Introduction to Healthcare Information Technology

Slides:



Advertisements
Similar presentations
A-49. A-50 Adjusted Admission – An aggregate measure of workload reflecting the sum of admissions and equivalent admissions attributed to outpatient services.
Advertisements

HIPAA Security Standards Emmanuelle Mirsakov USC School of Pharmacy.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
HIPAA Privacy Rule Training
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
NAU HIPAA Awareness Training
CHAPTER © 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2 The Use of Health Information Technology in Physician Practices.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
HIPAA Privacy Rule Compliance Training for YSU April 9, 2014.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
Are you ready for HIPPO??? Welcome to HIPAA
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
Health Care Facilities  Health care facilities are places that provide care or make it possible for some type of care to be delivered to clients.  Care.
Human Relations and Communications
Component 16 /Unit 3Health IT Workforce Curriculum Version 1/Fall Professionalism/Customer Service in the Health Environment Unit 3 Overview of.
Nursing Assistant Program Bradwell Institute
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
LONG TERM CARE AND THE NURSING ASSISTANT’S ROLE.
Component 1: Introduction to Health Care and Public Health in the U.S. 1.5: Unit 5: Financing Health Care (Part 2) 1.5d: Controlling Medical Expenses.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
Organizational Structure of the Hospital
1 FACILITY MONITORING October 30, 2008 Presenter: Theresa Gálvez, Chief Patients’ Rights Advocate Riverside County.
The University of Kansas Medical Center Shadow Experience Training.
Introduction to US Healthcare. History Patients paid directly Help from religious and charitable organizations Technology Advances in healthcare made.
Copyright © 2008 Delmar Learning. All rights reserved. Unit 1 Community Health Care.
The Use of Health Information Technology in Physician Practices
HIPAA PRIVACY AND SECURITY AWARENESS.
DIVISION OF LICENSING & CERTIFICATION, BUREAU OF HEALTH SYSTEMS (BHS) - MDCH (517) Fax (517)
Long term care and the nursing assistant’s role. Settings where the CNA may work Acute care Hospitals and _____________________ centers Pts are admitted.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Medical Tech Prep 1 Mrs. Carpenter Chapter 1: Intro to Health Care Agencies Pages 1-12.
Chapter 15 HOSPITAL INSURANCE.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Component 1: Introduction to Health Care and Public Health in the U.S. Unit 3: Delivering Healthcare (Part 2) Focus On Primary Care.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
Copyright © 2008 Delmar Learning. All rights reserved. Unit 8 Observation, Reporting, and Documentation.
Chapter 15 HOSPITAL INSURANCE.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 2 The HIPAA Privacy Standards HIPAA for Allied Health Careers.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
Chapter 7—Privacy Law and HIPAA
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Component 8/Unit 6aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 6a System Security Procedures.
HIPAA Health Insurance Portability and Accountability Act of 1996.
Component 2: The Culture of Health Care Unit 3: Health Care Settings- Where Care is Delivered Unit 3 Objectives and Overview 3.1 a: Outpatient Care.
Chapter 11: Admission, Discharge, Transfer, and Referrals
AJAYI OLUWABUKOLA O. NSC/2008/128 MUHAMMED FATIMOH.M NSC/2008/176 NWABEKE QUEEN E. NSC/2008/178 OGUNBODE IBIRONKE T. NSC/2008/186 OGUNDARE IBUKUN K. NSC/2008/187.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
Nursing Assistant Unit 1 Chapter 1: The Health Care System Unit 1 Chapter 1: The Health Care System.
Objectives Identify different types of health care facilities. Describe a typical hospital organizational structure. Identify hospital departments and.
© 2009 Delmar, Cengage Learning Chapter 3 Home Health Care.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
Chapter 1 Introduction to Electronic Health Records Copyright © 2011 by Saunders, an imprint of Elsevier Inc.
The Health Insurance Portability and Accountability Act 
HIPAA Privacy & Security
Patient Medical Records
Components of Health Care
HIPAA Privacy & Security
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
The Health Insurance Portability and Accountability Act
Presentation transcript:

Introduction to Healthcare Information Technology Chapter Two Healthcare Organizations and Operations

Objectives Identify various healthcare organizational structures and their different methods of operation Explain the use of codes of conduct Identify EHR/EMR access roles and responsibilities for using Protected Health Information (PHI) Describe the proper communication methods for use in the healthcare workplace List best practices in handling PHI in the healthcare setting

Healthcare IT: Challenges and Opportunities Delivery of health care to a large population Diverse and complex organizations First responders Police, firefighters, emergency medical technicians Operation of a hospital Numerous organizations play supporting roles

Healthcare Organizational Structures and Operation Framework through which a group of people work toward common goal Defines authority, responsibilities, communication methods, rights, and duties of the group Uniqueness of healthcare organizational structures Common goal to save lives, reduce suffering, and eliminate disease Stressful and demanding environments

Organizational Structures Hospitals Healthcare organizations treating patients for injury and disease Usually provide inpatient (long-term) care Patient resides in hospital one or more nights Also provide outpatient care Patient is not admitted and does not reside overnight

Organizational Structures (cont’d.) Types of hospitals General Contagious disease Nursing homes Psychiatric Orthopedic Pediatric Hospitals divide functionality into departments Departments depend on hospital type and size

Organizational Structures (cont’d.) Hospital departments Cardiac care unit (CCU) Emergency room (ER) Gynecology (GYN) Intensive care unit (ICU) Medical/Surgical (Med/Surg) Neurology Obstetrics (OB) Oncology Pediatrics (Peds)

Organizational Structures (cont’d.) Hospital departments (cont’d.) Physical therapy (PT) Psychiatry (Psych) Surgery (OR) Supporting departments Laboratory (Lab) Pathology (Path) Pharmacy Radiology (Xray)

Table 2-1 Selected departments typically found in hospitals © Cengage Learning 2013

Organizational Structures (cont’d.) Indirect support departments Health information management (medical records) Information technology (IT) Clinical (or biomedical) engineering Facilities management (maintenance/operations) Administration Food and nutrition services Security Material management

Organizational Structures (cont’d.) Physician Medical professional Licensed by a governing body Private practices Single physician provides care to individual patients Group of physicians working together Considered private practice if group is physician owned Non-physician owned healthcare group Not considered private practice

Organizational Structures (cont’d.) Nursing homes (convalescent hospitals) Equipped for patients with long-term diseases Address the needs of inpatients Generally not equipped for acute care Generally outsource support functions Skilled nursing facility (SNF) Requirement for facility to receive Medicare reimbursement Must employ skilled nursing staff

Organizational Structures (cont’d.) Requirements for Medicaid reimbursement of patient expenses Patient needs skilled nursing care Patient has income and assets below defined levels Patient must be a United States citizen Patient must reside in state in which nursing home is located

Organizational Structures (cont’d.) Assisted living facility Designed for elderly people who need some assistance with activities of daily living Has residents, not patients Generally do not have skilled nursing care staff No Medicare or Medicaid reimbursement

Organizational Structures (cont’d.) Home health care Treatment of disease or injury in patient’s home Staffed by nonmedical and/or skilled nursing professionals May be reimbursed depending on certain criteria

Organizational Structures (cont’d.) Hospice Care of terminally ill patients at home or in dedicated facilities Patients require palliative care Relief and prevention of suffering Hospice care may include: Skilled care on a 24-hour, 7 day per week basis Pharmaceuticals to provide patient comfort Necessary medical equipment Generally reimbursable by Medicare and Medicaid

Organizational Structures (cont’d.) Surgical centers and ASCs Specialize in outpatient surgical care Also called same-day surgery Less complex procedures than inpatient surgery Types of procedures Minor surgeries Pain management Diagnostic procedures

Methods of Operation Customs or practices used to achieve organization’s goal Scope of work Availability of resources Formality of procedures

Methods of Operation (cont’d.) Scope of work Refers to tasks involved in accomplishing a goal or objective Differences exist in scope of work among various types of medical facilities

Table 2-2 Scope of work for identified healthcare organizations © Cengage Learning 2013

Methods of Operation (cont’d.) Availability of resources Financial resources Economic and monetary resources needed for organization to function Human resources Staffing needs Physical resources Places and equipment Information

Table 2-3 Availability of financial resources for identified healthcare organizations © Cengage Learning 2013

Methods of Operation (cont’d.) Formality of procedures Set of established behaviors for collectively achieving an organization’s goal High formality: little deviation from set procedures Low formality: higher deviation from set procedures Formality typically increases as risk to patient increases

Table 2-4 Formality of procedures for identified healthcare organizations © Cengage Learning 2013

Codes of Conduct Rules for behavior to which a group of people adhere May be specific and written Likely to be similar for similar groups of people or facilities Frequently address communication, procedural behavior, social behavior, and sanitation

Communication Professional communication Style of communication Use of written, oral, or other exchange methods Style of communication How something is said Content of communication What is said High-formality healthcare setting Use formal communication style Inappropriate to discuss outside activities, relationships, or other staff members in front of patient

Adapting Procedural Behavior Level of procedural formality based on type of treatment or diagnostics Examples of locations where procedural behavior is important Imaging room Procedure room Recovery room Examination room Emergency room

Sanitation Physical hazards due to close proximity to biological or chemical disease components Sanitation methods Sterilization of facilities and instruments Proper disposal of contaminated wastes Infection control procedures Hand washing Cleaning and sterilization Use of antimicrobials Use of protective equipment

Social Behavior and Sensitivity of the Environment Conduct toward other people Example: inappropriate for emergency room staff to act shy around unclothed patient May be appropriate behavior for maintenance worker

Conforming to Management Requirements Main responsibility is the patient Managerial operating procedures Address business needs of the organization May sometimes conflict with patient care Example: private hospitals may turn away patient without insurance or means to pay

Protecting Healthcare Information HIPAA privacy rule protects individually identifiable health information Includes verbal, paper, and electronic forms Relates to past, present, and future health of an individual PHI is protected as long as retained by Covered Entity: Even if individual is deceased

Access Roles and Responsibilities Healthcare team access Each member of healthcare team has roles and responsibilities pertaining to PHI

Table 2-5 Protected health information access roles (continues) © Cengage Learning 2013

Table 2-5 Protected health information access roles (cont’d.) © Cengage Learning 2013

Access Roles and Responsibilities (cont’d.) Business Associate access HITECH Act encompasses Business Associates in same manner as Covered Entities Examples of Business Associate functions Claims processing Accounting Data aggregation Accreditation

Access Limitations Based on Role and Exceptions Certain times when traditional access roles need to be superseded Example: emergency situation when database administrator may read PHI

Access to Sensitive Patient Data Some information may have more stringent guidelines Individuals may ask a Covered Entity to restrict use and disclosure of their PHI Roles must be modified appropriately

Proper Communication Procedures must be followed for various types of communication Backups A permanent copy of all ePHI is maintained Unique identifiers Username and password for each distinct user account Emergency access Procedures for obtaining necessary ePHI during an emergency

Proper Communication (cont’d.) Timeout Terminating an electronic communication session after a period of inactivity Encryption ePHI must be encrypted Audit trails Mechanism to record activity in information systems

Proper Communication (cont’d.) Integrity Mechanisms to prevent unauthorized destruction or alteration of ePHI Authentication Procedures to ensure those seeking access to ePHI are authentic Disposal Procedures to ensure final disposition of ePHI

Proper Communication (cont’d.) Safeguards must apply to all forms of communication E-mail Instant messaging Fax File transfer protocol Telephone Voice over IP

Table 2-6 Safeguards for various electronic communication methods © Cengage Learning 2013

Data Handling Procedures Best practices for general technology use Help ensure PHI is protected Access to network devices should be controlled Access methods Physical Electronic Managing physical access Location of physical device chosen to minimize access

Data Handling Procedures (cont’d.) Privacy screens Prevents anyone not sitting in front of screen from reading its contents Screensavers Lock out computer screens after specified time period Time lockouts Program locks out users after specific period of time Password must be entered to regain access

Summary Various healthcare organizational structures exist Code of conduct refers to behavior rules to which a group of people adhere PHI includes information in verbal, paper, or electronic form Includes past, present, and future health information Various roles and responsibilities exist for using PHI

Summary (cont’d.) Safeguarding communication methods is one facet of protecting PHI Best practices in handling PHI in a healthcare setting involve controlling physical and electronic access to PCs, printers, and other equipment