Biometrics is the application of statistical analysis to biological data. When applying the use of biometrics to the healthcare industry you are able to use multiple sources of biological data to secure every source. However, the healthcare system it is broken down into “four “nested” levels: (1) the individual patient; (2) the care team, which includes professional care providers (e.g., clinicians, pharmacists, and others), the patient, and family members; (3) the organization (e.g., hospital, clinic, nursing home, etc.) that supports the development and work of care teams by providing infrastructure and complementary resources; and (4) the political and economic environment (e.g., regulatory, financial, payment regimes, and markets), …show more content…
Patients want the securest setting when in need of medical care. No one wants to have their private medical problems out for the world to see. With the use of Biometrics, facilities can keep a person’s medical records personal and guarantee that with out that persons finger scan, their chart can not be accessed or accidently given to another patient. Being able to use biometric finger scans to ensure patient privacy and security can give all patients a better sense of security and trust with the facility or private office they have chosen for treatment. “In conjunction with the drawbacks of biometrics, sociocultural, ethical, and legal consequences may arise. Although the disadvantages of biometrics may be consequential, the benefits should be acknowledged and considered for the future use of privacy and security of electronic health records” (Lacona …show more content…
The use of Biometrics is something that cannot be replicated, a person features, fingerprints, and vein patterns have not been replicated successfully. Maybe one day someone will be able to spoof the system and replicate a person’s facial features or a fingerprint, it just has not happened yet. The advances of technology are not always without consequence. We might think that our security and privacy will be maintained with these advances. However, hackers gain more knowledge daily and find newer ways to beat the technology that is being created to ensure our