Health IT has tremendous potential in addressing the major challenges we face in healthcare: improving patient safety and quality of care and managing costs while improving efficiency.
One of the most visible challenges that health IT faces is the question of protecting privacy. If patient privacy cannot be protected, patients will not trust a system with accurate, complete medical information, rendering the system useless.
Properly designed, greater adoption of health IT offers the potential to improve patient privacy. For example, electronic records enable patients to selectively give access to parts of their medical record to specific individuals. Electronic records can also audit access to medical records. Neither of these are practical with paper records.
Last month, the Alliance for Health Reform and the Divided We Fail initiative hosted a luncheon briefing on privacy and health IT to discuss ways to move forward and break the legislative logjam over privacy. Jodi Daniel from the Office of the National Coordinator for Health Information Technology, Deborah Peel from Patient Privacy Rights and John Rother from the AARP spoke about various technology, market and legislative approaches to addressing the issue of health privacy. One approach they did not discuss was open source.
Open source can provide a crucial level of transparency into how an electronic medical record or personal health record works. Today, we can understand the privacy and security protections of the traditional paper medical record system. As healthcare transitions to an electronic medical system, the public must be assured that these systems actually do what they claim to do in protecting patient privacy and security. Deborah Peel’s Privacy Rights Certified is moving in the right direction in creating an independent organization that will certify personal health records and electronic medical records. However, in order to ensure complete accountability, experts must be allowed to examine actual implementations instead of treating these systems as black boxes. Otherwise, certification organizations will have to rely on vendor assertions to “prove” patient protections, and any privacy violations will only be discovered after medical data is exposed. Medical records contain some of the most sensitive data about an individual, and patient trust and privacy can only be achieved if appropriate protections are put in place.
For more about why open source makes sense for healthcare IT, visit the Red Hat healthcare site.
À propos de l'auteur
Parcourir par canal
Automatisation
Les dernières nouveautés en matière d'automatisation informatique pour les technologies, les équipes et les environnements
Intelligence artificielle
Actualité sur les plateformes qui permettent aux clients d'exécuter des charges de travail d'IA sur tout type d'environnement
Cloud hybride ouvert
Découvrez comment créer un avenir flexible grâce au cloud hybride
Sécurité
Les dernières actualités sur la façon dont nous réduisons les risques dans tous les environnements et technologies
Edge computing
Actualité sur les plateformes qui simplifient les opérations en périphérie
Infrastructure
Les dernières nouveautés sur la plateforme Linux d'entreprise leader au monde
Applications
À l’intérieur de nos solutions aux défis d’application les plus difficiles
Programmes originaux
Histoires passionnantes de créateurs et de leaders de technologies d'entreprise
Produits
- Red Hat Enterprise Linux
- Red Hat OpenShift
- Red Hat Ansible Automation Platform
- Services cloud
- Voir tous les produits
Outils
- Formation et certification
- Mon compte
- Assistance client
- Ressources développeurs
- Rechercher un partenaire
- Red Hat Ecosystem Catalog
- Calculateur de valeur Red Hat
- Documentation
Essayer, acheter et vendre
Communication
- Contacter le service commercial
- Contactez notre service clientèle
- Contacter le service de formation
- Réseaux sociaux
À propos de Red Hat
Premier éditeur mondial de solutions Open Source pour les entreprises, nous fournissons des technologies Linux, cloud, de conteneurs et Kubernetes. Nous proposons des solutions stables qui aident les entreprises à jongler avec les divers environnements et plateformes, du cœur du datacenter à la périphérie du réseau.
Sélectionner une langue
Red Hat legal and privacy links
- À propos de Red Hat
- Carrières
- Événements
- Bureaux
- Contacter Red Hat
- Lire le blog Red Hat
- Diversité, équité et inclusion
- Cool Stuff Store
- Red Hat Summit