Summary

This Allen School presentation covers computer security for week 2, including topics like legal standards, administrative safeguards, and technical protections. It also touches on general security tips, passwords, data backup, system maintenance, including viruses and firewalls.

Full Transcript

Course: Computers Week: 2 Computer Security O Legal standards of confidentiality and compliance are required by the Health Insurance Portability and Accountability Act (HIPAA) O Administrative safeguards: policy and procedure that a medical office must develop to ensure security...

Course: Computers Week: 2 Computer Security O Legal standards of confidentiality and compliance are required by the Health Insurance Portability and Accountability Act (HIPAA) O Administrative safeguards: policy and procedure that a medical office must develop to ensure security of electronic protected health information (e-PHI) O Physical safeguards: prevent an unauthorized person from physically accessing patient data (privacy screens, locked screen savers, private office/cubicles etc.) O Technical safeguards: electronic protections to prevent unauthorized access over networks. Data is encrypted with passwords and put behind firewalls. O http://www.hhs.gov/ocr/privacy/hipaa/administrat ive/securityrule/securityruleguidance.html “Where Education Comes To Life” Security in General “Where Education Comes To Life” Passwords O Separate passwords for each system O Do not share the password with other workers O Log your account off and make sure no one can use your account O Passwords may change every 30,60,90 days O Some systems have a formula to follow O One capital letter, one number or a punctuation etc. “Where Education Comes To Life” Security Passwords “Where Education Comes To Life” Data Back up O Copy all files to a remote location (server or flash drive or external hard drive etc.) O Protects the data if the machine you are working on is damaged or “hacked” into and destroyed. “Where Education Comes To Life” System Maintenance O Virus protection software: prevent malicious software from damaging or steeling information from your computer O Norton Antivirus O McAfee Antivirus “Where Education Comes To Life” Computer Viruses “Where Education Comes To Life” System Maintenance O Firewall: a hardware or software based barrier that prevents outsiders from detecting the existence of your computer “Where Education Comes To Life” Cookie Security “Where Education Comes To Life” Internet / World Wide Web O Internet: thousands of interfacing networked and millions of computers world wide. O Internet Service Provider (ISP): the commercial provider of your modem and internet connection (like Cable or Verizon) “Where Education Comes To Life” Website Reliability O Generally websites that end in.ORG or.GOV are reliable. O PEER- REVIEWED material is the ultimate check for accuracy “Where Education Comes To Life” Selecting a Reliable Website-1 “Where Education Comes To Life” Selecting a Reliable Website-2 “Where Education Comes To Life” Selecting a Reliable Website-2 “Where Education Comes To Life” Reliable or NOT? O What is the website and who created it? O Yale/Harvard, government, or personal O How recent or date of publication? O Is the site years old or kept updated O Are there advertisements in the content? O A lot of ads open the possibility that the material on that site supports you purchasing what’s in the ad O Wikipedia is not a reliable site because anyone can publish anything on there O Is/Are the author(s) name published with the material and what are their credentials? O Is it created by a physician or leader in the field O Why was the site created? O Sell a product, public service, persuade O Can you tell facts from opinions? O Is the information sourced (referenced) and are those sources easily and readily available on the site? “Where Education Comes To Life” Computer Security Review O Legal standards of confidentiality and compliance are required by the Health Insurance Portability and Accountability Act (HIPAA) O Administrative safeguards: policy and procedure that a medical office must develop to ensure security of electronic protected health information (e-PHI) O Physical safeguards: prevent an unauthorized person from physically accessing patient data (privacy screens, locked screen savers, private office/cubicles etc.) O Technical safeguards: electronic protections to prevent unauthorized access over networks. Data is encrypted with passwords and put behind firewalls. “Where Education Comes To Life” Passwords Review O Separate passwords for each system O Do not share the password with other workers O Log your account off and make sure no one can use your account O Passwords may change every 30,60,90 days O Some systems have a formula to follow O One capital letter, one number or a punctuation etc. “Where Education Comes To Life”

Use Quizgecko on...
Browser
Browser