Identification should include a list of items related to
- system security (i.e., ensuring information is transmitted according to approved protocol)
- electronic courtesy (i.e., ensuring the rules of network etiquette are followed)
- confidentiality (i.e., ensuring through technology that information remains private and secure)
- technological integrity (i.e., verifying the source of information and ensuring information on a user’s screen is the same as what was sent)
- availability (i.e., ensuring that data/information remains available and intact).
Teacher Resource: What is PHI? (https://www.hhs.gov/answers/hipaa/what-is-phi/index.html), U.S. Department of Health and Human Services
Process/Skill Questions:
- With regard to cybersecurity, what does CIA stand for?
- What does availability mean with regard to cybersecurity?
- Why is data integrity important?
- What is protected health information (PHI)?
- What law governs privacy of all patient information?