Recommend elements included in the design of audit trails and data quality monitoring programs

timer Asked: Jun 10th, 2018
account_balance_wallet $19.99

Question Description

  • Unit outcomes addressed in this Assignment:
    • Discuss the impetus for health information exchange (HIE) in the United States.
    • Describe basic HIE organizational structures, architectures, and services.
    • Reinforce the need for data stewardship in HIE services.
    • Identify the state, regional, and local activities in achieving benefits and overcoming challenges for HIE organizations.
    • Describe the federal government's concept of a nationwide health information network

Unformatted Attachment Preview

Information Technology (IT) and the NHIN Assignment Requirements • • • • Please complete all parts in a Microsoft Word document. The body of your document should be at least 1200 words in length. Quoting should be less than 10% of the entire paper. Paraphrasing is necessary. Students must cite and reference at least 4 credible sources from the Library. Instructions Imagine that you are the Director of Health Information for a large hospital. As Director, you sit on various institution-wide committees which govern the organization’s policies. In collaboration with interdepartmental committees, you have made recommendations regarding the improvement of policies, procedures, and operations across the institution. The CEO and Board of Directors has approved funding for several initiatives, but has asked you to narrow changes to just a few. Therefore, you will develop an action plan for the hospital. Please follow the instructions below in completion of this assignment. Part 1 Competency Assessed Recommend elements included in the design of audit trails and data quality monitoring programs 2 Assess systems capabilities to meet regulatory requirements 3 Recommend device selection based on workflow, ergonomic and human factors Instructions Appraise at least three (3) policies which cover data security (i.e., audits, control data recovery, e-security, data recovery planning, and business continuity planning). Make three (3) recommendations for improvements to the elements included in the design of audit trails and data quality monitoring programs within the hospital. Critique the systems capabilities to meet regulatory requirements by judging the technologies that relate to electronic signatures, data correction, and audit logs. Critique at least three (3) human factors and user interface design of health information technologies by making at least (3) recommendations for device 4 Evaluate system architecture, database design, data warehousing 5 Take part in the development of information management plans that support the organization's current and future strategy and goals 6 Take part in the planning, design, selection, implementation, integration, testing, evaluation, and support of health information technologies selection based on workflow, ergonomics, and human factors. Evaluate a health information system's architecture in terms of database design and data warehousing. Critique issues with systems implementation related to systems testing, interface management, and data relationships. Participate in the development of information management plans that support the organization's current and future strategy and goals by comparing and contrasting at least three (3) issues related to a corporate strategic plan, operation improvement planning, information management plans, and/or disaster and recovery planning. Analyze at least three (3) challenges that exist in each phase of the systems development life cycle. Distinguish issues related to EHRs, HIEs, and RECs within your analysis. ...
Purchase answer to see full attachment

Tutor Answer

School: Rice University




Health information Exchange




Part 1;
Appraisal of Policies that Cover Data Security
Acceptable Use Policy
Anytime the organization systems are used in an inappropriate manner, the company is
exposed to a number of unpredictable risks. This calls for the specification of those things that are
prohibited and those that are permitted. The acceptable use of the information technology is
detailed in this policy. All the parties involved are protected by this policy.
The policy should specify the manner in which technology like email, social media, and
web browsing should be used. The policy should also include the protocol to be followed in
reporting security incidents (Kellermann & Jones, 2013).
Mobile Device Policy
Whenever the workers are flexible, they become more productive. The use of mobile
devices contributes significantly to the flexibility of workers. Information becomes more
straightforward to convey. However, there is a growth in the storage of sensitive information in
these devices making their use of being quite a risk. Any device that is likely to come into contact
with data of the company should be covered by this policy.
Password Policy
This is a significant step that the company should take to ensure that each employee is
always on watch over cyber-attack. All user accounts should still be protected using passwords.
Choosing these passwords should be done very keenly to ensure that the corporate network of the
organization is not compromised in any way. Anybody who has access to the company’s system
(guests, partners, contractors, vendors, and employees) should put this policy into practice.



The design of Audit Trails and Data Quality Monitoring Programs. The f...

flag Report DMCA

awesome work thanks

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors