Any topic (writer’s choice)

In the context of health information systems, privacy answers the question of who has the right to access personal information and under what conditions. It is mainly concerned with the process of collecting, storing and using personal information while examining whether the data should be collected in the first place. Confidentiality safeguards the collected information in the context of an intimate relationship. Security is the technical and procedural step required to prevent unauthorized access, use, dissemination and modification of data processed or stored within the computer system.


Cybersecurity Crash Course:


Chapter 9, Fundamentals of Health Information Management


HIPAA Survival Guide (2017).  HITECH Act Summary. Retrieved from

HIPAA General Information:




Health Research & Educational Trust (2014, April). Building a leadership team for the health care organization of the future. Chicago, IL: Health Research & Educational Trust. Retrieved from

HIMSS (n.d.). Policies & Procedures. Retrieved from

Infosec Institute (2017).  Hospital Security Policies & Procedures. Retrieved from

Mandy, D., Dopoulos, J., & Pollard, L. (2012). Health Information Technology: Planning and Financing Upgrades. Beckers Health IT & CIO Review. Retrieved from

Wiedower, J.S. (2016). Information Technology Governance: Vital to Healthcare Systems. Scholar Archive. 3753. Retrieved from

Xiaoming Zeng, X., Reynolds, R., & Sharp, M. (2009). Redefining the Roles of Health Information Management Professionals in Health Information Technology. Perspectives in Health Information Management. Retrieved from This link or lecture only version with notes in Course Content. This link or lecture only version with notes in Course Content. This link or lecture only version with notes

Leave a Reply

Your email address will not be published. Required fields are marked *