1 / 13

The EHR: Benefits for Privacy and Security

The EHR: Benefits for Privacy and Security. How the EHR Protects Health Information. National Initiative. “By computerizing health records, we can avoid dangerous medical mistakes, reduce costs and improve care.” George W. Bush, State of the Union Address January 20, 2004.

purity
Download Presentation

The EHR: Benefits for Privacy and Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The EHR: Benefits for Privacy and Security How the EHR Protects Health Information

  2. National Initiative “By computerizing health records, we can avoid dangerous medical mistakes, reduce costs and improve care.” George W. Bush, State of the Union Address January 20, 2004

  3. What Else Can the EHR Offer? Computerizing health records will also enhance the privacy and security of protected health information (PHI).

  4. How Can the EHR Enhance Privacy and Security? It can: • Control Physical and System Access • Monitor Workstation Use and Security • Audit access and need-to-know • Enhance Device and Media Controls • Employ Transmission Security

  5. Administrative Controls • Policies and procedures • Employee training • Privacy training • Security training • Background checks

  6. Managing Physical Access • Systems are physically inaccessible to unauthorized users • A Security Plan addresses safeguards against tampering and theft • Contingencies in place to recover or restore lost data in case of a disaster or emergency

  7. Managing Technical/System Access • Identification and authentication • Access control lists • Automatic log-off

  8. Workstation Use and Security • Some job functions might only be available at certain workstations • Volunteer might see only census information • Some printing functions available only in certain areas or workstations • Physical attributes of workstation • Privacy filters • Screen unable to be viewed by casual observer

  9. Monitoring and Audit Controls • Intrusion detection • Audit users for authorized use of PHI • Apply sanctions for failure to comply with policies and procedures

  10. Device and Media Controls • Must address disposal of information and hardware • If hardware is reused, information must be removed • Hardware must be tracked as it is reused • Data must be backed up for retrieval prior to hardware being moved

  11. Transmission Security Encryption The transformation of plain text into an unreadable cipher text

  12. Conclusion The EHR will soon be reality… • We will have better privacy and security protections. • Our information will be available when we need it.

  13. Your HIM Professionals Are a Valuable Resource! Working together we can realize all the benefits of EHR!

More Related