Scenario: You are a HIM intern at a large physician group practice that is consi
ID: 376735 • Letter: S
Question
Scenario: You are a HIM intern at a large physician group practice that is considering replacing its IT system for practice management and electronic health records. The lead physician, Dr. X admits that he knows much more about medicine than about data systems. His IT consultant keeps telling him that there are three key concepts regarding data: authenticity, integrity and security. Dr. X asks you to educate him and his physician partners about these three concepts. In addition, Dr. X and the physician staff would like to learn more about fraud detection and what processes should be implemented with the new system to detach fraudulent practices. He specifically mentioned that he would like to learn about Whistle blowers, STARK, Anti Kickback unbundling, and upcoding. Step One: Create a one page fact sheet that defines, compares and contrasts the concepts of authenticity, integrity and security as they relate to data. Include at least two examples for each key concept. Step Two: Create a policy/procedure that address fraud detection in the new IT system. Address what needs to be reviewed, who should perform the review, and how often the re should be done. view Step Three: Create a one page fact sheet on Whistle blowers, STARK, Anti Kickback unbundling, and upcoding. Include at least one example of each.Explanation / Answer
Data Authenticity, Integrity, and Security
In information systems, protection of data is significant to any organization. Authenticity, integrity, and security are some of the major terminologies that are applied for data protection. Data authenticity involves data retention and preservation for verifying that digital objects have not been changed. The attempts for data authenticity is to verify that an object remains the same genuine object the same it was originally and verifying that it has been changed over time unless any particular changes are known and authorized. What is so special with data authenticity is that it is more specific to the data content itself and involves assurance that if some particular data was transferred then the final data transferred is similar or in the same format from the source, where it is retrieved. The method of data verifying authenticity is through authentication that involves several proofs of identity like use of passwords (Jerman-Blazic, B., NATO Advanced Networking Workshop on Advanced Security Technologies in Networking, & NATO Advanced Workshop on Security in Networking., 2001).
Data security is a compromise between opening up data systems to the world and locking them down such that nobody can use them. Though sometimes organizations may open up their data, data security should have the ability to provide the services that are required by the user community while at the same time preventing unauthorized use of the system resources. The practice of data security is to keep data protected from corrupt moves and unauthorized access with the focus on maintaining its privacy in corporate or personal data. Access to unauthorized data could lead to numerous problems like loss, manipulation, or piracy. This may sound a big loss and a challenge to the organization or the individual, in particular. Therefore, data security is never complete without the proper backup solutions of the critical information. However, if data is secure, it might be easy to recover it from the system back up. This may sound better instead of starting from the scratch (Calabrese, 2004).
Data integrity is applied to the protection of information from modifications from any unauthorized persons. Information is always valuable whenever it is correct, hence to have it protected means that it loses its integrity and might not sound useful anymore. The concept of data integrity is further broken down to authenticity, accountability, and non-repudiation. Data integrity ensures that better mechanisms are available to prevent intentional or unintended data disruption by known users or unknown users without the appropriate authority.
Integrity in computer information and technology requires the integrity of resources. The description of the requirement holds that, any alteration to the information system must have a follow-up to recovery. The data recovered has to be consistent with the original file in terms of accuracy and correctness. Nevertheless, the better avoidance to such uncalled for circumstances, calls for worth placing on all data in any organization under the care. This encompasses the three methodologies for data care. The integrity requirement is that data has to be consistence, accurate, and correct according to the place of retrieval. Data authenticity requires that, data have to be original, genuine, true, and real. This is an indication that any data less of this definition is not reliable. In conclusion, the findings on data authenticity, integrity, and security are a sure pathway to our information/data protection. A failure to this is an indication of insecurity. None less, it is important to take care of our data because this is the real meaning of any organization's future. Once the data is leaked then it remains no more original because it can be shared from different platforms in either production or decision-making (Blobel, 2002).
References
Calabrese, T. (2004). Information security intelligence: Cryptographic principles and applications. Clifton Park, NY: Delmar Learning.
Jerman-Blazic, B., NATO Advanced Networking Workshop on Advanced Security Technologies in Networking, & NATO Advanced Workshop on Security in Networking. (2001). Advanced security technologies in networking: [proceedings of the NATO Advanced Networking Workshop on Advanced Security Technologies in Networking, 29 May - 2 June 2000, Portoroz, Slovenia]. Amsterdam [u.a.: IOS Press [u.a..
Blobel, B. (2002). Analysis, design and implementation of secure and interoperable distributed health information systems. Amsterdam [u.a.: IOS Press [u.a..
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.