Cmgt/554 Week 2

Topics: OSI model, OSI protocols / Pages: 6 (1453 words) / Published: Nov 13th, 2012
Patton-Fuller Community Hospital IT Department

Patton-Fuller Community Hospital IT Department In order for an organization to be able to have an efficient and successful organization the proper Information Technology system (IT) must be in place, this document will demonstrate what system is in place to make sure system is running successfully. Patton-Fuller Community Hospital is a prominent hospital that is known for specializing in pharmacy, radiology, surgery, and physical therapy. This community hospital has numerous departments and each has a different IT need, so understanding which programs will work and be compatible is their major objective. The patients of Patton-Fuller Hospital are accustomed to the quality service that the hospital provides with a focus on the different programs and services to help maintain a high degree of concern for its patients. Patton-Fuller Community Hospital has an great quantity of technology and can be divided into many different areas providing an in-depth review of the advancements and shortfalls of organization. Understanding the OSI model is important to getting the proper IT system job done, so knowing how to fit these elements together to form working system is what will be explained. The networking department has the challenge of breaking down the current infrastructure to ensure a comprehensive analysis is done to provide a solution that will last for the three to five years. A major goal of the hospital is to protect the personal information of the patients who fall under the guidelines of the Health Insurance Portability and Accountability Act (HIPAA). HIPAA requires the protection and confidential handling of protected health information ("Health Insurance Portability And Accountability Act", 2012). To make sure that standards are meet, Patton-Fuller uses an encrypted storage system known as Advanced Encryption Standard (AES) (Apollo Group, 2011). According to "Encryption



References: Bhagchandani, R. (2011). Networking Cheat Sheet . Retrieved from http://www.climbupon.com/stuffs/techmenu/45-networking-cheat-sheet?&lang=en_us&output=json&session-id=6030d5bf6d0f58e0de3ea68fb6a8c6e8 Encryption algorithms. (2012). Retrieved from http://www.networksorcery.com/enp/data/encryption.htm Health Insurance Portability and Accountability Act. (2012). Retrieved from http://www.dhcs.ca.gov/formsandpubs/laws/hipaa/Pages/1.00%20WhatisHIPAA.aspx

You May Also Find These Documents Helpful

  • Cmgt 554 Week 5
  • Cmgt 554 Week4
  • CMGT/554 Week 1 Individual Assigment
  • Cmgt 441 Week 2
  • Cmgt 430 Week 2
  • CMGT 575 Week 2 Summary
  • Cmgt 400 Week 2
  • Cmgt 441 - Week 2 Individual
  • CMGT 445 Week 2 IA
  • CMGT 575 Week 5 DQ 2