SlideShare a Scribd company logo
Installation and Maintenance of Health
IT Systems
Creating Fault-Tolerant Systems,
Backups, and Decommissioning
Lecture c
This material (Comp 8 Unit 9) was developed by Duke University, funded by the Department of Health and
Human Services, Office of the National Coordinator for Health Information Technology under Award
Number IU24OC000024. This material was updated in 2016 by The University of Texas Health Science
Center at Houston under Award Number 90WT0006.
This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International
License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/4.0/.
Creating Fault-Tolerant Systems,
Backups, and Decommissioning
Learning Objectives
1. Define availability, reliability, redundancy, and fault
tolerance (Lecture a)
2. Explain areas and outline rules for implementing fault
tolerant systems (Lecture a)
3. Perform risk assessment (Lecture a)
4. Follow best practice guidelines for common
implementations (Lecture b)
5. Develop strategies for backup and restore of operating
systems, applications, configuration settings, and
databases (Lecture c)
6. Decommission systems and data (Lecture c)
2
Importance of Backup
• Volume of data: hospital can generate 12
terabytes/yr in radiology alone.
• HIPAA (Health Information Portability &
Accountability Act) Security Rule requires
exact backup copies of all healthcare data,
easily retrievable
• Should be called “Importance of Restore”
(Surviving a Bottleneck, 2009)
3
Backup Strategies:
Requirements
Laws regarding length of time health information data must be retained
depend on the jurisdiction (usually state), and can involve:
• Flat length of time (X years)
• Age of patient
• Time since age of majority, or of discharge, or of death
• Length of statute of limitations for malpractice
What constitutes best practices for a backup?
• Exact, verified copy of the material – Multiple copies!
• Stored off-site location in case of natural disaster, fires, flooding, etc.
• Easily retrievable for timely restoration
• Security via encryption and storage in secure location
Fault tolerant storage protection (like RAID) is not enough
• Deleted files
• Old versions
(AHIMA Practice Brief, n.d.)
4
Backup Strategies:
Backup Window
• Time required to complete a given backup.
– Determined by amount of data to be backed up divided by speed
of network infrastructure
• Backups that occur during production hours may be
inconsistent (bad)
• Problems when backup window reaches peak operation
cycles, potentially straining resources and slowing down
the system
• What to do when system must be available 24/7?
(Harwood, 2003)
5
Backup Strategies:
Which Files?
• Full backups
– All files
– Pro: Ultimate protection, simple restoration
– Con: Requires more time & lots of storage to keep multiple file
versions
• Incremental backups
– Only files that have changed since last backup (full or
incremental)
– Pro: Much faster
– Con: Restoration from multiple files
(Harwood, 2003)
6
Backup Strategies:
Which Files? (cont’d)
• Differential backup
– Middle ground: all the files that have changed since
the last full backup
– Pro: easier restoration
• Synthetic full backup
– Compensates for small/nonexistent backup window
– Data from last full backup + differential / incremental
backup combined to create new full backup tape
(Harwood, 2003)
7
Backup Strategies:
Which Files? (cont’d - 1)
• File system snapshots
– Available through VM environments and later
UNIX versions
– Backups at several times through the day
without needing large amounts of additional
storage media
– Reliable backups without shutting down
applications
(Harwood, 2003)
8
Backup Strategies:
Where to store data
• Direct backup
– Tape drive / autoloader / library directly connected to
every server to directly backup and restore data
– Does not scale well
• Centralized network backup
– One server backs up data of all servers
• SAN (Storage Area Network) backup
– Storage network to which all servers & backup device
connect
(Gordon, n.d.)
9
Backup Strategies:
Backup Media
Storage of media should cycle off-site
• Tapes
– Robust but expensive
• Optical
– Inexpensive, relatively small, convenient
• Flash
– Robust, convenient, fast
• Hard disk
– Cheap, fast but fragile, bulky
• Network or Cloud backup
– Dependent on network throughout
10
Backup Strategies:
Databases
• Databases require extra considerations,
depending on the database infrastructure used
• Consult with database or EHR vendor to ensure
backup strategy is compatible with database
infrastructure.
• Database backup is usually through specialize
tools or applications, often provided with the
database.
11
Decommissioning
• Goals in retiring old systems / applications /
datasets
– Active data properly retained
– Inactive data archived or disposed of securely
• Tips
– Complete full data audit; note redundancies.
– Determine data owners and stakeholders.
– Identify active vs. inactive data.
– Consider reporting / retrieval requirements for
compliance.
12
Decommissioning (cont’d)
• Tips (cont’d)
– Document retention policies well & ensure
consistency with government guidelines.
– Standardize on single, well-navigable archival
system.
– Develop decommissioning plan & schedule.
– Ensure integrity of archived data and
destruction of decommissioned data.
13
Creating Fault-Tolerant Systems,
Backups, and Decommissioning
Summary – Lecture c
• Regulatory requirements for backups are stringent
• An effective backup strategy minimizes the backup
window while ensuring data integrity.
• Backup considerations:
• Onsite vs Off-site
• Full vs Partial
• Media
• Verification
• Decommissioning
– Active data properly retained
– Inactive data archived or disposed of securely
14
Creating Fault-Tolerant Systems,
Backups, and Decommissioning
Summary
• Regulatory requirements for backups are stringent
• An effective backup strategy minimizes the backup
window while ensuring data integrity.
• Backup considerations:
• Onsite vs Off-site
• Full vs Partial
• Media
• Verification
• Decommissioning
– Active data properly retained
– Inactive data archived or disposed of securely
15
Creating Fault-Tolerant Systems,
Backups, and Decommissioning
References – Lecture c
References
Surviving a Bottleneck - Insights into Managing Exponential Growth of Digitized Medical Images.
(2009, March 16). Retrieved from Scicasts website: asts.com/specialreports/86-healthcare-it/2442-
surviving-a-bottleneck-insights-into-managing-exponential-growth-of-digitized-medical-images
Gordon, S. (n.d.). Comparing different backup strategies. Retrieved February 8, 2007, from
SearchStorage website: http://searchstorage.techtarget.com/tip/Comparing-different-backup-
strategies
Retention and Destruction of Health Information. State Laws or Regulations Pertaining to Retention of
Health Information. (updated 2013). Retrieved June 24, 2016, from AHIMA website:
http://library.ahima.org/PB/RetentionDestruction#.V3Li1fkrJD8
16
Installation and Maintenance of
Health IT Systems
Creating Fault-Tolerant Systems,
Backups, and Decommissioning
Lecture c
This material was developed by Duke University,
funded by the Department of Health and Human
Services, Office of the National Coordinator for
Health Information Technology under Award
Number IU24OC000024. This material was
updated in 2016 by The University of Texas Health
Science Center at Houston under Award Number
90WT0006.
17

More Related Content

PPTX
The Ethics of Digital Preservation
PPTX
Storage Devices In PACS
PPTX
Disk Image!...and then what? Strategies for sustainable long-term storage an...
PPTX
Failure analysis buisness impact-backup-archive
PPTX
Comp8 unit9b lecture_slides
PPT
Computer_ Forensics_ Evidence& Capturing.ppt
PPTX
Comp8 unit9a lecture_slides
PPT
Tooltalk
The Ethics of Digital Preservation
Storage Devices In PACS
Disk Image!...and then what? Strategies for sustainable long-term storage an...
Failure analysis buisness impact-backup-archive
Comp8 unit9b lecture_slides
Computer_ Forensics_ Evidence& Capturing.ppt
Comp8 unit9a lecture_slides
Tooltalk

Similar to Comp8 unit9c lecture_slides (20)

PDF
Disaster recovery and backup solutions for ibm file net p8 version 4.5.1 syst...
PDF
Schrodinger’s Backup: Is Your Backup Really a Backup?
PPTX
Presentation on BACKUP(Nursing informatics )
PPTX
DataHealth First Insight Webinar 10.01.09
PPTX
2.6 backup and recovery
PPTX
13 DisasterR-1 Disaster Recovery Keamanan TI.pptx
PDF
PPTX
Disaster Recover : 10 tips for disaster recovery planning
PDF
Data Recovery Best Practices - Survival of the Fittest
PDF
When the Back-Ups Fail: Recovery and Reinvention of Digital Collections
ODP
Landis - System Administration
PPTX
Disaster Proof
ODP
Pdb my sql backup london percona live 2012
PPTX
Backing up the virtual datacentre. Charlie Llewellyn and Andy Powell from Edu...
PPTX
MCSA 70-412 Chapter 12
PPT
Disaster Recovery NTC 2010
PPTX
Succor's MyMedCloud& MyMedBackup
PDF
10 Latest Trends in Data Backup and Recovery You Need to Know
PPTX
Backup and Disaster Recovery
PDF
Construction of a Disaster Recovery Plan with Business Only Broadband
Disaster recovery and backup solutions for ibm file net p8 version 4.5.1 syst...
Schrodinger’s Backup: Is Your Backup Really a Backup?
Presentation on BACKUP(Nursing informatics )
DataHealth First Insight Webinar 10.01.09
2.6 backup and recovery
13 DisasterR-1 Disaster Recovery Keamanan TI.pptx
Disaster Recover : 10 tips for disaster recovery planning
Data Recovery Best Practices - Survival of the Fittest
When the Back-Ups Fail: Recovery and Reinvention of Digital Collections
Landis - System Administration
Disaster Proof
Pdb my sql backup london percona live 2012
Backing up the virtual datacentre. Charlie Llewellyn and Andy Powell from Edu...
MCSA 70-412 Chapter 12
Disaster Recovery NTC 2010
Succor's MyMedCloud& MyMedBackup
10 Latest Trends in Data Backup and Recovery You Need to Know
Backup and Disaster Recovery
Construction of a Disaster Recovery Plan with Business Only Broadband
Ad

More from CMDLMS (20)

PPTX
Culture of healthcare_ week 1_ lecture_slides
PPTX
Why bother
PPTX
Ensuring two way communications
PPTX
Human Development
PPTX
Lecture 11A
PPTX
lecture C
PPTX
lecture 11B
PPTX
lecture 10a
PPTX
lecture 9 B
PPTX
Lecture 9 A
PPTX
Lecture 9C
PPTX
Lecture 8B
PPTX
Lecture 8A
PPTX
Lecture 7B
PPTX
Lecture C
PPTX
lecture 7A
PPTX
Lecture 6B
PPTX
Lecture 6A
PPTX
Lecture 5B
PPTX
Lecture 5 A
Culture of healthcare_ week 1_ lecture_slides
Why bother
Ensuring two way communications
Human Development
Lecture 11A
lecture C
lecture 11B
lecture 10a
lecture 9 B
Lecture 9 A
Lecture 9C
Lecture 8B
Lecture 8A
Lecture 7B
Lecture C
lecture 7A
Lecture 6B
Lecture 6A
Lecture 5B
Lecture 5 A
Ad

Recently uploaded (20)

PPT
Recent advances in Diagnosis of Autoimmune Disorders
PPTX
Genaralised anxiety disorder presentation
PPTX
Trichuris trichiura infection
PPTX
NUTRITIONAL PROBLEMS, CHANGES NEEDED TO PREVENT MALNUTRITION
PDF
Structure Composition and Mechanical Properties of Australian O.pdf
PPTX
PEDIATRIC OSCE, MBBS, by Dr. Sangit Chhantyal(IOM)..pptx
PPTX
Medical aspects of impairment including all the domains mentioned in ICF
PPT
Microscope is an instrument that makes an enlarged image of a small object, t...
PPTX
AI_in_Pharmaceutical_Technology_Presentation.pptx
PPT
Parental-Carer-mental-illness-and-Potential-impact-on-Dependant-Children.ppt
PPTX
3. Adherance Complianace.pptx pharmacy pci
PDF
Pharmacology slides archer and nclex quest
PPTX
First aid in common emergency conditions.pptx
PPTX
Pulmonary Circulation PPT final for easy
PPTX
First Aid and Basic Life Support Training.pptx
PPTX
Galactosemia pathophysiology, clinical features, investigation and treatment ...
PPTX
Bronchial_Asthma_in_acute_exacerbation_.pptx
PPTX
Immunity....(shweta).................pptx
PDF
MINERAL & VITAMIN CHARTS fggfdtujhfd.pdf
DOCX
Copies if quanti.docxsegdfhfkhjhlkjlj,klkj
Recent advances in Diagnosis of Autoimmune Disorders
Genaralised anxiety disorder presentation
Trichuris trichiura infection
NUTRITIONAL PROBLEMS, CHANGES NEEDED TO PREVENT MALNUTRITION
Structure Composition and Mechanical Properties of Australian O.pdf
PEDIATRIC OSCE, MBBS, by Dr. Sangit Chhantyal(IOM)..pptx
Medical aspects of impairment including all the domains mentioned in ICF
Microscope is an instrument that makes an enlarged image of a small object, t...
AI_in_Pharmaceutical_Technology_Presentation.pptx
Parental-Carer-mental-illness-and-Potential-impact-on-Dependant-Children.ppt
3. Adherance Complianace.pptx pharmacy pci
Pharmacology slides archer and nclex quest
First aid in common emergency conditions.pptx
Pulmonary Circulation PPT final for easy
First Aid and Basic Life Support Training.pptx
Galactosemia pathophysiology, clinical features, investigation and treatment ...
Bronchial_Asthma_in_acute_exacerbation_.pptx
Immunity....(shweta).................pptx
MINERAL & VITAMIN CHARTS fggfdtujhfd.pdf
Copies if quanti.docxsegdfhfkhjhlkjlj,klkj

Comp8 unit9c lecture_slides

  • 1. Installation and Maintenance of Health IT Systems Creating Fault-Tolerant Systems, Backups, and Decommissioning Lecture c This material (Comp 8 Unit 9) was developed by Duke University, funded by the Department of Health and Human Services, Office of the National Coordinator for Health Information Technology under Award Number IU24OC000024. This material was updated in 2016 by The University of Texas Health Science Center at Houston under Award Number 90WT0006. This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/4.0/.
  • 2. Creating Fault-Tolerant Systems, Backups, and Decommissioning Learning Objectives 1. Define availability, reliability, redundancy, and fault tolerance (Lecture a) 2. Explain areas and outline rules for implementing fault tolerant systems (Lecture a) 3. Perform risk assessment (Lecture a) 4. Follow best practice guidelines for common implementations (Lecture b) 5. Develop strategies for backup and restore of operating systems, applications, configuration settings, and databases (Lecture c) 6. Decommission systems and data (Lecture c) 2
  • 3. Importance of Backup • Volume of data: hospital can generate 12 terabytes/yr in radiology alone. • HIPAA (Health Information Portability & Accountability Act) Security Rule requires exact backup copies of all healthcare data, easily retrievable • Should be called “Importance of Restore” (Surviving a Bottleneck, 2009) 3
  • 4. Backup Strategies: Requirements Laws regarding length of time health information data must be retained depend on the jurisdiction (usually state), and can involve: • Flat length of time (X years) • Age of patient • Time since age of majority, or of discharge, or of death • Length of statute of limitations for malpractice What constitutes best practices for a backup? • Exact, verified copy of the material – Multiple copies! • Stored off-site location in case of natural disaster, fires, flooding, etc. • Easily retrievable for timely restoration • Security via encryption and storage in secure location Fault tolerant storage protection (like RAID) is not enough • Deleted files • Old versions (AHIMA Practice Brief, n.d.) 4
  • 5. Backup Strategies: Backup Window • Time required to complete a given backup. – Determined by amount of data to be backed up divided by speed of network infrastructure • Backups that occur during production hours may be inconsistent (bad) • Problems when backup window reaches peak operation cycles, potentially straining resources and slowing down the system • What to do when system must be available 24/7? (Harwood, 2003) 5
  • 6. Backup Strategies: Which Files? • Full backups – All files – Pro: Ultimate protection, simple restoration – Con: Requires more time & lots of storage to keep multiple file versions • Incremental backups – Only files that have changed since last backup (full or incremental) – Pro: Much faster – Con: Restoration from multiple files (Harwood, 2003) 6
  • 7. Backup Strategies: Which Files? (cont’d) • Differential backup – Middle ground: all the files that have changed since the last full backup – Pro: easier restoration • Synthetic full backup – Compensates for small/nonexistent backup window – Data from last full backup + differential / incremental backup combined to create new full backup tape (Harwood, 2003) 7
  • 8. Backup Strategies: Which Files? (cont’d - 1) • File system snapshots – Available through VM environments and later UNIX versions – Backups at several times through the day without needing large amounts of additional storage media – Reliable backups without shutting down applications (Harwood, 2003) 8
  • 9. Backup Strategies: Where to store data • Direct backup – Tape drive / autoloader / library directly connected to every server to directly backup and restore data – Does not scale well • Centralized network backup – One server backs up data of all servers • SAN (Storage Area Network) backup – Storage network to which all servers & backup device connect (Gordon, n.d.) 9
  • 10. Backup Strategies: Backup Media Storage of media should cycle off-site • Tapes – Robust but expensive • Optical – Inexpensive, relatively small, convenient • Flash – Robust, convenient, fast • Hard disk – Cheap, fast but fragile, bulky • Network or Cloud backup – Dependent on network throughout 10
  • 11. Backup Strategies: Databases • Databases require extra considerations, depending on the database infrastructure used • Consult with database or EHR vendor to ensure backup strategy is compatible with database infrastructure. • Database backup is usually through specialize tools or applications, often provided with the database. 11
  • 12. Decommissioning • Goals in retiring old systems / applications / datasets – Active data properly retained – Inactive data archived or disposed of securely • Tips – Complete full data audit; note redundancies. – Determine data owners and stakeholders. – Identify active vs. inactive data. – Consider reporting / retrieval requirements for compliance. 12
  • 13. Decommissioning (cont’d) • Tips (cont’d) – Document retention policies well & ensure consistency with government guidelines. – Standardize on single, well-navigable archival system. – Develop decommissioning plan & schedule. – Ensure integrity of archived data and destruction of decommissioned data. 13
  • 14. Creating Fault-Tolerant Systems, Backups, and Decommissioning Summary – Lecture c • Regulatory requirements for backups are stringent • An effective backup strategy minimizes the backup window while ensuring data integrity. • Backup considerations: • Onsite vs Off-site • Full vs Partial • Media • Verification • Decommissioning – Active data properly retained – Inactive data archived or disposed of securely 14
  • 15. Creating Fault-Tolerant Systems, Backups, and Decommissioning Summary • Regulatory requirements for backups are stringent • An effective backup strategy minimizes the backup window while ensuring data integrity. • Backup considerations: • Onsite vs Off-site • Full vs Partial • Media • Verification • Decommissioning – Active data properly retained – Inactive data archived or disposed of securely 15
  • 16. Creating Fault-Tolerant Systems, Backups, and Decommissioning References – Lecture c References Surviving a Bottleneck - Insights into Managing Exponential Growth of Digitized Medical Images. (2009, March 16). Retrieved from Scicasts website: asts.com/specialreports/86-healthcare-it/2442- surviving-a-bottleneck-insights-into-managing-exponential-growth-of-digitized-medical-images Gordon, S. (n.d.). Comparing different backup strategies. Retrieved February 8, 2007, from SearchStorage website: http://searchstorage.techtarget.com/tip/Comparing-different-backup- strategies Retention and Destruction of Health Information. State Laws or Regulations Pertaining to Retention of Health Information. (updated 2013). Retrieved June 24, 2016, from AHIMA website: http://library.ahima.org/PB/RetentionDestruction#.V3Li1fkrJD8 16
  • 17. Installation and Maintenance of Health IT Systems Creating Fault-Tolerant Systems, Backups, and Decommissioning Lecture c This material was developed by Duke University, funded by the Department of Health and Human Services, Office of the National Coordinator for Health Information Technology under Award Number IU24OC000024. This material was updated in 2016 by The University of Texas Health Science Center at Houston under Award Number 90WT0006. 17

Editor's Notes

  • #2: Welcome to Installation and Maintenance of Health IT Systems, Creating Fault Tolerant Systems, Backups, and Decommissioning, This is lecture c. This component, Installation and Maintenance of Health IT Systems covers fundamentals of selection, installation, and maintenance of typical Electronic Health Records (EHR) systems. This unit, Creating Fault Tolerant Systems, Backups, and Decommissioning, will discuss ensuring availability and resiliency through fault tolerance, data reliability through backup, and secure decommissioning of EHR systems
  • #3: The objectives for this unit, Creating Fault-Tolerant Systems, Backups, and Decommissioning are to: Define availability, reliability, redundancy, and fault tolerance Explain areas and outline rules for implementing fault tolerant systems Perform risk assessment Follow best practice guidelines for common implementations Develop strategies for backup and restore of operating systems, applications, configuration settings, and databases and Decommission systems and data As healthcare organizations adopt new technology to improve their efficiency, their dependence on that technology increases exponentially. However, what happens to all of these critical applications if a failure were to occur? What about the integrity of the caregiver’s data in the event of a disaster? In lecture c, we will finalize our discussion and outline some backup strategies. And since we are on the subject of backing up, we will finish with some tips on archiving and decommissioning data and hardware.
  • #4: Healthcare institutions must now cope with the need to retain vast and ever-increasing quantities of medical data for protracted periods of time to safeguard themselves and their patients. The average 100-bed hospital generates anywhere between 40,000 to 45,000 radiological examinations yearly, equating to approximately 12 Terabytes of space needed for storage of these documents alone. This figure doesn’t even count the vast amounts of data generated yearly from billing, staffing and administration, and other typical needs of a healthcare setting. The HIPAA , or Health Information Portability & Accountability Act, Security Rule establishes the requirement to keep exact backup copies of all healthcare data that can be retrieved in a timely manner to restore documentation, should data be corrupted or lost. Think of a backup as a first step – the real reason to make a backup is not the backup, but the restoration of what was lost.
  • #5: Besides federal regulation such as HIPAA, state laws often describe retention requirements for health information. They may look at a fixed amount of time, or the age of the patient (especially for minors) or of the health record, time since discharge or death, or malpractice suit statute of limitations regulations. Let’s take a look at best practices for general backups. The copy of the information should be verified to ensure its correctness. A backup that cannot be restored is not a backup at all. Additionally, multiple copies, with a copy of the data at a location off-site geographically to protect it from natural disasters, fires, flooding, and such. The data must be easily retrievable so data can be restored in a timely fashion. The data must be encrypted for security, especially if stored off-site or transported. Note that RAID or other fault-tolerant systems (as discussed in lecture b) are NOT a substitute for backup. RAID does not protect against file deletion, or help in recovering older versions of the data. Backups can.
  • #6: Another issue you need to consider when developing your backup strategy is how often and when you will complete your backups. Backups, which can sap network bandwidth and hinder access to resources should be conducted, whenever possible, in a manner that reduces performance issues during peak cycles. A ‘backup window’ is “… the time it takes to complete a given backup. This backup window is determined by both the amount of data that must be backed up and by the speed of the network infrastructure that handles the data.” In a small organization, backups can complete in a small window, outside of production hours. An off-hours backup is advantageous because you may assume no changes to the data will be made during the backup. Any change to a backup mid-stream may lead to an inconsistent (and therefore flawed and possibly useless) backup. However, as the amount of data increases, backups may extend into production hours, introducing that possibility and impacting system speed as well. Finally, many systems are expected to run 24/7, and have only production time in which to backup.
  • #7: There are different types of backups which can be run, depending on your specific needs. Each has its advantages and disadvantages: Full backups save all files, and provide a convenient restore because all of the programs and data needed are in the same backup. The largest drawback to a full backup is the size of the backup and the time required. Retaining multiple versions of backup data can make the size requirements grow quickly. Incremental backup is faster because it saves only the copies of files which have changed since the last backup. For systems where a relatively few number of files change each day, this can save tremendously on storage. The drawback is that restoration requires access to multiple backups, increasing the time and effort for a restoration. Well-tended data libraries are recommended for incremental backups to allow easy identification of the proper backup from which to restore.
  • #8: Differential backups reduce the restoration problems from the incremental backup. Now only two backups are needed: the last full backup, and the last differential. This works by copying all data that has changed since the last full backup. It does mean, however, that the size of a differential backup will grow over time, eventually nearly reaching the size of the full backup. Synthetic full backups are generated by merging a full backup with an incremental to allow for on-stop restoration. While it combines the speed of an incremental with the easy restore of a full, it does take some post-processing to merge the data. This increases the complexity of the backup, and the potential for error. If the majority of your data files change frequently, then full backups are likely the best option
  • #9: Snapshots are a recommended backup method for systems that have no downtime or off-hours. This feature, often implemented in a platform specific environment, allows the data to be “frozen” so a backup is taken of guaranteed consistent data, no matter how long the backup takes. It does this by writing all changes to data in a temporary area during the snapshot, which is used transparently for all other system access. Then once the backup is complete, the data in the temporary area is merged back with the primary system. The biggest benefit of file system snapshots is that they allow backups on live data without disabling application access.
  • #10: The most straightforward backup is to copy the data to an attached tape drive, optical drive, or other file storage system directly connected to the server. This is fine for small environments, but for multiple servers, tracking the storage media may be difficult. Having a single backup server that connects to other networked servers is the next step up. This allows for extensive configured tracking of backed-up data in the backup server, and scales well. Also, it allows flexibility in restoration – anything that is on the network may be given a copy of freshly restored data. At still larger scales, the Storage Area Network (or SAN) is a separate system of interfaces and connections between data servers. A SAN will provide bulk data storage for the network, and have provision for backup of that data on the same network, usually integrated by the storage vendor.
  • #11: Backups will start on-site, but any media that are created should periodically be stored off-site. The media to use for a backup are available in several types. Tapes are historically the most robust, but also relatively slow and the media is expensive. Storing large amount of data on tapes can create a physical inventory problem. For several years, the capacity and cost of hard drives have greatly outdistanced that of tapes. Optical media is familiar and relatively inexpensive, and is readable for easy restoration without specialized equipment, as optical drives are standard equipment on most computers. They hold relatively little data though, and can be fragile. Their small space is attractive when considering physical size requirements of storage. Flash media is mentioned because of its ubiquity. USB memory sticks are available in fairly large capacity at increasingly attractive prices, and the media is robust. Their maximum capacity can mean difficulty scaling to very large data sizes. Backup to hard disk may sound oxymoronic, but because of advances in hard drive technology, huge amounts of data can be stored inexpensively and quickly. Because of their bulk and relative fragility, hard disks need careful physical storage. Finally, backup to network or cloud locations, while not technically media, depend on the network throughput to the backup site. Processes that continually run in the background, updating any changes to an off-site backup, are an ideal solution as long as the cost and network bandwidth are available to support it.
  • #12: Database backup requires extra considerations. Before embarking on a backup strategy for your EHR databases, consult with your EHR vendor to ensure your backup strategy is compatible with your database infrastructure. They should have outlined best practices for your system. Often the database or application vendor will provide specialized tools or additional applications to backup.
  • #13: Legacy systems are often maintained simply to reference historical data, sometimes at great cost to the organization. At some point, systems or applications past their prime, or datasets which must be retired, must be evaluated and dealt with in a manner that ensures that active data is properly retained and inactive data is archived or disposed of securely, consistent with the organizational needs. Here are some tips for identifying and decommissioning legacy systems: Complete a full data audit and identify the data you are collecting and retaining and note redundancies. Complete a full inventory of EHR systems and determine what kinds of data you collect and retain, and require. This is a complex task, since managing the many overlaps and redundancies will make it confusing as to which application is being used for which purpose. Determine who owns the data so you can work with them to resolve any compliance or archiving requirements. Identify which data is inactive and which data is still active. This is done through both using logs and conferring with data owners and stakeholders. Remember, archiving and retrieval of data, particularly in the healthcare arena, is a lifelong commitment. Be sure to plan adequately for archiving and tracking the data for compliance even once it’s off the servers.
  • #14: Be sure your retention policies are well documented and are consistent with federal and state guidelines. Be sure to standardize on a single, well-navigable archival system. This makes locating archived data easier and faster. Develop a plan and a schedule for decommissioning. Be sure to notify your data owners and stakeholders of the event, what will happen to their data once the application is decommissioned, and any potential impacts or replacement applications brought online. Once the server or applications are decommissioned, ensure the integrity of any archived data. Remember, simply erasing data from decommissioned hardware using conventional means is not enough. Data erased in this fashion can be retrieved using simple utilities. Be sure to render storage media useless or ensure it has been erased according to industry standards.
  • #15: This concludes Creating Fault-Tolerant Systems, Backups, and Decommissioning. Let’s take a quick moment to summarize the important points presented in this unit: Regulations require healthcare institutions to keep exact backup copies of all healthcare data. That data should be protected, encrypted and stored in multiple locations to protect it from foreseeable harm for the duration of its retention period. Backups often will occur during a limited timeframe, or backup window. As the amount of the data needing to be backed up increases, generally, so does the backup window. It is important to develop a backup strategy that minimizes the backup window while ensuring data integrity. Consider on versus off-site and full versus partial backups, as well as the type of media to use. However, always remember that any backup without a restore is useless – verification of stored data is critical to ensure availability. Lastly, decommissioning obsolete data or data storage devices require extra considerations to ensure that active data is properly retained, that inactive data is properly and safely discarded or archived and that regulatory compliance is maintained.
  • #16: This concludes Creating Fault-Tolerant Systems, Backups, and Decommissioning. Let’s take a quick moment to summarize the important points presented in this unit: Regulations require healthcare institutions to keep exact backup copies of all healthcare data. That data should be protected, encrypted and stored in multiple locations to protect it from foreseeable harm for the duration of its retention period. Backups often will occur during a limited timeframe, or backup window. As the amount of the data needing to be backed up increases, generally, so does the backup window. It is important to develop a backup strategy that minimizes the backup window while ensuring data integrity. Consider on versus off-site and full versus partial backups, as well as the type of media to use. However, always remember that any backup without a restore is useless – verification of stored data is critical to ensure availability. Lastly, decommissioning obsolete data or data storage devices require extra considerations to ensure that active data is properly retained, that inactive data is properly and safely discarded or archived and that regulatory compliance is maintained.
  • #17: No Audio. Ten seconds of silence.
  • #18: No Audio.