Aim of the meeting: Proper management of the patient’s data via electronic health records and observance of privacy via application of enterprise information management.
Enterprise Information Management (EIM) deals with some of the most challenging initiatives that an organization must undertake. The principal building blocks of EIM are data governance and data management. Here the data management provides a concrete technical infrastructure that is crucial to support the objectives of the EIM. Data governance is mostly concerned with the process and the people that involved under the entire workflow of the Meta data and support data of the EIM program.
For the strong foundation of the organizational policies that are associated with the privacy maintenance, the South East Health System must work on their Meta data management. Here Meta data management mostly deals with the information of the patients like their personal information and health related reports or data. Here the concerned hospitals of the South East Health must frame their Meta data in such a way that it never is disclosed to the other unauthorized people other than the concerned doctors and the nursing professionals/ health care representatives who are providing medical care to the patients. Disclosing the data of the patients beyond their permission is against the ethical rights and hence proper care in the grounds of the Meta data management must be undertaken in order to maintain the high bar in privacy control (Chen & Zhao, 2012). The concept of Meta Data Management becomes extremely significant in terms of the management of the electronic health records (EHR) as it deals with the management of the patient's data in the cloud server of the organization (Li et al., 2012). The process of the meta data management deals with properly managed meta data environment, meta data sourcing layer, meta data integration layer and meta data repository. These managed data must be float under strict administrative governance such that any deviation from the current rules will face high penalization.
References
Chen, D., & Zhao, H. (2012, March). Data security and privacy protection issues in cloud computing. In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on (Vol. 1, pp. 647-651). IEEE.
Li, S., Xu, L., Wang, X., & Wang, J. (2012). Integration of hybrid wireless networks in cloud services oriented enterprise information systems. Enterprise Information Systems, 6(2), 165-187.