Home » Supporting Your Practice » Mind Your Business » CDA Oasis Conversations: What are the key security questions you should ask when acquiring new office technologies?

CDA Oasis Conversations: What are the key security questions you should ask when acquiring new office technologies?

Anne Genge, in another great interview with Dr. John O’Keefe, speaks about the key security questions that you need ask when acquiring new technologies for your office.

Anne Genge is a Certified Information Privacy Professional with the International Association of Privacy Professionals. She also holds certifications for HIPAA, Credit Card Security, Internet, and Network Security. With over 20 years of experience, Anne knows the challenges healthcare providers face with technology. She and her team at Healthcare Compliance Network Inc. work with dental and medical professionals daily to minimize data risk and maximize patient care.

Interview Highlights

While technology and office digitization is certainly advantageous in enhancing our patient care, there are some potential downsides as well. Anne Genge shares some important information to help us remain compliant and keep our patients’ information safe.

  • Many digital services and technologies require connecting to the office databases and may not compliant with privacy and security regulations for specific jurisdictions.
  • A privacy impact assessment should be carried out and include questions such as:
    • How does the device connect?
    • What parts of the data or network does it access?
    • Who has the ability or authority to access it?
    • Is any data exposed or is any removed and what will be done with this data? How is it disposed?
  • Dental offices must implement policies related to information security – rules for systems operations, their network and the internet. Contracts detailing information security expectations should be put in place for vendors and business associates.
  • Retroactively, threat and risk assessments can be done to ensure that systems and networks are properly configured and to mitigate risks.

Watch the video interview

 

Leave a Reply

Your email address will not be published.

%d bloggers like this: