0% found this document useful (0 votes)
24 views

History of Health Information Technology in The U.S

The Health IT Workforce Curriculum was developed for U.S. community colleges to enhance workforce training programmes in health information technology. The curriculum consist of 20 courses of 3 credits each. Each course includes instructor manuals, learning objectives, syllabi, video lectures with accompanying transcripts and slides, exercises, and assessments. The materials were authored by Columbia University, Duke University, Johns Hopkins University, Oregon Health & Science University, and University of Alabama at Birmingham. The project was funded by the U.S. Office of the National Coordinator for Health Information Technology. All of the course materials are available under a Creative Commons Attribution Noncommercial ShareAlike (CC BY NC SA) License (http://creativecommons.org/licenses/by-nc-sa/3.0/). The course description, learning objectives, author information, and other details may be found at http://archive.org/details/HealthITWorkforce-Comp05Unit10. The full collection may be browsed at http://knowledge.amia.org/onc-ntdc or at http://www.merlot.org/merlot/viewPortfolio.htm?id=842513.
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views

History of Health Information Technology in The U.S

The Health IT Workforce Curriculum was developed for U.S. community colleges to enhance workforce training programmes in health information technology. The curriculum consist of 20 courses of 3 credits each. Each course includes instructor manuals, learning objectives, syllabi, video lectures with accompanying transcripts and slides, exercises, and assessments. The materials were authored by Columbia University, Duke University, Johns Hopkins University, Oregon Health & Science University, and University of Alabama at Birmingham. The project was funded by the U.S. Office of the National Coordinator for Health Information Technology. All of the course materials are available under a Creative Commons Attribution Noncommercial ShareAlike (CC BY NC SA) License (http://creativecommons.org/licenses/by-nc-sa/3.0/). The course description, learning objectives, author information, and other details may be found at http://archive.org/details/HealthITWorkforce-Comp05Unit10. The full collection may be browsed at http://knowledge.amia.org/onc-ntdc or at http://www.merlot.org/merlot/viewPortfolio.htm?id=842513.
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 18

History of Health Information

Technology in the U.S.


History of Privacy and
Security Legislation
Lecture b Best Practices for
Information Security
This material Comp5_Unit10 was developed by The University of Alabama Birmingham, funded by the epartment of !ealth
and !uman "ervi#es, $ffi#e of the %ational Coordinator for !ealth &nformation Te#hnology under Award %umber
1U'($C0000')
History of Privacy and
Security Legislation
Learning Objectives

Describe security recommendations in the


199 re!ort entitled "#or the $ecord%
&
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
National esearch !ouncil "N!#
ecommended Security Practices

1991 committee convened

*ommittee on 2aintaining Privacy and Security in Health *are


3!!lications of the 4ational Information Infrastructure5
*ommission on Physical Sciences5 2athematics5 and
3!!lications5 4ational $esearch *ouncil

199 boo) !ublished


#or the $ecord6 Protecting 7lectronic Health Information

#ree e8ecutive summary available from6


htt!6//999-na!-edu/catalog/1191-html
Source6 :4ational $esearch *ouncil5 199;
,
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
N! ecommended Practices

Individual authentication of users

Strong authentication

7nter!rise<9ide authentication
=
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
N! ecommended Practices

Individual authentication of users

Strong authentication

7nter!rise<9ide authentication

Access controls

3ccess validation
1
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
N! ecommended Practices

Individual authentication of users

Strong authentication

7nter!rise<9ide authentication

Access controls

3ccess validation

Audit trails

Inter<organi>ational audit trails

Patient access to audit logs

Im!roved authori>ation forms


?
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
Security Practices

Health I' (or)force *urriculum


+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
Security Practices

Physical security and disaster recovery


@
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
Security Practices

Physical security and disaster recovery

Protection of remote access points


9
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
Security Practices

Physical security and disaster recovery

Protection of remote access !oints

Protection of external electronic


communications
1.
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
Security Practices

Soft9are disci!line
11
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
Security Practices

Soft9are disci!line

System assessment
1&
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
Security Practices

Soft9are disci!line

System assessment

Electronic authentication of records


1,
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
Security Policies

Explicit security policies

Security *ommittees

Information Security Afficer


1=
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
Security Policies

78!licit security !olicies

Security *ommittees

Information Security Afficer

Education and Training


11
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
Security Policies

78!licit security !olicies

Security *ommittees

Information Security Afficer

7ducation and 'raining

Sanctions
1?
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
History of Privacy and Security
Legislation
Summary $ Lecture b

"#or the $ecord% recommendations

3dministrative5 technical5 !hysical security

Incor!orated in HIP33 Security $ule

Best !ractices5 but challenging to im!lement


1
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
History of Privacy and Security
Legislation
eferences $ Lecture b
1@
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
References
*ommittee on 2aintaining Privacy and Security in Health *are 3!!lications of the 4ational Information
Infrastructure5 *ommission on Physical Sciences5 2athematics5 and 3!!lications5 4ational $esearch *ouncil- #or
the record6 !rotecting electronic health information BInternetC- (ashington :D*;6 4ational 3cademy PressD 199-
3vailable from6 htt!6//999-na!-edu/catalog/1191-html

You might also like