As a health informatics professional, you will frequently encounter urgent requests related to data security concerns and potential threats. Through using tools such as SQL, health informatics professionals can create secure databases, analyze access patterns, and recommend security improvements to ensure data security, HIPAA compliance, and patient privacy.
Read the CareWell Hospital Case Study to become familiar with the specifics of the request to build and analyze an audit log database. Using the information from the case study, complete each of the steps below to address the urgent request from the CIO.
Note: No sample data will be provided. You must create your own data.
Step 1: Create the Schema in DB Fiddle
- Table: user_access_log
- Columns:
- access_id INT (Primary Key)
- user_id VARCHAR
- role VARCHAR
- access_time DATETIME
- patient_id VARCHAR
- record_type VARCHAR
- ip_address VARCHAR
Step 2: Insert Sample Data
- Insert at least 1015 rows of data.
- Design realistic scenarios using diverse roles, business/after-hours access times, and varied IP addresses.
Step 3: Write SQL Queries
- List accesses outside 8:00 a.m. 6:00 p.m.
- Identify administrative staff accessing clinical records.
- Find users accessing more than three records on the same day.
- Detect accesses from suspicious IP addresses.
Step 4: Report Findings
In a 200-250 word report to Alexis Grant, the Chief Information Officer, address the following:
- Summarize your findings by describing specific HIPAA risks and outlining security vulnerabilities.
- Provide a minimum of two recommendations for addressing the identified risks and vulnerabilities.
Submit the SQL outputs/screenshots and report in a single Word document.
Solid academic writing is expected, and in-text citations and references should be presented using documentation guidelines.
Leave a Reply
You must be logged in to post a comment.