One important aspect of any health record system is to ensure the confidentiality of the patient information because of its importance in the medical field. In addition, both believed that the privacy law must evolve in order to keep up with technological change (Harman, Flite, & Bond, 2012). strengthens the privacy and security of patient health information, modifies the breach notification rule, strengthens privacy protections for generic information by prohibiting health plans from using or disclosing such information for compliance, strengthens limitations on the use and disclosure of PHI for marketing, research, and fundraising, and allows patients … Relating to privacy and confidentiality is "security." Ensuring the privacy and confidentiality of electronic health records In 2004, President Bush announced his plan to ensure that more Americans would have electronic health records … Medical practice is increasingly information-intensive. Electronic medical records (EMRs) have the potential to decrease health care costs, increase the quality of patient care, facilitate better departmental communication, create less paper confusion, allow use with authorized access only, allow storage of digital images, and increase overall efficiency in the health care system, but are patients really better off with a paperless system? Cyber security is required to prevent, detect, and act on unauthorized access to a health system and its information. Data were collected between January and June 2018 via questionnaires and focus group interviews. Staff who have been authorized to read, enter, and/or update data as required by their job functions are responsible to comply with security controls and to protect confidential data from unauthorized disclosure or use. However, the electronic storage of healthcare records brings up key issues such as privacy and confidentiality, security, and data integrity and availability [1]. EMR is said to be an electronic patient record created and maintained by a medical practice or hospital whereas the EHR is said to be an interconnected aggregate of all the patients health records, culled from multiple providers and healthcare facilities. Explain the difference between an Electronic Health Record and an Electronic Medical Record. 2. D. Security of Electronic Health Records 1. With the evolution of electronic health records, people’s private medical history must also be protected and be treated as confidential. If not Following a survey of nurses’ concerns about privacy, confidentiality, security and patient safety in electronic health records, six focus groups were held to gain deeper insights about their concerns. In a disturbing, constructive recent report on protection of computerized health records, a panel of the National Research Council construed it this way: 9. Electronic health records (EHRs), with their adoption incentivized as part of the American Recovery and Reinvestment Act of 2009, are now a ubiquitous part of the health care landscape. Physicians have been using computers to update patient medical files, largely due to the belief that electronic health records have many advantages. Although these systems promised to improve the quality of patient care, increase efficiency, and reduce costs, health care providers are finding that current EHRs instead require time … Security consists of a number of measures that organizations implement to protect information and systems. There are three major ethical priorities for electronic health records: privacy and confidentiality, security, and data integrity and availability. Therefore, ensuring privacy, security, confidentiality, integrity, and availability of protected health information (PHI) in EHRs is absolutely necessary. The Administrative Simplification provisions of the Health Insurance Portability and Accountability Act of 1996 (HIPAA, Title II) required the Secretary of HHS to publish national standards for the security of electronic protected health information (e-PHI), electronic exchange, and the privacy and security of health information. Staff must exit applications when leaving computer workstations unattended.