The use of computers and information systems in healthcare is a good step in the right direction. Large amounts of information are stored, data is sorted into categories and can be easily retrieved, and patients are diagnosed effectively and accurately. Uniform codes and standards are created that make the system universally acceptable. Most hospitals and healthcare facilities focus on caring for their customers and saving their lives and meanwhile forget to adhere to the Health Insurance Portability and Accountability Act which mandates the protection of electronic health information since its implementation in 1996. The primary focus of the health law mandate was ensuring the privacy of patient information and insurance facilities. It is therefore the responsibility of all institutions to create new products and methods of protecting their data; The Privacy Rule was created to protect the confidentiality of patient information. Discovering new technologies to protect sensitive data has been a daunting task for healthcare facilities. Growing healthcare spending and the pressing demand to improve the quality and efficiency of patient care services represent the driving innovation in healthcare information management. The healthcare industry has become a challenging testbed for information security due to the complex nature of healthcare information and individual privacy. Storage of health information using computerized methods should essentially provide adequate protection of the confidentiality and reliability of patient data. Recent investigations have shown that data is lost not only due to theft by hackers, but also due to negligent healthcare workers who lose their laptops and are irresponsible...... middle of paper ..... .ns; An effective poster. 2009.Kathleen S. Oman, Mary E. Krugman Regina M. Fink Secrets of Nursing Research. ElsevierHealth Sciences. 2003. Marek Pam J. and College Anderson et al. Guidelines for preparing posters using PowerPoint presentation software. University of Florida. 2001.Mary Michaud, Monitoring and Evaluation Programme; Tips for Preparing Your Conference Paper University of Wisconsin. 2002.Robin Dredge, Poster Analysis; West Nodaway. July 2005 Available at http://www.chillihistoryproject.com/lessons/LP_dredge_poster.pdf Wolcott, TG Mortal Sins in poster Presentations or, How to give the poster no oneremembers. Newsletter of the Society for Integrative and Comparative Biology. 1997.Woodbury M. Gail. How to critically evaluate a poster; volume 5 London press. 2007. Available at http://www.cawc.net/images/uploads/wcc/5-2-woodbury.pdf
tags