Computers and Technology

As described in previous chapters, the Real-Time Glucose Monitoring (RTGM) system will include processing components on servers and on mobile devices with data exchange via 3G and 4G phone networks. Users will include patients, physicians, nurses, and physician assistants. In the United States, the Health Insurance Portability and Accountability Act of 1996 (HIPAA) mandates certain responsibilities regarding the privacy and security of electronic protected health information (ePHI). The law applies to what are collectively called covered entities—that is, health plans, health-care clearinghouses, and any health-care providers who transmit health information in electronic form. More information can be obtained from the U. S. Department of Health and Human Services Web site ( http://www. hhs. gov). In general, covered entities should do the following:
■ Ensure the confidentiality, integrity, and availability of all ePHI they create, receive, maintain, or transmit.
■ Identify and protect against reasonably anticipated threats to the security or integrity of the information.
■ Protect against reasonably anticipated, impermissible uses or disclosures of the information.
■ Ensure compliance by their workforces.
Specifically, covered entities should implement policies, procedures, and technologies that do the following:
■ Specify the proper use of and access to workstations and electronic media.
■ Regard the transfer, removal, disposal, and reuse of electronic media to ensure appropriate protection of ePHI.
■ Allow only authorized persons to access ePHI.
■ Record and examine access and other activity in information systems that contain or use ePHI.
■ Ensure ePHI isn’t improperly altered or destroyed.
■ Guard against unauthorized access to ePHI that is being transmitted over an electronic network.
Answer these questions in light of HIPAA requirements:
Consider the issues related to health-care professionals accessing server data by using workstations and mobile devices within a health-care facility. How will the system meet its duty to record and examine access to ePHI? If a healthcare professional uses a mobile device outside a health-care facility, what protections must be applied to the device and/or any data stored within it or transmitted to it?

answer
Answers: 2

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 09:50, laurentsofia09
Assume that you have an sorted array of records. assume that the length of the array (n) is known. give two different methods to search for a specific value in this array. you can use english or pseudo-code for your algorithm. what is the time complexity for each algorithm and why?
Answers: 1
image
Computers and Technology, 23.06.2019 03:00, Julianhooks
State 7 common key's for every keyboard
Answers: 1
image
Computers and Technology, 23.06.2019 20:00, shadow6728g
How much current flows through the alternator brushes? a. 2–5 a b. 25–35 a, depending on the vehicle c. 5–10 a d. 10–15 a
Answers: 2
image
Computers and Technology, 24.06.2019 12:10, breezer20042
What is it called during the editing process when the processor ensures that a character holding a coffee mug from one angle is holding the same mug in the same way when the shot switches to another camera at another angle? cinematography continuity technology prop use
Answers: 1
Do you know the correct answer?
As described in previous chapters, the Real-Time Glucose Monitoring (RTGM) system will include proce...

Questions in other subjects:

Konu
Mathematics, 17.09.2020 16:01
Konu
English, 17.09.2020 16:01
Konu
English, 17.09.2020 16:01
Konu
Mathematics, 17.09.2020 16:01
Konu
Mathematics, 17.09.2020 16:01
Konu
Mathematics, 17.09.2020 16:01
Konu
History, 17.09.2020 16:01
Konu
Mathematics, 17.09.2020 16:01
Konu
History, 17.09.2020 16:01
Konu
Mathematics, 17.09.2020 16:01