History of Health Information Technology in The U.S
History of Health Information Technology in The U.S
Strong authentication
7nter!rise<9ide authentication
=
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
N! ecommended Practices
Strong authentication
7nter!rise<9ide authentication
Access controls
3ccess validation
1
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
N! ecommended Practices
Strong authentication
7nter!rise<9ide authentication
Access controls
3ccess validation
Audit trails
Soft9are disci!line
11
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
Security Practices
Soft9are disci!line
System assessment
1&
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
Security Practices
Soft9are disci!line
System assessment
Security *ommittees
Security *ommittees
Security *ommittees
Sanctions
1?
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
History of Privacy and Security
Legislation
Summary $ Lecture b