2024 – Please click on the link to read the following article AHIMA Security Audits of

Audit Controls-NEED ASAP! – 2024

Please click on the link to read the following article:

  • AHIMA, “Security Audits of Electronic Health Information (Updated).” Journal of AHIMA 82, no. 3 (March 2011): 46-50. 

Link to article (attached)

After reading the article, review the sections on Technical Safeguards, including Access Control and Audit Controls in this module’s reading assignment. The author states that audit controls are “‘hardware, software, and /or procedural mechanisms that record and examine activity in information systems.’ Most information systems provide some level of audit controls and audit reports. These are useful, especially when determining if a security violation occurred” (Gartee, p. 404). 

Next, review the information presented below.

 

 

Date

Log In

Pt #

Pt Type

Log out

Patient Name

JWARD

01-05-11

08:00

1223

Surg

08:17

Olson

   

09:20

5776

Surg

09:24

Williams

   

09:26

3987

Surg

09:45

Johnson

SWILLIAMS

01-05-11

08:05

3463

Radiology

08:08

Finch

   

08:35

5776

Surg

09:02

Williams

   

09:03

1234

Radiology

09:07

Jones

LWORLEY

01-05-11

08:05

5776

Surg

08:15

Williams

   

08:32

9874

Medical

08:55

Smith

   

09:15

1223

Surg

09:24

Olson

 

 

This data was pulled to view a general login and logout pattern in the EHR for hospital staff on the morning listed above (01-05-11). Below are descriptions of these staff members’ positions. 

  1. J Ward is a nurse who works in the general surgery floor. 
  2. S Williams is a registration clerk who works in the Radiology department.
  3. L Worley is a Health Information clerk who processes requests for records from other healthcare providers and facilities. 

Given this information, how would you respond to the audit? Do the staff members’ logins seem appropriate? What would you question? Your response to this audit should be a one-two page document (4-5 paragraphs) to provide a complete response to the audit results based on each of the roles.

You needed to go staff person by staff person, and evaluate their logins in light of trigger events (see the article) and comment on who you would question. This one is all about your being able to identify specific instances of the types of trigger events. 

 

Need assignment writing services that are 100% risk-free. Our writers are capable of providing the best assignment help to students in globally at best rates.

Assignment online is a team of top-class experts whose only goal is to give you the best assignment help service. Follow the link below to order now...

#write essay #research paper