The HIBBs Game ! Click to Play Content licensed under Creative Commons Attribution-Share Alike 3.0 Unported.

Slides:



Advertisements
Similar presentations
Online Course Privacy Contacting Patients and Verification START Click to begin…
Advertisements

Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
HIPAA Training for Pharmaceutical Industry Representatives University of Utah Hospitals & Clinics.
Informed Consent.
Voice over the Internet Protocol (VoIP) Technologies… How to Select a Videoconferencing System for Your Agency Based on the Work of Watzlaf, V.M., Fahima,
Are you ready for HIPPO??? Welcome to HIPAA
Health Insurance Portability Accountability Act of 1996 HIPAA for Researchers: IRB Related Issues HSC USC IRB.
M. Guymon Pleasant Grove High School Spring 2003 Ethics & Computer Technology Day 18.
Computer Technology Day 18
Computer Concepts 5th Edition Parsons/Oja Page 492 CHAPTER 10 File And Database Concepts Section A PARSONS/OJA Databases.
Design Aspects. User Type the URL address on the cell phone or web browser Not required to login.
Informed Consent and HIPAA Tim Noe Coordinating Center.
HIBBs is a program of the Global Health Informatics Partnership Introduction to Form Design Regional East African Centre for Health Informatics (REACH-INFORMATICS)
Christina Williamson, DHA(c),MSN, RN-BC Veterans Healthcare System of the Ozarks.
HIBBs is a program of the Global Health Informatics Partnership Introduction To Electronic Medical Records Y. SINGH NELSON R. MANDELA SCHOOL OF MEDICINE.
ELECTRONIC MEDICAL RECORDS By Group 5 members: Kinal Patel David A. Ronca Tolulope Oke.
What is data quality? An introduction to the culture and philosophy of collecting and using accurate and useful data.
1-2 Training of Process FacilitatorsTraining of Coordinators 4-1.
Security Awareness Norfolk State University Policies.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Ethics and Integrity in Data Use and Management John E. Sidle, M.D., M.S. May 10, 2010 This module was recorded at the health informatics-training course.
Paula Peyrani, MD Medical/Project Director, HIV Program at the 550 Clinic Assistant Director, Research Design and Development Clinical and Translational.
Ethics & Computer Essentials. R. Stewart Fayetteville High School Ethics A set of principles of right conduct A theory or a system of.
Ethics & Computer Technology. Ethics are…  A set of principles of right conduct.  A theory or a system of moral values.  The rules or standards.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
Outline 1.Works protected by Copyright 2.Works offered under the terms of a Creative Commons license 3.Works in the Public Domain 4.Works that are Publicly.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
A brief Introduction to Bioinformatics Y. SINGH NELSON R. MANDELA SCHOOL OF MEDICINE DEPARTMENT OF TELEHEALTH Content licensed under.
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
We have reviewed this material in accordance with U.S. Copyright Law and have tried to maximize your ability to use, share, and adapt it. The citation.
Advanced Skills for Health Care Providers, Second Edition Barbara Acello Thomson Delmar Learning, 2007 Chapter 2 Observation, Documentation, and Reporting.
Fort Bend ISD Acceptable Use Policy Student Training.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Component 6 - Health Management Information Systems
AN INTRODUCTION Managing Change in Healthcare IT Implementations Sherrilynne Fuller, Center for Public Health Informatics School of Public Health, University.
Integrating a Federated Healthcare Data Query Platform With Electronic IRB Information Systems Shan He IPHIE 2010.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Chapter 19 Manager of Information Systems. Defining Informatics Process of using cognitive skills and computers to manage information.
Professional Development to Practice The contents of this presentation were developed under a grant from the US Department of Education to the Missouri.
Grouper Training – Admin – Subject API – Part 4 Shilen Patel Duke University This work licensed under a Creative Commons Attribution-NonCommercial 3.0.
R. Stewart Fayetteville High School Ethics & Computer Technology Day 18.
HIPAA and Human Subjects Research IRB Member CE May 2014 Slideshow by Sean Horkheimer.
An Introduction to Medical Informatics
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
HIPAA HEALTH INSURANCE PORTABILITY ACOUNTABILITY ACT.
Introduction and Training 1 By: Snehil Gupta CBMI, WUSTL.
© Trustees of Indiana University Released under Creative Commons 3.0 unported license; license terms on last slide. Informatics Tools at the Indiana CTSI.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
Health Management Information Systems Clinical Decision Support Systems Lecture b This material Comp6_Unit5b was developed by Duke University, funded by.
Proper Internet and Social Media Usage Internet Usage While on Premise Board Policy GBEAA (The Internet Acceptable Use Policy): “Employees will.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
Good Clinical Practice (GCP) and Monitoring Practices
Using the Computer Responsibly
IS 360D Health Management Applications
Data protection.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
Data Ethics BPS 7e Chapter 10 © 2015 W. H. Freeman and Company.
Office of Information Security
Information management and communication
Privileged Communications
Confidentiality of Information Acknowledgment and Agreement 2018
Making Your IRBs and Clinical Investigators HIPAA-Ready
Lesson 3: Medical Records
Ethics and Integrity in Data Use and Management
School of Medicine Orientation Information Security Training
Presentation transcript:

The HIBBs Game ! Click to Play Content licensed under Creative Commons Attribution-Share Alike 3.0 Unported

TerminologyMissing DataEthics Change Management 10 points 20 points 30 points 40 points Game Board Select a cell to play

What is the meaning of “direct entry” of data? Question 1 Show answer

Go to Gameboard The entry of data into a computer system by the individual who personally made the observations Answer 1

Show answer Question 2 Name a search method that looks for a literal match of the search term, allowing precise control over the items retrieved

Go to Gameboard Answer 2 Exact-match searching

Question 3 What is OpenMRS? Show answer

Go to Gameboard Answer 3 An Open Source Medical Record System

Show answer Question 4 In clinical research, what is a research protocol?

Go to Gameboard Answer 4 A prescribed plan for managing subjects that describes what actions to take under specific conditions

Question 5 Show answer When would you prepare a plan to account for missing data?

Go to Gameboard Answer 5 Before data collection begins

Question 6 Show answer During data collection in the clinic, how can you minimize the chances of having missing data?

Go to Gameboard Answer 6 Review the data collection forms while the patient is still there.

Question 7 Show answer At the point of data entry, how can you minimize the chances of having missing data?

Go to Gameboard Answer 7 Reject any form that is missing key variables (patient ID, visit date)

Question 8 Show answer Name 3 types of missing data.

Go to Gameboard Answer 8 1. Not applicable 2. Not available 3. Unknown 4. Refusal to answer 5. True missing (skipped)

Question 9 Show answer Give 3 examples of individually identifiable information

Go to Gameboard Answer 9 1. Name 2. Driver’s license number (ID card) 3. Phone number 4. Vehicle identifier

Question 10 Show answer Name the international agreement that provides ethical guidelines to govern all medical research

Go to Gameboard Answer 10 Declaration of Helsinki

Question 11 Show answer Name 3 ways to ensure data security by limiting access

Go to Gameboard Answer Password protection of electronic records 2. Defined privileges for data users 3. Firewalls to prevent outside access

Question 12 Show answer What are the differences in the rules for privacy and confidentiality for clinical data versus research data?

Go to Gameboard Answer 12 None. The rules are the same.

Question 13 Show answer When implementing a new healthcare IT system, at what point should change management processes be initiated?

Go to Gameboard Answer 13 At the beginning of the planning process.

Question 14 Show answer How can managers encourage a feeling of ownership when implementing a new healthcare IT system?

Go to Gameboard Answer 14 Communicate with all team members, and listen to their concerns

Question 15 Show answer What is one of the most important effects when implementing a new healthcare IT sytem?

Go to Gameboard Answer 15 Disruption of work routine

Question 16 Show answer Who is ultimately responsible for the successful implementation of a new healthcare IT system?

Go to Gameboard Everyone in the organization, including top management and employees at all levels Answer 16

Acknowledgements Game design and development was funded by The Rockefeller Foundation through a grant to the American Medical Informatics Association The game was designed by Parvati Dev and Patricia Youngblood (more)

The HIBBs Game ! THE WORK IS PROVIDED UNDER THE TERMS OF THIS CREATIVE COMMONS PUBLIC LICENSE ("CCPL" OR "LICENSE"). THE WORK IS PROTECTED BY COPYRIGHT AND/OR OTHER APPLICABLE LAW. ANY USE OF THE WORK OTHER THAN AS AUTHORIZED UNDER THIS LICENSE OR COPYRIGHT LAW IS PROHIBITED.CREATIVE COMMONS PUBLIC LICENSE Acknowledgements Current content in the game template is drawn from the prototype HIBBs modules and from “Biomedical Informatics”, third edition, EH Shortliffe and JJ Cimino, eds, Springer, 2006.

Thank you for playing the HIBBs Game ! Content licensed under Creative Commons Attribution-Share Alike 3.0 Unported