HIF 645: Healthcare Information Security Systems

Course Description

Strategies for designing, implementing, auditing and evaluating the technical, physical and human components of an information security system that adheres to a healthcare organization’s legal, ethical and organizational requirements. Assessment of security vulnerabilities and threats, exploration of technical applications and software tools used for securing health information systems. (3 credits)

Associated Program Learning Outcomes

  • 3. Apply healthcare informatics and technology concepts and skills to case studies and real-world situations.

Student Learning Outcomes (SLOs)

Students who successfully complete this course will be able to:

  1. Examine how health information is regulated at both the state and federal level.
  2. Interpret the HIPAA statute and administrative rules.
  3. Determine the scope of HIPAA and how it works to protect health information.
  4. Evaluate the various components of the Privacy Rule including authorization requirements, use and disclosure requirements, and patient rights.
  5. Analyze a breach of protected health information and describe the breach notification requirements.
  6. Differentiate the difference between the Privacy Rule and Security Rule.
  7. Determine the importance of physical, technical, administrative, and organizational safeguards.
  8. Integrate the purpose and steps within a risk analysis.
  9. Assess the importance of a business continuity plan.
  10. Forecast emerging security threats.

 

Course Activities and Grading

AssignmentsWeight

Discussions (Weeks 1-8)

20%

Weekly Assignments (Weeks 1-7)

65%

Final Project (Week 8)

15%

Total

100%

Required Textbooks

Available through Charter Oak's online bookstore

  • Rinehart-Thompson. Introduction to Health Information Privacy and Security. 2nd ed. AHIMA Press, 2019. ISBN-13: 9781584265887

 

Course Schedule

Week

SLOs

Readings and Exercises

Assignments

1

1

Topics: Introduction and a Review of How Health Information is Regulated

  • Readings:
    • Introduction to Health Information Privacy and Security - Chapter 1
  • Review course policies
  • Review course materials
  • Read assigned chapter
  • Review the lecture materials
  • Participate in discussions
  • Complete Week 1 Assignment

2

2,3

Topics: HIPAA Privacy and Security – The Basics

  • Readings:
    • Introduction to Health Information Privacy and Security - Chapter 2
  • Read assigned chapter
  • Review supplemental links and videos provided
  • Review the lecture materials
  • Participate in discussions
  • Complete Week 2 Assignment

3

4,5

Topic: Privacy Rule Deep Dive

  • Readings:
    • Introduction to Health Information Privacy and Security - Chapter 3

 

  • Read assigned chapter
  • Review supplemental links and videos provided
  • Review the lecture materials
  • Participate in discussions
  • Complete Week 3 Assignment

4

6,7

Topic: Security Rule Deep Dive

  • Readings:
    • Introduction to Health Information Privacy and Security - Chapter 4

 

  • Read assigned chapter
  • Review supplemental link provided
  • Review the lecture materials
  • Participate in discussions
  • Complete Week 4 Assignment

5

8

Topics: Threat Identification and Risk Analysis

  • Readings:
    • Introduction to Health Information Privacy and Security - Chapter 5 (pages 149-160)
  • Read assigned chapter
  • Review supplemental links and video provided
  • Review the lecture materials
  • Participate in discussions
  • Complete Week 5 Assignment

6

9

Topic: Business Continuity

  • Readings:
    • Introduction to Health Information Privacy and Security - Chapter 5 (pages 160-172)
  • Read assigned chapter
  • Review supplemental link and video provided
  • Review the lecture materials
  • Participate in discussions
  • Complete Week 6 Assignment

7

10

Topics: Emerging Security Threats 

  • Readings:
    • Introduction to Health Information Privacy and Security - Chapter 6

 

  • Read assigned chapter
  • Review supplemental links provided
  • Review the lecture materials
  • Participate in discussions
  • Begin working on your Final Project
  • Complete Week 7 Assignment

8

1-10

Topic: Emerging Security Threats (Continued)

  • Readings:
    • Introduction to Health Information Privacy and Security - Chapter 5 (pages 170-171)
  • Read assigned chapter
  • Review supplemental links provided
  • Review the lecture material
  • Participate in discussions
  • Submit Final Project

COSC Accessibility Statement

Charter Oak State College encourages students with disabilities, including non-visible disabilities such as chronic diseases, learning disabilities, head injury, attention deficit/hyperactive disorder, or psychiatric disabilities, to discuss appropriate accommodations with the Office of Accessibility Services at OAS@charteroak.edu.

COSC Policies, Course Policies, Academic Support Services and Resources

Students are responsible for knowing all Charter Oak State College (COSC) institutional policies, course-specific policies, procedures, and available academic support services and resources. Please see COSC Policies for COSC institutional policies, and see also specific policies related to this course. See COSC Resources for information regarding available academic support services and resources.