Cybersecurity and Maintaining the Integrity of Digital Patient Records

Presented by: Dr. Ian Furst

RCDSO Expiry Date: May 31, 2023

To qualify as a Core Category 1 course, the course certificate must be issued no later than this date.

RCDSO CE Points: 3, Category 1

Points can also be used as Category 2. For further information see our CE Points Page.

Click to close
  • Dr. Ian Furst DDS, MSc, RCDC(C)

    Dr. Ian Furst is a dental specialist in Oral and Maxillofacial Surgery.

    Dr. Furst graduated from the University of Toronto in 1994 with a Doctor of Dental Surgery degree. He completed an internship at St. Michael’s Hospital in Toronto, Ontario and subsequently received his specialty training in Oral and Maxillofacial Surgery & Anaesthesia also from the University of Toronto in 1999, along with his Masters of Science degree.  Dr. Furst  is an Editorial Consultant with the Journal of the Canadian Dental Association, and is also a main contributor to the JCDA Oasis campaign.

    Recently, Dr. Furst served as the President of the Oxford County Dental Society.  He is also a member of the Ontario Society of Oral and Maxillofacial Surgeons, Canadian Dental Society, Ontario Dental Society, Waterloo Wellington Dental Society, Stratford District Dental Society, and Brant County Dental Society.

    Dr. Furst is a Fellow of the Royal College of Dentists of Canada.

Current Status
Not Enrolled
Price
$50
Get Started

In the dental office, we often think about hygiene, prevention, infection and disease. We know that viruses and disease are ubiquitous, and no one is immune from the threat of illness. Like in life, the cyber landscape is full of risk. Decision-makers need to think in clinical terms about their information technology infrastructure. Systems should not be thought of as either clean or infected, but in terms of a wellness model that considers susceptibility, resilience, wellness, vulnerability to infection and recoverability.

This course will help decision-makers understand how to protect the integrity of digital records, and how their networks store and access data.  It will give them a checklist based framework, from a clinicians perspective,  to guide discussions with their IT professionals, create policies in the office, and place an emphasis on multiple, overlapping and mutually  supportive defensive systems that balance benefits, risks and costs.

Learning Objectives:

• Identify what falls into patient data, and if it’s integrity is “intact”

• Identify how IT is currently being used, the physical make up of an IT network, and key policies that need to be in place.

• Identify the core assets in their own practice that need protection and identify the most-significant threats to their business • Learn what to discuss with IT professionals, as a decision-maker, to build a threat-based, layered and defensive network architecture.

A checklist-based plan will be given and discussed.