Telemedicine is the integration of the electronic materials and telecommunication inventions to enhance long-distance patient care and health administration (Watzlaf, Dealmeida, Zhou, & Hartman, 2015). The telemedicine helps to provide adequate supervision and provision of health services to patients out of hospitals. Therefore, integration of telemedicine in the health facilities is important in provision of efficient care to the patients.
Some of the security and privacy risks in telemedicine include an attack on the accessibility of informative materials. Consequently, there is an intrusion on confidentiality of the data and tampering of the materials with unauthorized personnel (Hale & Kvedar, 2014). Similarly, the authenticity of the information can be fabricated thereby affecting its legitimacy.
Notably, to enhance the applicability of the device, numerous protective, deterrent, detective, and counteractive processes have been incorporated to reduce the impact on telemedicine ventures. The methods include the formation of Health Insurance Portability and Accountability act HIPAA that aims at creating standards and necessities for the transits and preservation of health materials electronically (Hale & Kvedar, 2014). Additionally, firewalls and intrusion detection systems have been used to reduce privacy risks.
The evaluation process includes planning, implementation, and impact assessment. During the implementation phase, the objective and justification of the activity are defined and the project design is formulated. The operation stage entails conveying inputs and producing outputs for the project execution (Agboola, Hale, Masters, Kvedar, & Jethwani, 2014). Impact assessment determines the net effect of the program, which is important for the project stakeholders.
The security and privacy risks in telemedicine include an attack on the accessibility of informative materials that affect its legitimacy. However, firewalls and intrusion detection systems have been used to reduce privacy risks. Notably, the evaluation process includes planning, implementation, and impact assessment.
Agboola, S., Hale, T. M., Masters, C., Kvedar, J., & Jethwani, K. (2014). “Real-world” practical evaluation strategies: a review of telehealth evaluation. JMIR research protocols, 3(4). Retrieved from: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4275475/
Hale, T. M., & Kvedar, J. C. (2014). Privacy and security concerns in telehealth. Virtual Mentor, 16(12), 981. Retrieved from: http://virtualmentor.ama-assn.org/2014/12/jdsc1-1412.html
Watzlaf, V. J., Dealmeida, D. R., Zhou, L., & Hartman, L. M. (2015). Protocol for a systematic review of telehealth privacy and security research to identify best practices. International journal of telerehabilitation, 7(2), 15. Retrieved from: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4985271/