Essay Cloud Computing Security

1106 Words 5 Pages
Managing the security of an Electronic Medical Record (EMR) system in a cloud computing environment can be challenging. Even without the addition of the cloud computing environment, the EMR system is vulnerable to the compromise of login information, unauthorized viewing or editing of medical records, and denial of service attacks. First of all, the data contained within the Electronic Medical Record (EMR) itself is sensitive. Inside the structure of an EMR, one is potentially looking to find patient data that pertains to identity, billing information, dentistry, cardiology, dermatology, mental health, and physical attributes among other forms of data. In many EMR systems, tools to provide security and privacy are implemented. In these …show more content…
Furthermore, one may look toward such avenues as negotiating terms with their cloud provider and having the cloud provider provide them with their security and compliance requirements (Mishra, D.P., Mishra, R., & Tripathy, 2011, p. 58).
When you look at the broader picture, there are many reasons why an organization needs to secure an EMR system. A patient’s insurance company or potential employer may want to wrongfully use the information contained in a medical record to make unethical decisions or to discriminate. A health care provider is of no value to a patient if there is no dependable medical record system in place. Without an operational system, a provider cannot review medical history which poses a potential threat to a patient’s health. Because patient care is such a critical process, records need to be accurate and available when needed. Identity and billing information are stored in these systems also; careful measures must be taken to ensure that information such as credit card numbers, social security numbers, home addresses, and telephone numbers are not compromised. In order for an EMR systems access control to be effective, its primary focus should be to protect patient data from compromise (Helms & Williams, 2011, p. 63). Additionally, and EMR system should be established with HIPAA (Health Insurance
Open Document