ELECTRONIC MEDICAL RECORDS By Group 5 members: Kinal Patel David A. Ronca Tolulope Oke.

Slides:



Advertisements
Similar presentations
Presented by Elena Chan, UCSF Pharm.D. Candidate Tiffany Jew, USC Pharm.D. Candidate March 14, 2007 P HARMACEUTICAL C ONSULTANTS, I NC. P RO P HARMA HIPAA.
Advertisements

HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
NAU HIPAA Awareness Training
 Original Intent: ◦ Act passed in 1996 with two main goals: 1.Ensure individuals would be able to maintain their health insurance between jobs (the “portability”
Regulatory Issues in Campus Computing Privacy and Security in a Digital World Presented by David Gleason, Esq. University Counsel University of Maryland,
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Are you ready for HIPPO??? Welcome to HIPAA
Privacy, Security, Confidentiality, and Legal Issues
Health Insurance Portability and Accountability Act (HIPAA)
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
HIPAA – Health Insurance Portability & Accountability Act and the Privacy Act MSgt Nechele M. Chambers Senior Enlisted Liaison TRICARE Area Office-Europe.
The University of Kansas Medical Center Shadow Experience Training.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Dealing with Business Associates Business Associates Business Associates are persons or organizations that on behalf of a covered entity: –Perform any.
Quality Integrity Stewardship Courtesy Care Accountability Medical Records ARMA Florida Gulf Coast Chapter Michael Spake Lakeland Regional Medical Center.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 2 The HIPAA Privacy Standards HIPAA for Allied Health Careers.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Eliza de Guzman HTM 520 Health Information Exchange.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
HIPAA BASIC TRAINING MODULE 1C – Overview (For staff who do not generally create Protected Health Information) Anderson Health Information Systems, Inc.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Working with HIT Systems
HIPAA LAWS.  Under the privacy rule, the patient must give consent to use his or her Protected Health Information.  Examples in which consent must be.
Component 8/Unit 6aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 6a System Security Procedures.
HIPAA Health Insurance Portability and Accountability Act of 1996.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
Health Insurance Portability and Accountability Act By Bradley Gleich.
Medical Documentation
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
Board of Directors – March 24, 2016 Denise Mannon, AHFI, CHPC Corporate Compliance Officer.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
The Medical College of Georgia HIPAA Privacy Rule Orientation.
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
Health Insurance Portability and Accountability Act (HIPAA) © 2013 Project Lead The Way, Inc.Principles of Biomedical Science.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
Installation and Maintenance of Health IT Systems System Security Procedures and Standards Lecture a This material Comp8_Unit6a was developed by Duke University,
Health Insurance Portability and Accountability Act
HIPAA Privacy & Security
Electronic Medical Record (EMR)
Understanding HIPAA Dr. Jennifer Lu.
Health Insurance Portability and Accountability Act
HIPAA.
Move this to online module slides 11-56
Disability Services Agencies Briefing On HIPAA
Final HIPAA Security Rule
County HIPAA Review All Rights Reserved 2002.
Health Care: Privacy in a Digital Age
HIPAA Privacy and Security Summit 2018 HIPAA Privacy Rule: Compliance Plans, Training, Internal Audits and Patient Rights Widener University Delaware.
HIPAA Security Standards Final Rule
HIPAA Privacy & Security
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
The Health Insurance Portability and Accountability Act
Presentation transcript:

ELECTRONIC MEDICAL RECORDS By Group 5 members: Kinal Patel David A. Ronca Tolulope Oke

CONTENT BACKGROUND BACKGROUND RISKS RISKS CONTROLS CONTROLS

DEFINITION “An electronic medical record (EMR) is a digital version of a paper chart that contains all of a patient's medical history from one practice.” “An electronic medical record (EMR) is a digital version of a paper chart that contains all of a patient's medical history from one practice.”

BENEFITS OF EMR EMR maintains patient privacy EMR maintains patient privacy Fewer forms to fill out during a visit. Fewer forms to fill out during a visit. Fewer repetitive questions- regarding past medical history. Fewer repetitive questions- regarding past medical history. Reduces cost of Healthcare. Reduces cost of Healthcare.

RISKS: SECURITY Risk of inappropriate access Unauthorized user access Data breaches Risk of record loss due to natural disasters Risk of record tampering Back dating Fraudulent entries, or other modifications

RISKS: USABILITY Multiple screens and mouse clicks Alert fatigue Standardization can lead to mindless repetition of entries rather than thoughtful documentation. Lack of uniform communication standards for systems

RISKS: LOGISTICS AND COST System inefficiency Obsolete Technology Huge Financial cost

HIPAA Health Insurance Portability and Accountability Act (HIPAA) Passed in the US in 1996 Establishes rules for access, authentications, storage and auditing, and transmittal of electronic medical records Restrictions for electronic records more stringent than those for paper records. Concerns as to the adequacy of these standards

PHI protected information under this act are: Information doctors and nurses input into the electronic medical record Conversations between a doctor and a patient that may have been recorded Billing information Under this act there is a limit as to how much information can be disclosed, and as well as who can see a patients information. Patients also get to have a copy of their records if they desire, and get notified if their information is ever to be shared with third parties Covered entities may disclose protected health information to law enforcement officials for law enforcement purposes as required by law (including court orders, court-ordered warrants, subpoenas) and administrative requests; or to identify or locate a suspect, fugitive, material witness, or missing person Medical and health care providers experienced 767 security breaches resulting in the compromised confidential health information of 23,625,933 patients during the period of 2006–2012 HIPAA (2)

The core of implementing controls in Electronic Medical Records center on ensuring the security and privacy of patients’ health information and records under the following key categories: Confidentiality: Confidentiality: Patients should have the right to decide who can examine and alter what part of their medical records Integrity: Complete and accurate records Integrity: Complete and accurate records Availability: Availability: Ensuring patients' access to their complete medical information while protecting their privacy These fall under the auspice of key areas in Information Security IMPLEMENTING EMR CONTROLS

Administrative safeguards Policies and procedures to protect the security, privacy, and confidentiality patients’ PHI (Personal Health Information) Required by both the HIPAA Privacy Rule and the HIPAA Security Rule Physical safeguards measures to protect the hardware and the facilities that store PHI Includes: Facility access control Workstation use Workstation security Device and media controls EMRs: Controls

Technical safeguards Safeguards that are built into your health IT system to protect health information and to control access to it Includes: Access Controls Audit Controls Integrity Person or entity authentication Transmission security EMRs: Controls(2)

Establish a security framework Establish a security framework Data Encryption (stored and in transit) Data Encryption (stored and in transit) Controlled Interoperability Controlled Interoperability Access Control Lists Access Control Lists Trainings for EMR staff Trainings for EMR staff Conclusion

Thoughts/Questions?