Reference no: EM133482444
Homework: Security of Healthcare Information Systems
Topic: Security of Healthcare Information Systems
Course Objectives for Homework:
1. Assess the potential of Information Technology in process and performance improvement.
2. Examine Information Technology Implementation by analyzing a case on using integrated systems that collect, track, and share information across local- and wide-area network tools to clinical and administrative audiences.
Scenario: Continuing to apply your role as a summer intern for the not-for-profit organization, you internship mentor has shared that they are very happy with your input. However, additional research needs to be conducted. Create a report that includes the following items:
I. Review the IoM's 1999 and 2001 reports under Module 7 Resources.
Question 1. Compare and contrast the recommendations in these reports.
Question 2. Evaluate the outcomes of their implementation and assess their impact on healthcare quality improvement (familiarize yourself with Quality Improvement points).
Question 3. Ascertain the consequences of not using HIT and frame your recommendations for improvement of healthcare quality using HIT?
II. HIPAA (1996) and HITECH (2009) Acts contain provisions for the protection of health information both by Covered Entities (CEs) and Business Associates (BAs).
Question 1. Compare Security Rule provisions for CEs and BAs in both Acts?
Question 2. Identify the organization responsible for monitoring its compliance by providers and explain its mode of operation. Ascertain the value of the Security Rule provisions for electronic health records.
Question 3. Finally, assess implications for noncompliance of the Security Rule provisions by healthcare organizations?
III. Develop an example case that can be used in the presentations where a Chief Information Security Officer (CISO) at a local healthcare facility has not adopted any Password use policy yet.
Question 1. Delineate the role of CISO in the implementation of the password use policy.
Question 2. Offer approaches to developing a Password use policy for this organization.
Tips: Identify and discuss at least three essential components of the password use policy that must be followed to securely log into the facility's healthcare information systems.
Explain which of these components is most critical and why. Ascertain implications for the organization if the policy is not followed strictly.