SlideShare uma empresa Scribd logo
1 de 1
Baixar para ler offline
5 Steps for Protecting Patient Data


Investing in an Electronic Health Record (EHR) solution                 4. Create Physical Safeguards
delivers significant benefits but also increases potential                 Develop policies and procedures to protect
data protection risks. To maximize the financial and                         inventory and control access to desktops, servers
productivity benefits of an EHR solution while protecting                    and information systems.
your organization’s valuable data, follow these five essential             Develop process for handling lost or stolen
steps for building a solid EHR security plan.                                laptops and handheld devices.
                                                                           Determine system backup and data recovery
1. Conduct a Risk Analysis                                                   procedures.
   Review current Protected Health Information                            Natural: flood, earthquake, tornado, etc.
    (PHI) safeguards.                                                      Environmental: chemical spills, HVAC problems,
   Use HITECH’s Meaningful Use Reporting Grid.                              power outages, etc.
   Evaluate firewalls and virus protection.                               Unauthorized intrusions: hackers, burglary, etc.
   Review security measures for secure                                    Establish contingency plans.
    e-communications.
   Review your responsibilities as a Covered Entity                    5. Determine Online Backup Measures
    under HIPAA’s Security Rule.                                           Create and document emergency access procedures.
                                                                           Consider 24/7 web support.
2. Establish Administrative Safeguards                                     Consider using server mirroring or cloning software.
   Assign an internal security leader.
   Establish data security policies and procedures                     Excerpted from the white paper “Electronic Health Records:
     for staff.                                                         Protecting Your Assets With a Solid Security Plan,” by
   Develop a plan to ensure updates of potential                       Carolyn P. Hartley, MLA. As the lead or co-author of 13
     web threats.                                                       textbooks on privacy, security and EHR implementation,
                                                                        she draws on nearly 30 years of experience in healthcare
3. Build Technical Safeguards                                           and over a decade in health information technology.
   Determine role-based access and implement
    audit trails.
   Audit applications.                                                           Download the full white paper now.
   Test and review network vulnerability.




                                                  ©2011 CenturyLink, Inc. All Rights Reserved.
    Not to be distributed or reproduced by anyone other than CenturyLink entities and CenturyLink Channel Alliance members. CM101248 07/11

Mais conteúdo relacionado

Destaque (10)

Needle in haystack
Needle in haystackNeedle in haystack
Needle in haystack
 
Front cover analysis
Front cover analysisFront cover analysis
Front cover analysis
 
Chuong5
Chuong5Chuong5
Chuong5
 
Boletin C&S Enero
Boletin C&S EneroBoletin C&S Enero
Boletin C&S Enero
 
Practico gotico 2011
Practico gotico 2011Practico gotico 2011
Practico gotico 2011
 
НЛТР_Новая Москва_Моделирование
НЛТР_Новая Москва_МоделированиеНЛТР_Новая Москва_Моделирование
НЛТР_Новая Москва_Моделирование
 
R5 eserva
R5 eserva R5 eserva
R5 eserva
 
Daniel scheinson fotos
Daniel scheinson fotosDaniel scheinson fotos
Daniel scheinson fotos
 
Hinweise zum blogprojekt
Hinweise zum blogprojektHinweise zum blogprojekt
Hinweise zum blogprojekt
 
Copia de cuento juan luis
Copia de cuento juan luisCopia de cuento juan luis
Copia de cuento juan luis
 

Mais de Erik Ginalick

Unleashing The Power Of Customer Data Wp091047
Unleashing The Power Of Customer Data Wp091047Unleashing The Power Of Customer Data Wp091047
Unleashing The Power Of Customer Data Wp091047
Erik Ginalick
 
Understand Benefits Of Electronic Health Records Wp091005
Understand Benefits Of Electronic Health Records Wp091005Understand Benefits Of Electronic Health Records Wp091005
Understand Benefits Of Electronic Health Records Wp091005
Erik Ginalick
 
Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366
Erik Ginalick
 
Qmoe For Manufacturing Wp090862
Qmoe For Manufacturing Wp090862Qmoe For Manufacturing Wp090862
Qmoe For Manufacturing Wp090862
Erik Ginalick
 
Qmoe For Public Sector Wp090863
Qmoe For Public Sector Wp090863Qmoe For Public Sector Wp090863
Qmoe For Public Sector Wp090863
Erik Ginalick
 
Sip Trunk Services The Cornerstone Of Unified Communications Wp101194
Sip Trunk Services The Cornerstone Of Unified Communications Wp101194Sip Trunk Services The Cornerstone Of Unified Communications Wp101194
Sip Trunk Services The Cornerstone Of Unified Communications Wp101194
Erik Ginalick
 
The Worry Free Network Wp091050
The Worry Free Network Wp091050The Worry Free Network Wp091050
The Worry Free Network Wp091050
Erik Ginalick
 
Qmoe For Financial Services Wp090860
Qmoe For Financial Services Wp090860Qmoe For Financial Services Wp090860
Qmoe For Financial Services Wp090860
Erik Ginalick
 
Qmoe For Healthcare Wp090861
Qmoe For Healthcare Wp090861Qmoe For Healthcare Wp090861
Qmoe For Healthcare Wp090861
Erik Ginalick
 
Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010
Erik Ginalick
 
Planning For Disaster And Everyday Threats Wp111438
Planning For Disaster And Everyday Threats Wp111438Planning For Disaster And Everyday Threats Wp111438
Planning For Disaster And Everyday Threats Wp111438
Erik Ginalick
 
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
Erik Ginalick
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
Erik Ginalick
 
Plan For Success White Paper
Plan For Success White PaperPlan For Success White Paper
Plan For Success White Paper
Erik Ginalick
 
Optimizing Your Communications In A Recession Wp090993
Optimizing Your Communications In A Recession Wp090993Optimizing Your Communications In A Recession Wp090993
Optimizing Your Communications In A Recession Wp090993
Erik Ginalick
 
Is Cloud Computing Right For You Wp101305
Is Cloud Computing Right For You Wp101305Is Cloud Computing Right For You Wp101305
Is Cloud Computing Right For You Wp101305
Erik Ginalick
 
Ipv Technical White Paper Wp111504
Ipv Technical White Paper Wp111504Ipv Technical White Paper Wp111504
Ipv Technical White Paper Wp111504
Erik Ginalick
 
Ipv6 Technical White Paper Wp111504
Ipv6 Technical White Paper Wp111504Ipv6 Technical White Paper Wp111504
Ipv6 Technical White Paper Wp111504
Erik Ginalick
 
Infrastructures For Innovation Wp090974
Infrastructures For Innovation Wp090974Infrastructures For Innovation Wp090974
Infrastructures For Innovation Wp090974
Erik Ginalick
 
Healthcare It Security Necessity Wp101118
Healthcare It Security Necessity Wp101118Healthcare It Security Necessity Wp101118
Healthcare It Security Necessity Wp101118
Erik Ginalick
 

Mais de Erik Ginalick (20)

Unleashing The Power Of Customer Data Wp091047
Unleashing The Power Of Customer Data Wp091047Unleashing The Power Of Customer Data Wp091047
Unleashing The Power Of Customer Data Wp091047
 
Understand Benefits Of Electronic Health Records Wp091005
Understand Benefits Of Electronic Health Records Wp091005Understand Benefits Of Electronic Health Records Wp091005
Understand Benefits Of Electronic Health Records Wp091005
 
Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366
 
Qmoe For Manufacturing Wp090862
Qmoe For Manufacturing Wp090862Qmoe For Manufacturing Wp090862
Qmoe For Manufacturing Wp090862
 
Qmoe For Public Sector Wp090863
Qmoe For Public Sector Wp090863Qmoe For Public Sector Wp090863
Qmoe For Public Sector Wp090863
 
Sip Trunk Services The Cornerstone Of Unified Communications Wp101194
Sip Trunk Services The Cornerstone Of Unified Communications Wp101194Sip Trunk Services The Cornerstone Of Unified Communications Wp101194
Sip Trunk Services The Cornerstone Of Unified Communications Wp101194
 
The Worry Free Network Wp091050
The Worry Free Network Wp091050The Worry Free Network Wp091050
The Worry Free Network Wp091050
 
Qmoe For Financial Services Wp090860
Qmoe For Financial Services Wp090860Qmoe For Financial Services Wp090860
Qmoe For Financial Services Wp090860
 
Qmoe For Healthcare Wp090861
Qmoe For Healthcare Wp090861Qmoe For Healthcare Wp090861
Qmoe For Healthcare Wp090861
 
Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010
 
Planning For Disaster And Everyday Threats Wp111438
Planning For Disaster And Everyday Threats Wp111438Planning For Disaster And Everyday Threats Wp111438
Planning For Disaster And Everyday Threats Wp111438
 
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
 
Plan For Success White Paper
Plan For Success White PaperPlan For Success White Paper
Plan For Success White Paper
 
Optimizing Your Communications In A Recession Wp090993
Optimizing Your Communications In A Recession Wp090993Optimizing Your Communications In A Recession Wp090993
Optimizing Your Communications In A Recession Wp090993
 
Is Cloud Computing Right For You Wp101305
Is Cloud Computing Right For You Wp101305Is Cloud Computing Right For You Wp101305
Is Cloud Computing Right For You Wp101305
 
Ipv Technical White Paper Wp111504
Ipv Technical White Paper Wp111504Ipv Technical White Paper Wp111504
Ipv Technical White Paper Wp111504
 
Ipv6 Technical White Paper Wp111504
Ipv6 Technical White Paper Wp111504Ipv6 Technical White Paper Wp111504
Ipv6 Technical White Paper Wp111504
 
Infrastructures For Innovation Wp090974
Infrastructures For Innovation Wp090974Infrastructures For Innovation Wp090974
Infrastructures For Innovation Wp090974
 
Healthcare It Security Necessity Wp101118
Healthcare It Security Necessity Wp101118Healthcare It Security Necessity Wp101118
Healthcare It Security Necessity Wp101118
 

Five Steps For Protecting Patient Data Cm101248

  • 1. 5 Steps for Protecting Patient Data Investing in an Electronic Health Record (EHR) solution 4. Create Physical Safeguards delivers significant benefits but also increases potential  Develop policies and procedures to protect data protection risks. To maximize the financial and inventory and control access to desktops, servers productivity benefits of an EHR solution while protecting and information systems. your organization’s valuable data, follow these five essential  Develop process for handling lost or stolen steps for building a solid EHR security plan. laptops and handheld devices.  Determine system backup and data recovery 1. Conduct a Risk Analysis procedures.  Review current Protected Health Information  Natural: flood, earthquake, tornado, etc. (PHI) safeguards.  Environmental: chemical spills, HVAC problems,  Use HITECH’s Meaningful Use Reporting Grid. power outages, etc.  Evaluate firewalls and virus protection.  Unauthorized intrusions: hackers, burglary, etc.  Review security measures for secure  Establish contingency plans. e-communications.  Review your responsibilities as a Covered Entity 5. Determine Online Backup Measures under HIPAA’s Security Rule.  Create and document emergency access procedures.  Consider 24/7 web support. 2. Establish Administrative Safeguards  Consider using server mirroring or cloning software.  Assign an internal security leader.  Establish data security policies and procedures Excerpted from the white paper “Electronic Health Records: for staff. Protecting Your Assets With a Solid Security Plan,” by  Develop a plan to ensure updates of potential Carolyn P. Hartley, MLA. As the lead or co-author of 13 web threats. textbooks on privacy, security and EHR implementation, she draws on nearly 30 years of experience in healthcare 3. Build Technical Safeguards and over a decade in health information technology.  Determine role-based access and implement audit trails.  Audit applications. Download the full white paper now.  Test and review network vulnerability. ©2011 CenturyLink, Inc. All Rights Reserved. Not to be distributed or reproduced by anyone other than CenturyLink entities and CenturyLink Channel Alliance members. CM101248 07/11