preview

Electronic Medical Records

explanatory Essay
1201 words
1201 words
bookmark

RISK ASSESSMENT PART-I Risk assessment is the main component. It is used to process several elements such as identifying, prioritizing and estimating information security risks. It is used in the organizational risk management process. They can be used as a single or multiple methodologies in risk assessment. There may be critiques or sensitivity of the functions and information systems or the stage of information systems in the development life cycle. Electronic medical record is a kind of database where the details of the patient is stored which can be accessed anytime. It is the digital version that contains all the data in a single file. It is created for the patients in the hospital and ambulatory environment. It has several benefits because it allows tracking the data over time and identifying and monitoring and improving as it allows the patients to identify the patient visits and screenings. Electronic health record will serve as the source for the electronic medical record. There is a difference between the emr and ehr where electronic health record is used to share information from all providers. The data stored in the ehr can be modified, updated, and share by the trusted providers. Risk assessment in such cases will have to make up an enterprise for medical practice called as Medco. The main objectives of risk management are: securing the information of the information technology sector that will store and does all the necessary process that has to be made and it can also transfer the company’s data. It is used to enable the decisions made by the management to clear the expenses that are made will be a part of their budget. The performance of the management will be assisted by the authorized IT systems to support th... ... middle of paper ... ... supplies should regulate the voltage high and low and it contains line conditioners. These will provide input to the mitigation process in order to evaluate and implement the controls. There is data loss in the database in the Medco Organization which needs to be prepared in the final documentation part. They have different levels of threats which will range from high to low and also efficient data needs to be reconciled and control the system implementations. References: 1. http://waterky.org/node/10076 2. http://www.americanehr.com/blog/2011/12/data-backup-information-protection/ 3. https://bb.uis.edu/bbcswebdav/pid-297124-dt-content-rid-1425606_1/courses/133CSC57012315/SP800-30-Rev1-ipd.pdf 4. https://bb.uis.edu/bbcswebdav/pid-297124-dt-content-rid-1425666_1/courses/133CSC57012315/Course%20Documents/NIST%20Special%20Publications%20SP%20800-30%281%29/sp800-30.pdf

In this essay, the author

  • Explains that irisk assessment is the main component used to process several elements such as identifying, prioritizing and estimating information security risks.
  • Explains that electronic medical record is a kind of database where the details of the patient are stored which can be accessed anytime. it is created for the patients in the hospital and ambulatory environment.
  • Explains the main objectives of risk management: securing information of the information technology sector that will store and do all the necessary process that has to be made and it can also transfer the company’s data.
  • Explains that medco is used by physicians for the emergency purpose in the local trauma to treat the patients suffering from the incurable cardiology issues.
  • Explains that medco contains microsoft exchange server, domain controller, citrix server, web server and microsoft sql server which runs the patients data. the gathering techniques are used in any organization for its operations.
  • Explains that vulnerabilities in the system software can be triggered accidentally or intentionally exploited. natural threats like floods, earthquakes and tornados cause abnormal termination of systems for power loss.
  • Explains that there are various sources to retrieve the information through different kinds of measures in order to remove the unidentified vulnerabilities.
  • Explains that in case of control analysis, the controls that have been accessed by the organization to implement or eliminate the existing planned vulnerability are lan connection to the servers which are internally connected through routers and switches.
  • Explains that there are different factors that can be considered to determine the likelihood rating to construct the nature and existence of the current controls.
  • Explains that the impact analysis is used to stabilize the information stored in the data base. it impacts the risk of vulnerability and criticality of data.
  • Explains that risk determination can be expressed as a function of threat’s source for vulnerability. there are different ranges of matrix level from high to low where it is 1 for high and o0.5 for mid.
  • Recommends reducing the level of the risk for the medco and to store the data on the acceptable stage. the unlocked room should be well secured and authorized level.
  • Explains that there is data loss in the medco organization's database, which needs to be prepared in its final documentation part.
  • Cites the following sources: http://waterky.org/node/100762, https://www.americanehr.com/blog/2011/12/data-backup-information-protection/3.
Get Access