Assignment: Developing Organizational Policies and Practices
Assignment: Developing Organizational Policies and Practices
Competing needs arise within any organization as employees seek to meet their targets and leaders seek to meet company goals. As a leader, successful management of these goals requires establishing priorities and allocating resources accordingly.
Within a healthcare setting, the needs of the workforce, resources, and patients are often in conflict. Mandatory overtime, implementation of staffing ratios, use of unlicensed assisting personnel, and employer reductions of education benefits are examples of practices that might lead to conflicting needs in practice.
ORDER A CUSTOMIZED, PLAGIARISM-FREE Assignment: Developing Organizational Policies and Practices HERE
Good News For Our New customers . We can write this assignment for you and pay after Delivery. Our Top -rated medical writers will comprehensively review instructions , synthesis external evidence sources(Scholarly) and customize a quality assignment for you. We will also attach a copy of plagiarism report alongside and AI report. Feel free to chat Us
Leaders can contribute to both the problem and the solution through policies, action, and inaction. In this Assignment, you will further develop the white paper you began work on in Module 1 by addressing competing needs within your organization.
To Prepare:
Review the national healthcare issue/stressor you examined in your Assignment for Module 1, and review the analysis of the healthcare issue/stressor you selected.
Identify and review two evidence-based scholarly resources that focus on proposed policies/practices to apply to your selected healthcare issue/stressor.
Reflect on the feedback you received from your colleagues on your Discussion post regarding competing needs.
The Assignment (1-2 pages):
Developing Organizational Policies and Practices
Add a section to the 2-3 page paper you submitted in Module 1. The new section should address the following in 1-2 pages:
Identify and describe at least two competing needs impacting your selected healthcare issue/stressor.
Describe a relevant policy or practice in your organization that may influence your selected healthcare issue/stressor.
Critique the policy for ethical considerations, and explain the policy’s strengths and challenges in promoting ethics.
Recommend one or more policy or practice changes designed to balance the competing needs of resources, workers, and patients, while addressing any ethical shortcomings of the existing policies. Be specific and provide examples.
Cite evidence that informs the healthcare issue/stressor and/or the policies, and provide two scholarly resources in support of your policy or practice recommendations.
Due to the nature of this assignment, your instructor may require more than 7 days to provide you with quality feedback.
Developing Organizational Policies and Practices
The identified pertinent healthcare issue regards technological disruptions. In the twenty-first century, healthcare organizations have realized that technology greatly impacts ensuring that patients receive quality and safe care. That is because healthcare organizations can easily store data without much paperwork, and there is an improved aspect of interoperability. However, various factors influence technological disruptions, making it important to address the issue critically. Therefore, this paper will try to elaborate on the pertinent healthcare issue’s main competing needs, relevant policy to the issue, ethical considerations for the policy, and recommendations on policy changes to balance patients and workers and resources competing needs.
The main competing needs for technological disruptions are cyber threats and increased healthcare costs. According to Shuaib et al. (2021), the U.S healthcare facilities are required by law to ensure that they safeguard patients’ information through the provisions of the 1996 Health Insurance Portability and Accountability Act (HIPAA). Hence, once cybercriminals invade the healthcare organizations’ data inventory and access patients’ or confidential healthcare organizations’ information, the issue poses a great risk to the patient and organization. Hence, despite the organizations incorporating the disruptive technology to improve the healthcare quality, these improvements can bring along legal implications, especially in breaching patients’ confidentiality. In addition, disruptive technology has also led to increased care costs which, if critically evaluated, may benefit a few and leave a majority patient population. For instance, healthcare that has implemented electronic health records (EHRs) may find themselves increasing medical costs since maintaining the systems is quite expensive (Goldman et al., 2020). Hence, there is a need to address how disruptive technology implementation in healthcare can be balanced by preventing cyber threats and managing healthcare costs.
Our healthcare organization recently implemented the EHRs to improve patient-nurse interaction and enhance patient information documentation. However, the healthcare management put in place cryptography to ensure that even during interoperability in the EHRs system, the patient information will still be protected, thus preventing legal and ethical implications that may result from breaching patients’ information (Esther-Omolara et al., 2020). Hence, the policy can help curb issues related to technological disruption. When evaluating the policy on EHRs cryptography, encrypting patient information to be accessed by the selected healthcare organizations and healthcare professions within an EHRs system is the best strategy to prevent breaching patient confidentiality. Mostly, this information helps when a patient has been transferred from one healthcare facility to another, thus preventing medical errors and enabling the healthcare provider to use limited time to evaluate the patient history. Such actions are mainly under beneficence and non-maleficence ethical principles, which help nurses act in patients’ best interests and avoid any harm that a patient may experience (Goldman et al., 2020). However, the policy’s main challenge is when nurses who were aware of the encrypted password exit the healthcare organization. That is because some might have malicious intentions to the organizations and end up breaching the patient confidentiality to implicate the healthcare management in a lawsuit for revenge purposes.
Hence, the main recommendation for the cryptography policy on EHRs systems is to ensure that passwords are regularly changed. Furthermore, such policy changes will ensure that the user’s access to these healthcare technological systems will stick to its initial intentions of enabling access only to the pre-established role-based privileges (Chinnasamy & Deepalakshmi, 2022). Hence, the main administrators in these healthcare organizations should be trusted individuals considering they decide who will have access to different patient information levels. These different security approaches are essential since they help healthcare organizations curb the possibility of cyber threats and increased cost of managing these systems, thus maintaining and efficiently securing patients’ information.
In conclusion, technological disruptions have greatly influenced how healthcare providers undertake their daily activities, especially in improving patient experience. However, factors like cyber threats and an increased maintenance cost for the technology system have greatly affected how healthcare protects patients’ information. Hence a policy like cryptography when engaging in healthcare exchange interoperability will help reduce security breaches in these organizations’ systems. However, there will be a need to change the encrypted passwords regularly to increase patient information safety.
References
Chinnasamy, P., & Deepalakshmi, P. (2018, April). Design of secure storage for health-care cloud using hybrid cryptography. In 2018 second international conference on inventive communication and computational technologies (ICICCT) (pp. 1717-1720). IEEE. DOI: 10.1109/ICICCT.2018.8473107
Esther-Omolara, A., Jantan, A., Abiodun, O. I., Arshad, H., Dada, K. V., & Emmanuel, E. (2020). HoneyDetails: A prototype for ensuring patient’s information privacy and thwarting electronic health record threats based on decoys. Health informatics journal, 26(3), 2083-2104. https://doi.org/10.1177/1460458219894479
Shuaib, M., Alam, S., Alam, M. S., & Nasir, M. S. (2021). Compliance with HIPAA and GDPR in blockchain-based electronic health record. Materials Today: Proceedings. https://doi.org/10.1016/j.matpr.2021.03.059
Goldman, J. M., Minzter, B., Ortiz, J., Banoub, M., & Rothman, B. (2020). Formation of an ASA Cybersecurity Task Force (CSTF) to protect patient safety. ASA Monitor, 84(9), 34-34. https://doi.org/10.1097/01.ASM.0000716908.49348.5a