Preview

Integrative Network Project Part 3

Good Essays
Open Document
Open Document
560 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Integrative Network Project Part 3
Integrative Network Project Part 3

For the Patton-Fuller hospital to become the best hospital in the area, key issues must be addressed. Securing the network from all possible electronic threats is one of the main issues that must be addressed. Referring back to HIPPA, this states that the facility must, “protect the privacy of individually identifiable health information (HIPPA).” Circumventing potential issues, and aiding with the tools necessary for the hospital to continue providing exceptional patient care and continuing to operate sound. If the facility does this, then we can expect much success from Patton-Fuller. In order for Patton-Fuller to operate to the best of its ability, they must first start with their wireless network. First by implementing two completely separate networks, the first network would be inside their firewall and connected to the wired network for use by staff and used by company equipment. The Second one should be located on the outside of the firewall to be used by guest and families to the facility. By drafting a “User Agreement” the guest network would be secured or encrypted in anyway, allowing any one to connect to it. On the other hand, the internal network must be secured using a WPA2 encryption, and further encryption with MAC filtering. With them implemented and in place; then a balance of the security and accessibility would benefit everyone. Currently the security for the internet server and the location of it in the network is not as protected as it should be and it is not the best design either. The internet server must be located out of the company firewall to protect the systems and network internally. By doing this it separates the remote server system the system has proper validation and connection through the system allows access to the rest of the network. Staffs that are located in the firewall can authenticate through a proxy system and then access the internet, which in turn allows them to communicate



References: HIPPA. U.S. Department of Health & Human Services. Retrieved from http://www.hhs.gov/ocr/privacy/ University Information Technology Services; Knowledge Base. Retrieved March 3, 2013: http://kb.iu.edu/data/agki.html

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Hcs 483 Wk1Dq1 2

    • 457 Words
    • 2 Pages

    Prior to the enactment of the Health Insurance Portability and Accountability Act (HIPPA) health information was able to be shared without the knowledge or permission of the patient. This information was available to just about anyone including insurance agencies, places of employment and even loan lenders. People would potentially use individuals’ health information to deny them work or a loan for their home and even impacting higher insurance rates or denial of coverage. According to U.S. Department of Health and Human Services (n.d.), “The Privacy Rule establishes a Federal floor of safeguards to protect the confidentiality of medical information. State laws which provide stronger privacy protections will continue to apply over and above the new Federal privacy standards.” (para. 1). Also, as medical records continue to move entirely to the new standard of electronic records it is important to have one standard across the country to protect everyone’s information. Electronic health records (EHR) make it easier than ever to accidentally share medical information, to include having it stolen. Medical providers are just as likely to face consequence if their facility is broken in to and the hard drive with patients information is stolen as they would be if they gave the information away themselves. In general HIPPA protects patients’ information as well as their right to be treated equally.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Patton-Fuller Rfp Cmgt554

    • 4696 Words
    • 19 Pages

    The following document shall serve as the RFP (Request for Project) for the Patton-Fuller Community Hospital. Team A has researched the hospital’s current IT systems seeking ways to ensure many years of continued success and compliance with the very best practices in the IT community today. Specific areas such as networking architecture design and the future proofing of the design for speed, accuracy, and security of the system shall be discussed as part of this RFP. Special consideration was given to the sensitive nature of the security surrounding patient information while proposing changes.…

    • 4696 Words
    • 19 Pages
    Best Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Looking at the network diagram provided I determined that the user, workstation, LAN, LAN-to-WAN, and system/application domains involved in the company should be redesigned to implement better access controls to provide multi-layered security. The most important access control implementation would be the user domain where the company should put emphasis on training; how to recognize social engineering attacks, how to create strong passwords, and how often they should be changed. The workstation domain should focus security via virus and malware scanning, operating system patching, and other types of application-level firewalls. To achieve a multi-layered security approach in the LAN domain I would recommend using an intrusion detection system (IDS) and an intrusion prevention system (IPS) to prevent unauthorized access. Security for the LAN-to-WAN domain should be implemented through the use of a firewall or DMZ to also prevent unauthorized access into the company’s network.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. How does HIPPA serve to protect patient rights? A patient’s health information can be shared with doctors and hospitals for treatment and care. The information can also be shared with family members who the patient has given permission to access the patient’s records. HIPPA’s guidelines make clear exactly what information about patients is protected. Called PHI, this information includes anything that would identify a patient, from name, Social Security numbers and addresses to broader identifiers like race, age and home state. Information about the person’s health care needs or medical history is also considered PHI.…

    • 388 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Kudler Fine Foods was first founded by Kathy Kudler in La Jolla, California. It has expanded to two more locations, Del Mar, California, and Encinitas, California. The stores are generally spaced, about 8,000 sq ft, and have imported and domestic foods, including Fresh Bakery & Pastries, Fresh Produce, Fresh Meat & Seafood, Condiments & Packaged foods as well as Cheese and other dairy products. Kudler wants to see their company grow by upgrading their communications systems and making it wireless. The wireless technology upgrade will allow the company to have a better way of communicating between the stores as well as to the employees and customers .…

    • 495 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Anyone with a laptop or tablet could access the network and with only few basic network utilities could access all the servers and all the patient information. Most of these facilities are not implementing any Network Security because of the cost associated with it. “Most healthcare organizations nationwide, some 61 percent to be exact, reported a security related incident in the form of security breach, data loss or unplanned downtime at least once this past year, according to a new health IT report by MeriTalk, a public-private organization working to improve government information technology. These security events cost U.S. hospitals an estimated $1.6 billion each year. Breaking it down by incident, hospitals should expect to hand over on average $810,000 per security breach, which occurs at nearly one in five healthcare organizations nationwide” (healthcareitnews.com). I hope that with this project I can make clear the benefits of securing the network and the steps we need to take to set up and secure the…

    • 698 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Administrators at the University of Colorado found a way to comply HIPAA to protect the integrity of electronic patient records. In addition to meeting the Privacy requirement of HIPAA, they needed a system to deal with their staff of medical professionals who move from computer to computer throughout their shifts. To be better equipped to achieve compliance, the hospital chose to use technology via a…

    • 783 Words
    • 4 Pages
    Good Essays
  • Good Essays

    As of today there are issues with the information technology systems, clinical data management systems and the increasing automation of the electronic medical records. All of these present a significant amount of patient privacy and confidentiality issues. When we say confidential, meaning in healthcare we are talking about the protection of a patient’s medical information and keeping their medical information private and safe from any third parties. Administrators are expected to follow the HIPAA Privacy Rule. The HIPAA protects the privacy of patient’s medical information. Patient’s medical records are sensitive personal information that is covered with privacy. There are several ethical…

    • 585 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Over the years since the inception of HIPAA, it is hard not to notice the influence it brought on to the patients, the healthcare industry, the health information management and technology, and other entities in securing the confidentiality, security, and privacy of PHI. In addition, the HITECH Act and its HIPAA modification released in January 2013 greatly invigorated the HIPAA of 1996 (Solove, 2013). Definitely, the most important health care changes over the past couple of decades is the growing interest in health information privacy and security (Solove, 2013).…

    • 90 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Hippa Regulations

    • 339 Words
    • 2 Pages

    HIPPA security and electronic signature standards are designed to protect the confidentiality, integrity, and availability of individual health information while allowing appropriate use by providers, plans, and clearing houses. The security standards apply to health data stored electronically or transmitted over a network. The proposed security standards include standards for…

    • 339 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    HIPAA Privacy Analysis

    • 170 Words
    • 1 Page

    Patient care has been vulnerable by HIPAA; healthcare providers cannot easily share patient’s information. Each patient or power of attorney must give implied permission for a healthcare provider to share any personal information. Deprived of not being able to share patient information between providers, it takes longer time to get critical information that can affect patient care. Healthcare organizations faces supplementary legal costs if they violate HIPAA privacy provisions. These costs make many organizations careful of sharing a patient information, even if the patient has given permission for information sharing, so that’s why everything has to be documented, initial, and signed.…

    • 170 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Why Is Hippa Important

    • 649 Words
    • 3 Pages

    Protecting personal information should always be a priority in any medical field.The Protected health information is suppose to be secured under the Health and accountability act beginning in 1996.This act is currently known as the HIPPA Act which is designed to protect medical rights. Imagine your information shared without knowledge even though HIPPA should be already set in place to protect rights of citizens. Does HIPPA seem to fall short in securing data and protecting American rights to medical trust? How can one be sure that all measures are being met to ensure protection?…

    • 649 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Providers of health care should be acquainted with the rules and regulations that guide HIPAA and the subsequent violations. Information is necessary to provide adequate and correct patient care. The guidelines to protect patient privacy should be followed but are open for interpretation. Providers should be steered by professional principals and ethics (Lo, Dornbrand, Dubler 2005). Health care providers must understand the difference between privacy and confidentiality. Privacy is the right of individuals to keep personal information restricted. Patients decide who has access to their information. Confidentiality is how…

    • 1599 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    The federal Health Insurance Portability and Accountability Act (HIPPA) is a security measure to preserve the confidentiality of medical records and standardized electronic data interchange (EDI) among providers, insurers, and government agencies.…

    • 380 Words
    • 2 Pages
    Good Essays