Step One: Complete the following table which outlines confidentiality and securi
ID: 359422 • Letter: S
Question
Step One: Complete the following table which outlines confidentiality and security activities, in relation to EHR security measures. Identify activities or items that can be performed in each stage of EHR development to ensure the confidentie and security of health information. A couple of entries have been made for you as examples. Security Activity/Item EHR DevelopmentConfidentiality Stage Activity/Item Review federal and state laws to determine with whom information may be shared Planning Design Selection Implementation Assign each user an unique username and password Integration Testing Evaluation SupportExplanation / Answer
EHR Development stage
Confidentiality activity/item
Security activity/item
Planning
Review federal and state laws to determine with whom information may be shared.
Pass laws that will help to greatly limit the access of such information by unauthorized persons.
Design
Develop a design that is rare and use the services of experts. The design should be accessed only by authorized personnel.
Unique design will make it hard to know the plan and the layout of development making it hard to access by unauthorized persons.
Selection
The EHR selected should give ability to action a broader spectrum of patient information.
Regular update of patient information by authorized personnel only helps to keep medical officers well informed.
Implementation
Engage the services of a few carefully and well trained personnel.
Assign each user unique username and password for the effective management of resources they are in charge.
Integration
The EHR should be developed in such a way that it can be easily be used by another organization to access patient records.
Process of integrating the system should be designated to an individual who only know the process thus preventing sharing of information unnecessarily.
Testing
Try accessing EHR website by unauthorized parties through a series of password saving process of saved passwords after every login.
Identify any weak points and reinforce them to prevent break-ins.
Evaluation
The EHR developed should be monitored and its effectiveness in carrying out designated roles documented.
Enhance the weak points to make them strong enough to prevent break ins as well as develop a plan for the admin to access it remotely.
Support
The introduction of a support panel that assists the users to easily notify the admin of any threats of intrusion by unauthorized parties.
Giving of direct contact with the admin and setting an automatic shut down when admin is not online.
EHR Development stage
Confidentiality activity/item
Security activity/item
Planning
Review federal and state laws to determine with whom information may be shared.
Pass laws that will help to greatly limit the access of such information by unauthorized persons.
Design
Develop a design that is rare and use the services of experts. The design should be accessed only by authorized personnel.
Unique design will make it hard to know the plan and the layout of development making it hard to access by unauthorized persons.
Selection
The EHR selected should give ability to action a broader spectrum of patient information.
Regular update of patient information by authorized personnel only helps to keep medical officers well informed.
Implementation
Engage the services of a few carefully and well trained personnel.
Assign each user unique username and password for the effective management of resources they are in charge.
Integration
The EHR should be developed in such a way that it can be easily be used by another organization to access patient records.
Process of integrating the system should be designated to an individual who only know the process thus preventing sharing of information unnecessarily.
Testing
Try accessing EHR website by unauthorized parties through a series of password saving process of saved passwords after every login.
Identify any weak points and reinforce them to prevent break-ins.
Evaluation
The EHR developed should be monitored and its effectiveness in carrying out designated roles documented.
Enhance the weak points to make them strong enough to prevent break ins as well as develop a plan for the admin to access it remotely.
Support
The introduction of a support panel that assists the users to easily notify the admin of any threats of intrusion by unauthorized parties.
Giving of direct contact with the admin and setting an automatic shut down when admin is not online.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.