Your SlideShare is downloading. ×
Five Steps For Protecting Patient Data Cm101248
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Five Steps For Protecting Patient Data Cm101248

102

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
102
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. 5 Steps for Protecting Patient DataInvesting in an Electronic Health Record (EHR) solution 4. Create Physical Safeguardsdelivers significant benefits but also increases potential  Develop policies and procedures to protectdata protection risks. To maximize the financial and inventory and control access to desktops, serversproductivity benefits of an EHR solution while protecting and information systems.your organization’s valuable data, follow these five essential  Develop process for handling lost or stolensteps for building a solid EHR security plan. laptops and handheld devices.  Determine system backup and data recovery1. Conduct a Risk Analysis procedures.  Review current Protected Health Information  Natural: flood, earthquake, tornado, etc. (PHI) safeguards.  Environmental: chemical spills, HVAC problems,  Use HITECH’s Meaningful Use Reporting Grid. power outages, etc.  Evaluate firewalls and virus protection.  Unauthorized intrusions: hackers, burglary, etc.  Review security measures for secure  Establish contingency plans. e-communications.  Review your responsibilities as a Covered Entity 5. Determine Online Backup Measures under HIPAA’s Security Rule.  Create and document emergency access procedures.  Consider 24/7 web support.2. Establish Administrative Safeguards  Consider using server mirroring or cloning software.  Assign an internal security leader.  Establish data security policies and procedures Excerpted from the white paper “Electronic Health Records: for staff. Protecting Your Assets With a Solid Security Plan,” by  Develop a plan to ensure updates of potential Carolyn P. Hartley, MLA. As the lead or co-author of 13 web threats. textbooks on privacy, security and EHR implementation, she draws on nearly 30 years of experience in healthcare3. Build Technical Safeguards and over a decade in health information technology.  Determine role-based access and implement audit trails.  Audit applications. Download the full white paper now.  Test and review network vulnerability. ©2011 CenturyLink, Inc. All Rights Reserved. Not to be distributed or reproduced by anyone other than CenturyLink entities and CenturyLink Channel Alliance members. CM101248 07/11

×