Study of the technical aspects of data security in healthcare systems. This course will cover strategies for designing, implementing, auditing, and evaluating the technical, physical and human components of an information security system that adhere to a healthcare organization’s legal, ethical and organizational requirements. This course focuses on assessment of security vulnerabilities, threats, breaches, and the exploration of technical applications and software tools used for securing health information systems. (3 credits)
Associated Program Learning Outcomes
- #3. Apply healthcare informatics and technology concepts and skills to case studies and real-world situations.
Student Learning Outcomes (SLOs)
Students who successfully complete this course will be able to:
- Examine how health information is regulated at both the state and federal level.
- Interpret the HIPAA statute and administrative rules.
- Determine the scope of HIPAA and how it works to protect health information.
- Evaluate the various components of the Privacy Rule including authorization requirements, use and disclosure requirements, and patient rights.
- Analyze a breach of protected health information and describe the breach notification requirements.
- Differentiate the difference between the Privacy Rule and Security Rule.
- Determine the importance of physical, technical, administrative, and organizational safeguards.
- Integrate the purpose and steps within a risk analysis.
- Assess the importance of a business continuity plan.
- Forecast emerging security threats.
Course Activities and Grading
Discussions (Weeks 1-8)
|Weekly Assignments (Weeks 1-7)|
Final Project (Week 8)
Available through Charter Oak's online bookstore
- Rinehart-Thompson. Introduction to Health Information Privacy and Security. 2nd ed. AHIMA Press, 2019. ISBN-13: 9781584265887
Readings and Exercises
Topics: Introduction and a Review of How Health Information is Regulated
Topics: HIPAA Privacy and Security – The Basics
Topic: Privacy Rule Deep Dive
Topic: Security Rule Deep Dive
Topics: Threat Identification and Risk Analysis
Topic: Business Continuity
Topics: Emerging Security Threats
Topic: Emerging Security Threats (Continued)
COSC Accessibility Statement
Charter Oak State College encourages students with disabilities, including non-visible disabilities such as chronic diseases, learning disabilities, head injury, attention deficit/hyperactive disorder, or psychiatric disabilities, to discuss appropriate accommodations with the Office of Accessibility Services at OAS@charteroak.edu.
COSC Policies, Course Policies, Academic Support Services and Resources
Students are responsible for knowing all Charter Oak State College (COSC) institutional policies, course-specific policies, procedures, and available academic support services and resources. Please see COSC Policies for COSC institutional policies, and see also specific policies related to this course. See COSC Resources for information regarding available academic support services and resources.