SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
5 Steps for Protecting Patient Data


Investing in an Electronic Health Record (EHR) solution                 4. Create Physical Safeguards
delivers significant benefits but also increases potential                 Develop policies and procedures to protect
data protection risks. To maximize the financial and                         inventory and control access to desktops, servers
productivity benefits of an EHR solution while protecting                    and information systems.
your organization’s valuable data, follow these five essential             Develop process for handling lost or stolen
steps for building a solid EHR security plan.                                laptops and handheld devices.
                                                                           Determine system backup and data recovery
1. Conduct a Risk Analysis                                                   procedures.
   Review current Protected Health Information                            Natural: flood, earthquake, tornado, etc.
    (PHI) safeguards.                                                      Environmental: chemical spills, HVAC problems,
   Use HITECH’s Meaningful Use Reporting Grid.                              power outages, etc.
   Evaluate firewalls and virus protection.                               Unauthorized intrusions: hackers, burglary, etc.
   Review security measures for secure                                    Establish contingency plans.
    e-communications.
   Review your responsibilities as a Covered Entity                    5. Determine Online Backup Measures
    under HIPAA’s Security Rule.                                           Create and document emergency access procedures.
                                                                           Consider 24/7 web support.
2. Establish Administrative Safeguards                                     Consider using server mirroring or cloning software.
   Assign an internal security leader.
   Establish data security policies and procedures                     Excerpted from the white paper “Electronic Health Records:
     for staff.                                                         Protecting Your Assets With a Solid Security Plan,” by
   Develop a plan to ensure updates of potential                       Carolyn P. Hartley, MLA. As the lead or co-author of 13
     web threats.                                                       textbooks on privacy, security and EHR implementation,
                                                                        she draws on nearly 30 years of experience in healthcare
3. Build Technical Safeguards                                           and over a decade in health information technology.
   Determine role-based access and implement
    audit trails.
   Audit applications.                                                           Download the full white paper now.
   Test and review network vulnerability.




                                                  ©2011 CenturyLink, Inc. All Rights Reserved.
    Not to be distributed or reproduced by anyone other than CenturyLink entities and CenturyLink Channel Alliance members. CM101248 07/11

Weitere ähnliche Inhalte

Andere mochten auch

Andere mochten auch (10)

Needle in haystack
Needle in haystackNeedle in haystack
Needle in haystack
 
Front cover analysis
Front cover analysisFront cover analysis
Front cover analysis
 
Chuong5
Chuong5Chuong5
Chuong5
 
Boletin C&S Enero
Boletin C&S EneroBoletin C&S Enero
Boletin C&S Enero
 
Practico gotico 2011
Practico gotico 2011Practico gotico 2011
Practico gotico 2011
 
НЛТР_Новая Москва_Моделирование
НЛТР_Новая Москва_МоделированиеНЛТР_Новая Москва_Моделирование
НЛТР_Новая Москва_Моделирование
 
R5 eserva
R5 eserva R5 eserva
R5 eserva
 
Daniel scheinson fotos
Daniel scheinson fotosDaniel scheinson fotos
Daniel scheinson fotos
 
Hinweise zum blogprojekt
Hinweise zum blogprojektHinweise zum blogprojekt
Hinweise zum blogprojekt
 
Copia de cuento juan luis
Copia de cuento juan luisCopia de cuento juan luis
Copia de cuento juan luis
 

Mehr von Erik Ginalick

Unleashing The Power Of Customer Data Wp091047
Unleashing The Power Of Customer Data Wp091047Unleashing The Power Of Customer Data Wp091047
Unleashing The Power Of Customer Data Wp091047Erik Ginalick
 
Understand Benefits Of Electronic Health Records Wp091005
Understand Benefits Of Electronic Health Records Wp091005Understand Benefits Of Electronic Health Records Wp091005
Understand Benefits Of Electronic Health Records Wp091005Erik Ginalick
 
Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366Erik Ginalick
 
Qmoe For Manufacturing Wp090862
Qmoe For Manufacturing Wp090862Qmoe For Manufacturing Wp090862
Qmoe For Manufacturing Wp090862Erik Ginalick
 
Qmoe For Public Sector Wp090863
Qmoe For Public Sector Wp090863Qmoe For Public Sector Wp090863
Qmoe For Public Sector Wp090863Erik Ginalick
 
Sip Trunk Services The Cornerstone Of Unified Communications Wp101194
Sip Trunk Services The Cornerstone Of Unified Communications Wp101194Sip Trunk Services The Cornerstone Of Unified Communications Wp101194
Sip Trunk Services The Cornerstone Of Unified Communications Wp101194Erik Ginalick
 
The Worry Free Network Wp091050
The Worry Free Network Wp091050The Worry Free Network Wp091050
The Worry Free Network Wp091050Erik Ginalick
 
Qmoe For Financial Services Wp090860
Qmoe For Financial Services Wp090860Qmoe For Financial Services Wp090860
Qmoe For Financial Services Wp090860Erik Ginalick
 
Qmoe For Healthcare Wp090861
Qmoe For Healthcare Wp090861Qmoe For Healthcare Wp090861
Qmoe For Healthcare Wp090861Erik Ginalick
 
Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010Erik Ginalick
 
Planning For Disaster And Everyday Threats Wp111438
Planning For Disaster And Everyday Threats Wp111438Planning For Disaster And Everyday Threats Wp111438
Planning For Disaster And Everyday Threats Wp111438Erik Ginalick
 
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094Erik Ginalick
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Erik Ginalick
 
Plan For Success White Paper
Plan For Success White PaperPlan For Success White Paper
Plan For Success White PaperErik Ginalick
 
Optimizing Your Communications In A Recession Wp090993
Optimizing Your Communications In A Recession Wp090993Optimizing Your Communications In A Recession Wp090993
Optimizing Your Communications In A Recession Wp090993Erik Ginalick
 
Is Cloud Computing Right For You Wp101305
Is Cloud Computing Right For You Wp101305Is Cloud Computing Right For You Wp101305
Is Cloud Computing Right For You Wp101305Erik Ginalick
 
Ipv Technical White Paper Wp111504
Ipv Technical White Paper Wp111504Ipv Technical White Paper Wp111504
Ipv Technical White Paper Wp111504Erik Ginalick
 
Ipv6 Technical White Paper Wp111504
Ipv6 Technical White Paper Wp111504Ipv6 Technical White Paper Wp111504
Ipv6 Technical White Paper Wp111504Erik Ginalick
 
Infrastructures For Innovation Wp090974
Infrastructures For Innovation Wp090974Infrastructures For Innovation Wp090974
Infrastructures For Innovation Wp090974Erik Ginalick
 
Healthcare It Security Necessity Wp101118
Healthcare It Security Necessity Wp101118Healthcare It Security Necessity Wp101118
Healthcare It Security Necessity Wp101118Erik Ginalick
 

Mehr von Erik Ginalick (20)

Unleashing The Power Of Customer Data Wp091047
Unleashing The Power Of Customer Data Wp091047Unleashing The Power Of Customer Data Wp091047
Unleashing The Power Of Customer Data Wp091047
 
Understand Benefits Of Electronic Health Records Wp091005
Understand Benefits Of Electronic Health Records Wp091005Understand Benefits Of Electronic Health Records Wp091005
Understand Benefits Of Electronic Health Records Wp091005
 
Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366
 
Qmoe For Manufacturing Wp090862
Qmoe For Manufacturing Wp090862Qmoe For Manufacturing Wp090862
Qmoe For Manufacturing Wp090862
 
Qmoe For Public Sector Wp090863
Qmoe For Public Sector Wp090863Qmoe For Public Sector Wp090863
Qmoe For Public Sector Wp090863
 
Sip Trunk Services The Cornerstone Of Unified Communications Wp101194
Sip Trunk Services The Cornerstone Of Unified Communications Wp101194Sip Trunk Services The Cornerstone Of Unified Communications Wp101194
Sip Trunk Services The Cornerstone Of Unified Communications Wp101194
 
The Worry Free Network Wp091050
The Worry Free Network Wp091050The Worry Free Network Wp091050
The Worry Free Network Wp091050
 
Qmoe For Financial Services Wp090860
Qmoe For Financial Services Wp090860Qmoe For Financial Services Wp090860
Qmoe For Financial Services Wp090860
 
Qmoe For Healthcare Wp090861
Qmoe For Healthcare Wp090861Qmoe For Healthcare Wp090861
Qmoe For Healthcare Wp090861
 
Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010
 
Planning For Disaster And Everyday Threats Wp111438
Planning For Disaster And Everyday Threats Wp111438Planning For Disaster And Everyday Threats Wp111438
Planning For Disaster And Everyday Threats Wp111438
 
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
 
Plan For Success White Paper
Plan For Success White PaperPlan For Success White Paper
Plan For Success White Paper
 
Optimizing Your Communications In A Recession Wp090993
Optimizing Your Communications In A Recession Wp090993Optimizing Your Communications In A Recession Wp090993
Optimizing Your Communications In A Recession Wp090993
 
Is Cloud Computing Right For You Wp101305
Is Cloud Computing Right For You Wp101305Is Cloud Computing Right For You Wp101305
Is Cloud Computing Right For You Wp101305
 
Ipv Technical White Paper Wp111504
Ipv Technical White Paper Wp111504Ipv Technical White Paper Wp111504
Ipv Technical White Paper Wp111504
 
Ipv6 Technical White Paper Wp111504
Ipv6 Technical White Paper Wp111504Ipv6 Technical White Paper Wp111504
Ipv6 Technical White Paper Wp111504
 
Infrastructures For Innovation Wp090974
Infrastructures For Innovation Wp090974Infrastructures For Innovation Wp090974
Infrastructures For Innovation Wp090974
 
Healthcare It Security Necessity Wp101118
Healthcare It Security Necessity Wp101118Healthcare It Security Necessity Wp101118
Healthcare It Security Necessity Wp101118
 

Five Steps For Protecting Patient Data Cm101248

  • 1. 5 Steps for Protecting Patient Data Investing in an Electronic Health Record (EHR) solution 4. Create Physical Safeguards delivers significant benefits but also increases potential  Develop policies and procedures to protect data protection risks. To maximize the financial and inventory and control access to desktops, servers productivity benefits of an EHR solution while protecting and information systems. your organization’s valuable data, follow these five essential  Develop process for handling lost or stolen steps for building a solid EHR security plan. laptops and handheld devices.  Determine system backup and data recovery 1. Conduct a Risk Analysis procedures.  Review current Protected Health Information  Natural: flood, earthquake, tornado, etc. (PHI) safeguards.  Environmental: chemical spills, HVAC problems,  Use HITECH’s Meaningful Use Reporting Grid. power outages, etc.  Evaluate firewalls and virus protection.  Unauthorized intrusions: hackers, burglary, etc.  Review security measures for secure  Establish contingency plans. e-communications.  Review your responsibilities as a Covered Entity 5. Determine Online Backup Measures under HIPAA’s Security Rule.  Create and document emergency access procedures.  Consider 24/7 web support. 2. Establish Administrative Safeguards  Consider using server mirroring or cloning software.  Assign an internal security leader.  Establish data security policies and procedures Excerpted from the white paper “Electronic Health Records: for staff. Protecting Your Assets With a Solid Security Plan,” by  Develop a plan to ensure updates of potential Carolyn P. Hartley, MLA. As the lead or co-author of 13 web threats. textbooks on privacy, security and EHR implementation, she draws on nearly 30 years of experience in healthcare 3. Build Technical Safeguards and over a decade in health information technology.  Determine role-based access and implement audit trails.  Audit applications. Download the full white paper now.  Test and review network vulnerability. ©2011 CenturyLink, Inc. All Rights Reserved. Not to be distributed or reproduced by anyone other than CenturyLink entities and CenturyLink Channel Alliance members. CM101248 07/11