Weitere ähnliche Inhalte
Mehr von Erik Ginalick (20)
Five Steps For Protecting Patient Data Cm101248
- 1. 5 Steps for Protecting Patient Data
Investing in an Electronic Health Record (EHR) solution 4. Create Physical Safeguards
delivers significant benefits but also increases potential Develop policies and procedures to protect
data protection risks. To maximize the financial and inventory and control access to desktops, servers
productivity benefits of an EHR solution while protecting and information systems.
your organization’s valuable data, follow these five essential Develop process for handling lost or stolen
steps for building a solid EHR security plan. laptops and handheld devices.
Determine system backup and data recovery
1. Conduct a Risk Analysis procedures.
Review current Protected Health Information Natural: flood, earthquake, tornado, etc.
(PHI) safeguards. Environmental: chemical spills, HVAC problems,
Use HITECH’s Meaningful Use Reporting Grid. power outages, etc.
Evaluate firewalls and virus protection. Unauthorized intrusions: hackers, burglary, etc.
Review security measures for secure Establish contingency plans.
e-communications.
Review your responsibilities as a Covered Entity 5. Determine Online Backup Measures
under HIPAA’s Security Rule. Create and document emergency access procedures.
Consider 24/7 web support.
2. Establish Administrative Safeguards Consider using server mirroring or cloning software.
Assign an internal security leader.
Establish data security policies and procedures Excerpted from the white paper “Electronic Health Records:
for staff. Protecting Your Assets With a Solid Security Plan,” by
Develop a plan to ensure updates of potential Carolyn P. Hartley, MLA. As the lead or co-author of 13
web threats. textbooks on privacy, security and EHR implementation,
she draws on nearly 30 years of experience in healthcare
3. Build Technical Safeguards and over a decade in health information technology.
Determine role-based access and implement
audit trails.
Audit applications. Download the full white paper now.
Test and review network vulnerability.
©2011 CenturyLink, Inc. All Rights Reserved.
Not to be distributed or reproduced by anyone other than CenturyLink entities and CenturyLink Channel Alliance members. CM101248 07/11