Mar 28, 2024  
2020-2021 Course Catalog 
    
2020-2021 Course Catalog [ARCHIVED CATALOG]

Add to Portfolio (opens a new window)

HIT 162 - Data Security for Health IT

Credits: 2
Lecture Hours: 2
Lab Hours: 0
Practicum Hours: 0
Work Experience: 0
Course Type: Voc/Tech
This course provides knowledge of current data security issues in the healthcare environment. A high-level emphasis is placed on identifying vulnerabilities and protection schemes. Additionally, the confidentiality, integrity and availability of protected health information will be discussed.
Prerequisite: HIT 360  or Instructor Approval
Competencies
  1. Explain medical records privacy and ethical issues related to patient information
    1. Discuss the implications of the HIPAA privacy and security rules for the protection of information
    2. Explain the potential risks to and vulnerabilities of the confidentiality, integrity, and availability of an organization’s sensitive information
    3. Discuss reasonable and appropriate policies and procedures to comply with regulatory requirements
    4. Define breach as it pertains to personal health information
    5. Describe required notification and reporting practices triggered by a breach occurrence and the role of Office of Civil Rights.
  2. Differentiate methods to maintain data quality
    1. Define data integrity and data mining and their relevance to health care
    2. Discuss strategies to ensure data integrity, accuracy, and quality
    3. Differentiate between online, offline, and out-sourced data storage and how storage conditions affect data integrity
    4. Discuss the significance of data cleansing for data warehousing and data mining
    5. Examine data sharing and transfer, consent, and considerations
  3. Discuss mitigation strategies to security threats by personnel and other internal influences
    1. Discuss social engineering tactics
    2. Identify competing and conflicting personnel interests
    3. Explain the impact that Internet technology, cloud environment and/or social networking has on health information security
    4. Describe end-user roles of organizations’ systems security policies
    5. Discuss importance of routine security training
  4. Outline mitigation strategies to technical and physical vulnerabilities
    1. Explain physical access & appropriate deterrents for unauthorized parties
    2. Discuss sources of printed and electronic waste and proper disposal techniques
    3. Examine the fundamentals of network security including topology and devices
    4. List acceptable authentication and permission mechanisms
    5. Describe protocols for data encryption and digital signatures
    6. Explain the importance of activity logs and system benchmarks
  5. Examine implications for use of mobile and wireless devices in healthcare information systems
  1. Describe mobile devices and apps security, convenience, accuracy, efficiency, and productivity
  2. Examine the fundamentals of wireless devices, authentication, encryption, and Wi-Fi connections
  3. Discuss administrative, physical, and technical safeguards



Add to Portfolio (opens a new window)