The EHR: Benefits for Privacy and Security How the EHR Protects Health Information.
-
Upload
allyson-montgomery -
Category
Documents
-
view
215 -
download
0
Transcript of The EHR: Benefits for Privacy and Security How the EHR Protects Health Information.
![Page 1: The EHR: Benefits for Privacy and Security How the EHR Protects Health Information.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d9e5503460f94a87dc7/html5/thumbnails/1.jpg)
The EHR: Benefits for Privacy and Security
How the EHR Protects Health Information
![Page 2: The EHR: Benefits for Privacy and Security How the EHR Protects Health Information.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d9e5503460f94a87dc7/html5/thumbnails/2.jpg)
National Initiative
“By computerizing health records, we can avoid dangerous medical mistakes, reduce costs and improve care.”
George W. Bush, State of the Union Address
January 20, 2004
![Page 3: The EHR: Benefits for Privacy and Security How the EHR Protects Health Information.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d9e5503460f94a87dc7/html5/thumbnails/3.jpg)
What Else Can the EHR Offer?
Computerizing health records will also enhance the privacy and security of protected health information (PHI).
![Page 4: The EHR: Benefits for Privacy and Security How the EHR Protects Health Information.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d9e5503460f94a87dc7/html5/thumbnails/4.jpg)
How Can the EHR Enhance Privacy and Security?
It can:
• Control Physical and System Access
• Monitor Workstation Use and Security
• Audit access and need-to-know
• Enhance Device and Media Controls
• Employ Transmission Security
![Page 5: The EHR: Benefits for Privacy and Security How the EHR Protects Health Information.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d9e5503460f94a87dc7/html5/thumbnails/5.jpg)
Administrative Controls
• Policies and procedures
• Employee training– Privacy training
– Security training
• Background checks
![Page 6: The EHR: Benefits for Privacy and Security How the EHR Protects Health Information.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d9e5503460f94a87dc7/html5/thumbnails/6.jpg)
Managing Physical Access
• Systems are physically inaccessible to unauthorized users
• A Security Plan addresses safeguards against tampering and theft
• Contingencies in place to recover or restore lost data in case of a disaster or emergency
![Page 7: The EHR: Benefits for Privacy and Security How the EHR Protects Health Information.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d9e5503460f94a87dc7/html5/thumbnails/7.jpg)
Managing Technical/System Access
• Identification and authentication
• Access control lists• Automatic log-off
![Page 8: The EHR: Benefits for Privacy and Security How the EHR Protects Health Information.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d9e5503460f94a87dc7/html5/thumbnails/8.jpg)
Workstation Use and Security
• Some job functions might only be available at certain workstations– Volunteer might see only census information– Some printing functions available only in
certain areas or workstations
• Physical attributes of workstation– Privacy filters– Screen unable to be viewed by casual observer
![Page 9: The EHR: Benefits for Privacy and Security How the EHR Protects Health Information.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d9e5503460f94a87dc7/html5/thumbnails/9.jpg)
Monitoring and Audit Controls
• Intrusion detection• Audit users for
authorized use of PHI• Apply sanctions for
failure to comply with policies and procedures
![Page 10: The EHR: Benefits for Privacy and Security How the EHR Protects Health Information.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d9e5503460f94a87dc7/html5/thumbnails/10.jpg)
Device and Media Controls
• Must address disposal of information and hardware
• If hardware is reused, information must be removed
• Hardware must be tracked as it is reused
• Data must be backed up for retrieval prior to hardware being moved
![Page 11: The EHR: Benefits for Privacy and Security How the EHR Protects Health Information.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d9e5503460f94a87dc7/html5/thumbnails/11.jpg)
Transmission Security
Encryption
The transformation of plain text into an unreadable cipher text
![Page 12: The EHR: Benefits for Privacy and Security How the EHR Protects Health Information.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d9e5503460f94a87dc7/html5/thumbnails/12.jpg)
Conclusion
The EHR will soon be reality…
• We will have better privacy and security protections.
• Our information will be available when we need it.
![Page 13: The EHR: Benefits for Privacy and Security How the EHR Protects Health Information.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d9e5503460f94a87dc7/html5/thumbnails/13.jpg)
Your HIM Professionals Are a Valuable Resource!
Working together we can realize all the benefits of EHR!