Electronic Health Records Security Plan Discussion

HT102 Spring, 2016:Revised Case Study 5-44 Electronic Health Records Security Plan Case Study 5-44 Electronic Health Records Security Plan Student: ____________________________ Date: __________________ Domain II: Information Protection: Access, Disclosure, Archival, Privacy and Security Subdomain II.B1: Data Privacy, Confidentiality & Security Competency: Apply confidentiality, privacy and security measures and policies and procedures for internal and external use and exchange to protect electronic health information (BL3); Curricular Considerations: Internal and external standards, regulations and initiatives (State and federal privacy and security laws); Electronic Health Records Security Plan Discussion

ORDER YOUR PAPER HERE

Patient verification (Medical identity theft), Data security concepts, processes and monitoring. Subdomain II.B2: Data Privacy, Confidentiality & Security Competency: Apply retention and destruction policies for health information (BL3); Curricular Consideration: E-Discovery; Data storage and retrieval. Subdomain II.B3: Data Privacy, Confidentiality & Security Competency: Apply system security policies according to departmental and organizational data/information standard (BL3) Curricular Consideration: Security processes and policies (data/information standards). TASKS: Given a scenario, design a security proposal, an executive summary and a cover letter to the Chief Information Officer (CIO), addressing issues of what security measures should be taken by your facility to maintain confidentiality, data integrity, prevention of loss of data and policies and procedures needed to be compliant with HIPAA and HITECH, as they transition to an Electronic Health Record, HER, system. Electronic Health Records Security Plan Discussion

This proposal must also include information on necessary retention and destruction policies needed on health information. Objectives: ● Discuss the elements of a data security program, including policies and procedures and monitoring (BL3) ● Identify the greatest threats to the security of health information and methods for minimizing the threats to data security (BL3) ● Identify the primary components of the security provisions of HIPAA and the HITECH Act (BL3) Standards: Time: 90 minutes; Accuracy: 70% Tasks Points Cover letter: appropriate format, no spelling/grammar/punctuation errors ____/10 Executive Summary: no spelling/grammar/punctuation errors ____/10 Proposed Security Measures: 5.0 points each  Physical security of hardware  Data Security  Confidentiality  Access 1 HT102 Spring, 2016:Revised Case Study 5-44 Electronic Health Records Security Plan        Disaster Recovery Backups Business Continuity Planning Penalties for Violating Policies Appointment of Chief Security Officer Employee Training Methods Total for this part: ____/50 Identify Requirements of HIPAA/HITECH for Compliance ___/15 Policies and procedures: Retention and Destruction ___/15 Total points ____/100 Instructor: __________________________________ 2 Date: _____________

Electronic Health Records Security Plan Discussion