SlideShare a Scribd company logo
1 of 40
We ask that all questions be held until the end of the Presentation! Thank You 
DaedalusTechnicalSolutions Steve Norton Technical Writer -Training Specialist  Bradley Manus Network  Specialist Jennifer Fitzgerald Project Manager Your Missing Link in Solving Your Networking Problems
Who We Are
Our Goals ,[object Object]
  Insure Seamless Access to Patient Medical Records.
  Make Security to Meet or Exceed HIPAA Standards.
  Design a Backup Plan for Disaster Recovery.,[object Object]
HIPAA-Compliant  Can you go buy a HIPAA-compliant software package and be done with it?  Not really, It's you, as an organization, that's HIPAA compliant, and no software application is going to magically make you that way. HIPAA defines a large set of policies and procedures, many of which have nothing to do with technology.
Tracking Who Did What
User Roles
Smart Cards
Front-End Software HIPAA transaction sets version 5010 are coming and HIPAAsuite is ready for it.
Benefits of HIPAAsuite
Security and Encryption
Sophos Security Software
Testing Plan
D.T.SOnsite Training Center
Building Layout – Central Office 66’ft. 92’ft.
Network Cabling
Security of Building
Virtual Network
Disaster Recovery Plan
Projected Timeline
Network Configuration
Cisco Secure PIX Firewall 535
Cisco 2921 Integrated Router
VoIP Phones
HP TouchSmart 9300 Elite Option A-
Thin Client Computers Option B-
Toughbook C1 Dual Touch
HP Digital Sender
Microsoft Office 2010
Windows 7 Professional
Transfer of Old Data
Scanning Documents
Recycling Old Equipment
Price List
Price List
Price List
Total Cost Option A - $    648,995.20 Option B - $    595,562.20

More Related Content

What's hot

Applied data analytics_v1_6.23
Applied data analytics_v1_6.23Applied data analytics_v1_6.23
Applied data analytics_v1_6.23John C. Havens
 
Puppet Channel Sales Training Webinar: Puppet Sales Messaging
Puppet Channel Sales Training Webinar: Puppet Sales MessagingPuppet Channel Sales Training Webinar: Puppet Sales Messaging
Puppet Channel Sales Training Webinar: Puppet Sales MessagingPuppet
 
CIS Security Benchmark
CIS Security BenchmarkCIS Security Benchmark
CIS Security BenchmarkRahul Khengare
 
To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015Paul Hogan
 
Disaster Preparedness Planning
Disaster Preparedness PlanningDisaster Preparedness Planning
Disaster Preparedness Planningpds2k.com
 
ONI Assure Insight Brochure fv
ONI Assure Insight Brochure fvONI Assure Insight Brochure fv
ONI Assure Insight Brochure fvCarl Pollard
 
Security Consulting Services
Security Consulting ServicesSecurity Consulting Services
Security Consulting ServicesePlus
 
Heureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Webinar – Security, the Growth Engine for eDiscovery ProfessionalsHeureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Webinar – Security, the Growth Engine for eDiscovery ProfessionalsHeureka Software
 
Achieving and Measuring Success with the Security Awareness Maturity Model
Achieving and Measuring Success with  the Security Awareness Maturity ModelAchieving and Measuring Success with  the Security Awareness Maturity Model
Achieving and Measuring Success with the Security Awareness Maturity ModelPriyanka Aash
 
Security Risks: The Threat is Real
Security Risks: The Threat is RealSecurity Risks: The Threat is Real
Security Risks: The Threat is RealePlus
 
Myth-busting in Application Security
Myth-busting in Application SecurityMyth-busting in Application Security
Myth-busting in Application SecurityDevOps.com
 
How sophisticated penetration testers get through the defenses
How sophisticated penetration testers get through the defensesHow sophisticated penetration testers get through the defenses
How sophisticated penetration testers get through the defensesPhilippe A. R. Schaeffer
 
Network nags - when security fails
Network nags  - when security failsNetwork nags  - when security fails
Network nags - when security failsRishabh Dangwal
 
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...centralohioissa
 
Hybrid Security Analysis: Bridging the Gap between Inside-Out and Outside-In
Hybrid Security Analysis: Bridging the Gap between Inside-Out and Outside-InHybrid Security Analysis: Bridging the Gap between Inside-Out and Outside-In
Hybrid Security Analysis: Bridging the Gap between Inside-Out and Outside-InTechWell
 
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk
 

What's hot (20)

Applied data analytics_v1_6.23
Applied data analytics_v1_6.23Applied data analytics_v1_6.23
Applied data analytics_v1_6.23
 
Puppet Channel Sales Training Webinar: Puppet Sales Messaging
Puppet Channel Sales Training Webinar: Puppet Sales MessagingPuppet Channel Sales Training Webinar: Puppet Sales Messaging
Puppet Channel Sales Training Webinar: Puppet Sales Messaging
 
CIS Security Benchmark
CIS Security BenchmarkCIS Security Benchmark
CIS Security Benchmark
 
To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015
 
Disaster Preparedness Planning
Disaster Preparedness PlanningDisaster Preparedness Planning
Disaster Preparedness Planning
 
Tesseract Service Portfolio
Tesseract Service PortfolioTesseract Service Portfolio
Tesseract Service Portfolio
 
ONI Assure Insight Brochure fv
ONI Assure Insight Brochure fvONI Assure Insight Brochure fv
ONI Assure Insight Brochure fv
 
Security Consulting Services
Security Consulting ServicesSecurity Consulting Services
Security Consulting Services
 
Heureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Webinar – Security, the Growth Engine for eDiscovery ProfessionalsHeureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Webinar – Security, the Growth Engine for eDiscovery Professionals
 
Achieving and Measuring Success with the Security Awareness Maturity Model
Achieving and Measuring Success with  the Security Awareness Maturity ModelAchieving and Measuring Success with  the Security Awareness Maturity Model
Achieving and Measuring Success with the Security Awareness Maturity Model
 
Security Risks: The Threat is Real
Security Risks: The Threat is RealSecurity Risks: The Threat is Real
Security Risks: The Threat is Real
 
Myth-busting in Application Security
Myth-busting in Application SecurityMyth-busting in Application Security
Myth-busting in Application Security
 
How sophisticated penetration testers get through the defenses
How sophisticated penetration testers get through the defensesHow sophisticated penetration testers get through the defenses
How sophisticated penetration testers get through the defenses
 
Network nags - when security fails
Network nags  - when security failsNetwork nags  - when security fails
Network nags - when security fails
 
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
 
Resume
ResumeResume
Resume
 
Portfolio security, analytics and forensic blue coat
Portfolio security, analytics and forensic blue coatPortfolio security, analytics and forensic blue coat
Portfolio security, analytics and forensic blue coat
 
Hybrid Security Analysis: Bridging the Gap between Inside-Out and Outside-In
Hybrid Security Analysis: Bridging the Gap between Inside-Out and Outside-InHybrid Security Analysis: Bridging the Gap between Inside-Out and Outside-In
Hybrid Security Analysis: Bridging the Gap between Inside-Out and Outside-In
 
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
 
DeJesusSres274
DeJesusSres274DeJesusSres274
DeJesusSres274
 

Viewers also liked

Cross platform mobile apps
Cross platform mobile appsCross platform mobile apps
Cross platform mobile appsZee Spencer
 
NSA Capstone Presentation
NSA Capstone PresentationNSA Capstone Presentation
NSA Capstone PresentationMinh Vu
 
Capstone Project Pt 11
Capstone Project Pt 11Capstone Project Pt 11
Capstone Project Pt 11Clarence Ennis
 
ITT CNS Capstone Project
ITT CNS Capstone ProjectITT CNS Capstone Project
ITT CNS Capstone ProjectKyle Montoya
 
Data Base Management ! Batra Computer Centre
Data Base Management ! Batra Computer Centre Data Base Management ! Batra Computer Centre
Data Base Management ! Batra Computer Centre jatin batra
 
Completed+Presentation+Capstone
Completed+Presentation+CapstoneCompleted+Presentation+Capstone
Completed+Presentation+Capstonecarl1968
 
IT 415 - Capstone Project Orientation
IT 415 - Capstone Project OrientationIT 415 - Capstone Project Orientation
IT 415 - Capstone Project OrientationSheryl Satorre
 
Capstone Project Presentation
Capstone Project PresentationCapstone Project Presentation
Capstone Project Presentationlafraz383
 
eBusiness Website Database Design
eBusiness Website Database DesigneBusiness Website Database Design
eBusiness Website Database DesignMeng (Meg) Wang
 
NT2799 FINAL CAPSTONE PROJECT.DOCX
NT2799 FINAL CAPSTONE PROJECT.DOCXNT2799 FINAL CAPSTONE PROJECT.DOCX
NT2799 FINAL CAPSTONE PROJECT.DOCXFred Abram III
 

Viewers also liked (12)

Cross platform mobile apps
Cross platform mobile appsCross platform mobile apps
Cross platform mobile apps
 
NSA Capstone Presentation
NSA Capstone PresentationNSA Capstone Presentation
NSA Capstone Presentation
 
Capstone Final Part
Capstone Final PartCapstone Final Part
Capstone Final Part
 
Capstone Project Pt 11
Capstone Project Pt 11Capstone Project Pt 11
Capstone Project Pt 11
 
ITT CNS Capstone Project
ITT CNS Capstone ProjectITT CNS Capstone Project
ITT CNS Capstone Project
 
Data Base Management ! Batra Computer Centre
Data Base Management ! Batra Computer Centre Data Base Management ! Batra Computer Centre
Data Base Management ! Batra Computer Centre
 
Completed+Presentation+Capstone
Completed+Presentation+CapstoneCompleted+Presentation+Capstone
Completed+Presentation+Capstone
 
IT 415 - Capstone Project Orientation
IT 415 - Capstone Project OrientationIT 415 - Capstone Project Orientation
IT 415 - Capstone Project Orientation
 
IMC 636 Capstone
IMC 636 CapstoneIMC 636 Capstone
IMC 636 Capstone
 
Capstone Project Presentation
Capstone Project PresentationCapstone Project Presentation
Capstone Project Presentation
 
eBusiness Website Database Design
eBusiness Website Database DesigneBusiness Website Database Design
eBusiness Website Database Design
 
NT2799 FINAL CAPSTONE PROJECT.DOCX
NT2799 FINAL CAPSTONE PROJECT.DOCXNT2799 FINAL CAPSTONE PROJECT.DOCX
NT2799 FINAL CAPSTONE PROJECT.DOCX
 

Similar to ITT-Tech Capstone Final for CNS

HIPAA Safeguard Slides
HIPAA Safeguard SlidesHIPAA Safeguard Slides
HIPAA Safeguard Slidesprojectwinner
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016SteveAtHPE
 
Nine HIPAA Compliance Questions to ask Yourself
Nine HIPAA Compliance Questions to ask YourselfNine HIPAA Compliance Questions to ask Yourself
Nine HIPAA Compliance Questions to ask YourselfLERNER Consulting
 
Karim Maalouf I.T services 2013
Karim Maalouf I.T services 2013Karim Maalouf I.T services 2013
Karim Maalouf I.T services 2013Karim Maalouf
 
Compliance is a Team Project
Compliance is a Team ProjectCompliance is a Team Project
Compliance is a Team ProjectThe TNS Group
 
7 reasons to outsource your IT
7 reasons to outsource your IT7 reasons to outsource your IT
7 reasons to outsource your ITJon Davis
 
Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...
Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...
Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...Dana Gardner
 
Clearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat ProtectionClearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat ProtectionCIO Look Magazine
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security MagazineQuentin Brown
 
A Comprehensive Guide to Managed Services
A Comprehensive Guide to Managed ServicesA Comprehensive Guide to Managed Services
A Comprehensive Guide to Managed Servicessangerarayal
 
Penntech Services Infodeck.ppsx
Penntech Services Infodeck.ppsxPenntech Services Infodeck.ppsx
Penntech Services Infodeck.ppsxElaineLadyman1
 
IT Development Solutions in Delhi.pdf
IT Development Solutions in Delhi.pdfIT Development Solutions in Delhi.pdf
IT Development Solutions in Delhi.pdfgenz9
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueRapidValue
 

Similar to ITT-Tech Capstone Final for CNS (20)

Vision Groups
Vision GroupsVision Groups
Vision Groups
 
Software Myths
Software MythsSoftware Myths
Software Myths
 
Presentation1HTGUK
Presentation1HTGUKPresentation1HTGUK
Presentation1HTGUK
 
Example_Whitepaper
Example_WhitepaperExample_Whitepaper
Example_Whitepaper
 
IT SERVICES
IT SERVICESIT SERVICES
IT SERVICES
 
ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
 
HIPAA Safeguard Slides
HIPAA Safeguard SlidesHIPAA Safeguard Slides
HIPAA Safeguard Slides
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016
 
Nine HIPAA Compliance Questions to ask Yourself
Nine HIPAA Compliance Questions to ask YourselfNine HIPAA Compliance Questions to ask Yourself
Nine HIPAA Compliance Questions to ask Yourself
 
Karim Maalouf I.T services 2013
Karim Maalouf I.T services 2013Karim Maalouf I.T services 2013
Karim Maalouf I.T services 2013
 
Compliance is a Team Project
Compliance is a Team ProjectCompliance is a Team Project
Compliance is a Team Project
 
7 reasons to outsource your IT
7 reasons to outsource your IT7 reasons to outsource your IT
7 reasons to outsource your IT
 
Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...
Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...
Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...
 
Clearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat ProtectionClearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat Protection
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security Magazine
 
A Comprehensive Guide to Managed Services
A Comprehensive Guide to Managed ServicesA Comprehensive Guide to Managed Services
A Comprehensive Guide to Managed Services
 
HIPAA_CheatSheet
HIPAA_CheatSheetHIPAA_CheatSheet
HIPAA_CheatSheet
 
Penntech Services Infodeck.ppsx
Penntech Services Infodeck.ppsxPenntech Services Infodeck.ppsx
Penntech Services Infodeck.ppsx
 
IT Development Solutions in Delhi.pdf
IT Development Solutions in Delhi.pdfIT Development Solutions in Delhi.pdf
IT Development Solutions in Delhi.pdf
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValue
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

ITT-Tech Capstone Final for CNS

Editor's Notes

  1. DTS is a Small Company with BIG values. We treat everyone like your family. Our friendly staff will help you out 24/7/365 days a year. We handle all of your business needs.MISSION STATEMENTTo make technology an asset for your business without problems. We work around your business schedule. We strive to make technology integrate seamlessly with your business, so your business can grow. As your technology partner, when your business grows ours will grow with you, therefore, we will work hand in hand to support your growth.
  2. Health Insurance Portability and Accountability Act To ensure protection andprivacy of personal health records by protecting the security and confidentiality of health care information.
  3. Can you go buy a HIPAA-compliant software package and be done with it? Not really, It's you, as an organization, that's HIPAA compliant, and no software application is going to magically make you that way. HIPAA defines a large set of policies and procedures, many of which have nothing to do with technology.
  4. One of the clearest HIPAA requirements is that organizations keep an audit log of who did what in the software package. It's important that your package be able to track which person accessed which record on what date, and whether he or she viewed it, updated it, or deleted it.
  5. HIPAA specifies that each employee at any organization should only see the "minimum necessary" information to do his or her job. This a requirement for organizations to define what level of access each employee has to the organization's software, based on both the employee's role within the organization as well as on the outside clients he or she has permission to access.
  6. Smart cards can provide identification, authentication, data storage and application processing…Smart cards can improve the security and privacy of patient information, provide a secure carrier for portable medical records reduce health care fraud, support new processes for portable medical records, provide secure access to emergency medical information, enable compliance with government initiatives and mandates, and provide the platform to implement other applications as needed by the health care organization.
  7. Electronic Data Interchange (EDI) is computer-to-computer communication of business documents between companies. It is a paperless way to send and receive Purchase Orders, Invoices, Charge backs etc. EDI replaces human-readable documents with electronically coded documents. The sending computer creates the document and the receiving computer interprets the document. Implementation of EDI streamlines the process of exchanging standard business transactionsElectronic data interchange (EDI) is the structured transmission of data between organizations by electronic means--HIPAA electronic data interchange (EDI) front-end application for all HIPAA transaction sets. It is designed for organizations that receive and send EDI transactions in the healthcare industry.
  8. HIPAA also requires you to secure your data. For example, the application should be secured behind a firewall, and with solid password protection for user accounts… we will be talking about firewall later in the presentation.
  9. HIPPA Compliant SoftwareEncryption provide multi-layered security that includes full disk encryption, port control and data loss prevention. Content scanning warns employees when they try to move sensitive data to email, IM or storage devices. Application control stops employees from running software, like P2P software, that puts your data at risk.Device control prevents employees from copying data to unknown devices like USB keys or CDs.
  10. Certified Professional Trainers. Conveniently located in Las Vegas. We will work to accommodate your needs. One-on-one on-site software training.
  11. Time line - start 09/06 – 10/31 end
  12. The Cisco Secure PIX Firewall 535 delivers carrier-class performance that meets the needs of large enterprise networks as well as service providers. As part of the world-leading Cisco Secure PIX Firewall series, it provides today's networking customers with unmatched security, reliability, and performance. The PIX 535 integrates stateful firewall and IP Security (IPsec) virtual private network (VPN) functionality. The PIX 535 is a purpose-built firewall appliance that offers an unprecedented level of protection. This is tightly integrated with the PIX Operating System (OS), which is a proprietary, hardened system that eliminates security holes and performance degrading overhead. At the heart of this system is a protection scheme based on the Adaptive Security Algorithm (ASA), which offers stateful connection-oriented firewalling that is capable of 500, 000 concurrent connections while at the same time blocking common denial of service (Dos) attacks. The PIX 535 is also a full-featured VPN gateway that can securely transport data over public networks. It supports both site-to-site and remote access VPN applications via 56-bit Data Encryption Standard (DES) or 168-bit 3DES. The integrated VPN functionality of the PIX 535 can be supplemented with an optional VPN Accelerator Card (VAC) to deliver 100 Mbps throughput and 2, 000 IPsec tunnels.
  13. The Cisco 2921 Integrated Services Router (ISR) delivers highly secure data, voice, video, and application services for small offices. Key features include:3 Integrated 10/100/1000 Ethernet ports with 1 port capable of RJ-45 or SFP connectivity 1 service module slot 4 Enhanced High-Speed WAN Interface Card (EHWIC) slots 3 onboard digital signal processor slots 1 internal service module slot for application services Fully integrated power distribution to modules supporting 802.3af Power over Ethernet (PoE) and Cisco Enhanced PoESecurity Embedded hardware-accelerated VPN encryption Secure collaborative communications with Group Encrypted Transport VPN, Dynamic Multipoint VPN, or Enhanced Easy VPN Integrated threat control using Cisco IOS Firewall, Cisco IOS Zone-Based Firewall, Cisco IOS IPS, and Cisco IOS Content Filtering Identity management: Intelligently protecting endpoints using authentication, authorization, and accounting (AAA), and public key infrastructure Voice High-density packet voice DSP module, optimized for voice and video support Standards-certified VoiceXML browser services Cisco Unified Border Element capabilities Cisco Unity Express voicemail support Support for Cisco Communications Manager Express and Survivable Remote Site Telephony
  14. Designed to meet the communication needs of professional workers in enclosed office environmentAccess to multiple telephone lines (or a combination of lines and direct access to telephony features) Includes high-quality, hands-free speakerphone capability and built-in headset connectivity.
  15. Preloaded w/ Windows 7 Professional /64 bitMulti-touch panel with 23-inch diagonal Full HD widescreen WLED backlit BrightView LCD, adjustable reclining stand and VESA Wall Mount adapter.Communication featuresSecurity management---Kensington lock slot,Rear port security cover
  16. Operating system -- Microsoft® MultiPoint Server 2011, Microsoft® MultiPoint Server 2010ProcessorIntel® Core™ i7-2600 3.4 GHzIntel® Core™ i5-2400 3.1 GHzStandard memory4 GB 1333 MHz DDR3 SDRAM8 GB 1333 MHz DDR3 SDRAM
  17. Must sign on with user name and password…tracks who sent what to whom…scans and uploads paperwork to patients files. HIPPA Complient!
  18. 2 location have paper copies of patients records, we will hire an outside contractor to scan in the documents so that you can become a digitalized firm.Each office will have a Digital Sender to it to keep better records and files on patients.The files will update the to the patient records immediately to eliminate missing documentsSecurity – everyone must login and alls documents sent can be to tracked to individual users.
  19. Clark County Computer Resource CenterRecycle your old and unwanted computer and network they will provide you with tax deductible donation receipt network.We will make sure that everything is wiped off the computer by using Acronis Drive Cleanser
  20. Tax write off for donating equipment….if done by you!Any over charges that we estimated higher, then what they actually were will be credited back to the customer.-HITECH act provides incentive payments for the adoption of electronic health records (EHR). HITECH incentives are paid on a per provider basis. For example, a practice with two physicians and a nurse practitioner using an EHR could qualify for $132,000 in Medicare incentives.First payment year is 2011or 2012 = $18,000 Second payment year = $12,000 Third payment year = $8,000 Fourth payment year = $4,000 Fifth payment year = $2,000