Five Steps For Protecting Patient Data Cm101248

208 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
208
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Five Steps For Protecting Patient Data Cm101248

  1. 1. 5 Steps for Protecting Patient DataInvesting in an Electronic Health Record (EHR) solution 4. Create Physical Safeguardsdelivers significant benefits but also increases potential  Develop policies and procedures to protectdata protection risks. To maximize the financial and inventory and control access to desktops, serversproductivity benefits of an EHR solution while protecting and information systems.your organization’s valuable data, follow these five essential  Develop process for handling lost or stolensteps for building a solid EHR security plan. laptops and handheld devices.  Determine system backup and data recovery1. Conduct a Risk Analysis procedures.  Review current Protected Health Information  Natural: flood, earthquake, tornado, etc. (PHI) safeguards.  Environmental: chemical spills, HVAC problems,  Use HITECH’s Meaningful Use Reporting Grid. power outages, etc.  Evaluate firewalls and virus protection.  Unauthorized intrusions: hackers, burglary, etc.  Review security measures for secure  Establish contingency plans. e-communications.  Review your responsibilities as a Covered Entity 5. Determine Online Backup Measures under HIPAA’s Security Rule.  Create and document emergency access procedures.  Consider 24/7 web support.2. Establish Administrative Safeguards  Consider using server mirroring or cloning software.  Assign an internal security leader.  Establish data security policies and procedures Excerpted from the white paper “Electronic Health Records: for staff. Protecting Your Assets With a Solid Security Plan,” by  Develop a plan to ensure updates of potential Carolyn P. Hartley, MLA. As the lead or co-author of 13 web threats. textbooks on privacy, security and EHR implementation, she draws on nearly 30 years of experience in healthcare3. Build Technical Safeguards and over a decade in health information technology.  Determine role-based access and implement audit trails.  Audit applications. Download the full white paper now.  Test and review network vulnerability. ©2011 CenturyLink, Inc. All Rights Reserved. Not to be distributed or reproduced by anyone other than CenturyLink entities and CenturyLink Channel Alliance members. CM101248 07/11

×