Types of Organizations in the Healthcare Sector
Healthcare Organizational Behavior
Coding and Classification Systems and Standards
International Classification of Diseases (ICD)
Systematized Nomenclature of Medicine Clinical Terms (SNOMED CT)
Claims Processing and Third-Party Payers
Business Process Reengineering (BPR)
Good Clinical Research Practice (GCP)
De-identification of Patient Information
Destruction of Patient Health Information
Authentication, Authorization, and Accounting (AAA)
Other Third-Party Relationships
Understand Foundational Health Data Management
Managing Information Flow and Lifecycle in Healthcare Environments
Data Lifecycle Management (DLM)
Data Interoperability and Exchange
Integrating the Healthcare Enterprise (IHE)
Digital Imaging and Communications in Medicine (DICOM)
Chapter 2 Information Governance in Healthcare
Information Security Steering Committee
Information Management Council
Risk Management Steering Committee
Generally Accepted Privacy Principles
Audit Committee (Board of Directors)
Information Governance Roles and Responsibilities
Chief Information Security Officer
Information Security and Privacy Policies and Procedures
Notable Policies and Procedures
Code of Conduct or Ethics in a Healthcare Information Environment
Organizational Codes of Conduct in Healthcare
Organizational Codes of Ethics in Healthcare
Chapter 3 Information Technologies in Healthcare
Fostering Privacy and Security with HIT
Increased Exposure Affecting the Threat Landscape
Internal Threats to HIT Privacy and Security
External Threats to HIT Privacy and Security
Oversight and Regulatory Challenges
Software and System Development
Medicare Access and CHIP Reauthorization Act of 2015
Trust Models for Third-Party Interconnections
Technical Standards: Physical, Logical, Network Connectivity
Chapter 4 Regulatory and Standards Environment
Identify Regulatory Requirements
Legal Issues Regarding Information Security and Privacy
Protected Personal and Health Information
Recognize Regulations and Controls of Various Countries
Understand Compliance Frameworks
Chapter 5 Privacy and Security in Healthcare
Guiding Principles of Information Security: Confidentiality, Integrity, and Availability
Understanding Security Concepts
Identity and Access Management
Least Privilege (Need to Know)
Configuration, or Change Management
Understanding Privacy Concepts
Transfer to Third Parties (or Countries)
Events, Incidents, and Breaches
The Relationship Between Privacy and Security
Ownership of Healthcare Information
Understand Sensitive Data and Handling
Chapter 6 Risk Management and Risk Assessment
Understand Enterprise Risk Management
Measuring and Expressing Information Risk
Identifying Information Assets
Understand Information Risk Management Framework
NIST Risk Management Framework (RMF)
International Organization for Standardization
Centers for Medicare and Medicaid Services
Understand Risk Management Process
Quantitative vs. Qualitative Approaches
Information Lifecycle and Continuous Monitoring
Tools, Resources, and Techniques
Role of Internal and External Audit and Assessment
Identify Control Assessment Procedures Using Organization Risk Frameworks
Participate in Risk Assessment According to Your Role
Risk Assessment Estimated Timeline
Use Controls to Remediate Risk
Participate in Continuous Monitoring
Chapter 7 Third-Party Risk Management
Understand the Definition of Third Parties in the Healthcare Context
Maintain a List of Third-Party Organizations
Third-Party Role and Relationship with the Organization
Third-Party Risk in Data Disposition
Third-Party Risk in Nonmedical Devices
Health Information Use: Processing, Storage, Transmission
International Regulations for Data Transfer to Third Parties
Unauthorized Disclosure of Data Transferred to Third Parties
Apply Management Standards and Practices for Engaging Third Parties
Determine When a Third-Party Assessment Is Required
Triggers of a Third-Party Assessment
Support Third-Party Assessments and Audits
Information Asset Protection Controls
Compliance with Information Asset Protection Controls
Participate in Third-Party Remediation Efforts
Respond to Notifications of Security/Privacy Events
Internal Processes for Incident Response
Relationship Between Organization and Third-Party Incident Response
Breach Recognition, Notification, and Initial Response
Respond to Third-Party Requests Regarding Privacy/Security Events
Organizational Breach Notification Rules
Organizational Information Dissemination Policies and Standards
Promote Awareness of Third-Party Requirements
Information Flow Mapping and Scope
Data Sensitivity and Classification
Privacy and Security Requirements
Risks Associated with Third Parties
Appendix About the Online Content
Your Total Seminars Training Hub Account
18.218.48.62