What issues should kay address in her consultation report

Assignment Help Management Information Sys
Reference no: EM132165250

Kay Carnes has begun consulting for a dialysis facility that began using an electronic health record system approximately six months ago. On her first consultation visit, she examined both the electronic and paper portions of the patient record.

She found that certain portions of the record, which were not included in the electronic health record, were maintained in sturdy three-ring binders. These binders were labeled on the spine with the patient's name and the patient's treatment schedule (e.g., John Doe, M-W-F, or Mary Smith, T-T-S).

The paper-based portion of the record included signed consent forms, assessment forms, outside lab reports, history and physical examination reports from the patient's physician or last hospital visit, identification data, CMS data collection forms, and patient plans of care..

The electronic portion of the record included data from each dialysis treatment and progress notes from the nurses, the dietitian, and the social worker.

On some of the older records in which all of the progress notes were handwritten, Kay noticed that the physicians had recorded monthly progress notes, but, there were no progress notes from the physicians in the electronic portion of the record that covered the past six months.

Kay asked the unit director, a registered nurse, about this. The director replied that all of the other disciplines were entering their own progress notes into the electronic health record during or after each patient contact.

The physicians were accustomed to handwriting their progress notes and, therefore, did not use the computer. The physicians had continued to see each patient monthly, but the chart had little documentation to indicate this after the electronic record had been implemented.

1. What issues should Kay address in her consultation report to this facility?

2. What recommendations would you make if you were in her place?

Reference no: EM132165250

Questions Cloud

Who owns the patient data entered into the ehr : Differentiate between the features and structure of Medcin software (used in this exercise) and SNOMED-CT.
Post one federal statute and one state statute : Using a Microsoft Word document, please post one federal statute and one state statute utilizing standard legal notation and a hyperlink to each statute.
How do you feel that using problems lists can help : How do you feel that using problems lists can help you determine the education needed for a patient?
Explain strategies for gaining consensus : Explain how group dynamics can support or hinder team performance - Outline strategies that can support team cohesion, participation and performance
What issues should kay address in her consultation report : What issues should Kay address in her consultation report to this facility? What recommendations would you make if you were in her place?
How well do you understand social media platforms : People's views on personal privacy vary from ‘not very concerned' in that people don't think they can do much to control their privacy to ‘extremely concerned'.
How do the teams manage their team boundaries : Consider the different teams presented in your reading assignment. How do the teams manage their team boundaries?
What in the areas could your organization improve : Using your organization or an organization you are familiar with, describe your IT decision making. You have been tasked with the job of reviewing the current.
The use of networking and social capital to manage : Review at least four (6) academically reviewed articles on the use of Networking and Social Capital to manage the external dynamics of a team.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Data protection and security

Explain whether adherence to the standards is essential to overall security management - Data Protection and Security Please respond to the following

  Create a policy and procedure

The facility still has paper records, but chart requests, disclosure management, dictation systems, chart locators, MPI and chart deficiencies .

  Review articles on cyber security and risk management

According to the first article a cyber physical system is something that is used in power systems, communications, and transportation.

  Identify ten possible customer interactions

You are tasked with matching the customer's mobile ordering interactions with HB Company's internal processes and information systems.

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Identify the sector in which the company operates

Introduce the company and its core competencies. The company can be real or imaginary; however, it should be described so that the reader understands exactly how you are relating each element of your business continuity plan to business needs.

  What is the difference in a logical and physical topology

What is the best practice Ethernet at the present time? Describe, and explain why this is best practice. What is the best practice wireless at the present time? Describe and explain why this is best practice. Would you install a wired or wirel..

  Define a set of policies and procedures

Define a set of policies and procedures that would allow educational institutions to limit vulnerabilities while still allowing students access to academic.

  Describe the methodology to a project using the it

Select a System/Software Development Life Cycle (SDLC) model and methodology then apply this model and methodology to a project using the Information Technology (IT) specialization i.e., Intrusion prevention. Be sure to define the SDLC model and ..

  Why is data mining so important

How does data quality impact business performance? Why is data mining so important and what tools and techniques are available to make this process easier?

  Discuss about the testing network design and its tools

Describe the significance of testing your network design. Use a real-world example to illustrate your point.Compare and contrast the network tools that you researched. Identify which you highly recommend and state why.

  Is the sdlc involved with reducing threats

Employee awareness is necessary for success. Why? Describe and explain the key elements of recovering from lost assets What are Internet connected systems? Describe five examples and Two jobs in IT Security that will grow quickly this year.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd