Training employees presentation by Amaya Manigault
pptm
keyboard_arrow_up
School
University of South Carolina, Upstate *
*We aren’t endorsed by this school
Course
105
Subject
Information Systems
Date
Dec 6, 2023
Type
pptm
Pages
10
Uploaded by ProfKingfisherMaster574
The training and education security threats and safeguards
Amaya Manigault
Professor Susan Richardson
Hlth info & info sys Apls
September 25, 2022
Objectives
•
The type of threats internal and external •
The examples of internal and external threats •
A graph on internal and external threats
•
how employees should ensure HIPAA in the organization.
•
The three HIPAA safeguards
The type of threats internal and external •
Internal
Hardware: stealing information from the company and physical hardware.
Environment: employees exploit access
Employees: the use information for malice and gain.
•
External
Natural disasters: weather like hurricanes and tornadoes could have chemicals escaping from their safe storage spaces and damaging various items of equipment
External people : access data or steal hardware
Malicious software: hackers that could use malware to get into companies' information
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
The examples of internal and external threats •
For example: The employee went to work stole a hard drive and a mouse then left work. This will be internal threats.
•
For example: If someone from the outside hacks a google company by using malware this will be external threats.
•
For example: The employees that gains information from the company for gain before leaving the company is an internal threat.
The three HIPAA safeguards
•
Physical safeguard
Security at individual workstations.
Mobile device use outside of the workplace.
Access control to computers, servers, or any other information system.
•
Technical safeguard
Access controls. System activity must be traced to a specific user.
Audit controls. Organizations implement procedures to view and record activity in information systems that deal with ePHI.
Secure data transmission. When transmitting ePHI, it encrypted.
Firewall security. This prevents unauthorized access from the outside by requiring identity-
based authorization to access ePHI.
•
Administrative safeguard
Information access management. Only required users have access to patient data.
Security personnel. The organization must designate a compliance officer to implement and maintain HIPAA Security Rule procedures.
Security management process. Security measures must be implemented and assessed.
Workforce training. Employees should receive annual training on HIPAA compliance. They must be informed of the policies and what the sanctions are for violation.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
How employees should ensure HIPAA in the organization.
•
The employees handling paper and electronic files is very important. Misfiling a patient’s paperwork in a cabinet or saving it on the wrong computer drive or network is a costly mistake.
•
The employees need to be aware of where mobile devices are always and to shut them down and lock them up when they’re not using them. •
The employees should do with their mobile devices is enabling encryptions, firewalls and secure user authentication on every device.
How employees should ensure HIPAA in the organization. Cont.
•
The employees who deal with patient files to focus on what they’re doing and double check that they properly store and save files in the right folders and drives.
•
The employee should double and triple checks that they properly dispose of all paper files.
•
The employees keep patient folders closed, don’t have appointment calendars openly displayed in patient areas and keep your computer monitors and mobile device screens hidden from patients and visitors.
Questions?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Reference List
•
Temeran, A. (2021, March 19). Top 10 risks to businesses from natural disasters - 2022 guide. Revenues & Profits. Retrieved September 26, 2022, from https://revenuesandprofits.com/risks-to-businesses-from-natural-disasters
/#:~:text=Top%2010%20Risks%20To%20Businesses%20From%20Natural%20Disasters
,8.%20Damage%20to%20Raw%20Materials%20...%20More%20items
•
How external threats occur. KnowItAllNinja. (2018, September 7). Retrieved September 26, 2022, from https://www.knowitallninja.com/lessons/how-external-threats-occur/
•
How internal threats occur. KnowItAllNinja. (2018, September 7). Retrieved September 26, 2022, from https://www.knowitallninja.com/lessons/how-internal-threats-occur/
•
Johnson, M. (2022, February 4). 7 ways employees can help prevent HIPAA violations. Intraprise Health. Retrieved September 26, 2022, from https://intraprisehealth.com/7-ways-employees-can-help-prevent-hipaa-vio
lations/#:~:text=7%20Ways%20Employees%20Can%20Help%20Prevent%20HIPAA%20V
iolations,...%207%207.%20Use%20social%20media%20wisely%20
•
The Fox Group. (2022, September 20). HIPAA security rule - 3 required safeguards. The Fox Group. Retrieved September 26, 2022, from https://www.foxgrp.com/hipaa-compliance/hipaa-security-rule