150 likes | 242 Views
Preventing Breach of Information with the use of electronic Medical Record. . Frostburg State University Fende Bokossah . . What is confidentiality? .
E N D
Preventing Breach of Information with the use of electronic Medical Record. Frostburg State University FendeBokossah.
What is confidentiality? • Confidentiality is a legal agreement signed by the both the patient and healthcare providers that limits access of patient’s health information. • This contract enables restriction of patient data to only authorized users. • Cerner is a type of Electronic medical records used at my place of work.
Confidentiality • Cerner has helped in addressing the subject of privacy and confidentiality to a great extend, however there are still some loop holes.
WORKFLOW DIAGRAM BEFORE Login to patient data on Cerner No activity after 15 minutes Forgets to Logout Allows access/ login to multiple computers at same time. Stay logged in Patient’s health records accessed by unauthorized users Violation of HIPAA
The Problem Cerner enables multiple assess to users from different computers which exposes patient information to unauthorized personnel. For example. A nurse forgets to log out of her computer, yet goes on to log on to another computer there by leaving the other computer unattended.
The Problem • Currently Cerner allows users to remain logged on after a prolonged period of inactivity. • This also allows access to patient data by unauthorized users if the computer is left unattended.
The solution • To correct this problem, the ability to access multiple computers by the same individual should be prevented or limited to charge nurses and unit managers. • This will enable users to log off from one computer before logging on to another computer, thereby protecting patient information.
Solution continuation • Also the computer system should have a built-in capability of automatically logging off after a two-minute period of inactivity. • This added feature will limit or prevent the access of patient health information by unauthorized personnel.
Incorporating Change • The Lewin’s change theory is a three step model that shows the strategies used in order to introduce modifications or change at the workplace.
Timeline Refreeze Unfreeze Change 3days 3days 1day
References • McGonigle, D., & Mastrian, K. (2012). Nursing informatics and the foundation of knowledge. (2 ed.). Burlington: Jones & Bartlett Learning. • http://www.google.com/search?q=confidentiality+with+electronic+medical+records&source