0 penilaian0% menganggap dokumen ini bermanfaat (0 suara)
16 tayangan14 halaman
The Health IT Workforce Curriculum was developed for U.S. community colleges to enhance workforce training programmes in health information technology. The curriculum consist of 20 courses of 3 credits each. Each course includes instructor manuals, learning objectives, syllabi, video lectures with accompanying transcripts and slides, exercises, and assessments. The materials were authored by Columbia University, Duke University, Johns Hopkins University, Oregon Health & Science University, and University of Alabama at Birmingham. The project was funded by the U.S. Office of the National Coordinator for Health Information Technology. All of the course materials are available under a Creative Commons Attribution Noncommercial ShareAlike (CC BY NC SA) License (http://creativecommons.org/licenses/by-nc-sa/3.0/). The course description, learning objectives, author information, and other details may be found athttp://www.merlot.org/merlot/viewPortfolio.htm?id=842513. The full collection may also be accessed at http://knowledge.amia.org/onc-ntdc.
Judul Asli
07- Working with Health IT Systems- Unit 7- Protecting Privacy, Security, and Confidentiality in HIT Systems- Lecture B
The Health IT Workforce Curriculum was developed for U.S. community colleges to enhance workforce training programmes in health information technology. The curriculum consist of 20 courses of 3 credits each. Each course includes instructor manuals, learning objectives, syllabi, video lectures with accompanying transcripts and slides, exercises, and assessments. The materials were authored by Columbia University, Duke University, Johns Hopkins University, Oregon Health & Science University, and University of Alabama at Birmingham. The project was funded by the U.S. Office of the National Coordinator for Health Information Technology. All of the course materials are available under a Creative Commons Attribution Noncommercial ShareAlike (CC BY NC SA) License (http://creativecommons.org/licenses/by-nc-sa/3.0/). The course description, learning objectives, author information, and other details may be found athttp://www.merlot.org/merlot/viewPortfolio.htm?id=842513. The full collection may also be accessed at http://knowledge.amia.org/onc-ntdc.
Hak Cipta:
Attribution Non-Commercial ShareAlike (BY-NC-SA)
Format Tersedia
Unduh sebagai PPT, PDF, TXT atau baca online dari Scribd
The Health IT Workforce Curriculum was developed for U.S. community colleges to enhance workforce training programmes in health information technology. The curriculum consist of 20 courses of 3 credits each. Each course includes instructor manuals, learning objectives, syllabi, video lectures with accompanying transcripts and slides, exercises, and assessments. The materials were authored by Columbia University, Duke University, Johns Hopkins University, Oregon Health & Science University, and University of Alabama at Birmingham. The project was funded by the U.S. Office of the National Coordinator for Health Information Technology. All of the course materials are available under a Creative Commons Attribution Noncommercial ShareAlike (CC BY NC SA) License (http://creativecommons.org/licenses/by-nc-sa/3.0/). The course description, learning objectives, author information, and other details may be found athttp://www.merlot.org/merlot/viewPortfolio.htm?id=842513. The full collection may also be accessed at http://knowledge.amia.org/onc-ntdc.
Hak Cipta:
Attribution Non-Commercial ShareAlike (BY-NC-SA)
Format Tersedia
Unduh sebagai PPT, PDF, TXT atau baca online dari Scribd
Lecture b This material (Comp7_Unit7b) was developed by Johns Hopkins University, funded by the Department of Health and Human Services, Office of the National Coordinator for Health Information Technology under Award Number IU24OC00013.
Protecting Privacy, Security, and Confidentiality in HIT Systems Learning ObjectivesLecture a Explain and illustrate privacy, security, and confidentiality in HIT settings. Identify common threats encountered when using HIT. Formulate strategies to minimize threats to privacy, security, and confidentiality in HIT systems.
2 Health IT Workforce Curriculum Version 3.0/Spring 2012 Working with Health IT Systems Protecting Privacy, Security, and Confidentiality in HIT SystemsLecture b Physical Safeguards Facility Access Controls
3 Health IT Workforce Curriculum Version 3.0/Spring 2012 Working with Health IT Systems Protecting Privacy, Security, and Confidentiality in HIT SystemsLecture b Physical Safeguards Examples Workstation Use Workstation Security Device and Media Controls (e.g., media disposal, access to backup and storage media) 4 Health IT Workforce Curriculum Version 3.0/Spring 2012 Working with Health IT Systems Protecting Privacy, Security, and Confidentiality in HIT SystemsLecture b Physical Safeguards Examples Device and Media Controls media disposal access to backup and storage media
5 Health IT Workforce Curriculum Version 3.0/Spring 2012 Working with Health IT Systems Protecting Privacy, Security, and Confidentiality in HIT SystemsLecture b Technical Safeguards Examples Access Control Unique user identification Emergency access Automatic logoff Encryption/decryption
6 Health IT Workforce Curriculum Version 3.0/Spring 2012 Working with Health IT Systems Protecting Privacy, Security, and Confidentiality in HIT SystemsLecture b Technical Safeguards Examples Audit Controls Integrity
7 Health IT Workforce Curriculum Version 3.0/Spring 2012 Working with Health IT Systems Protecting Privacy, Security, and Confidentiality in HIT SystemsLecture b Technical Safeguards Examples Person or Entity Authentication Password/passphrase/PIN Smart card/token/key Biometrics Two factor authentication
8 Health IT Workforce Curriculum Version 3.0/Spring 2012 Working with Health IT Systems Protecting Privacy, Security, and Confidentiality in HIT SystemsLecture b Technical Safeguards Examples Transmission Security Integrity controls Encryption
9 Health IT Workforce Curriculum Version 3.0/Spring 2012 Working with Health IT Systems Protecting Privacy, Security, and Confidentiality in HIT SystemsLecture b Risk Analysis and Management Analysis Gather data on potential threats and vulnerabilities Assess current security measures Determine likelihood, impact and level of risk Identify needed security measures Management Develop a plan for implementation Evaluate and maintain security measures 10 Health IT Workforce Curriculum Version 3.0/Spring 2012 Working with Health IT Systems Protecting Privacy, Security, and Confidentiality in HIT SystemsLecture b Meaningful Use Criteria for meaningful use of EHRs related to privacy, security, and confidentiality meant to align with HIPAA Emphasizes need to conduct a risk analysis Some specific requirements for EHR vendors 11 Health IT Workforce Curriculum Version 3.0/Spring 2012 Working with Health IT Systems Protecting Privacy, Security, and Confidentiality in HIT SystemsLecture b Protecting Privacy, Security, and Confidentiality in HIT Systems SummaryLecture b Privacy, security, and confidentiality in HIT settings Common threats encountered when using HIT Strategies to minimize threats to privacy, security, and confidentiality in HIT systems
12 Health IT Workforce Curriculum Version 3.0/Spring 2012 Working with Health IT Systems Protecting Privacy, Security, and Confidentiality in HIT SystemsLecture b Protecting Privacy, Security, and Confidentiality in HIT Systems ReferencesLecture b References American Health Information Management Association. Available from: http://www.ahima.org Ensuring Security of High-Risk Information in EHRs c2008. Available from: http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_039956.hcsp?dDocName=bok1_039956 HIPAA Security Series: Security 101 for Covered Entities .c2004 Available from: http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/security101.pdf Nationwide Privacy and Security Framework for Electronic Exchange of Individually Identifiable Health Information. c2008. Available from: http://healthit.hhs.gov/portal/server.pt/gateway/PTARGS_0_10731_848088_0_0_18/NationwidePS_Framework- 5.pdf Scribd. Mobility Infrastructure Solution Design Guide. c2008. Available from: http://www.scribd.com/doc/24975115/Procurve-Wifi-Network-Design-Guide U.S. Department of Health and Human Services. Available from: http://www.hhs.gov
13 Health IT Workforce Curriculum Version 3.0/Spring 2012 Working with Health IT Systems Protecting Privacy, Security, and Confidentiality in HIT SystemsLecture b Protecting Privacy, Security, and Confidentiality in HIT Systems ReferencesLecture b 14 Health IT Workforce Curriculum Version 3.0/Spring 2012 Working with Health IT Systems Protecting Privacy, Security, and Confidentiality in HIT SystemsLecture b Images Slide 3: HIPPA Security Bulletins. Courtesy HIPPA. Available from: http://www.hhs.gov/ocr/privacy Slide 5: Logo of the Federal Trade Commission. Courtesy Federal Trade Commission. Slide 6: Cloud Computing will Challenge Security Policies. Courtesy U.S. Dept. of Commerce Slide 7: The Field of Security Has to Adapt. Courtesy National Institutes of Health (NIH) Slide 8: A Sophisticated Users Station. Courtesy National Science Foundation (NSF) Available from: http://www.nsf.gov/od/lpa/news/press/00/stim5.htm Slide 9: Transmission Security Controls Prevent Unauthorized Access to ePHI. Available from: http://blog.tsa.gov/2008/08/encryption-is-issue-in-case-of-missing.html.