CS818 SOFTWARE SYSTEM ENGINEERING Team 3 Steve Grimes, Craig Mitchell, Mark Oden, Mark Ramos, Brian Rater, Kat Reagan.

Slides:



Advertisements
Similar presentations
Integrated Healthcare Management system. Standards based design. [ Supports HXP (Health Exchange Protocol) a standard in exchanging health care data ]
Advertisements

Todd Frech Ocius Medical Informatics 6650 Rivers Ave, Suite 137 North Charleston, SC Health Insurance Portability.
An Essential Component of Health Systems Strengthening Presented on: May 23, 2011 Akiko Maeda Health, Nutrition & Population Network The World Bank.
Bakheet Aldosari, Ph.D. Health 305 Health Information Management Bakheet Aldosari, Ph.D.
Westbrook Technologies from Document Management’s Role in HIPAA.
 Original Intent: ◦ Act passed in 1996 with two main goals: 1.Ensure individuals would be able to maintain their health insurance between jobs (the “portability”
HIPAA Security Regulations Jean C. Hemphill Ballard Spahr Andrews & Ingersoll, LLP November 30, 2004.
Are you ready for HIPPO??? Welcome to HIPAA
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
Health Insurance Portability and Accountability Act (HIPAA)
ULTIMA*HIS - WEB ENABLED -  ITC Software All rights reserved. ITC Software.
Pharmaceutical Care Solutions 8 March 2010 © Copyright ESH 2010 Submission to Greek Ministry.
2 The Use of Health Information Technology in Physician Practices.
Security of Computerized Medical Information: Threats from Authorized Users James G. Anderson, Ph.D. Purdue University.
WINGNUT TECHNOLOGIES CUSTOM ENGINEERING SOLUTIONS.
Tervisepank ® e-solution for primary care Madis Tiik, MD CEO, Estonian Society of Family Doctors
IT Security Challenges In Higher Education Steve Schuster Cornell University.
“Hospital Information System: A Transition to a Health Information System” Kiki Tsitoyanni Presales Manager Soren Hayrabedyan Consultant H-SYSTEMS, Health.
Document Management System for Healthcare Industry From Infocrew Solutions Pvt.Ltd.
Georgia Rural Health Information Technology Conference Healthcare Information Systems Requirements to Achieve Meaningful Use Certification December 10,
© 2009 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Career Education Computers in the Medical Office Chapter 2: Information Technology.
E-MDs: Charting the Future of Healthcare. PAGE 2 Company Background Founded in 1996 by David L. Winn, M.D. Headquartered in Austin, Texas Over 160 proud.
© 2010 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Healthcare of the Future: EMT Problem Statements Jenny Liu, ECE Jelece Morris, HSI David Woods, Arch Erxi Liu, Arch Fall 2012.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Week 4 Lecture Part 3 of 3 Database Design Samuel ConnSamuel Conn, Faculty Suggestions for using the Lecture Slides.
Wireless Access Code: July 21, 2002  General medical ID theft education is lacking – over 1.4 million fraud victims in  Fraud can.
State Alliance for e-Health Conference Meeting January 26, 2007.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 - Databases, Controls, and Security.
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
By: Tyler Kapka & Robbie Cantu HSTE ProjectHSTE Project.
Improving Patient Health Outcomes in Acute Care Hospital Settings Using Mobile Wireless Technology and Handheld Computers Research Team Maureen Farrell,
 The use of telecommunications technology to provide, enhance, or expedite health care services.  Accessing off-site databases, linking clinics or physicians'
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
1 Data use, data sharing and information governance Geraint Lewis Chief Data Officer, NHS England Mark Golledge Programme Manager in.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
Presentation by James Vu, Daniel Chang, Andrew Cheung, Vicky Sorto Sanchez HealTech.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
Review of Infoway’s COPD* Use Case for Care Plan Business Requirements Sasha Bojicic, Canada Health Infoway Ron Parker, Canada Health Infoway
Medical Manager Unit 9 ICBS 170. Medical Manager Electronic Data Interchange (EDI)  Ability to request, receive, transfer and integrate information electronically.
C HAPTER 34 Code Blue Health Sciences Edition 4. Confidentiality of sensitive information is an important issue in healthcare. Breaches of confidentiality.
Component 3-Terminology in Healthcare and Public Health Settings Unit 16-Definitions and Concepts in the EHR This material was developed by The University.
Unit 7 Seminar.  According to Sanderson (2009), the problems with the current paper-based health record system have been well documented. The author.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
HIPAA A Sea of Confusion, A Wave of the future and A High Tide of Confidentiality.
TEXAS Health Information Technology Advisory Committee (HITAC) Track 1: Getting Started, Organization and Governance Tim Turner Tim Turner & Associates,
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
Medical Documentation
The Electronic Personal Health Record (ePHR) Beth Friedmann CS Spring 2007.
XDS Security ITI Technical Committee May, XDS Security Use Cases Prevent Indiscriminate attacks (worms, DOS) Normal Patient that accepts XDS participation.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
Terminology in Healthcare and Public Health Settings Electronic Health Records Lecture b – Definitions and Concepts in the EHR This material Comp3_Unit15.
Cristian Lieneck and Eric Weaver  By the end of this class, the student should be able to:  Examine the data reporting advantages of electronic medical.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 3 This material was developed by Oregon Health & Science University,
David Sanneman IT IM Leadership Mayo Clinic Rochester, Mn
HIPAA THE PRIVACY RULE Reviewed December 2012.
Electronic Health Records (EHR)
INTEGRATED ELECTRONIC HEALTH RECORD SYSTEM
Health Insurance Portability and Accountability Act
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
EHR in General Practice in the Netherlands
Health Insurance Portability and Accountability Act
Azure Enables Secure Data Access, Sharing
The Health Insurance Portability and Accountability Act
HIPAA Privacy and Security Update - 5 Years After Implementation
School of Medicine Orientation Information Security Training
Presentation transcript:

CS818 SOFTWARE SYSTEM ENGINEERING Team 3 Steve Grimes, Craig Mitchell, Mark Oden, Mark Ramos, Brian Rater, Kat Reagan

Mission Statement Your company has identified a market niche for a patient- oriented medical information system. The product is expected to provide: A standard electronic patient records portable across multiple health care providers accessible by the Internet User interface and reports Secure interface for update/access to patient records Electronic interface to pharmacy system, insurance systems, and provider billing systems Users can tolerate only a few minutes of outage time per year; security of patient information, billing information, and pharmacy pricing data is very important; response times to data updates, queries, and transactions with external systems must be accomplished within a few seconds.

Drivers Driver NameRationalImportance SecurityMust protect billing and price integrity; privacy concerns; Legal responsibilities; prevent malicious hacking; prevent unauthorized access; prevent fraud and identity theft. High AvailabilityIf System is used for medical purposes, availability is critical. Providing incomplete records may lead to misdiagnosis. Down time may be adverse during emergencies. If System is used for personal use, availability’s importance will not be as high. Critical /Medium* InteroperabilitySystem must operate with many complex and constantly changing systems Medium PerformanceIf System is used for medical purposes, slow response times could cause delays in emergency and urgent care situations; can increase the time it takes a doctor or nurse to see each patient If System is used for personal use, availability’s importance will not be as high. High/Medium*

Drivers 1.Security: Must protect data integrity of billing and prices; privacy concerns; Legal responsibilities; prevent malicious hacking; prevent access by unauthorized users; prevent fraud and identity theft 2.Availability: May be needed in emergencies; having only some records and not others can lead to misdiagnosis 3.Interoperability: System must operate with many complex and constantly changing systems 4.Performance: Slow response times could cause delays in emergency and urgent care situations; can increase the time it takes a doctor or nurse to see each patient

Challenged Drivers: Availability Availability: “Users can tolerate only a few minutes of outage time per year” 1. Few is unclear and subjective to interpretation. 2.5 minutes of yearly downtime or % availability will allow about one second of down time per day. Maintenance and system recoveries must be done without human intervention. This down time allowance may be appropriate if system is used by medics, doctors, or hospitals. 3.8 hours of yearly downtime or 0.999% availability would allow 10 minutes a week. This will allow time for human involved maintenance and scheduled downtime. This solution may be appropriate if system is not used during emergencies. Performance: “response times to data updates, queries, and transactions with external systems must be accomplished within a few seconds” 1.For emergency services, a second response time is reasonable. 2.This expectation may not take in consideration external systems 3.Non emergency services, such as pharmacy information, may not need this stringent requirement.

Open Issues 1.Will a patient have access to the system? 2.Health care provider is a very broad term. What type of health care provider will access this system? 3.Will this system be accessed by doctors, hospitals, or other emergency care professionals? 4.Will there be central repository for patient records? 5.Will the system be used in emergency situations? 6.What legal issues will be involved in this system (federal and in all states) 7.We will need to understand scope of pharmacy and insurance systems