Component 8 Installation and Maintenance of Health IT Systems Unit 9b Creating Fault-Tolerant Systems, Backups, and Decommissioning This material was developed.

Slides:



Advertisements
Similar presentations
How to Ensure Your Business Survives, Even if Your Server Crashes Backup Fast, Recover Faster Fast and Reliable Disaster Recovery, Data Protection, System.
Advertisements

Remove the hurdles to offsite backup Highly efficient Automatically copies VMs to local or offsite storage location Validation and remediation.
Backup Strategy. An Exam question will ask you to describe a backup strategy. Be able to explain: Safe, secure place in different location. Why? – For.
11 BACKING UP AND RESTORING DATA Chapter 4. Chapter 4: BACKING UP AND RESTORING DATA2 CHAPTER OVERVIEW Describe the various types of hardware used to.
1 Storage Today Victor Hatridge – CIO Nashville Electric Service (615)
Barracuda Backup Service Data Backup and Disaster Recovery.
The Ultimate Backup Solution.
Genie Backup ManagerServer 7.0 Product Profile. Copyright© Genie-Soft Corporation All rights reserved. Overview GBM Server 7.0 is a fully integrated.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
November 2009 Network Disaster Recovery October 2014.
1 Introducing Windows Backup There are different methods for starting Windows 2000 Backup. Requirements for running Windows 2000 Backup All users can back.
Gorman, Stubbs, & CEP Inc. 1 Introduction to Operating Systems Lesson 12 Windows 2000 Server.
Chapter 7 Making Backups with RMAN. Objectives Explain backup sets and image copies RMAN Backup modes’ Types of files backed up Backup destinations Specifying.
STEALTH Content Store for SharePoint using Caringo CAStor  Boosting your SharePoint to the MAX! "Optimizing your Business behind the scenes"
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
Meeting the Data Protection Demands of a 24x7 Economy Steve Morihiro VP, Programs & Technology Quantum Storage Solutions Group
1 SECURITY & HIPAA DATA ENSURE INC. 798 PARK AVE. NW SUITE 204 NORTON, VA (276) D E.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Introduction to Information and Computer Science Information Systems Lecture c This material (Comp4_Unit9c) was developed by OHSU, funded by the Department.
Maintaining File Services. Shadow Copies of Shared Folders Automatically retains copies of files on a server from specific points in time Prevents administrators.
1 Availability Policy (slides from Clement Chen and Craig Lewis)
Working with Health IT Systems Protecting Privacy, Security, and Confidentiality in HIT Systems Lecture a This material (Comp7_Unit7a) was developed by.
Comp 14 - Special Topics in Vendor- Specific Systems Unit 8 - Vendor-Specific Go- Live Strategies This material was developed by Columbia University, funded.
Introduction to Information and Computer Science Basic Computing Concepts Including History Lecture c This material (Comp4_Unit1c) was developed by Oregon.
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
IOS110 Introduction to Operating Systems using Windows Session 10 1.
15 Copyright © 2007, Oracle. All rights reserved. Performing Database Backups.
Component 4: Introduction to Information and Computer Science Unit 4: Application and System Software Lecture 3 This material was developed by Oregon Health.
Unit 8a Troubleshooting; Maintenance and Upgrades; Interaction with Vendors, Developers, and Users Component 8 Installation and Maintenance of Health IT.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Unit 8b Troubleshooting; Maintenance and Upgrades; Interaction with Vendors, Developers, and Users Component 8 Installation and Maintenance of Health IT.
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
Component 4: Introduction to Information and Computer Science Unit 1: Basic Computing Concepts, Including History Lecture 3 This material was developed.
Unit 6a System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Working with Health IT Systems Protecting Privacy, Security, and Confidentiality in HIT Systems Lecture b This material (Comp7_Unit7b) was developed by.
This material was developed by Oregon Health & Science University, funded by the Department of Health and Human Services, Office of the National Coordinator.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Component 8/Unit 9bHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 9b Creating Fault Tolerant.
Component 8 Installation and Maintenance of Health IT Systems Unit 1b Elements of a Typical Electronic Health Record System This material was developed.
Component 8 Installation and Maintenance of Health IT Systems Unit 1a Elements of a Typical Electronic Health Record System This material was developed.
Working with HIT Systems
Special Topics in Vendor- Specific Systems EHR Go-Live Strategies This material (Comp14_Unit8) was developed by Columbia University, funded by the Department.
Unit 9a Creating Fault-Tolerant Systems, Backups, and Decommissioning Component 8 Installation and Maintenance of Health IT Systems This material was developed.
STORAGE MANAGEMENT/MASTER: Building an Affordable Practice for Regulation Compliance Getting the most out of existing technology Marc Farley President.
Module 9: Designing Security for Data. Overview Creating a Security Plan for Data Creating a Design for Security of Data.
Component 3-Terminology in Healthcare and Public Health Settings Unit 16-Definitions and Concepts in the EHR This material was developed by The University.
Hosted by Creating RFPs for Tape Libraries Dianne McAdam Senior Analyst and Partner Data Mobility Group.
Configuring Electronic Health Records Privacy and Security in the US Lecture a This material (Comp11_Unit7a) was developed by Oregon Health & Science University.
Component 8/Unit 9aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 9a Creating Fault Tolerant.
Working with HIT Systems Unit 7a Protecting Privacy, Security, and Confidentiality in HIT Systems This material was developed by Johns Hopkins University,
Cloud Archive By: Kimberly Nolan. What it is?  The goal of a cloud archiving service is to provide a data storage (ex. Google drive and SkyDrive) as.
Terminology in Healthcare and Public Health Settings Electronic Health Records Lecture b – Definitions and Concepts in the EHR This material Comp3_Unit15.
Component 9 – Networking and Health Information Exchange Unit 9-1 Privacy, Confidentiality, and Security Issues and Standards This material was developed.
Component 8/Unit 1bHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 1b Elements of a Typical.
St. Petersburg, 2016 Openstack Disk Storage vs Amazon Disk Storage Computing Clusters, Grids and Cloud Erasmus Mundus Master Program in PERCCOM Author:
CDP Technology Comparison CONFIDENTIAL DO NOT REDISTRIBUTE.
BACKUP AND RESTORE. The main area to be consider when designing a backup strategy Which information should be backed up Which technology should be backed.
Component 9 – Networking and Health Information Exchange Unit 2-3 Network Media and Hardware Communication Devices This material was developed by Duke.
Installation and Maintenance of Health IT Systems System Security Procedures and Standards Lecture a This material Comp8_Unit6a was developed by Duke University,
Slide Template for Module 4 Data Storage, Backup, and Security
Integrating Disk into Backup for Faster Restores
Installation and Maintenance of Health IT Systems
Backing up a Hard Disk Windows XP Tutorial 6.
Retain Data Commensurate with Value
Uptime All The Time: Doing Business In The Cloud
The Ultimate Backup Solution.
Prepared by Jaroslav makovski
Using the Cloud for Backup, Archiving & Disaster Recovery
IBM Tivoli Storage Manager
Presentation transcript:

Component 8 Installation and Maintenance of Health IT Systems Unit 9b Creating Fault-Tolerant Systems, Backups, and Decommissioning This material was developed by Duke University, funded by the Department of Health and Human Services, Office of the National Coordinator for Health Information Technology under Award Number IU24OC

Importance of Backup Volume of data: hospital can generate 12 terabytes/yr in radiology alone. HIPAA (Health Information Portability & Accountability Act) Security Rule requires exact backup copies of all healthcare data, easily retrievable, generally for the patient’s lifetime plus one year. Component 8/Unit 9bHealth IT Workforce Curriculum Version 2.0 Spring

Backup Strategies: Requirements Healthcare data generally must be retained for patient’s lifetime + 1 year. Copies protected at off-site location in case of natural disaster, fires, flooding, etc. Easily retrievable for timely restoration Security via encryption and storage in secure location Component 8/Unit 9bHealth IT Workforce Curriculum Version 2.0 Spring

Backup Strategies: Backup Window Time required to complete a given backup. –Determined by amount of data to be backed up + speed of network infrastructure Problems when backup window reaches peak operation cycles, potentially straining resources and slowing down the system. Component 8/Unit 9bHealth IT Workforce Curriculum Version 2.0 Spring

Backup Strategies: Which Files? Full backups –All files –Pro: Ultimate protection, simple restoration –Con: Requires more time & lots of storage to keep multiple file versions Incremental backups –Only files that have changed since last backup (full or incremental) –Pro: Much faster –Con: Restoration from multiple files Component 8/Unit 9bHealth IT Workforce Curriculum Version 2.0 Spring

Backup Strategies: Which Files? (cont’d) Differential backup –Middle ground: all the files that have changed since the last full backup –Pro: easier restoration Synthetic full backup –Compensates for small/nonexistent backup window –Data from last full backup + differential / incremental backup combined to create new full backup tape Component 8/Unit 9bHealth IT Workforce Curriculum Version 2.0 Spring

Backup Strategies: Which Files? (cont’d) File system snapshots –Available through VM environments and later UNIX versions –Backups at several times through the day without needing large amounts of additional storage media –Reliable backups without shutting down applications Component 8/Unit 9bHealth IT Workforce Curriculum Version 2.0 Spring

Backup Strategies: Methods Direct backup –Tape drive / autoloader / library directly connected to every server to directly backup and restore data Network backup –Much larger device connected to just one server backs up data of all servers SAN (Storage Area Network)backup –Storage network to which all servers & backup device connect –With appropriate arbitration, all servers backup to shared devices. Most use a combination. Component 8/Unit 9bHealth IT Workforce Curriculum Version 2.0 Spring

Databases require extra considerations. Consult with EHR vendor to ensure backup strategy is compatible with database infrastructure. Component 8/Unit 9bHealth IT Workforce Curriculum Version 2.0 Spring Backup Strategies: Databases

Decommissioning Goals in retiring old systems / applications / datasets –Active data properly retained –Inactive data archived or disposed of securely Tips –Complete full data audit; note redundancies. –Determine data owners and stakeholders. –Identify active vs. inactive data. –Consider reporting / retrieval requirements for compliance. Component 8/Unit 9bHealth IT Workforce Curriculum Version 2.0 Spring

Decommissioning (cont’d) Tips (cont’d) –Document retention policies well & ensure consistency with government guidelines. –Standardize on single, well-navigable archival system. –Develop decommissioning plan & schedule. –Ensure integrity of archived data and destruction of decommissioned data. Component 8/Unit 9bHealth IT Workforce Curriculum Version 2.0 Spring

Summary HIPAA requires exact backup copies of all healthcare data, to remain protected and easily retrievable for the patient’s lifetime plus one year after death. A Backup Window is the time required to complete a given backup task. An effective backup strategy minimizes the backup window while ensuring data integrity. Component 8/Unit 9bHealth IT Workforce Curriculum Version 2.0 Spring

Summary Types of backups include: –Full Backups –Incremental backups –Differential Backups –Synthetic Full Backups –Snapshots Typical backup strategies use a combination of different methods: –Direct –Network –SAN Component 8/Unit 9bHealth IT Workforce Curriculum Version 2.0 Spring

Summary Decommissioning Storage Systems require special considerations including: –Active data properly retained –Inactive data archived or disposed of securely Component 8/Unit 9bHealth IT Workforce Curriculum Version 2.0 Spring

References Mike Harwood. “Storage Basics: Backup Strategies,” Enterprise Storage Forum. – gement/features/article.php/ http:// gement/features/article.php/ Simon Gordon. “Comparing different backup strategies.” SearchStorage.com. – aring-different-backup-strategieshttp://searchstorage.techtarget.com/tip/Comp aring-different-backup-strategies Component 8/Unit 9bHealth IT Workforce Curriculum Version 2.0 Spring