Copyright ©2012 Delmar, Cengage Learning. All rights reserved. Chapter 11 Operating Computers and Office Equipment.

Slides:



Advertisements
Similar presentations
Chapter 1:Introduction to the world of computers
Advertisements

HIPAA Security Standards Emmanuelle Mirsakov USC School of Pharmacy.
CHAPTER © 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2 The Use of Health Information Technology in Physician Practices.
Copyright © 2008 Delmar Learning. All rights reserved. Chapter 4 Life Cycle of an Insurance Claim.
Stole it Straight from Wilkes County. Questions from 1.01.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
Copyright © 2007 by Thomson Delmar Learning. ALL RIGHTS RESERVED.1.
PrimeSUITE’s Practice Management and Electronic Health Record Software
Integrated Practice Management Systems. Learning Objectives After reading this chapter the reader should be able to: Document the workflow in a medical.
MEDICAL BILLING AND CODING Turtle Mountain Community College BIA #7 – POB 340 Belcourt, ND
Unit 11 Computers in Health Care
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 5 Personal Health Records Electronic Health Records for Allied.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
© 2009 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Career Education Computers in the Medical Office Chapter 2: Information Technology.
Allied Health Assisting
Lesson 2 Information Processing. Objectives Define hardware and software Explain the three basic computer functions: input, processing, and output.
Security Threats Connecting Computers Copyright Law & Ethics Storage & Memory Computer System
Computers in the Ambulatory Care Setting
Course ILT Computers and society Unit objectives Identify the main uses of computers in daily life, and identify the benefits of using Describe.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
Using Technology to Manage Information Chapter 14.
Explain the purpose of an operating system
Computer Basics.
Advanced CIS NAME: ___________________. OBJECTIVE: Maintaining, Managing, and Troubleshooting Systems Maintenance includes following established procedures.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
University Health Care Computer Systems Fellows, Residents, & Interns.
Chapter 8 Selecting and Maintaining Digital Resources.
Using Technology to Manage Information
Security and Ethics Privacy Employment Health Crime Working
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Chapter 5 Technology in the Business Office Copyright © 2011, 2006 Mosby, Inc., an affiliate of Elsevier. All rights reserved.
Chapter 2 Securing Network Server and User Workstations.
Class Welcome Seminars – Monday 12:00 – 1:00PM EST Seminars not every week. Verify with syllabus Weeks 1, 5, & 9 Class Organization –Seminar Alternate.
Data Security.
Information Technology Acceptable Use Policy The acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree.
Chapter 1: Applying Computer Basics – Lesson 1 © 2010, 2006 South-Western, Cengage Learning.
Chapter 19 Manager of Information Systems. Defining Informatics Process of using cognitive skills and computers to manage information.
Preparing Insurance Claims and Posting Insurance Payments
Copyright © 2011 Delmar, Cengage Learning. ALL RIGHTS RESERVED. Chapter 5 Electronic Health Records.
Chapter 9 Operating Systems Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 5 Personal Health Records Electronic Health Records for Allied.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
Health Insurance Portability and Accountability Act By Bradley Gleich.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
Society & Computers PowerPoint
Security and Ethics Safeguards and Codes of Conduct.
Copyright ©2012 Delmar, Cengage Learning. All rights reserved. Chapter 15 Procedural and Diagnostic Coding.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education 1A-1 Chapter 1 Introducing Computer Systems Instructor.
© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Copyright © 2013 Delmar, Cengage Learning. ALL RIGHTS RESERVED. Coding for Medical Necessity Chapter 10.
Chapter 1 Introduction to Electronic Health Records Copyright © 2011 by Saunders, an imprint of Elsevier Inc.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
RECORDS MANAGEMENT Judith Read and Mary Lea Ginn Chapter 12 Electronic Media and Image Records 1 © 2016 Cengage Learning ®. May not be scanned, copied.
CHAPTER 7 Operating System Copyright © Cengage Learning. All rights reserved.
Copyright © 2011 Delmar, Cengage Learning. ALL RIGHTS RESERVED. Chapter 8 Common CMS-1500 Completion Guidelines.
Copyright © 2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole.
Copyright © 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole.
Computers in the Ambulatory Care Setting
Information Processing
Hardware/Software Unit
Using Technology to Manage Information
UNIT 19 Data Security 2.
Introduction to Computers
Computers in the Ambulatory Care Setting
Presentation transcript:

Copyright ©2012 Delmar, Cengage Learning. All rights reserved. Chapter 11 Operating Computers and Office Equipment

Copyright ©2012 Delmar, Cengage Learning. All rights reserved. The Computer Hardware – The physical components of a computer – Examples: hard drive, CPU, monitor Software – The programs containing instructions to the computer to perform tasks – Examples: Word processing, spreadsheets, “Apps”

Copyright ©2012 Delmar, Cengage Learning. All rights reserved. Ergonomics and Computer Use Proper ergonomics promotes wellness and minimizes musculoskeletal problems Evaluate your workstation for proper ergonomics

Copyright ©2012 Delmar, Cengage Learning. All rights reserved. Applications Software Practice management software – Manages the operations of a medical office – Demographics, scheduling, insurance and claims processing, billing and collections Electronic health records software – Allows providers to document all care received by the patient – Often integrates with a practice management system, allowing a paperless office

Copyright ©2012 Delmar, Cengage Learning. All rights reserved. Applications Software Encoder software – Available for CPT, HCPCS, ICD, and Medicare coding guidelines – Improves coding accuracy and reimbursement to provider’s office

Copyright ©2012 Delmar, Cengage Learning. All rights reserved. The Internet Interconnected networks that access information all over the world Makes it possible to enter, obtain, and exchange information electronically Evaluate all websites for information integrity

Copyright ©2012 Delmar, Cengage Learning. All rights reserved. Computer Security Physical security – Privacy shields, screen savers – Placement of monitors Security from loss, disaster, virus, humans – Passwords – Backup data regularly – Use encryption, firewalls, and antivirus software

Copyright ©2012 Delmar, Cengage Learning. All rights reserved. Office Equipment Copy machinesFax machines

Copyright ©2012 Delmar, Cengage Learning. All rights reserved. Office Equipment Dictation-transcription machine Printers Smart phones and pagers