1 / 17

Information Security Is for Everyone By Jill Burrington-Brown, MS, RHIA

Information Security Is for Everyone By Jill Burrington-Brown, MS, RHIA. Setting the Standard for Security. Electronic health information must be confidential, have integrity, and be available. Each provider must protect against threats or hazards to the security of the information.

moira
Download Presentation

Information Security Is for Everyone By Jill Burrington-Brown, MS, RHIA

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information Security Is for EveryoneBy Jill Burrington-Brown, MS, RHIA

  2. Setting the Standard for Security • Electronic health information must be confidential, have integrity, and be available. • Each provider must protect against threats or hazards to the security of the information.

  3. Practical Security Safeguards • For our system • At our workstation • When using e-mail and the Internet

  4. Safeguarding Our System

  5. What Are the Potential Risks to Our System? • Theft • Vandalism • Snooping • Environment

  6. How Can We Minimize the Risks? Protect Physical Access • Control location • Lock equipment • Use screen filters • Label laptops • Lock or shut down

  7. Protecting System Access • Identifying Who are you? • Authenticating Something you know Something you have Something you are

  8. Protecting System Access… • Authorizing Rights and permissions • Accounting Audit trails and logs

  9. Manage your Password! Choose a strong password! Don’t share it with anyone! Don’t write it down on a Post-It! Don’t “Save This Password!” Protecting System Access

  10. Protecting System Access… • Remove default passwords • Control software loaded on system • Remove unused software • Consider automatic log-off • Consider encryption for sending sensitive information

  11. Minimizing the Risks…. Education of the Workforce Who are the • Data owners • Data users • Data custodians • And what can they do?

  12. Minimizing the Risks…. Anticipate Environmental Hazards • Power outages/spikes • Fire • Flood

  13. How About the Internet? • Downloading information • E-mail

  14. Downloading Information • Freeware • Shareware Be careful: some of these programs create vulnerability to viruses, unexpected software interactions, and subversion of security controls, and may violate your licensure agreements if you don’t purchase the software.

  15. E-mail • Don’t open attachments from someone you don’t know • Don’t open attachments from someone you do know if the message seems strange

  16. Your PC The only safe PC is a powered-off PC Two thirds of all hacking is INTERNAL Most hacking activity takes place off-hours There is no such thing as a 100 percent secure system or network, but we can work toward better security practices.

  17. Your HIM Professionals Are a Valuable Resource! Working together we can manage the privacy and security of health information. Sponsored by © 2003 AHIMA

More Related