Identify an effective health care organization that utilizes health information technology.
Analyze the components and requirements of its information system technology program
Explain the requirements for health care information technology systems to comply with federal state and local law governing patient information security
Assess the risks and affected stakeholders in the event of a system breach of failure, recommend approaches that can be used to safeguard confidential information