Recommend elements included in the design of audit trails and data quality monitoring programs

Anonymous
timer Asked: Jun 10th, 2018
account_balance_wallet $19.99

Question Description

  • Unit outcomes addressed in this Assignment:
    • Discuss the impetus for health information exchange (HIE) in the United States.
    • Describe basic HIE organizational structures, architectures, and services.
    • Reinforce the need for data stewardship in HIE services.
    • Identify the state, regional, and local activities in achieving benefits and overcoming challenges for HIE organizations.
    • Describe the federal government's concept of a nationwide health information network

Unformatted Attachment Preview

Information Technology (IT) and the NHIN Assignment Requirements • • • • Please complete all parts in a Microsoft Word document. The body of your document should be at least 1200 words in length. Quoting should be less than 10% of the entire paper. Paraphrasing is necessary. Students must cite and reference at least 4 credible sources from the Library. Instructions Imagine that you are the Director of Health Information for a large hospital. As Director, you sit on various institution-wide committees which govern the organization’s policies. In collaboration with interdepartmental committees, you have made recommendations regarding the improvement of policies, procedures, and operations across the institution. The CEO and Board of Directors has approved funding for several initiatives, but has asked you to narrow changes to just a few. Therefore, you will develop an action plan for the hospital. Please follow the instructions below in completion of this assignment. Part 1 Competency Assessed Recommend elements included in the design of audit trails and data quality monitoring programs 2 Assess systems capabilities to meet regulatory requirements 3 Recommend device selection based on workflow, ergonomic and human factors Instructions Appraise at least three (3) policies which cover data security (i.e., audits, control data recovery, e-security, data recovery planning, and business continuity planning). Make three (3) recommendations for improvements to the elements included in the design of audit trails and data quality monitoring programs within the hospital. Critique the systems capabilities to meet regulatory requirements by judging the technologies that relate to electronic signatures, data correction, and audit logs. Critique at least three (3) human factors and user interface design of health information technologies by making at least (3) recommendations for device 4 Evaluate system architecture, database design, data warehousing 5 Take part in the development of information management plans that support the organization's current and future strategy and goals 6 Take part in the planning, design, selection, implementation, integration, testing, evaluation, and support of health information technologies selection based on workflow, ergonomics, and human factors. Evaluate a health information system's architecture in terms of database design and data warehousing. Critique issues with systems implementation related to systems testing, interface management, and data relationships. Participate in the development of information management plans that support the organization's current and future strategy and goals by comparing and contrasting at least three (3) issues related to a corporate strategic plan, operation improvement planning, information management plans, and/or disaster and recovery planning. Analyze at least three (3) challenges that exist in each phase of the systems development life cycle. Distinguish issues related to EHRs, HIEs, and RECs within your analysis. ...
Purchase answer to see full attachment

Tutor Answer

TutorLeal
School: Rice University

Attached.

OUTLINE
Introduction
Body
Conclusion
Reference


Running Head: INFORMATION TECHNOLOGY

Health information Exchange
Name:
Course/Number:
Institution:
Instructor:
Date:

1

INFORMATION TECHNOLOGY

2

HEALTH INFORMATION EXCHANGE
Part 1;
Appraisal of Policies that Cover Data Security
Acceptable Use Policy
Anytime the organization systems are used in an inappropriate manner, the company is
exposed to a number of unpredictable risks. This calls for the specification of those things that are
prohibited and those that are permitted. The acceptable use of the information technology is
detailed in this policy. All the parties involved are protected by this policy.
The policy should specify the manner in which technology like email, social media, and
web browsing should be used. The policy should also include the protocol to be followed in
reporting security incidents (Kellermann & Jones, 2013).
Mobile Device Policy
Whenever the workers are flexible, they become more productive. The use of mobile
devices contributes significantly to the flexibility of workers. Information becomes more
straightforward to convey. However, there is a growth in the storage of sensitive information in
these devices making their use of being quite a risk. Any device that is likely to come into contact
with data of the company should be covered by this policy.
Password Policy
This is a significant step that the company should take to ensure that each employee is
always on watch over cyber-attack. All user accounts should still be protected using passwords.
Choosing these passwords should be done very keenly to ensure that the corporate network of the
organization is not compromised in any way. Anybody who has access to the company’s system
(guests, partners, contractors, vendors, and employees) should put this policy into practice.

INFORMATION TECHNOLOGY

3

The design of Audit Trails and Data Quality Monitoring Programs. The f...

flag Report DMCA
Review

Anonymous
awesome work thanks

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors