What is all the electronic and non-electronic phi

Assignment Help Computer Engineering
Reference no: EM133634916

Homework

Read the following information about a typical dental practice:

1. Community Dental has two offices in the same city - the North office and the South office. These offices offer the same dental services to patients. Patients can make appointments to either office at their convenience to see the dentist of their choice. Both offices are similarly equipped.

2. The professional staff includes the dentists, hygienists, dental mechanics, and administrative staff (receptionist, billing clerk, and office manager).

3. Each Community Dental office has a waiting area served by a receptionist who uses a computer to check in patients, schedule one of the examination rooms, and answer the phone. The waiting room has a door opening to the outside. A second door admits patients into the rest of the facility. Background music plays inside the waiting area. There is also a large aquarium on display.

4. Each examination area is partitioned off from the adjacent ones. Each has a computer and LCD screen used to pull up patient information and record new dental data such as x-ray interpretations, examination and test results, and procedures done for the patient. A low-level sound masking system is installed in this area.

5. After their treatment, the patient visits the billing clerk's desk, which of course has a computer and a printer. Here patients pay (cash co-pay, credit card, or check), insurance information is verified, and an appointment is made. This clerk also mails out postcard appointment reminders and answers the phone.

6. The Community Dental dentists share a private office that has a computer and a printer. Here they can review patient data, access the Internet, and exchange email with their patients, colleagues, and acquaintances.

7. A database server containing patient data sits in a closet, next to a small tape library used for backup. Next to it sits a VPN server, firewall/router, and cable modem connected to the Internet. The VPN server accepts incoming connections from the dentist's home computers. It also provides a permanent VPN connection between the North and South Offices. In this way, all patient data is available at all times at either office.

8. Most patient data is stored electronically on the database server, but some data such as x-rays and third-party labs results are still filed in physical form. Community Dental also depends on third party service providers to build crowns, braces, false teeth, soft dental protectors, and such. Information is exchanged with service providers using telephone, fax, letter, and email.

9. The network infrastructure's management and maintenance are outsourced.

10. Community Dental also maintains an informative website to advertise its practice. The site is remotely hosted.

Answer the following questions incorporated into an format. Make any sensible assumptions necessary in order to continue your analysis (stating them as needed for clarity). You are welcome to use the discussion board to share your assumptions with others in the class:

Question I. What is all the electronic and non-electronic private health information (ePHI) that is stored, processed, and transmitted at Community Dental's two offices?

Question II. Assess the practice's organization. Where are organizational processes most likely to be HIPAA compliant? What changes should be made to move the practice closer to compliance in its business operations?

Question III. Assess the practice's physical and technical safeguards. Where are they most likely HIPAA compliant? What changes should be made to move the practice closer to compliance?

Question IV. Community Dental exchanges data with external service providers and uses a third party to manage its IT infrastructure. What administrative and organizational safeguards should the practice expect these providers to adhere to?

Reference no: EM133634916

Questions Cloud

Describe tls-ssl vpn handshake followed by ipsec handshake : Describe the TLS/SSL VPN handshake followed by the IPSEC handshake. Compare the two protocols and explain, according to you which one is better.
Which is likely to be a more effective leverage point : PBHL20002 Systems Thinking in Public Health, Central Queensland University - Which is likely to be a more effective leverage point: the discovery
Review the information on defense mechanisms : That being the case, I want you to review the information on defense mechanisms that we covered at the beginning of the semester.
How do you recommend companies to respond in the future : What would you have done differently in this situation? Considering that this is a common scenario, how do you recommend companies to respond in the future?
What is all the electronic and non-electronic phi : What is all the electronic and non-electronic private health information (ePHI) that is stored, processed, and transmitted at Community Dental's two offices?
Create a use case diagram to show the system requirements : Create a use case diagram to show the system requirements, including all main features and workflow for the mobile app.
Present a comprehensive and well-structured action plan : Present a comprehensive and well-structured action plan for implementing the identified risk reduction strategies. Clearly outlines the steps
Develops a comprehensive and well-structured monitoring plan : Develops a comprehensive and well-structured monitoring plan to assess the effectiveness of the implemented strategies. Clearly outlines the indicators
Why does organized sport in a country like the usa lobby : Why does organized sport in a country like the USA lobby for a continuation of the prohibition of sports betting?

Reviews

Write a Review

Computer Engineering Questions & Answers

  What machine code would accomplish the operation shown

Explain exactly how the machine code in your answer accomplishes the operation above and returning the result. Why is this approach preferred to simply

  Show why cfb mode creates a nonsynchronous stream cipher

Show why CFB mode creates a nonsynchronous stream cipher, but 0113 mode creates a synchronous one.

  List and define the four most commonly used attributes

List and define the four most commonly used attributes for scalar types. List and define an additional four attributes commonly used with discrete types.

  Manage and secure windows infrastructure to satisfy bluesky

to improve efficiency in its current infrastructure blue sky systems decided to upgrade their current infrastructure of

  What are the types of new ethernet equipment

An older network using 10baseT technology needs an upgrade. The network contains a total of 220 workstations and 10 servers and has a network diameter of 300 meters. What type of new Ethernet equipment would you suggest be purchase to modernize th..

  What is the critical path for the project

Construct a network schedule (Gantt chart) in Microsoft® Project 2013 for the stadium project, using the information provided in the case.

  What url do you need to create a link to page

What URL do you need to create a link to page1? (assuming both files page2.html and page1.html are on the same directory) of stion Answer

  Determine the pros and cons of multilevel planning

From the case study, suggest at least three strategies (not discussed in the case study) to successfully conduct multilevel planning. Explain each strategy.

  What is the direction of reflection

Suppose you have a ray of light that hits a flat surface such as a mirror and is reflected. What is the direction of reflection?

  What was the underlying concern that drove nicholas

IST 609 California State University, What was the underlying concern that drove Nicholas Carr to this theory? Do you see any evidence of this in your work

  Developing a strong scm process to match is system

Developing a strong SCM process to match IS system upgrades would provide what advantage(s)? What would such a process look like? Watch the "Strategic Global Vision" video. What role does technology have in social responsibility

  Calculates the elements of the matrix for transforming world

Calculates the elements of the matrix for transforming world coordinates to viewing coordinates, given viewing coordinate origin P0 and the view up vector V.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd