The process of research in nursing frequently requires the use of data sources that contain sensitive patient data, known as ProtectedHealth Information (PHI). Long-term storage and access to data with… Click to show full abstract
The process of research in nursing frequently requires the use of data sources that contain sensitive patient data, known as ProtectedHealth Information (PHI). Long-term storage and access to data with PHI have evolved beyond the traditional approach of using local server environments to the growing use of cloud-based platforms with ease of remote access, flexibility, and scalability. The trend toward use of cloud-based storage platforms in the healthcare industry focuses new attention on the need for safety and security of PHI that nurse researchers use in their work. In some cases, compliance with the need for tight security guidelines must be assured before data can be acquired. Sources that provide health data containing PHI, such as the Centers for Medicare and Medicaid Services (CMS), may require adherence to industry standards and guidelines as a condition of data acquisition and long-term storage. The increasing adoptionof cloud-basedplatforms creates additional threats to data containing PHI and necessitates the integration of preventive methodologies to enhance cybersecurity that are already in practice by other industries that also use sensitive data. Preying upon the element of human risk, cybercriminals can be both innovative and persistent as they seek to acquire PHI. In their work with human subjects and PHI data, nurse researchers and scientists assume responsibility for protection and security of these factors.Maintaining similar protection in a cloud-based environment may require additional education and resources to emphasize the human element in data security. Technological advancements have transformed nursing practice and research. The value of software applications used in business analytics and intelligence, traditional clinical research, or student learning management systems is being recognized by nurse researchers and utilized in their customizedhealth research environments. The intersection of technology and practice necessitates nurses’ deeper understanding ofmechanisms that can be used to protect data containing PHI. Database storage options have evolved beyond onsite data servers and now include cloud-based options that offer remote access, rapid scalability, and reduced storage costs with advanced analytical tools. Many cloud-based platforms offer advanced analytical tools, enhancing the rapid processing of data into actionable information that can be used to support clinical decisions and creating a new learning curve for interestednurse researchers. Supporting the technological shift toward the use of cloud-based platforms requires familiarity with the terminology and concepts used to describe elements of cybersecurity practice and application. Concepts describing best practices in cybersecurity should be introduced into nursing education and practice using language that is aligned with American Nurses Association clinical best practices in use of cloud-based platforms and protection of PHI data in such environments. The need for nursing leaders to provide education, tools, and resources for the protection of PHI in cloud-based platforms was integrated into 3 competency areas (Information Management and Technology, Risk Management, and Patient Safety) by the American Organization of Nurse Executives. As we work to improve patient outcomes in the ever-changing landscape of healthcare, nurses who serve as data custodians need additional education, tools, and resources to reduce the risk of data breaches involving cloud-based storage environments.
               
Click one of the above tabs to view related content.