coursework-banner

NR 512 Week 7 Activities: Safeguarding Health Information and Systems

NR 512 Week 7 Activities: Safeguarding Health Information and Systems

Chamberlain University NR 512 Week 7 Activities: Safeguarding Health Information and Systems– Step-By-Step Guide

 

This guide will demonstrate how to complete the Chamberlain University   NR 512 Week 7 Activities: Safeguarding Health Information and Systems  assignment based on general principles of academic writing. Here, we will show you the A, B, Cs of completing an academic paper, irrespective of the instructions. After guiding you through what to do, the guide will leave one or two sample essays at the end to highlight the various sections discussed below.

 

How to Research and Prepare for  NR 512 Week 7 Activities: Safeguarding Health Information and Systems                                

 

Whether one passes or fails an academic assignment such as the Chamberlain University   NR 512 Week 7 Activities: Safeguarding Health Information and Systems    depends on the preparation done beforehand. The first thing to do once you receive an assignment is to quickly skim through the requirements. Once that is done, start going through the instructions one by one to clearly understand what the instructor wants. The most important thing here is to understand the required format—whether it is APA, MLA, Chicago, etc.

 

After understanding the requirements of the paper, the next phase is to gather relevant materials. The first place to start the research process is the weekly resources. Go through the resources provided in the instructions to determine which ones fit the assignment. After reviewing the provided resources, use the university library to search for additional resources. After gathering sufficient and necessary resources, you are now ready to start drafting your paper.

 

How to Write the Introduction for  NR 512 Week 7 Activities: Safeguarding Health Information and Systems                                

 

The introduction for the Chamberlain University   NR 512 Week 7 Activities: Safeguarding Health Information and Systems    is where you tell the instructor what your paper will encompass. In three to four statements, highlight the important points that will form the basis of your paper. Here, you can include statistics to show the importance of the topic you will be discussing. At the end of the introduction, write a clear purpose statement outlining what exactly will be contained in the paper. This statement will start with “The purpose of this paper…” and then proceed to outline the various sections of the instructions.

 

How to Write the Body for  NR 512 Week 7 Activities: Safeguarding Health Information and Systems                                

 

After the introduction, move into the main part of the  NR 512 Week 7 Activities: Safeguarding Health Information and Systems       assignment, which is the body. Given that the paper you will be writing is not experimental, the way you organize the headings and subheadings of your paper is critically important. In some cases, you might have to use more subheadings to properly organize the assignment. The organization will depend on the rubric provided. Carefully examine the rubric, as it will contain all the detailed requirements of the assignment. Sometimes, the rubric will have information that the normal instructions lack.

 

Another important factor to consider at this point is how to do citations. In-text citations are fundamental as they support the arguments and points you make in the paper. At this point, the resources gathered at the beginning will come in handy. Integrating the ideas of the authors with your own will ensure that you produce a comprehensive paper. Also, follow the given citation format. In most cases, APA 7 is the preferred format for nursing assignments.

 

How to Write the Conclusion for  NR 512 Week 7 Activities: Safeguarding Health Information and Systems                                

 

After completing the main sections, write the conclusion of your paper. The conclusion is a summary of the main points you made in your paper. However, you need to rewrite the points and not simply copy and paste them. By restating the points from each subheading, you will provide a nuanced overview of the assignment to the reader.

 

How to Format the References List for  NR 512 Week 7 Activities: Safeguarding Health Information and Systems                                

 

The very last part of your paper involves listing the sources used in your paper. These sources should be listed in alphabetical order and double-spaced. Additionally, use a hanging indent for each source that appears in this list. Lastly, only the sources cited within the body of the paper should appear here.

Stuck? Let Us Help You

 

Completing assignments can sometimes be overwhelming, especially with the multitude of academic and personal responsibilities you may have. If you find yourself stuck or unsure at any point in the process, don’t hesitate to reach out for professional assistance. Our assignment writing services are designed to help you achieve your academic goals with ease. 

 

Our team of experienced writers is well-versed in academic writing and familiar with the specific requirements of the  NR 512 Week 7 Activities: Safeguarding Health Information and Systems assignment. We can provide you with personalized support, ensuring your assignment is well-researched, properly formatted, and thoroughly edited. Get a feel of the quality we guarantee – ORDER NOW. 

Sample Answer for NR 512 Week 7 Activities: Safeguarding Health Information and Systems

My workplace would never allow for us to bring our own devices into the facility! I was quite surprised to find out that this was a thing!
Upon doing some research on this topic I found out some interesting facts. I found it interesting that BYOD encompasses more than just computers. It also means that employees may use smartphones, tablets, kindles, and more for their work. The concept of BYOD includes personal software and services, as employees use iCloud services and other tools on the web (Eschelbeck & Schwartzberg, 2017).

To begin, I will discuss the security issues that would be encountered. It’s risky to assume that prohibiting the use of personal devices solves the problem. I say this because the average employee ends up using their own device anyway because it is not monitored by work place security policies. But, regardless of what you think about BYOD and however workplaces choose to implement it, IT managers should treat it the same way as any introduction of innovative technology: with a controlled and predictable deployment of security (Eschelbeck & Schwartzberg, 2017).

When it comes to devices being introduced into the workplace, a few questions should be addressed.

1) Who owns this device?

Is this a trustworthy person? In the past, the company owned the devices, whereas in this case. the employee owns the device (Eschelbeck & Schwartzberg, 2017).

2) Who manages this device?

How is security going to be managed, if the employee is in charge (Eschelbeck & Schwartzberg, 2017)?

3) Who secures this device?

Accountability is not something that goes away for an employee just because they personally own the device (Eschelbeck & Schwartzberg, 2017).

All organizations have the flexibility to embrace BYOD as much as they feel reasonable. But, there are companies who have decided the risk is too great and choose not to implement a BYOD program (Eschelbeck & Schwartzberg, 2017).

In May 2012, a facility banned its 400,000 employees from using their own devices and their own applications because of the concerns about data security. The facility also banned cloud storage services such as Dropbox, as well as Siri. Since Siri listens to spoken requests and sends these requests to Apple’s servers where they are deciphered into text they found this could be a HIPAA violation along the line. They also banned Siri because she can create text messages and emails on voice command, but some of these messages could contain sensitive and private information (Eschelbeck & Schwartzberg, 2017).

Ultimately, the success of the BYOD program is measured by the employees’ willingness to use their personal devices within the rules set for them. The organization’s security procedures and policies should determine whether and how BYOD is utilized. If adopted into a company, BYOD users need to have the ability to enforce security policies on their device and protect their property if that device is ever lost or stolen (Eschelbeck & Schwartzberg, 2017).

A couple other security concerns include:

-Being able to register employee devices with the company for monitoring purposes (Matteucci, 2017).

-Implementing password protection, antivirus and back-up software for all devices (Matteucci, 2017).

-Preventing the use of public WiFi networks (Matteucci, 2017).

-Downloading company information on home computers (Matteucci, 2017).

-Cleaning/resetting the devices entirely when employees quit or are terminated (Matteucci, 2017).

Click here to ORDER an A++ paper from our Verified MASTERS and DOCTORATE WRITERS: NR 512 Week 7 Activities: Safeguarding Health Information and Systems 

References:

Eschelbeck, G., & Schwartzberg, D. (2017). BYOD Risks and Rewards: How to keep employee smartphones, laptops and tablets secure. SOPHOS, 2(10), 1-7.

Matteucci, G. (2017, April 21). The Pros and Cons of Bring-Your-Own-Device (BYOD) for Your Mobile Field Workforce – Field Force Friday. Retrieved April 09, 2018, from http://www.msidata.com/pros-and-cons-of-byod-in-mobile-field-workforce

If a device is required to complete the functions of your job should the organization be accountable to this cost? Defend your perspective.

ALSO READ:

NR 512 Week 8: Reflection on Second Life Experiences, Nursing Informatics Skills and Impact on Speciality

Sample Answer 2 for NR 512 Week 7 Activities: Safeguarding Health Information and Systems

I feel the employee should be compensated to some extent for being required to use their own personal device at work. Also, if an employee is required to use their own personal device are they in jeopardy of having their personal information contained on the phone made public to the employer? Basically, by using their personal phone at work and accepting compensation for it, have they given up their right to personal privacy? I guess it all depends on the agreements made with the employer and this agreement should be carefully consider by the employee. There is no doubt that employers will save time and money by allowing employees to use their own devices but is this best for the employee?

A recent article mentions that expense reimbursement for use of personal cell phones for work activities is required depending of which state one lives in (Lannon & Schreiber, 2018). This same article goes on to discuss a law in California that requires employers to pay at least part of an employee’s wireless voice and data plan if it is required at work (Lannon & Schreiber, 2018). After further research I found the actual California Labor Code 2802 (a) that basically states that the employer is responsible for all expenditures or losses incurred by the employee in direct consequences of discharging their duties (leginfo.legislature.ca.gov). This means employers need to seriously research this topic depending in which state they reside before they end up in trouble for non-compensation. While employees need to fully understand if their personal right to privacy can be breached by their employer.

 

Code Section. (2016, January 1). Retrieved April 10, 2018, from https://leginfo.legislature.ca.gov/faces/codes_displaySection.xhtml?lawCode=LAB§ionNum=2802.

 

Lannon, P. G., & Schreiber, P. M. (2018, March 30). BYOD Policies: What Employers Need to Know. Retrieved April 10, 2018, from https://www.shrm.org/hr-today/news/hr-magazine/pages/0216-byod-policies.aspx

Sample Answer 3 for NR 512 Week 7 Activities: Safeguarding Health Information and Systems

I agree with you that employees should definitely be compensated at least in part if requiring BYOD for work purposes. I personally would not want to use my own device at work due to the fact that the device would likely have to stay with the IT department and be canvassed and scanned for security purposes. While I understand the benefit of using these devices at work in terms of work flow, I do not wish to subject my information and privacy to the public, especially since often tax information, etc., is saved onto personal devices. I think one thing to take into consideration is the right of the employee’s privacy and protection in this particular situation, we have rights as well, and employers need to have a very specific and ethically sound position in their BYOD policy if they want to require this of workers.

I would never consider allowing my job to access any device I own unless I was legally forced. BYOD may seem like a good idea, but the results can be disastrous. My first question to my nursing supervisor would be if my device was strictly for work use. If the answer was yes, I would ask if I were going to be able to fill out reimbursement forms for the monthly costs to keep the device on and functional. If the answer was no, I would still not do it because what I put on my devices is also accessible, and I like to keep my work and private lives separate. It is hard to know where to begin when listing the security issues and breaches that may occur. Security technology is always undergoing improvements and changes to counter attack the efforts of computer experts who know how to gain illegal access to mobile devices. One issue that may occur is the downloading of malicious software (Singh, Chan, & Zulkefli, 2017). It is hard to know if the information downloaded is protected by virus software until the situation happens. The only way this can be addressed is to allow the IT department to equip the device with security software. The IT department people can access my device anytime they want, which I do not think is such a good idea.

A big issue is privacy risks to me and to the organizations’ clients (Singh et al., 2017). In a healthcare setting, patients expect nurses and medical staff to keep their EHRs and other personal information confidential. The ANA Code of Ethics, provision 3 states nurses are to protect the health, safety, and rights of all patients; this includes a confidentiality clause. Digital technology is always vulnerable to confidentiality and privacy risks. A password breach can happen at any time, phising attacks have become more common, and nurses may share information with unauthorized personnel. Other security issues that may happen are use of untrusted networks, use of untrusted mobile OS and applications, and lack of physical security controls, and (Singh et al., 2017). If I were an employer, to avoid any of these issues, I would not suggest BOYD as an option. I would consider the benefits behind the BOYD concept and try to incorporate it another way. Security risks are real with BOYD, and the only way to address them is for IT to properly configure the device and gain access to the device. Also, the staff would not be able to use the device for anything other than work. Secure passwords must be approved, and the best security technology would have to be installed on the device.

Reference:

Singh, M. M., Chan, C. W., & Zulkefli, Z. (2017). Security and privacy risks awareness for bring your own device (BYOD) paradigm. International Journal of Advanced Computer Science and Applications8(2), 53-62. Retrieved from https://pdfs.semanticscholar.org/f96f/50036cea811be2c79dc709bfdd5f4c3d2558.pdf

Sample Answer 4 for NR 512 Week 7 Activities: Safeguarding Health Information and Systems

I would never consider allowing my job to access any device I own unless I was legally forced. BYOD may seem like a good idea, but the results can be disastrous. My first question to my nursing supervisor would be if my device was strictly for work use. If the answer was yes, I would ask if I were going to be able to fill out reimbursement forms for the monthly costs to keep the device on and functional. If the answer was no, I would still not do it because what I put on my devices is also accessible, and I like to keep my work and private lives separate. It is hard to know where to begin when listing the security issues and breaches that may occur. Security technology is always undergoing improvements and changes to counter attack the efforts of computer experts who know how to gain illegal access to mobile devices. One issue that may occur is the downloading of malicious software (Singh, Chan, & Zulkefli, 2017). It is hard to know if the information downloaded is protected by virus software until the situation happens. The only way this can be addressed is to allow the IT department to equip the device with security software. The IT department people can access my device anytime they want, which I do not think is such a good idea. A big issue is privacy risks to me and to the organizations’ clients (Singh et al., 2017). In a healthcare setting, patients expect nurses and medical staff to keep their EHRs and other personal information confidential. The ANA Code of Ethics, provision 3 states nurses are to protect the health, safety, and rights of all patients; this includes a confidentiality clause. Digital technology is always vulnerable to confidentiality and privacy risks. A password breach can happen at any time, phising attacks have become more common, and nurses may share information with unauthorized personnel. Other security issues that may happen are use of untrusted networks, use of untrusted mobile OS and applications, and lack of physical security controls, and (Singh et al., 2017). If I were an employer, to avoid any of these issues, I would not suggest BOYD as an option. I would consider the benefits behind the BOYD concept and try to incorporate it another way. Security risks are real with BOYD, and the only way to address them is for IT to properly configure the device and gain access to the device. Also, the staff would not be able to use the device for anything other than work. Secure passwords must be approved, and the best security technology would have to be installed on the device.

Reference:

Singh, M. M., Chan, C. W., & Zulkefli, Z. (2017). Security and privacy risks awareness for bring your own device (BYOD) paradigm. International Journal of Advanced Computer Science and Applications8(2), 53-62. Retrieved from https://pdfs.semanticscholar.org/f96f/50036cea811be2c79dc709bfdd5f4c3d2558.pdf

Sample Answer 5 for NR 512 Week 7 Activities: Safeguarding Health Information and Systems

According to Ho (2013), there are ten ways the security requirements for BYOD are meet. The first is to review current security policies for web applications. Second, determine which devices you are willing to support. Third, set the expectations clearly. Fourth and fifth, write clear  ad concise policies and make a personal identification number. Sixth, enforce encryption data at rest. Seventh and eighth, decide what applications will be allowed and provide training to all hospital staff. Lastly, use applications that include auditability, reporting, and centralized management and consider mobile device management software. This is the biggest concern with implementing the BYOD policy at a facility. As long as the facility has a solid foundation on what their goals and guidelines are. These are the ways the facility to ensure a policy is well thought out to ensure security.

References

Ho, B. (2013). Mobile’s impact on hospital IT security in 2013: how your institution can adapt to BYOD. Journal Of Healthcare Protection Management: Publication Of The International Association For Hospital Security29(2), 120-124.