Identity |
Data access, specification of roles |
-
•
Important for designations, duties, roles, and responsibilities
-
•
Encouraging teamwork—Promoting psychological safety
|
|
Devices |
Multi-Factor authentication Phishing resistance |
-
•
Modules and EHR training
-
•
Interface remodeling
-
•
BYOD-Bring your device policies and secure VPNs
-
•
Continuous validation and approval processes
-
•
Error prevention in entry and scanning—human design and systems thinking and remodeling
|
-
•
Badges with Unique IDs
-
•
Second-factor authentications
-
•
Barcode scanning at the bedside
-
•
Updating hardware/devices
-
•
Ergonomic approach
|
Networks |
Network segmentation, Traffic encryption, and management |
|
|
Applications and workloads |
Application threat protections, Secure application development and deployment workflow, application security testing |
-
•
Third-party access utilizations, validation, and approval process with constant updates
-
•
Failure Mode and Effect Analysis
|
-
•
Quality Improvement projects and system improvement workflows
-
•
Scheduled IT and software updates with notifications and memos
-
•
Hardware maintenance updates with backup plans
|
Data |
Data availability, access, encryption, categorization |
-
•
Dashboards and accessibility of near misses and adverse events
-
•
Morbidity, Mortality, and Improvement updates
-
•
Quality Improvement Projects with status updates
|
-
•
Department-specific roles and designations for entry and safeguards
-
•
Patient safety dashboards
-
•
Health Informatics oversight
|