About the Course
The security and privacy of protected health information is a critical priority for the healthcare providers and patients. Patient concerns and government regulations enforce the requirements of appropriate protection of protected health information. This course will examine the healthcare industry, technology, data flows, levels of protection, legal and regulatory requirements. It will introduce how healthcare organizations manage information security risk through the lifecycle, and facilitate an understanding of third-party risk management.
- Develop an understanding of the healthcare industry, its common terminology, & entities in the healthcare patient lifecycle.
- Articulate the healthcare information technology regulatory framework.
- Identify the crucial aspects of protecting & securing the privacy of healthcare information.
- Articulate information governance & risk management assessment & treatment.
- Identify the relationship of third parties to the healthcare organization.
- Articulate the components of Zero Trust Architecture (ZTA).
- Articulate the steps to implement a connected medical device security program.
- Articulate the high-level steps to implement an information security program.