{br} STUCK with your assignment? {br} When is it due? {br} Get FREE assistance. Page Title: {title}{br} Page URL: {url}
UK: +44 748 007-0908, USA: +1 917 810-5386 [email protected]
  1. Clinic Management



    You are the office manager for a large multi-specialty clinic. Another practice in town has just had their EHR system held hostage. Your doctors are concerned and have asked to you write a policy and procedure outlining the technical best practices for your new electronic medical record system. For this assignment you will create a training for your employees to cover the following topics: Online safety expectations Email etiquette and security Electronic Health Record access Potential threats



Subject Nursing Pages 3 Style APA


Electronic Health Records (EHRs) and Electronic Medical Records (EMRs) comprise an enormous amount of delicate data concerning pateints identity, medical history and medical health. Whereas healthcare providers and insurance firms use these records for cross-coverage and bill insurance, their delicate and patient-care-based content makes them a main target for different security threats and susceptibility. This training outlines the measures to ensure security of EMRs data.

EMRs have mainly digitalized versions of mail. EMRs are electronic adaptations of patient charts. EMRs record a patient’s therapeutic history and therapies in a hospital. EHRs comprise more holistic documentation of a patients’ therapeutic history and treatment. Also, they are documentations that provide long-term knowledge into a patient’s health even when seeking healthcare from different providers. EHRs are made for sharing and can assist in facilitating care even when patients go to a new hospital.

EHRs permit the workforce to message patients through an online portal securely. Hence it operates like an email whereby patients can produce new messages. Emails make it easier for a physician to automatically forward a message to send the patient a follow-up to an appointment. Likewise, the patients can input their blood pressure and glucose results reading electronically via their patient health information (PHI) system, which they can send to the physician.

Healthcare cyber risks are a massive challenge because a clinic’s network can have resourceful financial information together with a patient record. Because only a few persons do not see healthcare providers, almost everybody’s data is accessible in some way. EHRs’ interconnected nature implies hackers have admittance to the data gathered under patient names for years. Sharing patient data is integral to giving definitive therapy to patients; however, that Similar sharing likewise makes networks severely resourceful targets. In cybercrime, the attacker’s objective is sometimes to collect information either for sale or their usage. With the content accessible via EHRs, strangers can utilize insurance information in setting up appointments, undergo costly medical procedures, or get prescription drugs under the patient’s name (Drolet et al., 2017). Thus, in these situations, the patient or hospital might be held accountable for the fees or drugs. In other circumstances, hospitals have controlled more direct attacks.

Once the hacker has network accessibility, they can implant ransomware to code files or lock essential services until the hospital pays a specified ransom. Therefore, healthcare is a time-delicate field that hospitals always have few decisions however, pay the ransom and anticipate the money can ultimately be recovered. Also, the workforce can access private financial documents and use patients’ credit card numbers in performing various deceitful purchases (McDermott et al., 2019). Another workforce has been discovered to pilfer face sheets comprising demographic and social security data utilized in committing various crimes. High-level malware and phishing plans that ingrain malicious scripts on a computer or pilfer login IDs can compromise a whole system. One of the most interesting issues dealing with malware is that it only assumes one ostensibly authentic link to implant a reprehensible cyber presence into a network. Hence it is vital to train the workforce in recognizing typical phishing attempts.

Doing risk evaluations can be an arduous activity; however, with the correct tools such as HIPAA Ready, it can be done quickly and helps the clinic save the time and money used to hire third-party vendors to do these evaluations (Luna et al., 2016).


Despite the threat to EMRS,  EMRs have become the new criteria in the healthcare industry with benefits such as: 

  • Giving precise and complete patient data at the point of care.
  • Helping providers in diagnosing patients, decreasing medical mistakes, ad providing safer care.
  • Empowering easy accessibility to patient documentation for efficient and synchronized care
  • Enhancing efficiency
  • Fostering legible communication to utilize in streamlining coding and billing.


  • Kruse, C. S., Smith, B., Vanderlinden, H., & Nealand, A. (2017). Security techniques for the electronic health records. Journal of medical systems41(8), 1-9.
  • Drolet, B. C., Marwaha, J. S., Hyatt, B., Blazar, P. E., & Lifchez, S. D. (2017). Electronic communication of protected health information: privacy, security, and HIPAA compliance. The Journal of hand surgery42(6), 411-416.
  • McDermott, D. S., Kamerer, J. L., & Birk, A. T. (2019). Electronic health records: A literature review of cyber threats and security measures. International Journal of Cyber Research and Education (IJCRE)1(2), 42-49.
  • Luna, R., Rhine, E., Myhra, M., Sullivan, R., & Kruse, C. S. (2016). Cyber threats to health information systems: A systematic review. Technology and Health Care24(1), 1-9.






Related Samples

WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, how can I help?