We ask that all questions be held until the end of the Presentation!Thank You 
DaedalusTechnicalSolutionsSteve NortonTechnical Writer -Training Specialist Bradley ManusNetwork  SpecialistJennifer FitzgeraldProject ManagerYour Missing Link in Solving Your Networking Problems
Who We Are
Our Goals  Provide Network Access to All 5 Office Locations.
  Insure Seamless Access to Patient Medical Records.
  Make Security to Meet or Exceed HIPAA Standards.
  Design a Backup Plan for Disaster Recovery.What is HIPAA?Health Insurance Portability and Accountability Act
HIPAA-Compliant Can you go buy a HIPAA-compliant software package and be done with it? Not really, It's you, as an organization, that's HIPAA compliant, and no software application is going to magically make you that way. HIPAA defines a large set of policies and procedures, many of which have nothing to do with technology.
Tracking Who Did What
User Roles
Smart Cards
Front-End SoftwareHIPAA transaction sets version 5010 are coming and HIPAAsuite is ready for it.
Benefits of HIPAAsuite
Security and Encryption
Sophos Security Software
Testing Plan
D.T.SOnsite Training Center
Building Layout – Central Office66’ft.92’ft.
Network Cabling
Security of Building
Virtual Network
Disaster Recovery Plan
Projected Timeline
Network Configuration
Cisco Secure PIX Firewall 535
Cisco 2921 Integrated Router
VoIP Phones
HP TouchSmart 9300 EliteOption A-
Thin Client ComputersOption B-
Toughbook C1 Dual Touch
HP Digital Sender
Microsoft Office 2010
Windows 7 Professional
Transfer of Old Data
Scanning Documents
Recycling Old Equipment
Price List
Price List
Price List
Total CostOption A - $    648,995.20Option B - $    595,562.20

More Related Content

PDF
Control the Hype: A look at service assurance systems and how they relate to ...
PDF
BCS ITNow 201606 - Insider Threats
PPTX
Network security
PDF
January Infographic: Benefits of Partnering with an Managed Service Provider
PPTX
Security Essentials
PDF
IoT vendor questions
PDF
Implementing Secure Access & Mobile Identity
PDF
6 aproaches
Control the Hype: A look at service assurance systems and how they relate to ...
BCS ITNow 201606 - Insider Threats
Network security
January Infographic: Benefits of Partnering with an Managed Service Provider
Security Essentials
IoT vendor questions
Implementing Secure Access & Mobile Identity
6 aproaches

What's hot (20)

PPTX
Applied data analytics_v1_6.23
PPTX
Puppet Channel Sales Training Webinar: Puppet Sales Messaging
PDF
CIS Security Benchmark
PDF
To MSSP or not to MSSP IISF 2015
PPT
Disaster Preparedness Planning
PDF
Tesseract Service Portfolio
PDF
ONI Assure Insight Brochure fv
PDF
Security Consulting Services
PPTX
Heureka Webinar – Security, the Growth Engine for eDiscovery Professionals
PDF
Achieving and Measuring Success with the Security Awareness Maturity Model
PDF
Security Risks: The Threat is Real
PDF
Myth-busting in Application Security
PPT
How sophisticated penetration testers get through the defenses
PPTX
Network nags - when security fails
PPTX
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
DOCX
Resume
PPTX
Portfolio security, analytics and forensic blue coat
PDF
Hybrid Security Analysis: Bridging the Gap between Inside-Out and Outside-In
PDF
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
RTF
DeJesusSres274
Applied data analytics_v1_6.23
Puppet Channel Sales Training Webinar: Puppet Sales Messaging
CIS Security Benchmark
To MSSP or not to MSSP IISF 2015
Disaster Preparedness Planning
Tesseract Service Portfolio
ONI Assure Insight Brochure fv
Security Consulting Services
Heureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Achieving and Measuring Success with the Security Awareness Maturity Model
Security Risks: The Threat is Real
Myth-busting in Application Security
How sophisticated penetration testers get through the defenses
Network nags - when security fails
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Resume
Portfolio security, analytics and forensic blue coat
Hybrid Security Analysis: Bridging the Gap between Inside-Out and Outside-In
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
DeJesusSres274
Ad

Viewers also liked (12)

KEY
Cross platform mobile apps
PPTX
NSA Capstone Presentation
DOCX
Capstone Final Part
PPTX
Capstone Project Pt 11
PPTX
ITT CNS Capstone Project
PPTX
Data Base Management ! Batra Computer Centre
PPT
Completed+Presentation+Capstone
PPTX
IT 415 - Capstone Project Orientation
PDF
IMC 636 Capstone
PPT
Capstone Project Presentation
PPTX
eBusiness Website Database Design
DOCX
NT2799 FINAL CAPSTONE PROJECT.DOCX
Cross platform mobile apps
NSA Capstone Presentation
Capstone Final Part
Capstone Project Pt 11
ITT CNS Capstone Project
Data Base Management ! Batra Computer Centre
Completed+Presentation+Capstone
IT 415 - Capstone Project Orientation
IMC 636 Capstone
Capstone Project Presentation
eBusiness Website Database Design
NT2799 FINAL CAPSTONE PROJECT.DOCX
Ad

Similar to ITT-Tech Capstone Final for CNS (20)

PPTX
Hipaa checklist for healthcare software
PDF
How to Build a HIPAA-Compliant Software Application
PDF
An Overview of HIPAA Laws and Regulations.pdf
PPTX
how to really implement hipaa presentation
PDF
HIPAA Security Assessment Intro & Overview
PDF
HIPAA Security Assesment Toolkit
PDF
The must have tools to address your HIPAA compliance challenge
PDF
Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...
PPTX
Healthcare Compliance: HIPAA and HITRUST
PDF
HIPAA 101- What all Doctors NEED to know
PPTX
Connectria Hosting- HIPAA Compliant Hosting Services
PDF
How to Build HIPAA Compliant Healthcare Apps: Everything You Should Know!
PDF
Application Developers Guide to HIPAA Compliance
PDF
Understanding the Importance of HIPAA Compliance in Medical Billing Software.pdf
PPTX
HIPAA Policies: The Key to Protecting Patient Information
PDF
Overview of hipaa & tools for hipaa compliance
PDF
Business Associates: How to become HIPAA compliant, increase revenue, and gai...
PDF
HIPAA HiTech Regulations: What Non-Medical Companies Need to Know
DOCX
Overview Imagine you are the information security officer at a.docx
PDF
Meaningful Use vs HIPAA
Hipaa checklist for healthcare software
How to Build a HIPAA-Compliant Software Application
An Overview of HIPAA Laws and Regulations.pdf
how to really implement hipaa presentation
HIPAA Security Assessment Intro & Overview
HIPAA Security Assesment Toolkit
The must have tools to address your HIPAA compliance challenge
Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...
Healthcare Compliance: HIPAA and HITRUST
HIPAA 101- What all Doctors NEED to know
Connectria Hosting- HIPAA Compliant Hosting Services
How to Build HIPAA Compliant Healthcare Apps: Everything You Should Know!
Application Developers Guide to HIPAA Compliance
Understanding the Importance of HIPAA Compliance in Medical Billing Software.pdf
HIPAA Policies: The Key to Protecting Patient Information
Overview of hipaa & tools for hipaa compliance
Business Associates: How to become HIPAA compliant, increase revenue, and gai...
HIPAA HiTech Regulations: What Non-Medical Companies Need to Know
Overview Imagine you are the information security officer at a.docx
Meaningful Use vs HIPAA

Recently uploaded (20)

DOCX
search engine optimization ppt fir known well about this
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PPT
What is a Computer? Input Devices /output devices
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PPTX
The various Industrial Revolutions .pptx
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
Architecture types and enterprise applications.pdf
PPTX
Build Your First AI Agent with UiPath.pptx
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PPT
Geologic Time for studying geology for geologist
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
STKI Israel Market Study 2025 version august
search engine optimization ppt fir known well about this
Developing a website for English-speaking practice to English as a foreign la...
Flame analysis and combustion estimation using large language and vision assi...
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
CloudStack 4.21: First Look Webinar slides
Enhancing plagiarism detection using data pre-processing and machine learning...
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
What is a Computer? Input Devices /output devices
The influence of sentiment analysis in enhancing early warning system model f...
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
The various Industrial Revolutions .pptx
Microsoft Excel 365/2024 Beginner's training
Comparative analysis of machine learning models for fake news detection in so...
Architecture types and enterprise applications.pdf
Build Your First AI Agent with UiPath.pptx
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Geologic Time for studying geology for geologist
Improvisation in detection of pomegranate leaf disease using transfer learni...
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
STKI Israel Market Study 2025 version august

ITT-Tech Capstone Final for CNS

Editor's Notes

  • #4: DTS is a Small Company with BIG values. We treat everyone like your family. Our friendly staff will help you out 24/7/365 days a year. We handle all of your business needs.MISSION STATEMENTTo make technology an asset for your business without problems. We work around your business schedule. We strive to make technology integrate seamlessly with your business, so your business can grow. As your technology partner, when your business grows ours will grow with you, therefore, we will work hand in hand to support your growth.
  • #6: Health Insurance Portability and Accountability Act To ensure protection andprivacy of personal health records by protecting the security and confidentiality of health care information.
  • #7: Can you go buy a HIPAA-compliant software package and be done with it? Not really, It's you, as an organization, that's HIPAA compliant, and no software application is going to magically make you that way. HIPAA defines a large set of policies and procedures, many of which have nothing to do with technology.
  • #8: One of the clearest HIPAA requirements is that organizations keep an audit log of who did what in the software package. It's important that your package be able to track which person accessed which record on what date, and whether he or she viewed it, updated it, or deleted it.
  • #9: HIPAA specifies that each employee at any organization should only see the "minimum necessary" information to do his or her job. This a requirement for organizations to define what level of access each employee has to the organization's software, based on both the employee's role within the organization as well as on the outside clients he or she has permission to access.
  • #10: Smart cards can provide identification, authentication, data storage and application processing…Smart cards can improve the security and privacy of patient information, provide a secure carrier for portable medical records reduce health care fraud, support new processes for portable medical records, provide secure access to emergency medical information, enable compliance with government initiatives and mandates, and provide the platform to implement other applications as needed by the health care organization.
  • #11: Electronic Data Interchange (EDI) is computer-to-computer communication of business documents between companies. It is a paperless way to send and receive Purchase Orders, Invoices, Charge backs etc. EDI replaces human-readable documents with electronically coded documents. The sending computer creates the document and the receiving computer interprets the document. Implementation of EDI streamlines the process of exchanging standard business transactionsElectronic data interchange (EDI) is the structured transmission of data between organizations by electronic means--HIPAA electronic data interchange (EDI) front-end application for all HIPAA transaction sets. It is designed for organizations that receive and send EDI transactions in the healthcare industry.
  • #13: HIPAA also requires you to secure your data. For example, the application should be secured behind a firewall, and with solid password protection for user accounts… we will be talking about firewall later in the presentation.
  • #14: HIPPA Compliant SoftwareEncryption provide multi-layered security that includes full disk encryption, port control and data loss prevention. Content scanning warns employees when they try to move sensitive data to email, IM or storage devices. Application control stops employees from running software, like P2P software, that puts your data at risk.Device control prevents employees from copying data to unknown devices like USB keys or CDs.
  • #16: Certified Professional Trainers. Conveniently located in Las Vegas. We will work to accommodate your needs. One-on-one on-site software training.
  • #22: Time line - start 09/06 – 10/31 end
  • #24: The Cisco Secure PIX Firewall 535 delivers carrier-class performance that meets the needs of large enterprise networks as well as service providers. As part of the world-leading Cisco Secure PIX Firewall series, it provides today's networking customers with unmatched security, reliability, and performance. The PIX 535 integrates stateful firewall and IP Security (IPsec) virtual private network (VPN) functionality. The PIX 535 is a purpose-built firewall appliance that offers an unprecedented level of protection. This is tightly integrated with the PIX Operating System (OS), which is a proprietary, hardened system that eliminates security holes and performance degrading overhead. At the heart of this system is a protection scheme based on the Adaptive Security Algorithm (ASA), which offers stateful connection-oriented firewalling that is capable of 500, 000 concurrent connections while at the same time blocking common denial of service (Dos) attacks. The PIX 535 is also a full-featured VPN gateway that can securely transport data over public networks. It supports both site-to-site and remote access VPN applications via 56-bit Data Encryption Standard (DES) or 168-bit 3DES. The integrated VPN functionality of the PIX 535 can be supplemented with an optional VPN Accelerator Card (VAC) to deliver 100 Mbps throughput and 2, 000 IPsec tunnels.
  • #25: The Cisco 2921 Integrated Services Router (ISR) delivers highly secure data, voice, video, and application services for small offices. Key features include:3 Integrated 10/100/1000 Ethernet ports with 1 port capable of RJ-45 or SFP connectivity 1 service module slot 4 Enhanced High-Speed WAN Interface Card (EHWIC) slots 3 onboard digital signal processor slots 1 internal service module slot for application services Fully integrated power distribution to modules supporting 802.3af Power over Ethernet (PoE) and Cisco Enhanced PoESecurity Embedded hardware-accelerated VPN encryption Secure collaborative communications with Group Encrypted Transport VPN, Dynamic Multipoint VPN, or Enhanced Easy VPN Integrated threat control using Cisco IOS Firewall, Cisco IOS Zone-Based Firewall, Cisco IOS IPS, and Cisco IOS Content Filtering Identity management: Intelligently protecting endpoints using authentication, authorization, and accounting (AAA), and public key infrastructure Voice High-density packet voice DSP module, optimized for voice and video support Standards-certified VoiceXML browser services Cisco Unified Border Element capabilities Cisco Unity Express voicemail support Support for Cisco Communications Manager Express and Survivable Remote Site Telephony
  • #26: Designed to meet the communication needs of professional workers in enclosed office environmentAccess to multiple telephone lines (or a combination of lines and direct access to telephony features) Includes high-quality, hands-free speakerphone capability and built-in headset connectivity.
  • #27: Preloaded w/ Windows 7 Professional /64 bitMulti-touch panel with 23-inch diagonal Full HD widescreen WLED backlit BrightView LCD, adjustable reclining stand and VESA Wall Mount adapter.Communication featuresSecurity management---Kensington lock slot,Rear port security cover
  • #28: Operating system -- Microsoft® MultiPoint Server 2011, Microsoft® MultiPoint Server 2010ProcessorIntel® Core™ i7-2600 3.4 GHzIntel® Core™ i5-2400 3.1 GHzStandard memory4 GB 1333 MHz DDR3 SDRAM8 GB 1333 MHz DDR3 SDRAM
  • #30: Must sign on with user name and password…tracks who sent what to whom…scans and uploads paperwork to patients files. HIPPA Complient!
  • #34: 2 location have paper copies of patients records, we will hire an outside contractor to scan in the documents so that you can become a digitalized firm.Each office will have a Digital Sender to it to keep better records and files on patients.The files will update the to the patient records immediately to eliminate missing documentsSecurity – everyone must login and alls documents sent can be to tracked to individual users.
  • #35: Clark County Computer Resource CenterRecycle your old and unwanted computer and network they will provide you with tax deductible donation receipt network.We will make sure that everything is wiped off the computer by using Acronis Drive Cleanser
  • #40: Tax write off for donating equipment….if done by you!Any over charges that we estimated higher, then what they actually were will be credited back to the customer.-HITECH act provides incentive payments for the adoption of electronic health records (EHR). HITECH incentives are paid on a per provider basis. For example, a practice with two physicians and a nurse practitioner using an EHR could qualify for $132,000 in Medicare incentives.First payment year is 2011or 2012 = $18,000 Second payment year = $12,000 Third payment year = $8,000 Fourth payment year = $4,000 Fifth payment year = $2,000