1 / 14

Presentation by Ofer Shimrat

Preparing to Practice Computers & IT. Presentation by Ofer Shimrat. November 22, 2008. Introduction. Health Insurance Portability & Accountability Act Medical Applications determine your needs Network Architecture & Types of Networks Wired Network or Wireless Network

yelena
Download Presentation

Presentation by Ofer Shimrat

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Preparing to Practice Computers & IT Presentation by Ofer Shimrat November 22, 2008

  2. Introduction • Health Insurance Portability & Accountability Act • Medical Applications determine your needs • Network Architecture & Types of Networks • Wired Network or Wireless Network • Desktop Hardware & Software Recommendations • Server Hardware & Software Recommendations • Network Hardware & Software Recommendations • Network and Computer Security • Backup Strategies and Disaster Recovery • Insurance to protect your computer assets • Productivity and Feature-Rich Enhancements • Computer Best Practices and Conclusion

  3. HIPAA Compliance • Health Insurance Portability and Accountability Act • Enacted August 21, 1996 • Applies to Health Plans, Providers & Clearinghouses • Protects all “individually identifiable health information” • Mandates patient record privacy in any transaction • Electronic • Paper • Oral • Requires written security standards & procedures • Staff must understand security logic • “Minimum necessary” use & disclosure • Appointment of a security manager • Inventory and catalog all “exposed” IT components • Sanctions for security policy violations • Only as effective as your weakest link

  4. Medical Software Applications • Software determines hardware - Integration • Small or Solo Practice • Medium Size Practice • Large Practice • Electronic Health Record (EHR) or EMR system • Medical management systems • Medical equipment applications • Medical imaging applications • Appointment Scheduling systems • Electronic patient charts & scanning • Billing applications • Office productivity applications • Wireless hardware applications

  5. Less expensive Not scalable Slower No central control More maintenance Fragmented Backup More expensive Scalable Faster Central management Less maintenance Centralized Backup Network Topology Peer-To-Peer Network Client/Server Network

  6. Wired or Wireless • Wired • Faster (10/100/1000/10000 Mbps) • More secure • Always on and connected but more preparation • Professionally installed same time as Telco wiring • Use CAT 5e, CAT 6 or CAT 7 Ethernet cabling • Concentrate to patch panel and label clearly • Wire enough drops for the future office needs • Diagram & document your office wiring • Wireless • Slower (11/22/54/108/125/240 Mbps) • Less secure • May have blind spots but more convenient • Wi-Fi 802.11 a / b / g / n/ i standard • Bluetooth standard • Use encryption with password protection

  7. Desktop Hardware & Software

  8. Server Hardware & Software • The heart of your network & greatest IT asset • Professionally installed/configured/maintained • 64 bit server grade hardware components • Server grade chassis & expansion slots • Redundant power supplies and cooling fans • Redundant Array of Independent Disks (RAID) • Extended warranty & replacement service • MS Windows 2003/2008 Server (various editions) • MS Exchange 2003/2007 (various editions) • MS Small Business Server 2003/2008 (2 editions) • MS Essential Business Server 2008 (2 editions) • Intranet, Internet & Extranet • Remote login, security groups & privileges

  9. Network Hardware & Software

  10. Anti-Virus Anti-Spam Anti-Spyware Firewall or UTM SERVER Security Hardware & Software • Firewall or Unified Threat Management (UTM) • Anti-Virus software or hardware equivalent • Anti-Spam software or hardware equivalent • Anti-Spyware software or hardware equivalent • Authenticated user security & passwords • Encryption software or hardware equivalent

  11. Backup & Disaster Recovery • Data as your most important asset • Nightly Backups with verify logs • Full, Differential, Incremental backups • Rotation of backup devices • On-line, On-Site and Off-Site rotation • Recommend external USB/eSATA drives • Backup or Image Backup Software • Volume Shadow Copy • Operational Backups & Restores • Disaster Recovery • Backup, Backup, Backup

  12. Insurance • Inventory & catalog all IT components (HIPAA) • Send copy to Insurance Agent/Head Office • Inland Marine Coverage • Flood Insurance • Filed class and Non-filed class coverage • Business Interruption Coverage • Sprinkler Systems & Smoke Alarms • Theft versus Burglary • User alarm codes and monitoring • Umbrella Policies

  13. Productivity and IT • Communication channels (devices) employed in the organization • The preferred communication method for specific scenarios • The type of information appropriate for each channel (device) • Response time guidelines, base on the communication method • Voice-Mail • E-Mail • Meetings • Memos • Phone calls • Delete It• Do It• Delegate It• Defer It P – Purpose of the communicationA – Action and dues datesS – Supporting documentationS – Summary in subject Adapted from McGhee Productivity Solutions

  14. Conclusion • Be HIPAA compliant • Software determines what hardware • Understand your network topology • Choose hardware with the future in mind • Backup, be secure, redundant & insured Ofer Shimrat TEL: (858) 569-0300 FAX: (858) 569-0303 EML: ofer@soundoffcomputing.com URL: www.soundoffcomputing.com

More Related