What types of standards protect health data

Assignment Help Basic Computer Science
Reference no: EM132715399

Unit outcomes addressed in this discussion:

Explain the role of clinical vocabularies in the EHR.

Support the need for and address issues related to the EHR.

Educate the provider on benefits of the EHR.

Identify the need for the multiple information systems required to support the EHR.

Course outcome addressed in this discussion:

Examine the privacy and security considerations for safeguarding protected health information.

Discussion Topic: Case Question EHR Standards

Real-World Case Questions:

A local internal medicine and cardiology practice has recently implemented their new EHR system from Allscripts. Some relatively minor building renovations were required, and additional hardware was installed. Extensive training sessions and onsite support staff spent several months meeting with all users. Super users and managers were identified and given additional training.

During the testing phases, there were several glitches that needed to be addressed. Because of the practice's long-standing relationship with a local hospital, they had to electronically communicate seamlessly to coordinate ongoing patient care throughout the healthcare continuum.

The EHR from Cerner is used by the hospital. Technology and software issues had to be addressed to ensure interoperability so that complete patient information was transmitted securely. The application of the HL7 messaging standards were evaluated for each system and then the firewall and encryption software were adapted to meet data integrity and secure transmission requirements per the required standards.

The patient portal for the physician practice had to be coordinated with the hospital's EHR so that patients were able to see information generated from their hospital admission. The cardiologists and internal medicine physicians were incorporating this information into their outpatient treatment plan. These issues have been addressed and care coordination has become more efficient thanks in part to the new electronic processes incorporated into both EHR systems.

QUESTIONS:

1. Explain what types of standards protect health data and information systems from unauthorized access.

2. Discuss how this might hinder the access from legitimate authorized HCOs or other sources.

Reference no: EM132715399

Questions Cloud

Compute probability index of projects : Maslow's restaurant is considering two mutually exclusive projects with the following cash flow streams.
Significance of formulating adequate policies : Discuss the significance of formulating adequate policies and procedures in an organization
What is the break-even point in boxes : Mo's Delicious Burgers Inc. sells food to university cafeterias for $39 a box. What is the break-even point in boxes
Weighted average cost of capital-sirom scientific solutions : SIROM Scientific Solutions has $8 million in equity and $5 million in bank debt on its balance sheet. The stock price is $50 and the firm has 200,000 shares
What types of standards protect health data : Explain what types of standards protect health data and information systems from unauthorized access.
Calculate the unit product cost for the month : Calculate the unit product cost for the month under variable costing. Prepare the Income Statement for the month, using the variable costing method
What is the company contribution margin percentage : Bikes Manufacturing produces and sells children's bikes at an average price of $120. Its costs are as follows: direct materials. $12; direct labour.
Strategies for profiting from a falling market : Pick one of the stock market bubbles that burst in the past and explain how did the market bubble form? Did the market bubble you selected persist?
What is the profitability index of the project : What is the profitability index (PI) of the project, if the company's cost of capital is 9.81 percent?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Computer inventory and maintenance form

Besides the Computer Inventory and Maintenance form, what other documentation should you keep on each computer? How might you store that information?

  Describing a network management system

"Write a two-and-a-half-page paper describing a network management system identified on a currently-dated vendor website (Cisco, HP, Sun, SolarWinds, CA, Network General, IBM, etc.). "

  Create a database using professional principles and standard

Create a database using professional principles and standards. Use a relational database software application to develop a database implementing the logical design into a physical design. Using Oracle database to create the normalized physical databa..

  Supporting data to improve one decision making abilities

i. Why is past experience so important to managers today, and how applicable is it in decision making? ii. Develop three approaches to eliminate bias and stick to supporting data to improve one's decision making abilities.

  How do computer systems minimize memory fetches

List and define the three basic interfaces enabled by the operating system. How do computer systems minimize memory fetches? Describe the difference between assemblers, compilers and interpreters. What is a transaction manager

  Difference between argument and parameter

To compare two strings, what library function can be used? The difference between argument and parameter.

  Potential output level

Why is it hard for policy makers to decide whether the economy is operating at its potential output level?

  Why is a post-implementation evaluation important

List and describe the four main system changeover methods. Which one generally is the least expensive? Which is the safest? Explain your answers.

  Ethical for government to agree to grant terrorist immunity

In a hostage crisis, is it ethical for a government to agree to grant a terrorist immunity if he releases the hostages, even though the government

  Word meaning and purpose of the following words

Word meaning and purpose of the following words? 1 string 2 pile 3 Loop 4 Indices 5 Functions 6 odd and Even Letters?

  Discuss distributed denial of service attacks

Select a topic from the list and conduct research (based on literature, at least three recent research papers) and prepare a summary report with brief.

  Research and report on network management tools

Compare and contrast, at least, one tool for each of the three network management areas. What is the best tool for each area? Can one tool be used for managing more than one area? Why or why not?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd