Cybersecurity and Maintaining the Integrity of Digital Patient Records

$50.00

This course will help decision-makers understand how to protect the integrity of digital records, and how their networks store and access data.  It will give them a checklist based framework, from a clinicians perspective,  to guide discussions with their IT professionals, create policies in the office, and place an emphasis on multiple, overlapping and mutually  supportive defensive systems that balance benefits, risks and costs.

RCDSO Expiry Date: May 31, 2023

To qualify as a Core Category 1 course, the course certificate must be issued no later than this date.

Completion of this online course qualifies for 3 Core CE Points.
Category:

Cybersecurity and Maintaining the Integrity of Digital Patient Records

In the dental office, we often think about hygiene, prevention, infection and disease. We know that viruses and disease are ubiquitous, and no one is immune from the threat of illness. Like in life, the cyber landscape is full of risk. Decision-makers need to think in clinical terms about their information technology infrastructure. Systems should not be thought of as either clean or infected, but in terms of a wellness model that considers susceptibility, resilience, wellness, vulnerability to infection and recoverability.

This course will help decision-makers understand how to protect the integrity of digital records, and how their networks store and access data.  It will give them a checklist based framework, from a clinicians perspective,  to guide discussions with their IT professionals, create policies in the office, and place an emphasis on multiple, overlapping and mutually  supportive defensive systems that balance benefits, risks and costs.

Learning Objectives:

• Identify what falls into patient data, and if it’s integrity is “intact”

• Identify how IT is currently being used, the physical make up of an IT network, and key policies that need to be in place.

• Identify the core assets in their own practice that need protection and identify the most-significant threats to their business • Learn what to discuss with IT professionals, as a decision-maker, to build a threat-based, layered and defensive network architecture.