SlideShare a Scribd company logo
1 of 40
We ask that all questions be held until the end of the Presentation! Thank You 
DaedalusTechnicalSolutions Steve Norton Technical Writer -Training Specialist  Bradley Manus Network  Specialist Jennifer Fitzgerald Project Manager Your Missing Link in Solving Your Networking Problems
Who We Are
Our Goals ,[object Object]
  Insure Seamless Access to Patient Medical Records.
  Make Security to Meet or Exceed HIPAA Standards.
  Design a Backup Plan for Disaster Recovery.,[object Object]
HIPAA-Compliant  Can you go buy a HIPAA-compliant software package and be done with it?  Not really, It's you, as an organization, that's HIPAA compliant, and no software application is going to magically make you that way. HIPAA defines a large set of policies and procedures, many of which have nothing to do with technology.
Tracking Who Did What
User Roles
Smart Cards
Front-End Software HIPAA transaction sets version 5010 are coming and HIPAAsuite is ready for it.
Benefits of HIPAAsuite
Security and Encryption
Sophos Security Software
Testing Plan
D.T.SOnsite Training Center
Building Layout – Central Office 66’ft. 92’ft.
Network Cabling
Security of Building
Virtual Network
Disaster Recovery Plan
Projected Timeline
Network Configuration
Cisco Secure PIX Firewall 535
Cisco 2921 Integrated Router
VoIP Phones
HP TouchSmart 9300 Elite Option A-
Thin Client Computers Option B-
Toughbook C1 Dual Touch
HP Digital Sender
Microsoft Office 2010
Windows 7 Professional
Transfer of Old Data
Scanning Documents
Recycling Old Equipment
Price List
Price List
Price List
Total Cost Option A - $    648,995.20 Option B - $    595,562.20

More Related Content

What's hot

Applied data analytics_v1_6.23
Applied data analytics_v1_6.23Applied data analytics_v1_6.23
Applied data analytics_v1_6.23John C. Havens
 
Puppet Channel Sales Training Webinar: Puppet Sales Messaging
Puppet Channel Sales Training Webinar: Puppet Sales MessagingPuppet Channel Sales Training Webinar: Puppet Sales Messaging
Puppet Channel Sales Training Webinar: Puppet Sales MessagingPuppet
 
CIS Security Benchmark
CIS Security BenchmarkCIS Security Benchmark
CIS Security BenchmarkRahul Khengare
 
To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015Paul Hogan
 
Disaster Preparedness Planning
Disaster Preparedness PlanningDisaster Preparedness Planning
Disaster Preparedness Planningpds2k.com
 
ONI Assure Insight Brochure fv
ONI Assure Insight Brochure fvONI Assure Insight Brochure fv
ONI Assure Insight Brochure fvCarl Pollard
 
Security Consulting Services
Security Consulting ServicesSecurity Consulting Services
Security Consulting ServicesePlus
 
Heureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Webinar – Security, the Growth Engine for eDiscovery ProfessionalsHeureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Webinar – Security, the Growth Engine for eDiscovery ProfessionalsHeureka Software
 
Achieving and Measuring Success with the Security Awareness Maturity Model
Achieving and Measuring Success with  the Security Awareness Maturity ModelAchieving and Measuring Success with  the Security Awareness Maturity Model
Achieving and Measuring Success with the Security Awareness Maturity ModelPriyanka Aash
 
Security Risks: The Threat is Real
Security Risks: The Threat is RealSecurity Risks: The Threat is Real
Security Risks: The Threat is RealePlus
 
Myth-busting in Application Security
Myth-busting in Application SecurityMyth-busting in Application Security
Myth-busting in Application SecurityDevOps.com
 
How sophisticated penetration testers get through the defenses
How sophisticated penetration testers get through the defensesHow sophisticated penetration testers get through the defenses
How sophisticated penetration testers get through the defensesPhilippe A. R. Schaeffer
 
Network nags - when security fails
Network nags  - when security failsNetwork nags  - when security fails
Network nags - when security failsRishabh Dangwal
 
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...centralohioissa
 
Hybrid Security Analysis: Bridging the Gap between Inside-Out and Outside-In
Hybrid Security Analysis: Bridging the Gap between Inside-Out and Outside-InHybrid Security Analysis: Bridging the Gap between Inside-Out and Outside-In
Hybrid Security Analysis: Bridging the Gap between Inside-Out and Outside-InTechWell
 
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk
 

What's hot (20)

Applied data analytics_v1_6.23
Applied data analytics_v1_6.23Applied data analytics_v1_6.23
Applied data analytics_v1_6.23
 
Puppet Channel Sales Training Webinar: Puppet Sales Messaging
Puppet Channel Sales Training Webinar: Puppet Sales MessagingPuppet Channel Sales Training Webinar: Puppet Sales Messaging
Puppet Channel Sales Training Webinar: Puppet Sales Messaging
 
CIS Security Benchmark
CIS Security BenchmarkCIS Security Benchmark
CIS Security Benchmark
 
To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015
 
Disaster Preparedness Planning
Disaster Preparedness PlanningDisaster Preparedness Planning
Disaster Preparedness Planning
 
Tesseract Service Portfolio
Tesseract Service PortfolioTesseract Service Portfolio
Tesseract Service Portfolio
 
ONI Assure Insight Brochure fv
ONI Assure Insight Brochure fvONI Assure Insight Brochure fv
ONI Assure Insight Brochure fv
 
Security Consulting Services
Security Consulting ServicesSecurity Consulting Services
Security Consulting Services
 
Heureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Webinar – Security, the Growth Engine for eDiscovery ProfessionalsHeureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Webinar – Security, the Growth Engine for eDiscovery Professionals
 
Achieving and Measuring Success with the Security Awareness Maturity Model
Achieving and Measuring Success with  the Security Awareness Maturity ModelAchieving and Measuring Success with  the Security Awareness Maturity Model
Achieving and Measuring Success with the Security Awareness Maturity Model
 
Security Risks: The Threat is Real
Security Risks: The Threat is RealSecurity Risks: The Threat is Real
Security Risks: The Threat is Real
 
Myth-busting in Application Security
Myth-busting in Application SecurityMyth-busting in Application Security
Myth-busting in Application Security
 
How sophisticated penetration testers get through the defenses
How sophisticated penetration testers get through the defensesHow sophisticated penetration testers get through the defenses
How sophisticated penetration testers get through the defenses
 
Network nags - when security fails
Network nags  - when security failsNetwork nags  - when security fails
Network nags - when security fails
 
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
 
Resume
ResumeResume
Resume
 
Portfolio security, analytics and forensic blue coat
Portfolio security, analytics and forensic blue coatPortfolio security, analytics and forensic blue coat
Portfolio security, analytics and forensic blue coat
 
Hybrid Security Analysis: Bridging the Gap between Inside-Out and Outside-In
Hybrid Security Analysis: Bridging the Gap between Inside-Out and Outside-InHybrid Security Analysis: Bridging the Gap between Inside-Out and Outside-In
Hybrid Security Analysis: Bridging the Gap between Inside-Out and Outside-In
 
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
 
DeJesusSres274
DeJesusSres274DeJesusSres274
DeJesusSres274
 

Viewers also liked

Cross platform mobile apps
Cross platform mobile appsCross platform mobile apps
Cross platform mobile appsZee Spencer
 
NSA Capstone Presentation
NSA Capstone PresentationNSA Capstone Presentation
NSA Capstone PresentationMinh Vu
 
Capstone Project Pt 11
Capstone Project Pt 11Capstone Project Pt 11
Capstone Project Pt 11Clarence Ennis
 
ITT CNS Capstone Project
ITT CNS Capstone ProjectITT CNS Capstone Project
ITT CNS Capstone ProjectKyle Montoya
 
Data Base Management ! Batra Computer Centre
Data Base Management ! Batra Computer Centre Data Base Management ! Batra Computer Centre
Data Base Management ! Batra Computer Centre jatin batra
 
Completed+Presentation+Capstone
Completed+Presentation+CapstoneCompleted+Presentation+Capstone
Completed+Presentation+Capstonecarl1968
 
IT 415 - Capstone Project Orientation
IT 415 - Capstone Project OrientationIT 415 - Capstone Project Orientation
IT 415 - Capstone Project OrientationSheryl Satorre
 
Capstone Project Presentation
Capstone Project PresentationCapstone Project Presentation
Capstone Project Presentationlafraz383
 
eBusiness Website Database Design
eBusiness Website Database DesigneBusiness Website Database Design
eBusiness Website Database DesignMeng (Meg) Wang
 
NT2799 FINAL CAPSTONE PROJECT.DOCX
NT2799 FINAL CAPSTONE PROJECT.DOCXNT2799 FINAL CAPSTONE PROJECT.DOCX
NT2799 FINAL CAPSTONE PROJECT.DOCXFred Abram III
 

Viewers also liked (12)

Cross platform mobile apps
Cross platform mobile appsCross platform mobile apps
Cross platform mobile apps
 
NSA Capstone Presentation
NSA Capstone PresentationNSA Capstone Presentation
NSA Capstone Presentation
 
Capstone Final Part
Capstone Final PartCapstone Final Part
Capstone Final Part
 
Capstone Project Pt 11
Capstone Project Pt 11Capstone Project Pt 11
Capstone Project Pt 11
 
ITT CNS Capstone Project
ITT CNS Capstone ProjectITT CNS Capstone Project
ITT CNS Capstone Project
 
Data Base Management ! Batra Computer Centre
Data Base Management ! Batra Computer Centre Data Base Management ! Batra Computer Centre
Data Base Management ! Batra Computer Centre
 
Completed+Presentation+Capstone
Completed+Presentation+CapstoneCompleted+Presentation+Capstone
Completed+Presentation+Capstone
 
IT 415 - Capstone Project Orientation
IT 415 - Capstone Project OrientationIT 415 - Capstone Project Orientation
IT 415 - Capstone Project Orientation
 
IMC 636 Capstone
IMC 636 CapstoneIMC 636 Capstone
IMC 636 Capstone
 
Capstone Project Presentation
Capstone Project PresentationCapstone Project Presentation
Capstone Project Presentation
 
eBusiness Website Database Design
eBusiness Website Database DesigneBusiness Website Database Design
eBusiness Website Database Design
 
NT2799 FINAL CAPSTONE PROJECT.DOCX
NT2799 FINAL CAPSTONE PROJECT.DOCXNT2799 FINAL CAPSTONE PROJECT.DOCX
NT2799 FINAL CAPSTONE PROJECT.DOCX
 

Similar to ITT-Tech Capstone Final for CNS

HIPAA Safeguard Slides
HIPAA Safeguard SlidesHIPAA Safeguard Slides
HIPAA Safeguard Slidesprojectwinner
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016SteveAtHPE
 
Nine HIPAA Compliance Questions to ask Yourself
Nine HIPAA Compliance Questions to ask YourselfNine HIPAA Compliance Questions to ask Yourself
Nine HIPAA Compliance Questions to ask YourselfLERNER Consulting
 
Karim Maalouf I.T services 2013
Karim Maalouf I.T services 2013Karim Maalouf I.T services 2013
Karim Maalouf I.T services 2013Karim Maalouf
 
Compliance is a Team Project
Compliance is a Team ProjectCompliance is a Team Project
Compliance is a Team ProjectThe TNS Group
 
7 reasons to outsource your IT
7 reasons to outsource your IT7 reasons to outsource your IT
7 reasons to outsource your ITJon Davis
 
Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...
Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...
Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...Dana Gardner
 
Clearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat ProtectionClearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat ProtectionCIO Look Magazine
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security MagazineQuentin Brown
 
A Comprehensive Guide to Managed Services
A Comprehensive Guide to Managed ServicesA Comprehensive Guide to Managed Services
A Comprehensive Guide to Managed Servicessangerarayal
 
Penntech Services Infodeck.ppsx
Penntech Services Infodeck.ppsxPenntech Services Infodeck.ppsx
Penntech Services Infodeck.ppsxElaineLadyman1
 
IT Development Solutions in Delhi.pdf
IT Development Solutions in Delhi.pdfIT Development Solutions in Delhi.pdf
IT Development Solutions in Delhi.pdfgenz9
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueRapidValue
 

Similar to ITT-Tech Capstone Final for CNS (20)

Vision Groups
Vision GroupsVision Groups
Vision Groups
 
Software Myths
Software MythsSoftware Myths
Software Myths
 
Presentation1HTGUK
Presentation1HTGUKPresentation1HTGUK
Presentation1HTGUK
 
Example_Whitepaper
Example_WhitepaperExample_Whitepaper
Example_Whitepaper
 
IT SERVICES
IT SERVICESIT SERVICES
IT SERVICES
 
ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
 
HIPAA Safeguard Slides
HIPAA Safeguard SlidesHIPAA Safeguard Slides
HIPAA Safeguard Slides
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016
 
Nine HIPAA Compliance Questions to ask Yourself
Nine HIPAA Compliance Questions to ask YourselfNine HIPAA Compliance Questions to ask Yourself
Nine HIPAA Compliance Questions to ask Yourself
 
Karim Maalouf I.T services 2013
Karim Maalouf I.T services 2013Karim Maalouf I.T services 2013
Karim Maalouf I.T services 2013
 
Compliance is a Team Project
Compliance is a Team ProjectCompliance is a Team Project
Compliance is a Team Project
 
7 reasons to outsource your IT
7 reasons to outsource your IT7 reasons to outsource your IT
7 reasons to outsource your IT
 
Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...
Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...
Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...
 
Clearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat ProtectionClearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat Protection
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security Magazine
 
A Comprehensive Guide to Managed Services
A Comprehensive Guide to Managed ServicesA Comprehensive Guide to Managed Services
A Comprehensive Guide to Managed Services
 
HIPAA_CheatSheet
HIPAA_CheatSheetHIPAA_CheatSheet
HIPAA_CheatSheet
 
Penntech Services Infodeck.ppsx
Penntech Services Infodeck.ppsxPenntech Services Infodeck.ppsx
Penntech Services Infodeck.ppsx
 
IT Development Solutions in Delhi.pdf
IT Development Solutions in Delhi.pdfIT Development Solutions in Delhi.pdf
IT Development Solutions in Delhi.pdf
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValue
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

ITT-Tech Capstone Final for CNS

Editor's Notes

  1. DTS is a Small Company with BIG values. We treat everyone like your family. Our friendly staff will help you out 24/7/365 days a year. We handle all of your business needs.MISSION STATEMENTTo make technology an asset for your business without problems. We work around your business schedule. We strive to make technology integrate seamlessly with your business, so your business can grow. As your technology partner, when your business grows ours will grow with you, therefore, we will work hand in hand to support your growth.
  2. Health Insurance Portability and Accountability Act To ensure protection andprivacy of personal health records by protecting the security and confidentiality of health care information.
  3. Can you go buy a HIPAA-compliant software package and be done with it? Not really, It's you, as an organization, that's HIPAA compliant, and no software application is going to magically make you that way. HIPAA defines a large set of policies and procedures, many of which have nothing to do with technology.
  4. One of the clearest HIPAA requirements is that organizations keep an audit log of who did what in the software package. It's important that your package be able to track which person accessed which record on what date, and whether he or she viewed it, updated it, or deleted it.
  5. HIPAA specifies that each employee at any organization should only see the "minimum necessary" information to do his or her job. This a requirement for organizations to define what level of access each employee has to the organization's software, based on both the employee's role within the organization as well as on the outside clients he or she has permission to access.
  6. Smart cards can provide identification, authentication, data storage and application processing…Smart cards can improve the security and privacy of patient information, provide a secure carrier for portable medical records reduce health care fraud, support new processes for portable medical records, provide secure access to emergency medical information, enable compliance with government initiatives and mandates, and provide the platform to implement other applications as needed by the health care organization.
  7. Electronic Data Interchange (EDI) is computer-to-computer communication of business documents between companies. It is a paperless way to send and receive Purchase Orders, Invoices, Charge backs etc. EDI replaces human-readable documents with electronically coded documents. The sending computer creates the document and the receiving computer interprets the document. Implementation of EDI streamlines the process of exchanging standard business transactionsElectronic data interchange (EDI) is the structured transmission of data between organizations by electronic means--HIPAA electronic data interchange (EDI) front-end application for all HIPAA transaction sets. It is designed for organizations that receive and send EDI transactions in the healthcare industry.
  8. HIPAA also requires you to secure your data. For example, the application should be secured behind a firewall, and with solid password protection for user accounts… we will be talking about firewall later in the presentation.
  9. HIPPA Compliant SoftwareEncryption provide multi-layered security that includes full disk encryption, port control and data loss prevention. Content scanning warns employees when they try to move sensitive data to email, IM or storage devices. Application control stops employees from running software, like P2P software, that puts your data at risk.Device control prevents employees from copying data to unknown devices like USB keys or CDs.
  10. Certified Professional Trainers. Conveniently located in Las Vegas. We will work to accommodate your needs. One-on-one on-site software training.
  11. Time line - start 09/06 – 10/31 end
  12. The Cisco Secure PIX Firewall 535 delivers carrier-class performance that meets the needs of large enterprise networks as well as service providers. As part of the world-leading Cisco Secure PIX Firewall series, it provides today's networking customers with unmatched security, reliability, and performance. The PIX 535 integrates stateful firewall and IP Security (IPsec) virtual private network (VPN) functionality. The PIX 535 is a purpose-built firewall appliance that offers an unprecedented level of protection. This is tightly integrated with the PIX Operating System (OS), which is a proprietary, hardened system that eliminates security holes and performance degrading overhead. At the heart of this system is a protection scheme based on the Adaptive Security Algorithm (ASA), which offers stateful connection-oriented firewalling that is capable of 500, 000 concurrent connections while at the same time blocking common denial of service (Dos) attacks. The PIX 535 is also a full-featured VPN gateway that can securely transport data over public networks. It supports both site-to-site and remote access VPN applications via 56-bit Data Encryption Standard (DES) or 168-bit 3DES. The integrated VPN functionality of the PIX 535 can be supplemented with an optional VPN Accelerator Card (VAC) to deliver 100 Mbps throughput and 2, 000 IPsec tunnels.
  13. The Cisco 2921 Integrated Services Router (ISR) delivers highly secure data, voice, video, and application services for small offices. Key features include:3 Integrated 10/100/1000 Ethernet ports with 1 port capable of RJ-45 or SFP connectivity 1 service module slot 4 Enhanced High-Speed WAN Interface Card (EHWIC) slots 3 onboard digital signal processor slots 1 internal service module slot for application services Fully integrated power distribution to modules supporting 802.3af Power over Ethernet (PoE) and Cisco Enhanced PoESecurity Embedded hardware-accelerated VPN encryption Secure collaborative communications with Group Encrypted Transport VPN, Dynamic Multipoint VPN, or Enhanced Easy VPN Integrated threat control using Cisco IOS Firewall, Cisco IOS Zone-Based Firewall, Cisco IOS IPS, and Cisco IOS Content Filtering Identity management: Intelligently protecting endpoints using authentication, authorization, and accounting (AAA), and public key infrastructure Voice High-density packet voice DSP module, optimized for voice and video support Standards-certified VoiceXML browser services Cisco Unified Border Element capabilities Cisco Unity Express voicemail support Support for Cisco Communications Manager Express and Survivable Remote Site Telephony
  14. Designed to meet the communication needs of professional workers in enclosed office environmentAccess to multiple telephone lines (or a combination of lines and direct access to telephony features) Includes high-quality, hands-free speakerphone capability and built-in headset connectivity.
  15. Preloaded w/ Windows 7 Professional /64 bitMulti-touch panel with 23-inch diagonal Full HD widescreen WLED backlit BrightView LCD, adjustable reclining stand and VESA Wall Mount adapter.Communication featuresSecurity management---Kensington lock slot,Rear port security cover
  16. Operating system -- Microsoft® MultiPoint Server 2011, Microsoft® MultiPoint Server 2010ProcessorIntel® Core™ i7-2600 3.4 GHzIntel® Core™ i5-2400 3.1 GHzStandard memory4 GB 1333 MHz DDR3 SDRAM8 GB 1333 MHz DDR3 SDRAM
  17. Must sign on with user name and password…tracks who sent what to whom…scans and uploads paperwork to patients files. HIPPA Complient!
  18. 2 location have paper copies of patients records, we will hire an outside contractor to scan in the documents so that you can become a digitalized firm.Each office will have a Digital Sender to it to keep better records and files on patients.The files will update the to the patient records immediately to eliminate missing documentsSecurity – everyone must login and alls documents sent can be to tracked to individual users.
  19. Clark County Computer Resource CenterRecycle your old and unwanted computer and network they will provide you with tax deductible donation receipt network.We will make sure that everything is wiped off the computer by using Acronis Drive Cleanser
  20. Tax write off for donating equipment….if done by you!Any over charges that we estimated higher, then what they actually were will be credited back to the customer.-HITECH act provides incentive payments for the adoption of electronic health records (EHR). HITECH incentives are paid on a per provider basis. For example, a practice with two physicians and a nurse practitioner using an EHR could qualify for $132,000 in Medicare incentives.First payment year is 2011or 2012 = $18,000 Second payment year = $12,000 Third payment year = $8,000 Fourth payment year = $4,000 Fifth payment year = $2,000