What is all the electronic and non-electronic phi

Assignment Help Computer Engineering
Reference no: EM133634916

Homework

Read the following information about a typical dental practice:

1. Community Dental has two offices in the same city - the North office and the South office. These offices offer the same dental services to patients. Patients can make appointments to either office at their convenience to see the dentist of their choice. Both offices are similarly equipped.

2. The professional staff includes the dentists, hygienists, dental mechanics, and administrative staff (receptionist, billing clerk, and office manager).

3. Each Community Dental office has a waiting area served by a receptionist who uses a computer to check in patients, schedule one of the examination rooms, and answer the phone. The waiting room has a door opening to the outside. A second door admits patients into the rest of the facility. Background music plays inside the waiting area. There is also a large aquarium on display.

4. Each examination area is partitioned off from the adjacent ones. Each has a computer and LCD screen used to pull up patient information and record new dental data such as x-ray interpretations, examination and test results, and procedures done for the patient. A low-level sound masking system is installed in this area.

5. After their treatment, the patient visits the billing clerk's desk, which of course has a computer and a printer. Here patients pay (cash co-pay, credit card, or check), insurance information is verified, and an appointment is made. This clerk also mails out postcard appointment reminders and answers the phone.

6. The Community Dental dentists share a private office that has a computer and a printer. Here they can review patient data, access the Internet, and exchange email with their patients, colleagues, and acquaintances.

7. A database server containing patient data sits in a closet, next to a small tape library used for backup. Next to it sits a VPN server, firewall/router, and cable modem connected to the Internet. The VPN server accepts incoming connections from the dentist's home computers. It also provides a permanent VPN connection between the North and South Offices. In this way, all patient data is available at all times at either office.

8. Most patient data is stored electronically on the database server, but some data such as x-rays and third-party labs results are still filed in physical form. Community Dental also depends on third party service providers to build crowns, braces, false teeth, soft dental protectors, and such. Information is exchanged with service providers using telephone, fax, letter, and email.

9. The network infrastructure's management and maintenance are outsourced.

10. Community Dental also maintains an informative website to advertise its practice. The site is remotely hosted.

Answer the following questions incorporated into an format. Make any sensible assumptions necessary in order to continue your analysis (stating them as needed for clarity). You are welcome to use the discussion board to share your assumptions with others in the class:

Question I. What is all the electronic and non-electronic private health information (ePHI) that is stored, processed, and transmitted at Community Dental's two offices?

Question II. Assess the practice's organization. Where are organizational processes most likely to be HIPAA compliant? What changes should be made to move the practice closer to compliance in its business operations?

Question III. Assess the practice's physical and technical safeguards. Where are they most likely HIPAA compliant? What changes should be made to move the practice closer to compliance?

Question IV. Community Dental exchanges data with external service providers and uses a third party to manage its IT infrastructure. What administrative and organizational safeguards should the practice expect these providers to adhere to?

Reference no: EM133634916

Questions Cloud

Describe tls-ssl vpn handshake followed by ipsec handshake : Describe the TLS/SSL VPN handshake followed by the IPSEC handshake. Compare the two protocols and explain, according to you which one is better.
Which is likely to be a more effective leverage point : PBHL20002 Systems Thinking in Public Health, Central Queensland University - Which is likely to be a more effective leverage point: the discovery
Review the information on defense mechanisms : That being the case, I want you to review the information on defense mechanisms that we covered at the beginning of the semester.
How do you recommend companies to respond in the future : What would you have done differently in this situation? Considering that this is a common scenario, how do you recommend companies to respond in the future?
What is all the electronic and non-electronic phi : What is all the electronic and non-electronic private health information (ePHI) that is stored, processed, and transmitted at Community Dental's two offices?
Create a use case diagram to show the system requirements : Create a use case diagram to show the system requirements, including all main features and workflow for the mobile app.
Present a comprehensive and well-structured action plan : Present a comprehensive and well-structured action plan for implementing the identified risk reduction strategies. Clearly outlines the steps
Develops a comprehensive and well-structured monitoring plan : Develops a comprehensive and well-structured monitoring plan to assess the effectiveness of the implemented strategies. Clearly outlines the indicators
Why does organized sport in a country like the usa lobby : Why does organized sport in a country like the USA lobby for a continuation of the prohibition of sports betting?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd