Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

In this assignment, you are required to identify a health care facility where yo

ID: 126619 • Letter: I

Question

In this assignment, you are required to identify a health care facility where you would consider working in the field of health care informatics. Identify and interview someone who is responsible for IT security (e.g., compliance, privacy, risk, or quality). To assist in formulating salient questions, view the terms (see assigned readings related to "Health Information Exchange.") From the discussions and insights from the discussion forum, include the questions that were pertinent to the information gathered from your interview. Focus on EHRs and software solutions. Write a 500-750-word summary of your interview. The summary should focus on EHRs, software solutions, and IT security. Include the following: Background information of the interviewee (e.g., role, title, and their professional involvement with privacy, security, patient data, and EHR hardware). IT security Impending government regulations APA format is not required, but solid academic writing is expected.

Explanation / Answer

Information security and patient privacy is the most important and fundamental components of a well functioning healthcare environment.Health information exchange (HIE) is the mobilization of health care information electronically across organizations within a region, community or hospital system. In practice the term HIE may also refer to the organization that facilitates the exchange.HIE systems facilitate the efforts of physicians and clinicians to meet high standards of patient care through electronic participation in a patient's continuity of care with multiple providers.

The basic questions that i would like to interview someone who is responsible for IT security:

1.What would be the top three information security concerns that revolve around for the protection of patient information?

2.Insider threats pose a huge security risk for healthcare,How to prevent and protect that?

3.How to protect and safeguard healthcare data?

4.How would he assess the risk mitigation and errors that are observed?

Inside threats via employees errors or lack of awareness - employees are the soft belly of a well defended IT infrastructure. Employees carelessness and lack of awareness may lead to a breach despite a solid network perimeter. Common examples are employees introducing threats via clicking on a malicious attachment in an email, or connecting their personal mobile device to the organization's Wi-Fi or hardware. Such threats can lead to introduction of ransomware, and malware which may harvest user credentials or even open a backdoor to a hacker.

Big data and artificial intelligence promises to provide doctors with a greater pool of information as to what treatments have worked and how to diagnose and treat some less common diseases. In addition big data may be the key to the creation of designer drugs tailored specifically for a host of symptoms that a patient may be displaying, but like cloud service providers, the integrity of the data from the vast pools of data that are available needs to be maintained.

Compliance and information technology must work together to document these error incidents, provide the notice and follow-up as required by law. There are similar compliance requirements in many countries around world. Major healthcare institutions should seek the advice of competent HIPAA consultants. Hospitals and physician practices in the U.S. are primary targets for a HIPAA compliance audit.

An electronic health record (EHR), or electronic medical record (EMR), is the systematized collection of patient and population electronically-stored health information in a digital format.[1] These records can be shared across different health caresettings.EHR systems are designed to store data accurately and to capture the state of a patient across time. It eliminates the need to track down a patient's previous paper medical records and assists in ensuring data is accurate and legible.When a health facility has documented their workflow and chosen their software solution they must then consider the hardware and supporting device infrastructure for the end users. Staff and patients will need to engage with various devices throughout a patient's stay and charting workflow. Computers, laptops, all-in-one computers, tablets, mouse, keyboards and monitors are all hardware devices that may be utilized. Other considerations will include supporting work surfaces and equipment, wall desks or articulating arms for end users to work on. Another important factor is how all these devices will be physically secured and how they will be charged that staff can always utilize the devices for EHR charting when needed.