Occupational health nurses are increasingly using computer systems in the delivery of efficient, high-quality occupational health services. However, potential breaches in data security are posing more risks to these data systems. The purpose of this article is to address concerns related to data security in occupational health nursing. Occupational health nurses must protect the personal health information of employees by proactively developing methods to ensure data security.
American Nurses Association. (2001). Scope and standards of nursing informatics practice. Washington, DC: American Nurses Publishing.
3.
AustinS. (2006). E-mail: So fast, so convenient, so … risky?Nursing, 36(2), 76.
4.
CollmannJ.SostromK.WrightW. (2004). Organizing safety: Conditions for successful information assurance programs. Telemedicine Journals, Telehealth Journals and eHealth Journals, 10(3), 311–320.
5.
DonovanJ. (2004). Data center upgrade essential to enhanced patient care: As digital applications expand to physicians, nurses and patients, healthcare providers require greater data availability and security to reduce error rates, risks and costs. Health Management Technology, 25(10), 38, 40, 42.
6.
FarneyR. J.WalkerJ. M.ClowardT. V.ShillingK. C.BoyleK. M.SimonsR. G. (2006). Polysomnography in hospitalized patients using a wireless wide area network. Journal of Clinical Sleep Medicine, 2(1), 28–34.
7.
GranberryN. (2007). Email: From “to” to “send.”AAOHN Journal, 55(3), 127–130.
8.
HardwickM. E.PulidoP. A.AdelsonW. S. (2007). The use of handheld technology in nursing research and practice. Orthopaedic Nursing, 26(4), 251–255.
9.
HaughR. (2004). Banking on privacy: Hospitals must protect patient information, and their own liability, as banks balk at HIPAA. Hospitals & Health Networks, 78(2), 50–54, 56.
10.
KellyG.McKenzieB. (2002). Security, privacy, and confidentiality issues. Journal of Medical Internet Research, 4(2), e12.
11.
LewisJ. A.SommersC. O. (2003). Personal data assistant: Using new technology to enhance nursing practice. American Journal of Maternal Child Nursing, 28(2), 66–71.
12.
LutesM. (2000). Privacy and security compliance in the E-healthcare marketplace. Healthcare Financial Management, 54(3), 48–50.
13.
McLeanI.AndersonC. M. (2004). The security of patient identifiable information in doctors' homes. Journal of Clinical Forensic Medicine, 11(4), 198–201.
14.
MrayyanM. T. (2004). Using the web to trap data. Nurse Manage, 35(10), 50–51.
15.
National Institutes of Health, Automated Information System Security Program. (2002). NIH security level designations. Retrieved March 10, 2005, from http://irm.cit.nih.gov/policy/DHHS_SecLev.html
16.
QuinnJ.DurskiK. (2004). A real-time tracking, notification, and web-based enrollment system for emergency department research. Academic Emergency Medicine, 11(11), 1245–1248.
17.
SarantoK.Leino-KilpiH. (1997). Computer literacy in nursing: Developing the information technology syllabus in nursing education. Journal of Advanced Nursing, 25(2), 377–385.
18.
ThompsonB. W. (2005). HIPAA guidelines for using PDAs. Nursing, 35(11), 24.
19.
TracyC. S.DantasG. C.UpshurR. E. (2004). Feasibility of a patient decision aid regarding disclosure of personal health information: Qualitative evaluation of the Health Care Information Directive. BioMed Central Medical Informatics and Decision Making, 4(1), 13.
20.
TraftonK. L. (1999). Home care nursing informatics guidelines. Home Healthcare Nurse, 17(4), 253–256.
21.
van der HaakM.WolffA. C.BrandnerR.DringsP.WannenmacherM.WetterT. (2003). Data security and protection in cross-institutional electronic patient records. International Journal of Medical Informatics, 70(2–3), 117–130.