|
Dec 26, 2024
|
|
|
|
HIT 162 - Data Security for Health IT Credits: 2 Lecture Hours: 2 Lab Hours: 0 Practicum Hours: 0 Work Experience: 0 Course Type: Voc/Tech This course provides knowledge of current data security issues in the healthcare environment. A high-level emphasis is placed on identifying vulnerabilities and protection schemes. Additionally, the confidentiality, integrity and availability of protected health information will be discussed. Prerequisite: HIT 360 or Instructor Approval Competencies
- Explain medical records privacy and ethical issues related to patient information
- Discuss the implications of the HIPAA privacy and security rules for the protection of information
- Explain the potential risks to and vulnerabilities of the confidentiality, integrity, and availability of an organization’s sensitive information
- Discuss reasonable and appropriate policies and procedures to comply with regulatory requirements
- Define breach as it pertains to personal health information
- Describe required notification and reporting practices triggered by a breach occurrence and the role of Office of Civil Rights.
- Differentiate methods to maintain data quality
- Define data integrity and data mining and their relevance to health care
- Discuss strategies to ensure data integrity, accuracy, and quality
- Differentiate between online, offline, and out-sourced data storage and how storage conditions affect data integrity
- Discuss the significance of data cleansing for data warehousing and data mining
- Examine data sharing and transfer, consent, and considerations
- Discuss mitigation strategies to security threats by personnel and other internal influences
- Discuss social engineering tactics
- Identify competing and conflicting personnel interests
- Explain the impact that Internet technology, cloud environment and/or social networking has on health information security
- Describe end-user roles of organizations’ systems security policies
- Discuss importance of routine security training
- Outline mitigation strategies to technical and physical vulnerabilities
- Explain physical access & appropriate deterrents for unauthorized parties
- Discuss sources of printed and electronic waste and proper disposal techniques
- Examine the fundamentals of network security including topology and devices
- List acceptable authentication and permission mechanisms
- Describe protocols for data encryption and digital signatures
- Explain the importance of activity logs and system benchmarks
- Examine implications for use of mobile and wireless devices in healthcare information systems
- Describe mobile devices and apps security, convenience, accuracy, efficiency, and productivity
- Examine the fundamentals of wireless devices, authentication, encryption, and Wi-Fi connections
- Discuss administrative, physical, and technical safeguards
Add to Portfolio (opens a new window)
|
|