NR 512 Week 7 Discussions: Safeguarding Health Information and Systems

Sample Answer for NR 512 Week 7 Discussions: Safeguarding Health Information and Systems Included After Question

NR 512 Week 7 Discussions: Safeguarding Health Information and Systems

NR 512 Week 7 Discussions Safeguarding Health Information and Systems

Click here to ORDER an A++ paper from our Verified MASTERS and DOCTORATE WRITERS: NR 512 Week 7 Discussions: Safeguarding Health Information and Systems

Week 7: Safeguarding Health Information and Systems

7070 unread replies.109109 replies.

A new concept for some organizations is to allow nurses to bring in their own devices known as bring your own devices (BYOD) to use at work. What are some of the security issues you might encounter if this were allowed? How would you address these issues?

Search entries or author Filter replies by unread Unread     Collapse replies Expand replies

 Subscribed

Apr 9, 2018Apr 9 at 10:13am

Manage Discussion Entry

A Sample Answer For the Assignment: NR 512 Week 7 Discussions: Safeguarding Health Information and Systems

Title: NR 512 Week 7 Discussions: Safeguarding Health Information and Systems

My workplace would never allow for us to bring our own devices into the facility! I was quite surprised to find out that this was a thing!
Upon doing some research on this topic I found out some interesting facts. I found it interesting that BYOD encompasses more than just computers. It also means that employees may use smartphones, tablets, kindles, and more for their work. The concept of BYOD includes personal software and services, as employees use iCloud services and other tools on the web (Eschelbeck & Schwartzberg, 2017).

To begin, I will discuss the security issues that would be encountered. It’s risky to assume that prohibiting the use of personal devices solves the problem. I say this because the average employee ends up using their own device anyway because it is not monitored by work place security policies. But, regardless of what you think about BYOD and however workplaces choose to implement it, IT managers should treat it the same way as any introduction of innovative technology: with a controlled and predictable deployment of security (Eschelbeck & Schwartzberg, 2017).

When it comes to devices being introduced into the workplace, a few questions should be addressed.

1) Who owns this device?

Is this a trustworthy person? In the past, the company owned the devices, whereas in this case. the employee owns the device (Eschelbeck & Schwartzberg, 2017).

2) Who manages this device?

How is security going to be managed, if the employee is in charge (Eschelbeck & Schwartzberg, 2017)?

3) Who secures this device?

Accountability is not something that goes away for an employee just because they personally own the device (Eschelbeck & Schwartzberg, 2017).

All organizations have the flexibility to embrace BYOD as much as they feel reasonable. But, there are companies who have decided the risk is too great and choose not to implement a BYOD program (Eschelbeck & Schwartzberg, 2017).

In May 2012, a facility banned its 400,000 employees from using their own devices and their own applications because of the concerns about data security. The facility also banned cloud storage services such as Dropbox, as well as Siri. Since Siri listens to spoken requests and sends these requests to Apple’s servers where they are deciphered into text they found this could be a HIPAA violation along the line. They also banned Siri because she can create text messages and emails on voice command, but some of these messages could contain sensitive and private information (Eschelbeck & Schwartzberg, 2017).

Ultimately, the success of the BYOD program is measured by the employees’ willingness to use their personal devices within the rules set for them. The organization’s security procedures and policies should determine whether and how BYOD is utilized. If adopted into a company, BYOD users need to have the ability to enforce security policies on their device and protect their property if that device is ever lost or stolen (Eschelbeck & Schwartzberg, 2017).

A couple other security concerns include:

-Being able to register employee devices with the company for monitoring purposes (Matteucci, 2017).

-Implementing password protection, antivirus and back-up software for all devices (Matteucci, 2017).

-Preventing the use of public WiFi networks (Matteucci, 2017).

-Downloading company information on home computers (Matteucci, 2017).

-Cleaning/resetting the devices entirely when employees quit or are terminated (Matteucci, 2017).

References :NR 512 Week 7 Discussions: Safeguarding Health Information and Systems

Eschelbeck, G., & Schwartzberg, D. (2017). BYOD Risks and Rewards: How to keep employee smartphones, laptops and tablets secure. SOPHOS, 2(10), 1-7.

Matteucci, G. (2017, April 21). The Pros and Cons of Bring-Your-Own-Device (BYOD) for Your Mobile Field Workforce – Field Force Friday. Retrieved April 09, 2018, from http://www.msidata.com/pros-and-cons-of-byod-in-mobile-field-workforce

Apr 9, 2018Apr 9 at 1:41pm

Manage Discussion Entry

Thanks for your response Hailey and highlighting dynamics related to BYOD.

Class,

Hailey highlights the success of BYOD relying on staff willingness to use their personal device. If a device is required to complete the functions of your job should the organization be accountable to this cost? Defend your perspective.

 

Apr 10, 2018Apr 10 at 2:49pm

Manage Discussion Entry

Good Afternoon Dr. Barry and Classmates,

If a device is required to complete the functions of your job should the organization be accountable to this cost? Defend your perspective.

I feel the employee should be compensated to some extent for being required to use their own personal device at work. Also, if an employee is required to use their own personal device are they in jeopardy of having their personal information contained on the phone made public to the employer? Basically, by using their personal phone at work and accepting compensation for it, have they given up their right to personal privacy? I guess it all depends on the agreements made with the employer and this agreement should be carefully consider by the employee. There is no doubt that employers will save time and money by allowing employees to use their own devices but is this best for the employee?

A recent article mentions that expense reimbursement for use of personal cell phones for work activities is required depending of which state one lives in (Lannon & Schreiber, 2018). This same article goes on to discuss a law in California that requires employers to pay at least part of an employee’s wireless voice and data plan if it is required at work (Lannon & Schreiber, 2018). After further research I found the actual California Labor Code 2802 (a) that basically states that the employer is responsible for all expenditures or losses incurred by the employee in direct consequences of discharging their duties (leginfo.legislature.ca.gov). This means employers need to seriously research this topic depending in which state they reside before they end up in trouble for non-compensation. While employees need to fully understand if their personal right to privacy can be breached by their employer.

NR 512 Week 7 Discussions Safeguarding Health Information and Systems
NR 512 Week 7 Discussions Safeguarding Health Information and Systems

Code Section. (2016, January 1). Retrieved April 10, 2018, from https://leginfo.legislature.ca.gov/faces/codes_displaySection.xhtml?lawCode=LAB§ionNum=2802.

 

Lannon, P. G., & Schreiber, P. M. (2018, March 30). BYOD Policies: What Employers Need to Know. Retrieved April 10, 2018, from https://www.shrm.org/hr-today/news/hr-magazine/pages/0216-byod-policies.aspx

Click here to ORDER an A++ paper from our Verified MASTERS and DOCTORATE WRITERS: NR 512 Week 7 Discussions: Safeguarding Health Information and Systems

NR 512 Week 7 Discussions: Safeguarding Health Information and Systems Grading Rubric Guidelines

Performance Category 10 9 8 4 0
Scholarliness

Demonstrates achievement of scholarly inquiry for professional and academic decisions.

  • Provides relevant evidence of scholarly inquiry clearly stating how the evidence informed or changed professional or academic decisions
  • Evaluates literature resources to develop a comprehensive analysis or synthesis.
  • Uses valid, relevant, and reliable outside sources to contribute to the threaded discussion
  • Provides relevant evidence of scholarly inquiry but does not clearly state how the evidence informed or changed professional or academic decisions.
  • Evaluates information from source(s) to develop a coherent analysis or synthesis.
  • Uses some valid, relevant, reliable outside sources to contribute to the threaded discussion.
  • Discusses using scholarly inquiry but does not state how scholarly inquiry informed or changed professional or academic decisions.
  • Information is taken from source(s) with some interpretation/evaluation, but not enough to develop a coherent analysis or synthesis.
  • Little valid, relevant, or reliable outside sources are used to contribute to the threaded discussion.
  • Demonstrates little or no understanding of the topic.
  • Discusses using scholarly inquiry but does not state how scholarly inquiry informed or changed professional or academic decisions.
  • Information is taken from source(s) without any interpretation/evaluation.
  • The posting uses information that is not valid, relevant, or reliable
  • No evidence of the use of scholarly inquiry to inform or change professional or academic decisions.
  • Information is not valid, relevant, or reliable
Performance Category  10 9 8 4 0
Application of Course Knowledge –

Demonstrate the ability to analyze, synthesize, and/or apply principles and concepts learned in the course lesson and outside readings and relate them to real-life professional situations

  • Posts make direct reference to concepts discussed in the lesson or drawn from relevant outside sources;
  • Applies concepts to personal experience in the professional setting and or relevant application to real life.
  • Posts make direct reference to concepts discussed in the lesson or drawn from relevant outside sources.
  • Applies concepts to personal experience in their professional setting and or relevant application to real life
  • Interactions with classmates are relevant to the discussion topic but do not make direct reference to lesson content
  • Posts are generally on topic but do not build knowledge by incorporating concepts and principles from the lesson.
  • Does not attempt to apply lesson concepts to personal experience in their professional setting and or relevant application to real life
  • Does not demonstrate a solid understanding of the principles and concepts presented in the lesson
  • Posts do not adequately address the question posed either by the discussion prompt or the instructor’s launch post.
  • Posts are superficial and do not reflect an understanding of the lesson content
  • Does not attempt to apply lesson concepts to personal experience in their professional setting and or relevant application to real life
  • Posts are not related to the topics provided by the discussion prompt or by the instructor; attempts by the instructor to redirect the student are ignored
  • No discussion of lesson concepts to personal experience in the professional setting and or relevant application to real life
Performance Category  5 4 3 2 0
Interactive Dialogue

Replies to each graded thread topic posted by the course instructor, by Wednesday, 11:59 p.m. MT, of each week, and posts a minimum of two times in each graded thread, on separate days.

(5 points possible per graded thread)

  • Exceeds minimum post requirements
  • Replies to each graded thread topic posted by the course instructor, by Wednesday, 11:59 p.m. MT, of each week, and posts three or more times in each graded thread, over three separate days.
  • Replies to a post posed by faculty and to a peer
  • Summarizes what was learned from the lesson, readings, and other student posts for the week.
  • Replies to each graded thread topic posted by the course instructor, by Wednesday, 11:59 p.m. MT, of each week, and posts a minimum of two times in each graded thread, on separate days
  • Replies to a question posed by a peer

Summarizes what was learned from the lesson, readings, and other student posts for the week.

  • Meets expectations of 2 posts on 2 different days.
  • The main post is not made by the Wednesday deadline
  • Does not reply to a question posed by a peer or faculty
  • Has only one post for the week
  • Discussion posts contain few, if any, new ideas or applications; often are a rehashing or summary of other students’ comments
  • Does not post to the thread
  • No connections are made to the topic
  Minus 1 Point Minus 2 Point Minus 3 Point Minus 4 Point Minus 5 Point
Grammar, Syntax, APA

Note: if there are only a few errors in these criteria, please note this for the student in as an area for improvement. If the student does not make the needed corrections in upcoming weeks, then points should be deducted.

Points deducted for improper grammar, syntax and APA style of writing.

The source of information is the APA Manual 6th Edition

  • 2-3 errors in APA format.
  • Written responses have 2-3 grammatical, spelling, and punctuation errors.
  • Writing style is generally clear, focused, and facilitates communication.
  • 4-5 errors in APA format.
  • Writing responses have 4-5 grammatical, spelling and punctuation errors.
  • Writing style is somewhat focused.
  • 6-7 errors in APA format.
  • Writing responses have 6-7 grammatical, spelling and punctuation errors.
  • Writing style is slightly focused making discussion difficult to understand.
  • 8-10 errors in APA format.
  • Writing responses have 8-10 grammatical, spelling and punctuation errors.
  • Writing style is not focused, making discussion difficult to understand.
  • Post contains greater than 10 errors in APA format.
  • Written responses have more than 10 grammatical, spelling and punctuation errors.
  • Writing style does not facilitate communication.
  • The student continues to make repeated mistakes in any of the above areas after written correction by the instructor
0 points lost       -5 points lost
Total Participation Requirements

per discussion thread

The student answers the threaded discussion question or topic on one day and posts a second response on another day. The student does not meet the minimum requirement of two postings on two different days
Early Participation Requirement

per discussion thread

The student must provide a substantive answer to the graded discussion question(s) or topic(s), posted by the course instructor (not a response to a peer), by Wednesday, 11:59 p.m. MT of each week. The student does not meet the requirement of a substantive response to the stated question or topic by Wednesday at 11:59 pm MT.

Also Check Out: NR 512 Week 7 The Self-Assessment of TIGER Nursing Informatics Competencies Assignment