Part
|
Competency Assessed
|
Instructions
|
1
|
Utilize technology for data collection, storage, analysis, and reporting of information
|
As a health information professional, you have been hired to consult a network of providers in the technology infrastructure supporting coordination of career for in-network and out-of-network patients. Differentiate the technologies needed to support data collection, storage, analysis, and reporting throughout the network. Please indicate at least ten (10) relevant computer components-- including software and hardware.
|
2
|
Take part in the development of networks, including intranet and Internet applications
|
Within your technology infrastructure analysis, compare and contrast computer networks in terms of (1) approach (i.e., Internet, intranet, and extranet); (2) communication technologies (Network- LANS, WANS, WLANS, and VPNs); and (3) Internet standards (i.e., TCP/IP, XML, and SGML).
|
3
|
Educate consumers on patient-centered health information technologies
|
As the consultant for this project, implementation of a patient portal (with personal health records or PHR) is a required deliverable. In preparation for this goal, you must create a pamphlet that will educate consumers on patient-centered medical homes (PCMH), patient portals, and personal health records. Distinguish the key components of your educational pamphlet.
|
4
|
Collaborate in the development of operational policies and procedures for health information exchange
|
Since the coordination of care is supported through the exchange of health information, you have been asked to consult on the development of operational policies and procedures related to a health information exchange (HIE). First, summarize the major architectural models of the health information exchange--making analogies to the various network topologies. Next, analyze at least two operational policies that would support data exchange among the various healthcare entities that utilize the exchange--including outpatient facilities, inpatient facilities, pharmacies, and other health facilties.
|
5
|
Discover threats to data integrity and validity
|
Imagine that your work as consultant has raised questions among executives regarding threats to data integrity and validity. Illustrate and examine the application of (1) intrusion detection systems and related technology (i.e., firewalls, client/server model) and (2) auditing, audit trails, and audit systems.
|
6
|
Implement policies and procedures to ensure data integrity internal and external
|
In regards to the security concerns, you have decided to provide additional information to the executive board regarding policies and procedures to implement that would ensure information privacy and security. Make recommendations on policies/procedures regarding authentication, encryption, and password management.
|