$2,522 $0
Your upfront cost: $0
Duration
14 weeks
Study method
100% Online
Available loans
- FEE-HELP
Assessments
100% online
Prior study
Not required
Start dates
- 10 Jul 2023
Australia’s fourth oldest university, the University of Tasmania, is highly regarded internationally for teaching and academic excellence. The university offers more than 100 undergraduate degrees and more than 50 postgraduate programs across a range of disciplines. The university offers students a diverse range of opportunities, the chance to learn from leading experts, and excellent preparation for their future careers.
Learn more about UTAS.
Explore UTAS courses.
QS Ranking 2023
17
Times Higher Education Ranking 2023
22
Need help?
Our student advisors are here to guide you with:
- Enrolling and eligibility
- Fee and loan information
- Credit and recognition for prior learning
Subject details
Upon completion of this subject, the student should be able to:
- Discuss concepts and terms relevant to privacy and security
- Critically review the Australian legal framework as it applies to the use of health information confidentiality, integrity, and availability
- Analyse stakeholder perspectives and challenges on the use of health information
- Justify the recommendation of appropriate information security measures to manage identified risks
- Consider the contribution of ethical frameworks for guiding health informatics professionals
-
- Refer to Mylo for study topics
Equivalent subjects
You should not enrol in this subject if you have successfully completed any of the following subject(s) because they are considered academically equivalent:
- TAS-CRH503-E-Health Privacy and Security Issues (No longer available)
Additional requirements
No additional requirements
This subject explores the information security issues arising from technology use in the health care environment. Consideration is given to legal and ethical concepts and issues, with an emphasis on the confidentiality, integrity, and availability of health information. Students are provided the opportunity to apply their learning by undertaking a risk analysis and mitigation process related to the core business of a health organisation. Security standards and systems are discussed in context to protecting personal health information, including the limitations of the technology to support this.
- Breach Report (30%)
- Risk Analysis Report (30%)
- Policy Document (40%)
For textbook details check your university's handbook, website or learning management system (LMS).