Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Step One: Complete the following table which outlines confidentiality and securi

ID: 359422 • Letter: S

Question

Step One: Complete the following table which outlines confidentiality and security activities, in relation to EHR security measures. Identify activities or items that can be performed in each stage of EHR development to ensure the confidentie and security of health information. A couple of entries have been made for you as examples. Security Activity/Item EHR DevelopmentConfidentiality Stage Activity/Item Review federal and state laws to determine with whom information may be shared Planning Design Selection Implementation Assign each user an unique username and password Integration Testing Evaluation Support

Explanation / Answer

EHR Development stage

Confidentiality activity/item

Security activity/item

Planning

Review federal and state laws to determine with whom information may be shared.

Pass laws that will help to greatly limit the access of such information by unauthorized persons.

Design

Develop a design that is rare and use the services of experts. The design should be accessed only by authorized personnel.

Unique design will make it hard to know the plan and the layout of development making it hard to access by unauthorized persons.

Selection

The EHR selected should give ability to action a broader spectrum of patient information.

Regular update of patient information by authorized personnel only helps to keep medical officers well informed.

Implementation

Engage the services of a few carefully and well trained personnel.

Assign each user unique username and password for the effective management of resources they are in charge.

Integration

The EHR should be developed in such a way that it can be easily be used by another organization to access patient records.

Process of integrating the system should be designated to an individual who only know the process thus preventing sharing of information unnecessarily.

Testing

Try accessing EHR website by unauthorized parties through a series of password saving process of saved passwords after every login.

Identify any weak points and reinforce them to prevent break-ins.

Evaluation

The EHR developed should be monitored and its effectiveness in carrying out designated roles documented.

Enhance the weak points to make them strong enough to prevent break ins as well as develop a plan for the admin to access it remotely.

Support

The introduction of a support panel that assists the users to easily notify the admin of any threats of intrusion by unauthorized parties.

Giving of direct contact with the admin and setting an automatic shut down when admin is not online.

EHR Development stage

Confidentiality activity/item

Security activity/item

Planning

Review federal and state laws to determine with whom information may be shared.

Pass laws that will help to greatly limit the access of such information by unauthorized persons.

Design

Develop a design that is rare and use the services of experts. The design should be accessed only by authorized personnel.

Unique design will make it hard to know the plan and the layout of development making it hard to access by unauthorized persons.

Selection

The EHR selected should give ability to action a broader spectrum of patient information.

Regular update of patient information by authorized personnel only helps to keep medical officers well informed.

Implementation

Engage the services of a few carefully and well trained personnel.

Assign each user unique username and password for the effective management of resources they are in charge.

Integration

The EHR should be developed in such a way that it can be easily be used by another organization to access patient records.

Process of integrating the system should be designated to an individual who only know the process thus preventing sharing of information unnecessarily.

Testing

Try accessing EHR website by unauthorized parties through a series of password saving process of saved passwords after every login.

Identify any weak points and reinforce them to prevent break-ins.

Evaluation

The EHR developed should be monitored and its effectiveness in carrying out designated roles documented.

Enhance the weak points to make them strong enough to prevent break ins as well as develop a plan for the admin to access it remotely.

Support

The introduction of a support panel that assists the users to easily notify the admin of any threats of intrusion by unauthorized parties.

Giving of direct contact with the admin and setting an automatic shut down when admin is not online.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote