SKM2004 Daniel W. Emmer, PhD Ebrahim Randeree, MBA Securing Clinical Knowledge: Balancing Accessibility, Security, and Privacy in Dental Education.

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

Steps towards E-Government in Syria
Overarching Issues. Competing Legislation Legal requirement for mandatory QA of professional membership vs. personal privacy protection legislation Know.
1 Dr. Ashraf El-Farghly SECC. 2 Level 3 focus on the organization - Best practices are gathered across the organization. - Processes are tailored depending.
HIPAA Security Rule Overview and Compliance Program Presented by: Lennox Ramkissoon, CISSP The People’s Hospital HIPAA Security Manager The Hospital June.
CAMP Med Building a Health Information Infrastructure to Support HIPAA Rick Konopacki, MSBME HIPAA Security Coordinator University of Wisconsin-Madison.
Faculty of Computer Science © 2006 CMPUT 605February 11, 2008 A Data Warehouse Architecture for Clinical Data Warehousing Tony R. Sahama and Peter R. Croll.
Security Controls – What Works
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter 12 Strategies for Managing the Technology Infrastructure.
Database Administration
12 th National HIPAA Summit – Managing a Data Security Audit Program 2.05, 1:15 PM Chris Apgar, CISSP Apgar & Associates, LLC.
Measuring the effectiveness of government IT systems Current ANAO initiatives to enhance IT Audit integration and support in delivering Audit outcomes.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
The Value of Patient Education Kiosks Jackie A. Smith, Ph.D. April 12, 2000.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
SecureAware Building an Information Security Management System.
1 “Once we can deal with customers electronically, - then what?” A presentation to the RMAA, 30 May 2001 Mark Rogers, Director, Information Policy & Strategy.
Management Information Systems
1 Comp7780 Update  Why?  What?  How? What have you learnt? Comp
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Overview:  Different controls in an organization  Relationship between IT controls & financial controls  The Mega Process Leads  Application of COBIT.
0 Presentation to: Health IT HIPPA Workshop Presented by: Stacey Harris, Director of Health IT Innovation September 26, 2014 Division of Health Information.
Confidentiality and Security Issues in ART & MTCT Clinical Monitoring Systems Meade Morgan and Xen Santas Informatics Team Surveillance and Infrastructure.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
Understanding Knowledge There is More to Knowledge than Might be Known.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Together.Today.Tomorrow. The BLUES Project Karen C. Fox, PhD Chief Executive Officer.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Eliza de Guzman HTM 520 Health Information Exchange.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
ERPANET works to enhance the preservation of cultural and scientific digital objects through raising awareness, providing access to experience,
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
1 National Audioconference Sponsored by the HIPAA Summit June 6, 2002 Chris Apgar, CISSP Data Security & HIPAA Compliance Officer Providence Health Plan.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Issues and Challenges for Integrated Surveillance Systems Daniel M. Sosin, MD, MPH Division of Public Health Surveillance and Informatics Epidemiology.
Working with HIT Systems
1 MISA Model Douglas Petry Manager Information Security Architecture Methodist Health System Managed Information Security.
HIPAA Security A Quantitative and Qualitative Risk Assessment Rosemary B. Abell Director, National Healthcare Vertical Keane, Inc. HIPAA Summit VII September.
Chapter 11: Policies and Procedures Security+ Guide to Network Security Fundamentals Second Edition.
The IT Vendor: HIPAA Security Savior for Smaller Health Plans?
Energize Your Workflow! ©2006 Merge eMed. All Rights Reserved User Group Meeting “Energize Your Workflow” May 7-9, Security.
Security Training and Awareness Brad Reed, IT Security Analyst OIT – Information Security Office Securing the University – ITSS 2015.
Chris Apgar, CISSP President, Apgar & Associates, LLC December 12, 2007.
HIPAA Security John Parmigiani Director HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Week 7 Lecture Part 2 Introduction to Database Administration Samuel S. ConnSamuel S. Conn, Asst Professor.
Working with HIT Systems Unit 7a Protecting Privacy, Security, and Confidentiality in HIT Systems This material was developed by Johns Hopkins University,
Overview of the 5 Zones Maryland Health Improvement and Disparities Reduction Act of 2012 funded the HEZ program with $4 million per year for four years.
Case Study: Applying Authentication Technologies as Part of a HIPAA Compliance Strategy.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Chang, Wen-Hsi Division Director National Archives Administration, 2011/3/18/16:15-17: TELDAP International Conference.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
CSC4003: Computer and Information Security Professor Mark Early, M.B.A., CISSP, CISM, PMP, ITILFv3, ISO/IEC 27002, CNSS/NSA 4011.
Strategic Approaches to HIPAA Access & Audit HIPAA Summit West II March 15, 2002 San Francisco, CA Mariann Yeager tel cel
Monsour Roi M. Monzon, RN.  What is Electronic Health Record?  Electronic Medical Record (EMR) vs Electronic Health Record (EHR)  Comparison with Paper-based.
Securing Information Systems
ServiceNow Implementation Knowledge Management
Final HIPAA Security Rule
The Practical Side of Meaningful Use:
Our Telepsychiatry Model
Pam Matthews, FHIMSS Director of Business Information Systems Business Information Systems is focused around administrative and financial information.
HIPAA Security A Quantitative and Qualitative Risk Assessment
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Data Governance & Management Skills and Experience
Introduction to the PACS Security
Presentation transcript:

SKM2004 Daniel W. Emmer, PhD Ebrahim Randeree, MBA Securing Clinical Knowledge: Balancing Accessibility, Security, and Privacy in Dental Education

SKM2004 Overview Introduction of HCO to SKM Clinical Knowledge characteristics Issues for SKM in the Dental School Implementation in the Dental School Issues for Future Research

SKM2004 Introduction of HCO to SKM Previous focus on data creation, acquisition, storage, and transmission (Alavi & Leidner, 1999) Protection of knowledge has received little attention in research (Bloodgood & Salisbury, 2001) 2073 KM practitioners - Security issues ranked 10 th among KM practitioners (King, 2002) 307 KM - Little or no focus on security by knowledge managers (Asllani & Luthans, 2003)

SKM2004 Introduction of HCO to SKM Limited foray into KMS Biggest challenges  sharing data across multiple systems and platforms  setting standards  Improving accessibility (Bailey, 2003) Along comes HIPAA (1996) New focus on Privacy (2003) and Security (2005)

SKM2004 Clinical Knowledge Characteristics Knowledge is different; KBV and Competitive Advantage (Grant, 1996; Salisbury, 2003) Competitiveness hinges on management of intellectual resources (Grover & Davenport, 2001) Effective knowledge management requires a knowledge infrastructure and architecture – including security (Gold, et al., 2001) Clinical knowledge is neither unidirectional or linear Various users with the demand for more access, more summaries, more audits, more analytical tools (data mining) Current focus is still on database and data security (Damm & Schindler, 2002)

SKM2004 SKM Issues in the Dental School

SKM2004 SKM Issues in the Dental School Clinical Information Management System (CIMS) 2005 Security Deadline Patient record is primary vehicle – broad compilation of data and information Goal:  Quality/Effective Dental Care  Balancing access with security & privacy  Teaching School

SKM2004 Implementation in the Dental School Administrator Faculty/Res Student Access Security Privacy Administrative Technical Physical Safeguards designated by HIPAA User Groups Criteria

SKM2004 SKM Issues in the Dental School More on Clinical Information Management System (CIMS)  Central repository  Internal development, Client-server (since 1998)  Security: electronic, physical, human  KMS functions Tracking student progress Evaluating outcomes Summary financial reports QA Analysis EMR/EHR (future) Digital radiographs (future)

SKM2004 SKM Issues in the Dental School

SKM2004 Implementation in the Dental School Technology Operating Policies & Procedures User Awareness & Training (Schou & Trimmer, 2004) Firewalls/SSL/Citrix Remote Access Written

SKM2004 Implementation in the Dental School Continuous Training Continuous Risk assessment Contingency planning

SKM2004 Implementation in the Dental School Continuous Training  HIPAA Refreshers  High risk Areas  Weakest link (Smith, 2003) – Example!  Compliance through: Random audits Education Bulletins/Monthly Clinic Newsletter Online quizzes  Changing the CULTURE!

SKM2004 Implementation in the Dental School Continuous Risk assessment  Four areas Physical assets Networking Software Business/clinical processes  Gap analysis  Random audits (time consuming)

SKM2004 Implementation in the Dental School Contingency planning  Initial assessment  Linked to training  UB guidelines vs. state guidelines  On a case-by-case basis

SKM2004 Future Research Culture change – “culture of security” External influences New technology (part of the solution)  Single-Sign-On (SSO): security vs ease of use  OASIS/HL7/ASTM/???

SKM2004 Example

SKM2004 Example

SKM2004 Questions