

{"id":25,"date":"2025-02-15T11:59:00","date_gmt":"2025-02-15T16:59:00","guid":{"rendered":"https:\/\/sites.temple.edu\/rmi5103dwhiteindividualproject\/?page_id=25"},"modified":"2025-02-23T19:33:27","modified_gmt":"2025-02-24T00:33:27","slug":"health-information-technology-risk-and-the-growing-concern","status":"publish","type":"page","link":"https:\/\/sites.temple.edu\/rmi5103dwhiteindividualproject\/health-information-technology-risk-and-the-growing-concern\/","title":{"rendered":"Analysis and Interpretations"},"content":{"rendered":"\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">The Implications of ERM Approach to the Utilization of Health Information Exchanges and Patient Portals<\/h2>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading has-text-align-center has-vivid-green-cyan-color has-text-color has-link-color wp-elements-f5961e64367ff08b80339fb8a851b8e6\" style=\"font-style:normal;font-weight:1000\"><strong>Pros<\/strong><\/h2>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading has-text-align-center has-vivid-red-color has-text-color has-link-color has-large-font-size wp-elements-28e655d80ef314bc5e0cf1a29f666f63\" style=\"font-style:normal;font-weight:800\"><strong>Cons<\/strong><\/h2>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-top is-not-stacked-on-mobile is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-top has-light-green-cyan-background-color has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"font-style:normal;font-weight:600\">\n<p class=\"has-text-align-center\">Comprehensive mitigation<br>Prevents information silos<br>Collaborative<br>Facilitates better metrics<br> Benchmarking<br>Nimble and agile to respond quickly<br>Equips senior leadership<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top has-pale-pink-background-color has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"font-style:normal;font-weight:600\">\n<p class=\"has-text-align-center\">Challenges of scope<br>Overreliance<br>Contractual limits<br>Benefits larger structures<br>Reporting barriers<br>Hasty responses<br>Analysis paralysis<\/p>\n<\/div>\n<\/div>\n\n\n\n<p class=\"has-text-align-right\"><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ramifications &amp; Recommendations<\/h2>\n\n\n\n<p style=\"text-transform:uppercase\"><\/p>\n\n\n\n<p>Many health information technology risk exposures today can be prevented with fundamental, straightforward technical interventions. Patient data communiction tools, particularly patient portal, can utlilize simliar security measures as other customer facing applications. Nevertherless, as a result of the unique privacy concerns regarding health data, best practices to ensure HIPAA compliance and ONC (Office of National Coordinator of Health IT) certification should be employed.<\/p>\n\n\n\n<p>John Deutsch, contributor at FQHC.org, offers seven practical data security solutions to mitigate cyberthreats and technology risk:<\/p>\n\n\n\n<p><strong>1. Opt-in Consent<\/strong><\/p>\n\n\n\n<p><strong>2. Role-Based Access Control<\/strong><\/p>\n\n\n\n<p><strong>3. Zero-Trust Framework<\/strong><\/p>\n\n\n\n<p><strong>4. Ecosystem Oversight<\/strong><\/p>\n\n\n\n<p><strong>5. Multi-Factor Authentication and Password Protection<\/strong><\/p>\n\n\n\n<p><strong>6. Encrypted Backups<\/strong><\/p>\n\n\n\n<p><strong>7. Staff Training<\/strong><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Applying ERM Approaches With Health Information Exchanges (HIEs) and Patient Portals<\/h2>\n\n\n\n<figure class=\"wp-block-table is-style-regular\" style=\"font-size:15px\"><table class=\"has-fixed-layout\"><thead><tr><th>Strategic<\/th><th>Clinical<\/th><th>Financial<\/th><th>Human Capital<\/th><th>Legal<\/th><th>IT<\/th><th>Business<\/th><th>Hazard<\/th><\/tr><\/thead><tbody><tr><td>Internal business growth<\/td><td>Clinical leader direction<\/td><td>High reliability tools<\/td><td>Training focus<\/td><td>Timely contracts<\/td><td><em>Listed solutions<\/em><\/td><td>Balanced processes <\/td><td>Strategic hazard planning<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Implications of ERM Approach to the Utilization of Health Information Exchanges and Patient Portals Pros Cons Comprehensive mitigationPrevents information silosCollaborativeFacilitates better metrics BenchmarkingNimble and&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/sites.temple.edu\/rmi5103dwhiteindividualproject\/health-information-technology-risk-and-the-growing-concern\/\">Continue reading<span class=\"screen-reader-text\">Analysis and Interpretations<\/span><\/a><\/div>\n","protected":false},"author":36250,"featured_media":0,"parent":0,"menu_order":5,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-25","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/sites.temple.edu\/rmi5103dwhiteindividualproject\/wp-json\/wp\/v2\/pages\/25","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.temple.edu\/rmi5103dwhiteindividualproject\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.temple.edu\/rmi5103dwhiteindividualproject\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.temple.edu\/rmi5103dwhiteindividualproject\/wp-json\/wp\/v2\/users\/36250"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.temple.edu\/rmi5103dwhiteindividualproject\/wp-json\/wp\/v2\/comments?post=25"}],"version-history":[{"count":19,"href":"https:\/\/sites.temple.edu\/rmi5103dwhiteindividualproject\/wp-json\/wp\/v2\/pages\/25\/revisions"}],"predecessor-version":[{"id":220,"href":"https:\/\/sites.temple.edu\/rmi5103dwhiteindividualproject\/wp-json\/wp\/v2\/pages\/25\/revisions\/220"}],"wp:attachment":[{"href":"https:\/\/sites.temple.edu\/rmi5103dwhiteindividualproject\/wp-json\/wp\/v2\/media?parent=25"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}