.
Anton, (n.d.) indicates that the technology that uses internet closely avails knowledge to user’s mainly the employees in the health sector. The ability to access such information at various locations any time has become a reality today. Availing information at whatever time or location is an excellent way of empowering workers.”
Data protection policies apply to everyone who has access the health information regardless of its location, the form it takes, the technology used to handle it, or the purpose it serves. The organization ought to identify and classify important or critical data.
Business continuity/ Disaster recovery
For continuity, there has to exist a backup process for line-of-business (LOB) applications just in case a disaster may occur. Formulating Record Retention program, which organizes and manages records and keeps information stored and available for the relevant retention periods is essential. Security is the key to continuity. User accounts provide access to, and security for, granting corporate resources enables access to the network.
Computerization of other areas allows for extra security, and resources’ owners need to grant permission for users to access these areas. System accounts are accounts used to perform services, such as for SQL Server, information exchange, backups, or scheduled scripts in a similar way as user accounts. Distribution and security groups for either sending mail or for granting access to resources increases chances for advances. (Janczewski, 2000)
References
Anton, K., (n.d.) Effective Intranet: Intranet journal from Comprose Inc. Web.
Janczewski, L. (2000). Internet and Intranet Security Management: Risks and Solutions. Idea Group Inc (IGI). Pp 38.
Mosenkis, R. (2005). Intranet Implementation. Web.