History and Emerging Health Care IT Tools

Information Technology is improving daily. The healthcare department has not been left behind when it comes to adopting technology in most activities. New healthcare technologies are emerging daily, and health care professionals are learning how to embrace these changes. Embracing technology has helped the healthcare sector in protecting patient Health Records (PHI).

History and Emerging Health Care IT Tools

In this essay, I will explore two security measures needed to safeguard a patient’s information and records. Besides, the essay will explore how the measures selected help to protect the patient’s records for confidentiality and effectiveness.

The Health Insurance Portability and Accountability Act (HIPAA) is a law that is meant to protect sensitive patient information from being disclosed to other persons without the patient’s consent (Moore & Frye, 2019). The goal of this law is to keep all patient’s information private. The HIPAA privacy rule also states the individuals have the right to understand how their health information and records are used.

However, the patient cannot access psychotherapy notes or any other information that will be used to defend against a lawsuit (Moore & Frye, 2019). As a result, it will be wrong for third parties to access such information without the patient’s knowledge and consent.

HIPAA benefits protect patient’s information and protect them in four different ways.  First, HIPAA ensures that the health data is adequately safeguarded; hence, unauthorized individuals cannot access it (Cohen & Mello, 2018). Secondly, HIPAA ensures that the patient’s privacy is protected by prohibiting certain uses or even disclosure of their health information.

HIPAA allows all patients to obtain copies of their health information from the healthcare facility, and the patient can use the information during their follow-ups. According to Cohen and Mello (2018), HIPAA ensures that if there is any breach of health information, notifications must be sent to all the individuals that will be affected. Through all these regulations, HIPAA ensures that patient health information is protected. However, proper measures are taken if there is any breach.

The second measure that can be used to protect patient health records is encryption. Encryption involves encoding the patient’s data and information in a complex way. For one to access the encrypted data, one must have a proper key. Therefore, it becomes hard for unauthorized persons to access the information and data that is encrypted. In addition, the patient’s health information is kept secure with several layers of scrambled characters that surround the legitimate data (Kruse et al., 2017).

Therefore, it becomes hard for others to access such information unless the right key is given for decoding it. As Kruse et al. (2017) notes, encryption can be either software-based or hardware-based. Software encryption is easy to implement, and it only needs a password. As a result, it becomes easy for the cyber attacker s to encrypt the data by cracking the one-word code. On the other hand, hardware-based encryption is complicated since the process is separated from the device. Depending on the level of security, the department can choose the encryption method that is relevant provided the information is safe.

Safeguarding patient information is critical for all healthcare facilities, and all healthcare providers know and understand that patient safety is paramount. To enhance patient safety, their data and information should therefore be protected and safeguarded. HIPAA and data encryption are some of the most effective measures that can be used to protect patient’s health information. If the procedures outlined above are followed, it will be hard to have cases of patient data leakage to unauthorized persons.


  • Cohen, I. G., & Mello, M. M. (2018). HIPAA and Protecting Health Information in the 21st Century. JAMA320(3), 231. https://doi.org/10.1001/jama.2018.5630
  • Kruse, C. S., Smith, B., Vanderlinden, H., & Nealand, A. (2017). Security Techniques for the Electronic Health Records. Security Techniques for the Electronic Health Records41(8). https://doi.org/10.1007/s10916-017-0778-4
  • Moore, W., & Frye, S. (2019). Review of HIPAA, Part 1: History, Protected Health Information, and Privacy and Security Rules. Journal of Nuclear Medicine Technology47(4), 269-272. https://doi.org/10.2967/jnmt.119.227819

History and Emerging Health Care IT Tools Instructions

During the last meeting, many ideas were shared about emerging trends and information technology (IT) tools used in health care, such as e-mail between the patient and provider, e-prescribing, and computerized physician order entry (CPOE). A department supervisor has asked you to provide a brief summary about information technology tools so that he can share it with his staff. Write a paper of 1–2 pages, not including the title and reference pages, that discusses the following: Select 2 security measures that are needed to protect the patient health record (PHI), such as encryption, e-prescribing guidelines, or Health Insurance Portability and Accountability Act (HIPAA) guidelines, and describe how these measures are used to protect patient health records. Be sure to support your information by citing at least 2 references using APA format.