write a policy for a cancer registry that relates to the security of secondary data
Ans) All registries that submit data to the National Program of Cancer Registries (NPCR) should have a security policy that is specific to the needs of the registry and the organization in which the registry operates. This includes registries that are a part of a larger public health department, a university, or an institution that provides information technology support for several programs. The security policy of the organization in which the registry operates must meet or be modified to accommodate the specific concerns of the cancer registry.
• CDC’s Division of Cancer Prevention and Control has compiled the following information in support of CDC’s NPCR to help cancer registries create or audit their current security policy. This information is not intended establish cancer registry security policy, but to guide cancer registries as they address security issues.
- Many NPCR programs are part of a larger public health department, university, or institution that provides technical support for several programs and usually has a security policy in place. Each NPCR program and its organization’s technical support staff are responsible for making cancer registry data secure. Both will devote time to security training and monitoring, and to reviewing and updating the security document.
- Designate a CTO: The first step is to identify or designate a
person who works directly with the registry director to ensure data
security. This person is often called the Chief Technology Officer
(CTO), and is typically a senior information technology
professional supporting the cancer registry.
- Find out if you have a security policy: Next, the registry should
determine if a security policy has been written. If so, the CTO
should review it and identify any needed updates. If not, the CTO
should lead the development of a new policy specific to the needs
of the registry.
- Develop a new security policy, if needed: The CTO will obtain
existing institutional security documents and work with registry
staff to develop a single security document detailing national,
institutional, and NPCR security policies and standards.
- Execute the policy: Technical support and registry staff should
work together to execute the security plan and enforce security
policies.
Review and update the policy. At a minimum, the security document
should be updated annually to include advances in technology and
updates to prevailing standards.
write a policy for a cancer registry that relates to the security of secondary data
TAKE THE CHALLENGE and locate your state's cancer registry and data reports. If you Go online are unable to find your state's cancer registry data, use the Texas Cancer Registry data at http:/IntroHlM.ParadigmCollege.net/TexasCance Registry.) Find the top 10 anatomical recent year or the accumulative years listed (e.g. 2010-2013). Then, create a bar graph showing the top 10 sites broken down by gender. Note which cancer sites appear on both lists. Submit the results to your instructor cancer sites for your...
Discuss and explain the use of the ICD-O-3 and cancer registry data abstracting.
why is birth data, mortality data and cancer registry so important. how can we use this to improve patients health
Determine the cancer death rate for each of the cancer sites. University Hospital Cancer Registry Annual Report Selected Cancers Report 20XX Type of Cancer No. of Discharges and Deaths No. of Deaths Cancer Death Rate Breast 410 19 Prostate 389 12
Secondary Data Source Examples Please select a secondary data source (such as a specific healthcare index, registry or database) and explain it in detail, including when and how it is used and where the data comes from (the primary source), etc.
Question 13 Deleted data from the registry cannot be recovered. True False Question 14 The registry is only present on Windows machines. True False Question 15 All data in the registry is in binary format. True False
Scenario 2: You are working in a Cancer Registry and have just received a phone call from the Oncology Department Director requesting a report of all of Dr. Lonestone's lung cancer cases for the past two years where treatments such as resections, chemotherapy, and radiation were provided. She would also like the same type of report for Dr. Trotter's colon cancer patients for the past two years. The Oncology Department wants to create a presentation to show trends in the...
Question 13 Deleted data from the registry cannot be recovered. True False Question 14 The registry is only present on Windows machines. rue False
Distinguish between primary and secondary data and between patient-identifiable and aggregate data Identify the internal and external users of secondary data Compare the facility-specific indexes commonly found in hospitals Describe the registries used in hospitals according to purpose, methods of case definition and case finding, data collection methods, reporting and follow-up, and pertinent laws and regulations affecting registry operations Describe AHIMA’s data quality model and explain its elements Identify the role of the health information management professional in creating and...
Model and Security Policy Increasingly patients are creating and maintaining personal health records (PHRS) with data from a variety of healthcare providers as well as data they have generated about their health. What provisions should be included in a model privacy and security policy that patients might use in making decisions related to their privacy and the security of their PHRS?