UNE HIN615 All Assignments Latest 2020 November
HIN615 ADVANCED COMPUTER INFORMATION TECHNOLOGIES FOR HEALTH INFORMATICISTS
Week 2 Assignment
Wearables
Wearables such as Apple Watch, Fitbits, Garmin, etc. collect data such as how many steps a person takes in a day, the average heart rate, ECGs, and sleeping habits to help a consumer become proactive in their health. However, consumers do not realize how much data is being collected, let alone how the data is stored. Moreover, consumers tend to think they own the data.
For this week’s assignment, analyze the user agreement and privacy policy from one of the major wearable producers to determine who owns the data. In addition, analyze the user agreement and privacy policy to learn if these devices are HIPAA compliant. Finally, using the data gathered through research, synthesize your understanding of who owns the data if an organization distributes wearables to their employees.
Submit a four to six-page paper using APA standards. This paper will not only be graded on content; it will also be graded on mechanics such as grammar and spelling.
HIN615 ADVANCED COMPUTER INFORMATION TECHNOLOGIES FOR HEALTH INFORMATICISTS
Week 4 Assignment
Video presentation
You have been hired as an information security consultant. You have been charged with analyzing the integrity of the data system that houses a clinic’s electronic health records. The clinic’s directors would like to have a risk assessment completed to ensure all threats and vulnerabilities have been accounted for. In addition to identifying all threats and vulnerabilities, the clinic’s directors would like for you to present your analysis to the health board.
Develop a 10 to 15 minute video presentation to discuss the importance of risk analysis, your findings, and your recommendation(s) to the clinic’s health board. You will need to do some research about auditing IT systems to learn what types of threats and vulnerabilities can have an impact on networking systems. In addition to submitting a video presentation, please submit a slide presentation.
HIN615 ADVANCED COMPUTER INFORMATION TECHNOLOGIES FOR HEALTH INFORMATICISTS
Week 5 Assignment
Contingency plan
Using resources provided this week, and using additional resources based on your own research, create a contingency plan to ensure the electronic health records will still be available in the event of a cyber attack such as a ransomware attack, a natural disaster, and/or a server failure.
Prepare a minimum of fifteen slides to explain the contingency plan in detail. Your target audience is the Board of Directors at Salutem Hospital.
HIN615 ADVANCED COMPUTER INFORMATION TECHNOLOGIES FOR HEALTH INFORMATICISTS
Week 6 Assignment
Troubleshooting Screencast Presentation
The troubleshooting process can be distilled into four steps:
Step 1: The system malfunctions and symptoms are identified.
Step 2: A list of possible causes is generated based on existing knowledge, research, and/or previous experience.
Step 3: Additional data is collected and, based on a process of elimination, the causes of the problem are determined.
Step 4: The solution is tested to confirm that the problem has been solved.
Read the scenario below and create a narrated slide presentation to describe the experiences the troubleshooter may encounter and to provide detail on how to solve the problem. Be sure to follow the four steps of the troubleshooting process. Create a screencast of your presentation. Refer to the Troubleshooting Screencast Presentation Rubric Click for more options for submission guidelines.
Scenario:
The Superior Care Health Group (SCHG) recently installed a new system for electronically sending patient prescriptions to pharmacies. This new e-prescribing system was working well until recently. Now the system is displaying errors periodically. When this occurs, the prescribing doctor has to call the prescription into the pharmacy, which takes much more time. The new office manager, Braden Thomas, is responsible for maintaining the system. Braden found an error-log file in the system. These errors are perplexing and contain cryptic messages:
07, incorSCRIPT error #34rect PVD format
PProc error #3212, Schedule 1 not allowed
PProc error #3245, not in formulary
After spending several hours changing various system configuration settings, the problems started getting worse. He finally realized that he doesn’t know enough about troubleshooting the system to correct the problems. Even worse, he doesn’t know whom to contact to solve the problem, other than the sales associate who sold SCHG the system. When he called that number, he was sent to voicemail. Meanwhile, the group’s doctors are expressing displeasure with his ability to manage the system.
Use Screencast-O-Matic or another screencasting tool to create your video. When you are done, upload your screencast to YouTube and submit the link to your YouTube video in Blackboard.
HIN615 ADVANCED COMPUTER INFORMATION TECHNOLOGIES FOR HEALTH INFORMATICISTS
Week 8 Assignment
Data Flow Through the Patient Healthcare Journey
The purpose of this assignment is to make you aware of how patient data travels with the patient and/or is generated based on events such as getting an x-ray or having surgery.
It’s a major holiday. Your family member is complaining of pain on their left side. This is usually a symptom of appendix issues. Your doctor’s office is closed for the holiday. It is likely that the person will require admission to the hospital and require surgery. Think about the information that will be collected from you and throughout the hospital stay.
Use this infographic to help as you list the pieces of data that will likely be collected throughout the hospital journey. For each piece of data, identify which EHR system and which outside entity may need the information. The first line of the chart has been filled out as an example.
After completing this assignment, look at your table and identify where data may be vulnerable to cyber threats, both internally and externally. Include a short description of these vulnerabilities (1 paragraph).
Assignment Table Template
copy this Google Doc template, adjust the file permissions it so your instructor can access it, and fill in the chart according to the patient journey as you imagine it, along with a summary of vulnerabilities.

Having Trouble Meeting Your Deadline?
Get your assignment on UNE HIN615 All Assignments Latest 2020 November completed on time. avoid delay and – ORDER NOW