SECURITY POLICY MODEL FOR MEDICAL RECORDS (A CASE STUDY OF UNIVERSITY OF UYO TEACHING HOSPITAL UYO – AKWA IBOM STATE)

CHAPTER ONE

 GENERAL INTRODUCTION

1.0     INTRODUCTION

The application of information technology has really ensured capacity framework and principles to several businesses and professional organization by providing measures of productivity and solution in their activities.

Information technology in this modern age as provided several measures and modalities through which patent personal medical information could be protected and secured from public access and also even help to improve communication among health care providers.

Among the obstacles to adoption of a security policy model for protecting medical records which is a computerized –based patient record, institutional and clinical concerns about privacy of confidential  information. Yet adopting high quality security is itself sometimes resisted by medical record users.

This project is to describe from a primary care viewpoint the features that characterize an attractive solution to the implementation of patient records security goals, as well as strategies for implementing  these features. The accompanying traces the origins of typical unauthorized access and release of confidential  patent information.

A second federal law gramm head-Billey Act (Public no. 102 – 106, 1999). 15  USC 6801 et. al. was enacted  to protect the privacy of financial  information, but applies to health plans as well as (Hirah, 2001). The Act requires that health plans and information distribute notices to enroll detailing the types of information disclosed to the third party and the types of third parties who might receive this information.

Public Health Service Act 543, 42 USC 290 dd; regulation at 42 Cfr part (2); information may only be disclosed to third party if the patients signs an authorized.

Edwards (2007), just as well electronics medical records can be password protected, all paper files can be kept in a locked file safe with records only being available to staff with legitimate need to access them.

Davidson and Davidson (2005) states that data can be destroyed, payment data can be destroyed once the services in question have been completed and paid for.

 

 1.1    STATEMENT OF THE PROBLEM

Medical records in diverse medical institutions and outlets encountered many setbacks and difficulties.

The following are the problems of the study:

  1. Medical records are vulnerable to unauthorized users in the sense that anyone can have access to it.
  2. Patients personal medical information lack security encryption because it is paper-based generation.
  3. Medical records of patient information lack authentication and authorization.
  4. Sometimes patient medical information records are accessed by unauthorized users without the patient consent or permission

1.2     OBJECTIVE OF THE STUDY

The objectives of this project are as follows:

  1. To design a system security policy model that will secure patients medical information records from unauthorized users and access.
  2. To provide security measures that will encrypt and deny access to any intruder about the information.
  • To provide authentication and authorization access to patient medical information record through different level of access and what depth of information in case of emergencies.

1.3     SIGNIFICANCE OF THE STUDY

The security policy model for protecting medical records absolutely will be significantly impactful in diverse capacity as follows:

  1. This system will help in security policy model for protecting medical records of health workers to easily control and monitor patients’ medical information records.
  2. It will also enable medical officers with schematics measures of protecting health administrative and patient information records from the general public.
  • This will also enable the technicians or students of information technology (IT) to learn on diverse ways to provide security to information technology asset.
  1. This study will be a source of information to both medical personnel and students in formulating security policy model d government may encourage for approval.

 

1.4     SCOPE/DELIMITATION OF THE STUDY

The feasible design and implementation of a security policy model for protecting medical records will demand the software and hardware implementation, but in this project, we are will concentrate on designing and simulating a software in protecting patients medical information records and while also specifying different hardware components that can be used in the feasible implementation.

In related view, designing a security policy model for protecting medical record is making an expert system to view and secure patients medical information system in order to grant access to authorized users and deny access to unauthorized users and also give report to the patient.

 

1.5     LIMITATION OF THE STUDY

The limitation of this project was that the researcher was not given right access to the accurate information on time and the sources of information could not respond as demanded due to the busy schedule of their work. The workers of University of Uyo Teaching Hospital (UUTH) were concerned about how their information could be kept in confident to avoid breaches.

 

1.6     PROJECT LAYOUT

Security policy model for protecting medical records consist of five sections.

Chapter one which considers the General introduction, Background of the study, Statement of the Problem, Objectives and the Relevance; it also view the contributions to knowledge as well as glossary. Chapter two focus on the required. Chapter three concentrates on the general analysis, designs, algorithms and research methodologies as applicable. Whereas chapter four give regards to system implementation, requirements documentation and maintenance. Chapter five summarizes the research document, provides conclusion and recommendations accordingly.

 

1.7     DEFINITION OF TERMS

Security              –        the safety of a state or organization.

Policy                  –        It is a dimensional copy of something,                                  usually in   a small scale.

Patient                –        A person receiving treatment medically.

Medical               –        A science of medical or an examination            to           assess a personal health.

Record                 –        A permanent account kept for evidence                                        or information.

Information        –        A fact or knowledge provided or                                                   learned.

Vulnerable         –        Exposed to being attacked or hacked.

Access                 –        Given the right or opportunity to use                          something or see someone.

User                     –        Someone who use something or                                                    information.

Permission          –       The act or right of allowing someone to                                        do something.

Data                     –        Facts or statistics used for reference or                                           analysis.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top