Interview Summary Sample

1132 Words3 Pages

Interview Summary
Introduction
The purpose of this interview is to utilize a selected interviewee’s work history and perspectives concerning electronic health records (EHRs), software solutions, and impending government regulations as it relates to information technology (IT) privacy and security. I selected my interviewee because he currently works at the Veterans Administration Medical Center (VAMC) in Durham, North Carolina in the IT department; and I do wish to continue my career within the VAMC or remain in a government entity. Interviewing the selectee and having an internal perspective as it relates to a governmental organization provided me valuable insight on IT security.
Overview of Career The selected interviewee is Jeffrey S. …show more content…

His educational background consists of a Bachelor’s Degree in Psychology and several certifications such as CompTIA Network +, CompTIA Security +, and Certified Accreditation Professional (CAP). In addition, he is currently enrolled in the CompTIA Cyber Security Analyst (CSA+) certification course. According to Claburn (2016) in 2014 the SANS Institute released a report that suggest having IT certifications can increase income by five percent in the informatics field. When asked what attracted him to informatics and information security, shockingly the response was “Nothing”. “I was looking for anything right after I graduated and was accepted into a two-year internship with Field Security Service (VA’s ISOs); and I was mentored by the previous Durham VA ISO for those two years and upon completion was a full ISO” (Interviewee, …show more content…

Mr. Gardiner explained that the system owner is the local Chief Information Officer (CIO) and his authority comes directly form the VA CIO who reports to the secretary of the VA. More specifically, the CIO is responsible for managing the data by ensuring the VA systems meet VA security requirements, and the information owner or Facility Director is ultimately responsible for the data that resides in the system. Finally, the interviewee provided an example of a project involving security, patient data, and EHR hardware. He described an initiative for a precision oncology system that is a best of breed application for oncology to securely export data in a specific format to be shared with external facilities thereby reducing faxing resulting in a decrease of possible security breaches of patient health information. Faxing has its own patient confidentiality issues such as faxing to the wrong number, in 2009, 65,000 breaches were reported to the Office for Civil Rights (McCann, 2013). Once the pilot is complete the application and process will be used within oncology departments nationally within the

Open Document