SlideShare a Scribd company logo
1 of 10
Health Informatics 101
Security
 Is

the protections or safeguards (administrative,
technical, or physical) put in place to secure protected
health information.

 Pertains

to the methods to protect the privacy of patient
information and confidentiality of the patient encounter.


Objective: An organization needs to protect;



Information - documented (paper or electronic) data or
intellectual property collected by and/or used to meet the
organization’s mission.
Systems - a combination of information, software and
hardware that process and store information.
Services and Applications - software applications and
services (operating system, database applications,
networking software, office application) that process,
store and/or transmit information.




Security policy is based on the well-known security
components of:
 Authentication
 Encryption (transport security)
 Authorization
 Access Control
 Auditing
 Physical Security





Authentication
Is the process of proving or confirming that an entity or
person is who or what it claims to be. All entities and
workforce members need to be authenticated prior to
accessing electronic health information in order to keep
the data secured
The organization should use a combination of
operational practices and technological solutions to
validate or authenticate that a person or entity
attempting to access to EHI is the one it claims to be.


Encryption



Encryption technology can protect patient health
information whether an EHR is locally installed or
accessed over the Internet, from being read by
unauthorized parties when it is transmitted, or stored on
any device, including mobile devices.



Encrypting protect patient health puts information in a
coded form that can only be read by an authorized user
who has a “key.”


Authorization



Determine what informational resources are permitted
to access and what actions it will be allowed to perform
(run, view, create, delete, or change).



Authorization to access information and other computing
services begins with administrative policies and
procedures. The policies prescribe what information and
computing services can be accessed, by whom, and
under what conditions.


Access Control



Access to protected information must be restricted to
people who are authorized to access the information.
The more sensitive or valuable the information the
stronger the control mechanisms need to be. The
foundation on which access control mechanisms are
built start with identification and authentication.
Common access control mechanisms in use today
include role-based access control available in many
advanced database management systems.




Auditing



To gauge the level of compliance across an organization
through self-audit, walk-through, person-to-person
interviews, checklists or scorecards, and rating scale.
Audit trails is a record of each time data is altered, how it
was altered and by whom. Information includes: user IP
address, patient, data type, access type and time of
access).




Physical Security



Protection of physical environment to safeguard
protected health information as per organization policy.

More Related Content

What's hot

HIPAA HiTech Security Assessment
HIPAA HiTech Security AssessmentHIPAA HiTech Security Assessment
HIPAA HiTech Security Assessment
data brackets
 
Health information security system
Health information security systemHealth information security system
Health information security system
Diana Fernandez
 
Health information system security
Health information system securityHealth information system security
Health information system security
kristinleighclark
 

What's hot (19)

Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk Assessment
 
HIPAA HiTech Security Assessment
HIPAA HiTech Security AssessmentHIPAA HiTech Security Assessment
HIPAA HiTech Security Assessment
 
Health information security system
Health information security systemHealth information security system
Health information security system
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Web Werks Data Center Achieves HIPAA Compliance Certification
Web Werks Data Center Achieves HIPAA Compliance CertificationWeb Werks Data Center Achieves HIPAA Compliance Certification
Web Werks Data Center Achieves HIPAA Compliance Certification
 
Six pillars of security and privacy in telemedicine
Six pillars of security and privacy in telemedicineSix pillars of security and privacy in telemedicine
Six pillars of security and privacy in telemedicine
 
Telemedicine: safety and security
Telemedicine: safety and securityTelemedicine: safety and security
Telemedicine: safety and security
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small Practices
 
Federated architecture
Federated architectureFederated architecture
Federated architecture
 
The importance of hipaa compliance and training
The importance of hipaa compliance and trainingThe importance of hipaa compliance and training
The importance of hipaa compliance and training
 
Patientory Blockchain Privacy, How is it Achieved?
Patientory Blockchain Privacy, How is it Achieved?Patientory Blockchain Privacy, How is it Achieved?
Patientory Blockchain Privacy, How is it Achieved?
 
Comp8 unit6a lecture_slides
Comp8 unit6a lecture_slidesComp8 unit6a lecture_slides
Comp8 unit6a lecture_slides
 
Health information system security
Health information system securityHealth information system security
Health information system security
 
Understanding HIPAA
Understanding HIPAAUnderstanding HIPAA
Understanding HIPAA
 
BEMR
BEMRBEMR
BEMR
 
Privacy, Confidentiality, and Security Lecture 3_slides
Privacy, Confidentiality, and Security Lecture 3_slidesPrivacy, Confidentiality, and Security Lecture 3_slides
Privacy, Confidentiality, and Security Lecture 3_slides
 
Encryption Solutions for Healthcare
Encryption Solutions for HealthcareEncryption Solutions for Healthcare
Encryption Solutions for Healthcare
 
How to Ensure HIPPA Compliance
How to Ensure HIPPA ComplianceHow to Ensure HIPPA Compliance
How to Ensure HIPPA Compliance
 
Healthcare IT Solutions Ensure Uptime, Security and Stability
Healthcare IT Solutions Ensure Uptime, Security and StabilityHealthcare IT Solutions Ensure Uptime, Security and Stability
Healthcare IT Solutions Ensure Uptime, Security and Stability
 

Viewers also liked

Material Selection of Smartphone Body Shell [Autosaved].ppt 2
Material Selection of Smartphone Body Shell [Autosaved].ppt 2Material Selection of Smartphone Body Shell [Autosaved].ppt 2
Material Selection of Smartphone Body Shell [Autosaved].ppt 2
Muhammad Harith Mohd Fauzi
 
7.sınıf 1.dönem 2. sınav
7.sınıf 1.dönem 2. sınav7.sınıf 1.dönem 2. sınav
7.sınıf 1.dönem 2. sınav
ingilizceschool
 

Viewers also liked (9)

Maria Verchenova (formely Balikoeva)
Maria Verchenova (formely Balikoeva) Maria Verchenova (formely Balikoeva)
Maria Verchenova (formely Balikoeva)
 
Effective PR Agency - Client Relationships
Effective PR Agency - Client RelationshipsEffective PR Agency - Client Relationships
Effective PR Agency - Client Relationships
 
Аналитическая справка
Аналитическая справкаАналитическая справка
Аналитическая справка
 
Computer Architecture
Computer ArchitectureComputer Architecture
Computer Architecture
 
Du an benh vien ung buou
Du an benh vien ung buouDu an benh vien ung buou
Du an benh vien ung buou
 
Material Selection of Smartphone Body Shell [Autosaved].ppt 2
Material Selection of Smartphone Body Shell [Autosaved].ppt 2Material Selection of Smartphone Body Shell [Autosaved].ppt 2
Material Selection of Smartphone Body Shell [Autosaved].ppt 2
 
7.sınıf 1.dönem 2. sınav
7.sınıf 1.dönem 2. sınav7.sınıf 1.dönem 2. sınav
7.sınıf 1.dönem 2. sınav
 
Sholat bagi orang sakit
Sholat bagi orang sakitSholat bagi orang sakit
Sholat bagi orang sakit
 
Ejercicio 9
Ejercicio 9Ejercicio 9
Ejercicio 9
 

Similar to Security in electronic health records

CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
Ganbayar Sukhbaatar
 
Implementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control PlanImplementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control Plan
Angie Willis
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
Nicholas Davis
 
Information security background
Information security backgroundInformation security background
Information security background
Nicholas Davis
 
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boroEhr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
kayla_ann_30
 

Similar to Security in electronic health records (20)

Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptx
 
Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information System
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
 
Maintaining Patient Data Security at Hospitals.pptx
Maintaining Patient Data Security at Hospitals.pptxMaintaining Patient Data Security at Hospitals.pptx
Maintaining Patient Data Security at Hospitals.pptx
 
Access control
Access controlAccess control
Access control
 
Data Security
Data SecurityData Security
Data Security
 
Importance of Access Control System for Your Organization Security
Importance of Access Control System for Your Organization SecurityImportance of Access Control System for Your Organization Security
Importance of Access Control System for Your Organization Security
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare Application
 
Article on The Electronic Health Record
Article on The Electronic Health RecordArticle on The Electronic Health Record
Article on The Electronic Health Record
 
An Introduction to Cyber security
An Introduction to Cyber securityAn Introduction to Cyber security
An Introduction to Cyber security
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing Informatics
 
Implementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control PlanImplementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control Plan
 
Access Control System_ An Overview - Bahaa Abdul Hadi.pdf
Access Control System_ An Overview - Bahaa Abdul Hadi.pdfAccess Control System_ An Overview - Bahaa Abdul Hadi.pdf
Access Control System_ An Overview - Bahaa Abdul Hadi.pdf
 
Standardization and Interoperability
Standardization and InteroperabilityStandardization and Interoperability
Standardization and Interoperability
 
Exploring the Seven Key Attributes of Security Testing.pdf
Exploring the Seven Key Attributes of Security Testing.pdfExploring the Seven Key Attributes of Security Testing.pdf
Exploring the Seven Key Attributes of Security Testing.pdf
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
Information security background
Information security backgroundInformation security background
Information security background
 
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boroEhr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
 

Recently uploaded

The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
allensay1
 

Recently uploaded (20)

Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Buy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From Seosmmearth
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Falcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial WingsFalcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial Wings
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
BeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdfBeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdf
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 

Security in electronic health records

  • 2. Security  Is the protections or safeguards (administrative, technical, or physical) put in place to secure protected health information.  Pertains to the methods to protect the privacy of patient information and confidentiality of the patient encounter.
  • 3.  Objective: An organization needs to protect;  Information - documented (paper or electronic) data or intellectual property collected by and/or used to meet the organization’s mission. Systems - a combination of information, software and hardware that process and store information. Services and Applications - software applications and services (operating system, database applications, networking software, office application) that process, store and/or transmit information.  
  • 4. Security policy is based on the well-known security components of:  Authentication  Encryption (transport security)  Authorization  Access Control  Auditing  Physical Security
  • 5.    Authentication Is the process of proving or confirming that an entity or person is who or what it claims to be. All entities and workforce members need to be authenticated prior to accessing electronic health information in order to keep the data secured The organization should use a combination of operational practices and technological solutions to validate or authenticate that a person or entity attempting to access to EHI is the one it claims to be.
  • 6.  Encryption  Encryption technology can protect patient health information whether an EHR is locally installed or accessed over the Internet, from being read by unauthorized parties when it is transmitted, or stored on any device, including mobile devices.  Encrypting protect patient health puts information in a coded form that can only be read by an authorized user who has a “key.”
  • 7.  Authorization  Determine what informational resources are permitted to access and what actions it will be allowed to perform (run, view, create, delete, or change).  Authorization to access information and other computing services begins with administrative policies and procedures. The policies prescribe what information and computing services can be accessed, by whom, and under what conditions.
  • 8.  Access Control  Access to protected information must be restricted to people who are authorized to access the information. The more sensitive or valuable the information the stronger the control mechanisms need to be. The foundation on which access control mechanisms are built start with identification and authentication. Common access control mechanisms in use today include role-based access control available in many advanced database management systems. 
  • 9.  Auditing  To gauge the level of compliance across an organization through self-audit, walk-through, person-to-person interviews, checklists or scorecards, and rating scale. Audit trails is a record of each time data is altered, how it was altered and by whom. Information includes: user IP address, patient, data type, access type and time of access). 
  • 10.  Physical Security  Protection of physical environment to safeguard protected health information as per organization policy.