Lab 2: CMC and the GE “Centricity” Case Updated for Spring 2006.

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
Copyright Eastern PA EMS Council February 2003 Health Information Portability and Accountability Act It’s the law.
COBB/DOUGLAS COMMUNITY SERVICES BOARD Confidentiality and Privacy of Consumer Information.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
HIPAA Health Insurance Portability and Accountability Act.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
NAU HIPAA Awareness Training
HIPAA Basics A Matter of Integrity. Introduction “A Matter of Integrity” defines HIPAA and protecting patient health information. Success depends on our.
CHAPTER © 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2 The Use of Health Information Technology in Physician Practices.
Reviewing the World of HIPAA Stephanie Anderson, CPC October 2006.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
© 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2.5 HIPAA Legislation and its Impact on Physician Practices 2-15 The Health Insurance Portability.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Are you ready for HIPPO??? Welcome to HIPAA
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
Privacy, Security, Confidentiality, and Legal Issues
Computer Mediated Communication Computer Mediated Communications and Collaboration (CMCC)
HEAVEN’S HANDS COMMUNITY SERVICE H.I.P.A.A. What is HIPAA? HIPAA stands for the Health Insurance Portability and Accountability Act, which was passed.
HIPAA COMPLIANCE FANTASTIC FOUR CASEY FORD MANINDER SINGH RANGER OLSOM Information Security in Real Business.
Computer Mediated Communication: Pre-lab Lecture Slides.
Day 4 Agenda Talk about Lufthansa Case Topics for lab ROI, HIPAA, CMC Goals See information systems in context Understand the connection between Societal.
Factors to be taken into account when designing ICT Security Policies
Lab Review Material that will be on the exam. Where to find Material Course Website Calendar –Lecture Slides (PowerPoint) –Assigned Reading Blackboard.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
ELECTRONIC MEDICAL RECORDS By Group 5 members: Kinal Patel David A. Ronca Tolulope Oke.
HIPAA – Health Insurance Portability & Accountability Act and the Privacy Act MSgt Nechele M. Chambers Senior Enlisted Liaison TRICARE Area Office-Europe.
HIPAA Privacy & Security EVMS Health Services 2004 Training.
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
The Use of Health Information Technology in Physician Practices
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
HIPAA OBJECTIVES  Define HIPAA  Define PHI  Use of PHI  Your rights  Your responsibilities.
Confidentiality and Drug Courts Carson Fox Esq. Steve Hanson M.S. Ed.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
HIPAA (health insurance portability and accountability act)
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 2 The HIPAA Privacy Standards HIPAA for Allied Health Careers.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
Create speaking avatars and use them as an effective learning tool.
Working with HIT Systems
Medical Manager Unit 9 ICBS 170. Medical Manager Electronic Data Interchange (EDI)  Ability to request, receive, transfer and integrate information electronically.
Social Aspects of Human- Computer Interaction Designing for collaboration and communication Chris Kelly.
Mtivity Client Support System Quick start guide. Mtivity Client Support System We are very pleased to announce the launch of a new Client Support System.
HIPAA Health Insurance Portability and Accountability Act of 1996.
Google Tools for your Classroom. 6/15/2009. Agenda 1. Google Accounts 2. What is Web 2.0? 3. Intro to Google calendar 4. Google Docs 5. Google Forms and.
Welcome! IEEE Region 2 Meeting April 9-10, 2005 Sheraton Four-Points, Baltimore MD.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Cybersecurity Essentials Lesson 1 Protecting Your Identity ICT Demonstrate an Understanding of Internet Safety and Ethics 3.08 Identify and apply.
Health Insurance Portability and Accountability Act By Bradley Gleich.
Lab 2: SOLUTIONS. Goals  “CENTRICITY” = Centralized records  Many kinds of records = integration  Faster access to records  Support diagnoses  Reduce.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
HIPAA for Students Health Insurance Portability and Accountability Act.
Terminology in Healthcare and Public Health Settings Electronic Health Records Lecture b – Definitions and Concepts in the EHR This material Comp3_Unit15.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill/Irwin Chapter 6 The Privacy and Security of Electronic Health Information.
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
HIPAA PRIVACY & SECURITY TRAINING
Move this to online module slides 11-56
Disability Services Agencies Briefing On HIPAA
Health Care: Privacy in a Digital Age
Lesson 1: Introduction to HIPAA
Introduction to the PACS Security
Presentation transcript:

Lab 2: CMC and the GE “Centricity” Case Updated for Spring 2006

Part 1 Friends and enemies CMC overview HIPPA

Friends …. Secure and Reliable Timely and Accessible Reliable and Simple

And Enemies Accessible vs. Secure Reliable/Accurate/Complete vs. Economical

CMC Computer-Mediated Communication Voic or – one way (asynchronous) IM / chat rooms – two way (synchronous) Videophone Interactive internet games

What happens to our communications when we use CMC? Loss of Cues = cause misunderstandings Facial expressions Tone of voice Hand gestures Pauses Laughs Make up for it by emoticons or careful writing! (sarcasm)

What else happens? Writing becomes more informal Lower case, no punctuation, abbreviations: POS G2G TTFN Is this due to information overload? We become more “self-absorbed” More interested in our own problems than other Hate speech, rantings or angry Web logs do this a lot…

Caveats: careful! Never reply in anger – wait until the next day. Can send something stupid or personal to many people at once – watch reply to group. can be saved easily and used against you. is powerful and gives access to powerful people – flattens organization. Use it wisely!

? Question ? Do employers have a right to read or control your ? Court rulings say: yes, mostly: Company time and resources Privacy as basic human right. Don’t work there!

Group Decision Support Systems (GDSS) A DSS that meets the needs for a group decision. Provides support in group decision-making settings. A GDSS allows you to communicate with group members that are in the same building or half-way across the world.

Characteristics of a GDSS Easy to use Decision-making Support Support Brainstorming Encourage Group Consensus (voting, gap analysis) Allow Anonymous input Reduce negative group behavior

HIPPA Health Insurance Portability and Privacy Act Students read hippa overview: Google: hippa overview via tration/tools_for_your_office/resources/HIPPA _overview.php#2 Discuss Simplification, Privacy, Security Relates to info Attributes!

HIPPA: Simplification “Administrative Simplification is one of the newly published regulations which requires standardization of electronic transmissions and procedure/diagnosis codes.” See web page for examples…

HIPPA: Privacy and Personal Health Information (PHI) “Provisions for individual rights to receive a notice from the covered entity regarding how their PHI will be used; rights to access, inspect and copy their PHI; rights to receive an accounting of the release of their PHI for purposes other than for the use of treatment, payment, operations or other uses. “

HIPPA: Security Administrative Procedures Improved procedures/policies for records handling Backups Physical Safeguards Computer room access, protect from fire and water Technical Security Services and Mechanisms Logins, passwords, audit trail Data encryption, firewalls, etc.

Part 2: Chat room. 15 minutes Discuss Major Societal Trends surrounding the case. Instructor: turn on recording Students: COMMUNICATIONS | COLLABORATION | JOIN Select “Major trends” chat session

Part 3: Discussion Forum: 15 minutes Use meaningful thread names Instructor: assign students to groups and start recording. Students: COMMUNICATIONS | DISCUSSION BOARD | Select discussion forum “Major Goals”

Part 3 continued: ROI 10 minutes. Instructor: open ROI chart file and discuss. What were the top 4 savings areas? Intangibles are important Can be difficult to measure E.g., staff morale -> less turnover Payback time of Centricity system itself? Note connection to GOALS !

Return On Investment ANSWERS What were the top 4 savings areas? Paper storage costs Personnel Legal costs Better utilization – process more patients Payback time of Centricity system itself? 1.5 years. Definitely worth doing.

Part 4: I/P/O/F/S Analysis For Centricity, identify: Inputs (patient history, tests, etc.) Processing (calculations, searching, etc.) Outputs (screens, , reports, charts, etc) Feedback (How is system performing?) Stakeholders Individuals or organizations that have an interest in the operation or outcome of the system.

IPOFS chart: 20 minutes. Use work from pre-lab Instructor: assign students to groups and start recording. COMMUNICATION | GROUP PAGES GROUP # | COLLABORATION | VIRTUAL CLASSROOM Hold CTL key and JOIN

Part 5 15 minutes Face to face: Three most important information attributes for this case? Contrast and compare CMC techniques: Face to face Chat Discussion forum Virtual whiteboard

Part 6 Online quiz Hand in IPOF chart and pre-lab