Site icon Eminence Papers

Comprehensive Analysis – Englewood Health Care

Comprehensive Analysis – Englewood Health Care

Project Outline (Week 1)

The Englewood Health Care Systems (EHCS), situated in Englewood, New Jersey, is a healthcare facility that offers services such as urgent care, diagnostics, primary healthcare, surgical procedures, and rehabilitation programs. The organization has around 500 employees which include doctors, registered nurses, IT professionals, and other support personnel. Due to the nature of EHCS’s healthcare data like patient files, the EHCS organization faces a lot of difficulties in protecting it. These difficulties include cybersecurity protections, compliance with healthcare policies like HIPAA, and plastering physical security to the facility and its belongings.

Problem Statement

At Englewood Health Care the core of IT difficulty deals with a lack of insufficient protective policies to secure private healthcare information and meet compliance requirements under the US legislation HIPAA. The organization has faced cybersecurity issues, problems with physical security, and the increasing difficulty of maintaining the privacy of patient data alongside balancing the security of the healthcare facility. There is a problem with comprehensive security management systems dictating digital aspects of security while neglecting physical security.

Problem Identification

Englewood Health Care faces the following problems: insufficient cybersecurity measures, gaps between physical and digital security systems, and issues maintaining compliance with healthcare regulations. Upgrading the security infrastructure at Englewood Health Care becomes imperative due to the sophistication of cyber-attacks and the ever-increasing volume of patient data (Force & Initiative, 2013). This includes the need for physical and cybersecurity measures which protect sensitive health information as well as compliance with legal regulations such as HIPAA.

The system update functional requirements include:

  1. Enhanced Network Security: Strengthened firewalls, intrusion detection/prevention systems, and secure access control management.
  2. Data Encryption and Protection: Ensuring encryption of patient data both in transit and at rest (Moore, 2023).
  3. Access Control Systems: Establishing strict protocols to protect sensitive patient data, ensuring only authorized personnel can access critical information.

Nonfunctional requirements include meeting compliance standards, system usability for non-IT professional healthcare staff, and system scalability.

Research Methodology

To resolve these security issues, it would be prudent to consider best practices from the industry frameworks like CMMI (Capability Maturity Model Integration) which is well-known across the healthcare sector. CMMI provides a guide and framework for process improvement within the healthcare industry. EHCS will be able to evaluate its existing practices in security management and guided by the framework, determine gaps that require corrective action. Furthermore, the studies will focus on the most recent developments in data encryption, network security, as well as incident response technologies to make certain that the proposed solution applies advanced security technologies. These healthcare organization case studies will also be reviewed to examine the security upgrades and determine the potential risks and benefits.

Conclusion

As the focus of cybercriminals shifts towards sensitive healthcare information, Englewood Health Care and similar organizations face multifaceted security issues. Englewood Health Care must adopt an integrated security approach which incorporates information technology, physical security, and regulatory compliance all at the same time. Employing Frameworks can assist in developing a governance and compliance based security management system to safeguard patient data and secure the healthcare environment. This system will enable the organization to sustain patient’s trust while simultaneously fortifying the dynamic security needs of the healthcare sector.

Week 2: Project Plan

TBD

Week 3: Project Execution

TBD

Week 4: Proposed Solution

TBD

Week 5: Current and Future Technology Trends

TBD

References

Force, J. T., & Initiative, T. (2013). Security and privacy controls for federal information systems and organizations. NIST Special Publication800(53), 8-13. http://dx.doi.org/10.6028/NIST.SP.800-53r4

Moore, C. (2023). Health Information Technology. In: Daaleman, T.P., Helton, M.R. (eds) Chronic Illness Care. Springer, Cham. https://doi.org/10.1007/978-3-031-29171-5_37

ORDER A PLAGIARISM-FREE PAPER HERE

We’ll write everything from scratch

Question 


Comprehensive Analysis – Englewood Health Care

Comprehensive Analysis - Englewood Health Care

Comprehensive Analysis – Englewood Health Care

For the assignments in this course, you will be developing a comprehensive Information Technology Problem Analysis document that identifies an IT problem and works through a formal research and analysis method to provide a proposed solution to the problem. Your first task in this process will be to select a project to use as the basis of your research and analysis for each of the assignments in the course. You will also create the shell document for the final project deliverable that you will be working on during each unit. As you proceed through each project phase, you will add content to each section of the final document to gradually complete the final project delivery. Appropriate research should be conducted to support the development of your document, and assumptions may be made when necessary.

Exit mobile version