systems containing e PHI Integrity controls to prevent improper e PHI

Systems containing e phi integrity controls to

This preview shows page 72 - 76 out of 119 pages.

systems containing e-PHI Integrity controls to prevent improper e-PHI alteration and destruction Backup and recovery plans and capabilities
Image of page 72
Sanctions, which may range from a warning or suspension with retraining to termination or prosecution depending on severity of the action or event (e.g., if an employee access e- PHI inappropriately or steals a mobile device) Authorization limits / turning off CD/DVD burners and USB ports on computers to prevent the transmission of malicious code or copying of files to a device, such as CDs/DVDs, jump drives, flash drives, or thumb drives Encryption to protect e-PHI in transmission and on mobile devices Anti-virus software, anti- spyware, and firewall The organization is charged with determining which safeguards are appropriate, effective, and feasible for the risks they have identified. Since resource constraints are common in healthcare organizations, representatives must carefully evaluate these choices. An organization may perform a trade-off analysis, weighing the benefits of implementing a particular safeguard with the costs that would be incurred. Learn by Doing Security Standards Security Standards: Technical Safeguards I read this! Network Security Measures Learn by Doing I watched this video! If you feel confident in your grasp of the material presented in this module, please continue to the next section in the course. If you are unclear about the content presented, please review the material and contact your course mentor if additional support or clarification is needed.
Image of page 73
Risk Analysis Plans and Best Practices HIPPA requires health care organizations to complete risk assessments within their organization. The goal of the risk assessment is to identify areas of weakness and to ensure HIPPA requirements are being met. When reviewing the risk assessment learning resources reflect on what a risk assessment in your current work setting might uncover. Security 101: Security Risk Analysis This video discussed how health care organizations can approach the planning and implementation of a risk assessment. Learn by Doing I watched this video! Learn by Doing Security Risk Assessment Website: Security Risk Assessment The HealthIT.gov website provides an overview of risk assessment and includes a security risk assessment tool developed by the Department of Health and Human Services to help health care organizations carry out risk assessments. I reviewed this! Learn by Doing Guidance on Risk Analysis Read: Guidance on Risk Analysis, from HHS.gov I read this!
Image of page 74
Learn by Doing Cyber Attacks on US Healthcare Read: Cyber attacks on US Healthcare, from HBMA.org I read this! If you feel confident in your grasp of the material presented in this module, please continue to the next section in the course. If you are unclear about the content presented, please review the material and contact your course mentor if additional support or clarification is needed.
Image of page 75
Image of page 76

You've reached the end of your free preview.

Want to read all 119 pages?

  • Summer '19
  • Nursing, National Database of Nursing Quality Indicators, Health Information Systems, knowledge workers

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture