Determine the security or integrity problems

Assignment Help Other Subject
Reference no: EM131138922

Security and Integrity of Clinical Information Systems

Establishing security standards that protect patient data is an important step in the database design process. Protecting the confidentiality of personal health information is not optional; it is mandated under the Health Insurance Portability and Accountability Act (HIPAA). HIPAA violations can result in both fines and legal consequences. Failing to protect private information can also damage a health care organization's reputation as well as result in the loss of patients' peace of mind.

For this Discussion, you consider the clinical information systems presented in the case studies below and identify the security and integrity problems and risks that need to be addressed.

Case Study 1:

A busy academic hospital has grown rapidly and acquired multiple clinical information systems that interface with each other. Physicians and practitioners require access to each system and frequently have workflows that require access to multiple systems at the same time. In addition, practitioner responsibilities often require them to complete documentation or access clinical information at home and during off hours.

Case Study 2:

An increase in the number of clinical research studies and the use of undergraduate students as research assistants for subject recruitment was perceived as a risk for a medium-sized academic hospital. Students were enrolled at the hospital-affiliated university but still required a credentialing process to be able to access clinical areas of the hospital and clinical systems. The hospital wants to meet IRB and HIPAA research regulations, and to exceed HIPAA's minimum necessary principle.

Case Study 3:

As a large multi-specialty academic medical practice, providers are often utilizing laptop computers and mobile devices in patient care and research-related activities. Tracking, securing, and managing the numerous devices to mitigate loss, theft, or other breaches is important to the enterprise.

To prepare:

Review the information in this week's Learning Resources, focusing on the security and integrity of clinical information systems. Consider the importance of security and integrity, as well as the consequences of failing to address these aspects of database design.

Select one of the case studies above to examine further for this Discussion.

Determine the security or integrity problems in the clinical information system in the case study. What legal, ethical, and organizational risks do these issues pose?

Begin to formulate a potential solution or strategy to address the security and integrity problems. How would this solution or strategy mitigate the security or integrity risks you identified?

Prepare 550 words in APA format with 3 references. Include the level one headings below:

1) A description of the security and integrity problems identified with regards to the case study you selected.

2) Select at least two specific risks (legal, ethical, or organizational) related to the case study and propose a solution or strategy to address each. Justify your response

Required Resources

Readings

Coronel, C. & Morris, S. (2015). Database systems: Design, implementation, and management (11th ed.). Stamford, CT: Cengage Learning.
Chapter 15, "Database Administration and Security" (pp. 670-713)

This chapter describes the role of the database manager and highlights responsibilities covered in the database administration process. These responsibilities ensure that data is protected and continually monitored to yield the most accurate information.

Murray, M. C. (2010). Database security: What students need to know. Journal of Information Technology Education, 9, IIP61-IIP77.

Retrieved from the Walden Library databases.

Security is an important requisite of database design. This article describes the pitfalls of vulnerability in databases and the importance of data security methods.

Forrest, M., Maclean, D., Towers, H. K., & Younes, H. (2012). The accuracy of real-time procedure coding by theatre nurses: A comparison with the central national system. Health Informatics Journal, 18(1), 3-11.

Retrieved from the Walden Library databases.

The authors compare the differences in real-time coding performed by clinical coders and non-clinical coders. They observed that complications arose during attempts to embed coding in clinical workflow.

Imran, S.,& Hyder, I. (2009). Security issues in databases. Future Information Technology and Management Engineering, 2009. FITME '09. Second International Conference, 541-545.

Retrieved from the Walden Library databases.

This article explains discretionary and mandatory database security models, their implementation, and their efficiency. It also evaluates how these methods may be inefficient with regard to specific database designs.
Gaff, B. M., Smedinghoff, T. J., & Sor, S. (2012). Privacy and security. Computer, 45(3), 8-10.

Retrieved from the Walden Library databases.

Privacy regulation and the protection of sensitive information are still inconsistently established and enforced. This article addresses the legal issues surrounding database security. It also evaluates protection methods that are the most effective

Reference no: EM131138922

Questions Cloud

What is the maximum income : A company makes two types of biscuits: Jumbo and Regular. The oven can cook at most 200 biscuits per day. How many of each size biscuit should be made to maximize income? What is the maximum income
Do you agree with authors feelings about increased oversight : The United States has a variety of regulations to address the economic harm resulting from monopoly power in an industry. Do you agree with the author's feelings about increased government oversight of such industries? Why or why not?
The status of accounts before adjustment : The type of adjustment (prepaid expense, unearned revenue, accrued revenue, or accrued expense).
The cost for replacement engine : Haply Inc. contracts with Barksdale LLC to have an engine repaired. After much negotiation, the parties agree that the engine will be repaired and reinstalled at Haply’s facilities in 5 days. Haply plans on losing $40,000 a day for each day the engin..
Determine the security or integrity problems : Determine the security or integrity problems in the clinical information system in the case study. What legal, ethical, and organizational risks do these issues pose? Begin to formulate a potential solution or strategy to address the security and..
What was the net income and what was the total revenue : What was the total amount of withdrawals for the year? What was the net income? What was the total revenue? What were the total expenses?
Find the lengths of the sides of the poster and the sign : A square poster has sides measuring 2 feet less than the sides of a square sign. If the difference between their areas is 5656square feet, find the lengths of the sides of the poster and the sign
Determine the normalized undrained shear strength : Recommend the undrained shear strength for use in the design of (1) a foundation for an oil tank, and (2) a slope.
Used tool to tap into the voice of the market : Benchmarking is a widely used tool to tap into the "voice of the market." From this week's readings, as well as from any relevant experience you may have, what are some of the pitfalls organizations should avoid when benchmarking? How can organizatio..

Reviews

Write a Review

Other Subject Questions & Answers

  Illustrate the difference in community intervention and

what is the difference in community intervention and intervention in the community? how can health advocates thoroughly

  Identification of cultural factors

Identification of cultural(Middle East) factors that influenced your choice of philosophy

  Patient lost a lot of blood during surgery

A patient lost a lot of blood during surgery and his blood pressure dropped from 120/80 to 90/50. Describe how the kidneys respond to this change in blood pressure.

  What history would be necessary to collect from the patient

With regard to the case study you were assigned: Review this week's Learning Resources, and consider the insights they provide about the case study. Consider what history would be necessary to collect from the patient in the case study you were assig..

  Write a brief description of the culture you have chosen

Review the article, "Introduction to Sexuality in Late Life." Focus on the real versus perceived differences in sexuality for this cultural group. Write a brief description of the culture you have chosen. Then, compare (similarities and difference..

  What legal test should the federal district court

The prison policy will be upheld if there is any conceivable basis on which the classification might relate to a legitimate governmental interest.

  Knowledge by acquaintance and knowledge by description

I need help deciphering Bertram Russell's "Knowledge by acquaintance and knowledge by description"...? Can anyone help me ...Explain how Russell's theory of definite descriptions can express existential claims without making existence into a predicat..

  How would you prevent further gang interaction

You are warden of a state correction facility and need to train your staff to prepare for crisis and violence. How would you prevent further gang interaction

  Preconceived notions about the experience

Discuss your preconceived notions about the experience. Explain how your notions were impacted by group influence.

  The affirmative action act

The Affirmative Action Act has many supporters and opponents too. Do you believe that the Affirmative Action play a significant role in our daily lives and can improve fairness in our society? Please present arguments for and against affirmative a..

  Drawn from a manufacturing process

Fifty samples of size 600 were drawn from a manufacturing process  and the number of defectives in each sample was counted. The mean sample proportion was 0.025. The lower control limit for the 3 - sigma p chart is

  European union current asylum policy

What is the existing policy? What are its primary components? What are the problems with the existing policy? What challenges are being posed to the existing policy?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd