Professional Documents
Culture Documents
CONSIDERATIONS IN
NURSING INFORMATICS
Information Security and
Confidentiality
Learning Outcomes
1.
2.
3.
Learning Outcomes
4.
5.
6.
Learning Outcomes
7.
8.
Security
Confidentiality
Privacy
Significance of Privacy
Confidentiality
Information/Data Privacy
Information Security
Security Planning
Guards against:
Downtime
Breeches in confidentiality
Loss of consumer confidence
Cybercrime
Liability
Lost productivity
Steps to Security
An organizational plan
A culture of security
Thieves
Hackers and
crackers
Viruses, worms
Flooding sites
Denial of service
attacks
Terrorists
Power
fluctuations
Revenge attacks
Security Measures
Firewalls
Automatic sign-off
Identity Management
Authentication
access codes
logon passwords
digital certificates
public or private keys used for encryption and
biometric measures
Password
Do:
Do not:
Leave computers or
applications running
when not in use.
Avoid obvious
passwords.
Change password
frequently.
Biometrics
a fingerprint
voice or iris pattern
retinal scan
hand geometry
face recognition
ear pattern
smell
blood vessels in the palm
gait recognition
Antivirus Software
Spyware
Acceptable uses
Reference
Hebda, T. & Czar, P. (2013). Handbook of
informatics for nurses and health care
professionals (5thed.). Upper Saddle
River, New Jersey: Pearson.