Tuesday, December 7, 2010

Module 6: What Happens in Vegas Stays in Vegas!

As I was pondering on a fun title to describe this last module which deals with 'Policy and Ethical issues Related to Information Technology,' I thought of the above phrase that somehow presents the gist of this unit- the concepts of confidentiality and security of information. Hand-in-hand with the unabated progress in computer technology that gave impetus to the birth of  health care informatics is the potential of security breach and divulging of personal, private information. The readings both in the text, articles and powerpoint have taught me of the immensity of this topic and as a health care provider and consumer, I need to be not only careful with my own personal health record but also need to respect health information that I am privileged to access. Curtin's (2005) description of how technology and its power can either be used properly or misused/abused  made me ponder on how crucial it is for me as a nurse to respect the information I gather whenever I access a patient's file and to treat it with confidentiality. I believe that as nurses we have the unique role of 'being allowed' to enter our patients' personal realm to such an extent that is normally not given to other professions and we need to make ethical choices daily as we build therapeutic relationships with our clients. Such electronic health records, as described by Swartz(2004) can be positive tools not only to to contain cost or  reduce errors in medication and but also to provide quality and safe patient care and they should be treated with privacy.

This module has also reinforced in me the importance of improving my computer skills so that I can use this technology properly and wisely both for educational advancement and patient management. Reality is that there are people who can use this wonderful technology to destroy vital information or misuse it. The major WikiLeak breach of information that has showed government files related to international relations is a great example of  security breach  that can endanger a country's diplomatic stance.

As I write this last blog, I am truly grateful for the new great vista of healthcare informatics that opened before my eyes with this Nursing Informatuics class. I hope to progress as I step deeper into the cyber world in my 'Cyber Pedagogy' course next semester and use such knowledge and skills to be an effective teacher, nurse and clinician.