Component 8; Unit 6: Installation and Maintenance of Health IT Systems
Description:
This unit will discuss the security rules required by regulation and best practices for implementation and monitoring of security in EHR systems.
Topics in this unit include: Federal, state, and local health information regulations for EHRs, computer and network system vulnerabilities and best practices for identification and mitigation of those vulnerabilities, information access and protection measures, and user security training.
Objectives:
- Identify regulatory requirements for EHRs
- Provide training for system users regarding the methods and importance of security compliance
- Identify administrative, physical, and technical safeguards for system security and regulatory compliance
- Identify best practices for system security
- Identify best practices for risk / contingency management
Component 8; Unit 6; Lecture 6a comp8_unit6a_lecture_slides
Regulatory Requirements (22:38): 1) Regulation regarding security and privacy of health information, a. HIPAA Privacy Rule, b. HIPAA Security Rule
Component 8; Unit 6; Lecture 6b comp8_unit6b_lecture_slides
Technical Safeguards and Contingency Plans (29:46): 1) Safeguards, a. Administrative, b. Physical, c. Technical; 2) System Security Best Practices, a. Vulnerabilities, b. Baselines, c. Contingency, Backup, and Disaster Recovery, d. Data policies, e. Inventories, f. Logs