Quiz 3_Prep.pdf - Module 4 1 of 42 https\/learn.bu.edu\/bbcswebdav\/pid-6513695-dt-content-rid-24962383 Module 4 This is a single concatenated file

Quiz 3_Prep.pdf - Module 4 1 of 42...

This preview shows page 1 - 3 out of 42 pages.

Module 4 This is a single, concatenated file, suitable for printing or saving as a PDF for offline viewing. Please note that some animations or images may not work. Module 4 Study Guide and Deliverables Readings: Security Amatayakul, Chapter 12 Becker Hospital Review Article on healthcare security challenges Toby Gouker, CISO at First Health Advisory Solutions on HIT Security Recent article – will be posted in the discussion forum Interoperability Amatayakul, Chapter 13, Chapter 10 pp. 281-304 Recent article – will be posted in the discussion forum Assignments: Assignment 4 due Tuesday, February 19 at 6:00 AM ET Assessments: Quiz 4 due Tuesday, February 19 at 6:00 AM ET Discussions: For grading consideration, all posts to this discussion topic must be made prior to February 19 at 6:00 AM ET. Any posts after this date/time will not be included in the grading process. Module Learning Objectives met_cs581_18_sp1_mlevinger_m04 video cannot be displayed here Module 4 ... 1 of 42 2/12/2019, 10:45 PM
Image of page 1
What you will learn: General concepts of information technology security How IT security is a process that must be managed How to protect information and IT assets Security within the medical environment and especially as it relates to an EHR Overview of HIT and EHR Interoperability Health Information Exchanges Functionality & Architecture Interoperability Standards Government Interoperability & HIE Initiatives Critical Success Factors This module continues with the technical arm of the Balanced Performance Model (BPM). It first covers security—how to ensure the privacy and security of an EHR and its data and then focuses on interoperability—EHRs working together to share vital health information. The module therefore covers a mix of several of the BPM elements. EHR Balanced Performance Model Lecture 7: EHR Security and HIPAA Introduction to Medical Security The protection of sensitive personal health information (PHI) is a vital part of an EHR system. Information security is not just about protecting computers and networks, but also about protecting people. When determining the best security solution, we have to consider the people involved and how they manage these systems—a mix of People, Processes and Technology. A healthcare provider—whether a hospital, clinic, or physician practice—is a system. Medical security starts with the building itself—from physical security controls, availability and reliability of power systems, to data backups and restorations. A systems approach takes the entire system under consideration when developing goals and requirements for security. A healthcare provider is fundamentally no different from this perspective than an engineering or manufacturing plant. The specific threats will vary, but determining what information is valuable and its vulnerabilities is the same exercise regardless of the system. As always, successful security also is a matter of costs versus benefit.
Image of page 2
Image of page 3

You've reached the end of your free preview.

Want to read all 42 pages?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture