Mha 690 week one discussion 2 jing presentation hipaa and confidentiality training

352 views

Published on

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
352
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Mha 690 week one discussion 2 jing presentation hipaa and confidentiality training

  1. 1. HIPAA AND CONFIDENTIALITY TRAINING Sunder Sattlefield MHA 690 Healthcare Capstone Dr. Martha Jennings December 19, 2013
  2. 2. HIPAA AND CONFIDENTIALITY TRAINING • Statement of the problem: Health information systems (HIS) security implementation require an in depth consideration of all stakeholder to become effective and safe.
  3. 3. HIPAA AND CONFIDENTIALITY TRAINING (CONT.) • Authorization in Cross-Border eHealth Systems Information Systems Frontiers is a research performed by He, et., al., (2012). They researched in an e-Health system that crosses different administrative domains, individual organizations usually define their authorization control policies independently.
  4. 4. HIPAA AND CONFIDENTIALITY TRAINING (CONT.) • managing effective processes and systems for patients’ privacy, confidentiality, • and the security of health information maintained in paper or computerized systems.
  5. 5. HIPAA AND CONFIDENTIALITY TRAINING (CONT.)
  6. 6. HIPAA AND CONFIDENTIALITY TRAINING (CONT.) • Constructing useful electronic health record systems will demand the expertise of doctors and other clinicians, information management and technology professionals, administrative personnel, and patients.
  7. 7. HIPAA AND CONFIDENTIALITY TRAINING (CONT.) • The responsibilities for privacy and security can be appointed to a member of the doctor’s office staff or can be contracted to another electronic healthcare vendor. The HIPAA Security Rule regulates healthcare organizations to perform audit trails, in which the organization must record their information systems activity and have the hardware, software, and methods to document and review activity in systems that have protected health information.
  8. 8. REFERENCE He, D. D., Yang, J., Compton, M., & Taylor, K. (2012). Authorization in Cross-Border eHealth Systems. Information Systems Frontiers, 14(1), 43-55. http://10.1007/s10796-011-9316

×