SlideShare uma empresa Scribd logo
1 de 27
Standards of dental
informatics, security issues,
privacy and costs

      Dr Ebtissam Al-Madi
• Why are standards important in
medical informatics?
  – Promote consistent naming of individuals,
  events, objects, etc.
  – Allow better use of data for patient care,
  quality assurance, research, etc.
  – Enhance ability to transfer data among
  applications, allowing better system
    integration
Benefits and limitations of
 standards
Benefits
  – Interoperability
  – May allow innovation based on common
    foundation
Limitations
  – Dominance by one segment of industry:
    Microsoft “standards,” e.g., Windows,
    Office, etc.
  – May stifle innovation
The standards development
 process
• Groups agree to informal specifications
• Single vendor controls industry
• Government agency creates standard
  and mandates its use.
• Interested parties work in open process
International standards bodies

• International Organization for
  Standardization (ISO)
  http://www.iso.org/iso/home.html

• ADA Standards Committee on Dental
  Informatics (ADA SCDI)
  http://www.ada.org/prof/resources/stand
  ards/informatics_reports.asp#a1031
Medical informatics standards
1.   Identifiers
2.   Transactions
3.   Message exchange
4.   Terminology
1. Identifiers
• Various approaches have been
  proposed for
  – Patients
  – Providers
  – Employers
  – Health Plans
Patient identifiers
• Unique – only one person has a
  particular identifier
• Non-disclosing – discloses no personal
  information
• Permanent – will never be re-used
• Ubiquitous – everyone has one
• Canonical – each person has only one
• Invariable – will not change over time
Patient identifiers
Benefits
  – Easy linkage of records
  – Facilitate health information exchange
  – Reduce errors and costs arising from duplicate
    records
  – Medical record identifier errors compromise
    quality of care and can be costly
  – Cost increases with length of time error not
    identified
Risks
  – Easy linkage of records
  – Potentially compromise privacy and
    confidentiality
2. Transactions
• Transaction standards are designed to
  encourage electronic commerce for
  health claims.
• HIPAA (Health Insurance and privacy
  act) mandates use of these standards
  for health care business electronic data
  exchange

      “Administrative simplification”
Transactions standards cover
 – Health claims and equivalent encounter
   information
 – Enrollment and disenrollment in a health
   plan
 – Eligibility for a health plan
 – Health care payment and remittance
   advice
 – Health plan premium payments
 – Health claim status
 – Referral certification and authorization
 – Coordination of benefits
3. Message exchange standards
Allow data and application interoperability
• Major standards include
  – Health Level 7 (HL7)
  – Digital Imaging and Communications
    (DICOM)
  – IEEE
  – NCPDP and SCRIPT
  – ELINCS
  – Continuity of Care Record (CCR)
4. Terminology standards
    Benefits of computerization of clinical information
               depends upon its “normalization”
•   Clinical language is inherently vague, which is at
    odds with the precision of computers
•   Computers have no intelligence
•   Computers can only do what programmers and
    users tell them to do
•   Computers process numbers and symbols very
    fast and accurately
•   Computers have extraordinarily great memory
•   It is up to humans to define the meaning or
    semantics of information represented in a compute
Standardized terminology
• Information capture – documenting
  findings, conditions, and outcomes
• Communication – transferring
  information
• Knowledge organization – classification
  of diseases, treatments, etc.
• Information retrieval – accessing
  knowledge based information
• Decision support – implementing
  decision support rules
PRIVACY, CONFIDENTIALITY,
AND SECURITY: BASIC
CONCEPTS
Personal privacy vs. the common
 good
• Personal privacy is important.
• Common good of society is more
  important.

      Where do your views fit?
• Privacy – right to keep things to yourself
• Confidentiality – right to keep things
  about you from being disclosed to
  others
• Security – protection of your personal
  information
Security Issues
• Who owns information?
• How is informed consent implemented?
• When does public good exceed
  personal privacy?
• What conflicts are there with business
  interests?
Problems of Poor security
•   Patients avoid health care
•   Patients lie
•   Providers avoid entering sensitive data
•   Providers devise work-arounds
•   Disclosure problems continue
Security for paper records
• Difficult to audit trail of paper chart
• Fax machines are easily accessible
• Records frequently copied for many
  reasons
  – New providers, insurance purposes
• Records abstracted for variety of
  purposes
  – Research
  – Quality assurance
  – Insurance
Technologies to secure
information
Deterrents          Obstacles
  – Alerts            – Authentication
  – Audit trails      – Authorization
System management     – Integrity
  precautions           management
  – Software          – Digital signatures
    management        – Encryption
  – Analysis of       – Firewalls
    vulnerability     – Rights management
Protected health information
 (PHI)
• Name                             • Social security number
• Address (street address, city,   • Internet protocol (IP) address
county, zip code)                  • Any vehicle or device serial
• Names of relatives               number
• Names of employers               • Medical record number
• E-mail address                   • Health plan beneficiary
• Fax number                       number
• Telephone number                 • Account number
• Birth date                       • Certificate/license number
• Finger or voice prints           • Web URL
• Photographic images              • Any other unique identifying
                                   number, characteristic, or code
Costs of Informatics
• Health IT costs and return on investment (ROI)
   – “What do I get back („return‟) for the money I'm
   being asked to spend („investment‟)?”
• Cost-benefit defined
   – “Ratio of money value of benefit divided by cost”
• Cost-benefit in the outpatient setting
   – Increased time for first 4 months but thereafter saved time
     that was either spent seeing more patients or reducing work
     hours
   – Only a few practices implemented comprehensive quality
     improvement efforts, usually when insurers paid explicitly for
     it
   – System payback achieved at average of 2.5 years.
   – Factors associated with success included
       • Near complete use of system functions
       • Having local EHR champion and supportive practice culture
• Cost-benefit in integrated delivery
  setting
  – Laboratory and radiology order entry
     • Reduction of time spent processing orders
  – Pharmacy order entry
     • Reduced adverse drug events
     • Improved cost savings through better formulary
       compliance
  – Documentation
     • Reduction in cost due to use of structured
       documentation in outpatient setting
• Overcoming the economic obstacles
  – Centrally funded.
  – Grants
  – Financial incentives
  – Tie into quality of care initiatives
This weeks assignments

1. View this lecture online for review.
2. Read article: How to write a term paper
3. Participate in discussion: Personal privacy vs
   Common good of society- which is more important.




  View      Read        Discuss
• Thank you
  – Dr Ebtissam Al-Madi
  – ealmadi@ksu.edu.sa

Mais conteúdo relacionado

Mais procurados

Anatomical structures of teeth
Anatomical structures of teethAnatomical structures of teeth
Anatomical structures of teethJamil Kifayatullah
 
Dentin
DentinDentin
Dentinddert
 
introduction to dental anatomy
introduction to dental anatomyintroduction to dental anatomy
introduction to dental anatomyAmmar Ammar
 
Dental Management of patient with Hypertension
Dental Management of patient with HypertensionDental Management of patient with Hypertension
Dental Management of patient with HypertensionIraqi Dental Academy
 
Arrangement of teeth in complete denture
Arrangement of teeth in complete dentureArrangement of teeth in complete denture
Arrangement of teeth in complete dentureAbhilash Mohapatra
 
Disturbances of dental development
Disturbances of dental developmentDisturbances of dental development
Disturbances of dental developmentCing Sian Dal
 
Differences between primary and permanent dentition
Differences between primary and permanent dentitionDifferences between primary and permanent dentition
Differences between primary and permanent dentitionAkshMinhas
 
Operative hand instruments - DR SNEHA
Operative hand instruments - DR SNEHAOperative hand instruments - DR SNEHA
Operative hand instruments - DR SNEHASNEHA RATNANI
 
Contacts and contours
Contacts and contoursContacts and contours
Contacts and contoursSahal Abu
 
Principles of oral surgery
Principles of oral surgeryPrinciples of oral surgery
Principles of oral surgeryReshaGhosh1
 
Mandibular 2nd premolar
Mandibular 2nd premolar Mandibular 2nd premolar
Mandibular 2nd premolar dentistry
 
2 anterior teeth
2 anterior teeth2 anterior teeth
2 anterior teethmahmod3mmar
 
Extraction instruments | Dental surgery | by Dr.mohammad nameer
Extraction instruments | Dental surgery | by Dr.mohammad nameerExtraction instruments | Dental surgery | by Dr.mohammad nameer
Extraction instruments | Dental surgery | by Dr.mohammad nameerDenTeach
 
Maxillary Lateral and Mandibular Incisors
Maxillary Lateral and Mandibular Incisors Maxillary Lateral and Mandibular Incisors
Maxillary Lateral and Mandibular Incisors hchidmd
 
Tooth Morphology - Chapter 1; Part 4
Tooth Morphology - Chapter 1; Part   4Tooth Morphology - Chapter 1; Part   4
Tooth Morphology - Chapter 1; Part 4Rooban Thavarajah
 
Terminology in Orthodontics
Terminology in OrthodonticsTerminology in Orthodontics
Terminology in OrthodonticsCing Sian Dal
 
Root canal anatomy
Root canal anatomyRoot canal anatomy
Root canal anatomyLama K Banna
 

Mais procurados (20)

Anatomical structures of teeth
Anatomical structures of teethAnatomical structures of teeth
Anatomical structures of teeth
 
Dentin
DentinDentin
Dentin
 
introduction to dental anatomy
introduction to dental anatomyintroduction to dental anatomy
introduction to dental anatomy
 
Dental Management of patient with Hypertension
Dental Management of patient with HypertensionDental Management of patient with Hypertension
Dental Management of patient with Hypertension
 
Arrangement of teeth in complete denture
Arrangement of teeth in complete dentureArrangement of teeth in complete denture
Arrangement of teeth in complete denture
 
Supernumerary Teeth
Supernumerary TeethSupernumerary Teeth
Supernumerary Teeth
 
Disturbances of dental development
Disturbances of dental developmentDisturbances of dental development
Disturbances of dental development
 
Differences between primary and permanent dentition
Differences between primary and permanent dentitionDifferences between primary and permanent dentition
Differences between primary and permanent dentition
 
Occlusion presentation
Occlusion presentationOcclusion presentation
Occlusion presentation
 
Operative hand instruments - DR SNEHA
Operative hand instruments - DR SNEHAOperative hand instruments - DR SNEHA
Operative hand instruments - DR SNEHA
 
Contacts and contours
Contacts and contoursContacts and contours
Contacts and contours
 
Principles of oral surgery
Principles of oral surgeryPrinciples of oral surgery
Principles of oral surgery
 
Mandibular 2nd premolar
Mandibular 2nd premolar Mandibular 2nd premolar
Mandibular 2nd premolar
 
2 anterior teeth
2 anterior teeth2 anterior teeth
2 anterior teeth
 
Extraction instruments | Dental surgery | by Dr.mohammad nameer
Extraction instruments | Dental surgery | by Dr.mohammad nameerExtraction instruments | Dental surgery | by Dr.mohammad nameer
Extraction instruments | Dental surgery | by Dr.mohammad nameer
 
Maxillary Lateral and Mandibular Incisors
Maxillary Lateral and Mandibular Incisors Maxillary Lateral and Mandibular Incisors
Maxillary Lateral and Mandibular Incisors
 
Jaw relation in rpd
Jaw relation in rpdJaw relation in rpd
Jaw relation in rpd
 
Tooth Morphology - Chapter 1; Part 4
Tooth Morphology - Chapter 1; Part   4Tooth Morphology - Chapter 1; Part   4
Tooth Morphology - Chapter 1; Part 4
 
Terminology in Orthodontics
Terminology in OrthodonticsTerminology in Orthodontics
Terminology in Orthodontics
 
Root canal anatomy
Root canal anatomyRoot canal anatomy
Root canal anatomy
 

Semelhante a Standards of dental informatics, security issues

Clinical Data Standards and Data Portability
Clinical Data Standards and Data Portability Clinical Data Standards and Data Portability
Clinical Data Standards and Data Portability Nrip Nihalani
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory IntelligenceArmin Torres
 
Managing Fraud and Compliance in Healthcare
Managing Fraud and Compliance in HealthcareManaging Fraud and Compliance in Healthcare
Managing Fraud and Compliance in HealthcareMike Wons
 
Managing Compliance in Healthcare
Managing Compliance in HealthcareManaging Compliance in Healthcare
Managing Compliance in HealthcareMike Wons
 
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ..."Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...Health IT Conference – iHT2
 
Data Use Cases - Healthcare & Banking2.pptx
Data Use Cases - Healthcare & Banking2.pptxData Use Cases - Healthcare & Banking2.pptx
Data Use Cases - Healthcare & Banking2.pptxDimple N Rakhiani
 
Lies CMIOs Tell- Dr. David Allard, Henry Ford Health System
Lies CMIOs Tell- Dr. David Allard, Henry Ford Health SystemLies CMIOs Tell- Dr. David Allard, Henry Ford Health System
Lies CMIOs Tell- Dr. David Allard, Henry Ford Health SystemLevi Shapiro
 
Respect Thy Data: The Gospel
Respect Thy Data: The GospelRespect Thy Data: The Gospel
Respect Thy Data: The GospelJill Gilbert
 
The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?Stephen Cobb
 
Hipaa overview 073118
Hipaa overview 073118Hipaa overview 073118
Hipaa overview 073118robint2125
 
Implications for risk management of digital health technologies
Implications for risk management of digital health technologiesImplications for risk management of digital health technologies
Implications for risk management of digital health technologiesDavid Lee Scher, MD
 
Use of mobile device in health care setting
Use of mobile device in health care settingUse of mobile device in health care setting
Use of mobile device in health care settingDr. Samir Sawli
 
Blue team pp_(final_4-12-11)[1]
Blue team pp_(final_4-12-11)[1]Blue team pp_(final_4-12-11)[1]
Blue team pp_(final_4-12-11)[1]Jamie Jackson
 
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOPodcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOM2SYS Technology
 
Patient Access to Implantable Cardiac Rhythm Device Data
Patient Access to Implantable Cardiac Rhythm Device DataPatient Access to Implantable Cardiac Rhythm Device Data
Patient Access to Implantable Cardiac Rhythm Device DataDavid Lee Scher, MD
 
Why FIDO Matters: Healthcare Services
Why FIDO Matters: Healthcare ServicesWhy FIDO Matters: Healthcare Services
Why FIDO Matters: Healthcare ServicesFIDO Alliance
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a bytelgcdcpas
 
informatics1.ppt
informatics1.pptinformatics1.ppt
informatics1.pptanwarkade1
 

Semelhante a Standards of dental informatics, security issues (20)

Clinical Data Standards and Data Portability
Clinical Data Standards and Data Portability Clinical Data Standards and Data Portability
Clinical Data Standards and Data Portability
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory Intelligence
 
Managing Fraud and Compliance in Healthcare
Managing Fraud and Compliance in HealthcareManaging Fraud and Compliance in Healthcare
Managing Fraud and Compliance in Healthcare
 
Managing Compliance in Healthcare
Managing Compliance in HealthcareManaging Compliance in Healthcare
Managing Compliance in Healthcare
 
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ..."Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
 
Data Use Cases - Healthcare & Banking2.pptx
Data Use Cases - Healthcare & Banking2.pptxData Use Cases - Healthcare & Banking2.pptx
Data Use Cases - Healthcare & Banking2.pptx
 
Lies CMIOs Tell- Dr. David Allard, Henry Ford Health System
Lies CMIOs Tell- Dr. David Allard, Henry Ford Health SystemLies CMIOs Tell- Dr. David Allard, Henry Ford Health System
Lies CMIOs Tell- Dr. David Allard, Henry Ford Health System
 
Respect Thy Data: The Gospel
Respect Thy Data: The GospelRespect Thy Data: The Gospel
Respect Thy Data: The Gospel
 
The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?
 
Hipaa overview 073118
Hipaa overview 073118Hipaa overview 073118
Hipaa overview 073118
 
Implications for risk management of digital health technologies
Implications for risk management of digital health technologiesImplications for risk management of digital health technologies
Implications for risk management of digital health technologies
 
Importance of RWD in HEOR: An Industrial Perspective
Importance of RWD in HEOR: An Industrial PerspectiveImportance of RWD in HEOR: An Industrial Perspective
Importance of RWD in HEOR: An Industrial Perspective
 
Use of mobile device in health care setting
Use of mobile device in health care settingUse of mobile device in health care setting
Use of mobile device in health care setting
 
Blue team pp_(final_4-12-11)[1]
Blue team pp_(final_4-12-11)[1]Blue team pp_(final_4-12-11)[1]
Blue team pp_(final_4-12-11)[1]
 
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOPodcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
 
Patient Access to Implantable Cardiac Rhythm Device Data
Patient Access to Implantable Cardiac Rhythm Device DataPatient Access to Implantable Cardiac Rhythm Device Data
Patient Access to Implantable Cardiac Rhythm Device Data
 
3 02
3 023 02
3 02
 
Why FIDO Matters: Healthcare Services
Why FIDO Matters: Healthcare ServicesWhy FIDO Matters: Healthcare Services
Why FIDO Matters: Healthcare Services
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a byte
 
informatics1.ppt
informatics1.pptinformatics1.ppt
informatics1.ppt
 

Standards of dental informatics, security issues

  • 1. Standards of dental informatics, security issues, privacy and costs Dr Ebtissam Al-Madi
  • 2. • Why are standards important in medical informatics? – Promote consistent naming of individuals, events, objects, etc. – Allow better use of data for patient care, quality assurance, research, etc. – Enhance ability to transfer data among applications, allowing better system integration
  • 3. Benefits and limitations of standards Benefits – Interoperability – May allow innovation based on common foundation Limitations – Dominance by one segment of industry: Microsoft “standards,” e.g., Windows, Office, etc. – May stifle innovation
  • 4. The standards development process • Groups agree to informal specifications • Single vendor controls industry • Government agency creates standard and mandates its use. • Interested parties work in open process
  • 5. International standards bodies • International Organization for Standardization (ISO) http://www.iso.org/iso/home.html • ADA Standards Committee on Dental Informatics (ADA SCDI) http://www.ada.org/prof/resources/stand ards/informatics_reports.asp#a1031
  • 6. Medical informatics standards 1. Identifiers 2. Transactions 3. Message exchange 4. Terminology
  • 7. 1. Identifiers • Various approaches have been proposed for – Patients – Providers – Employers – Health Plans
  • 8. Patient identifiers • Unique – only one person has a particular identifier • Non-disclosing – discloses no personal information • Permanent – will never be re-used • Ubiquitous – everyone has one • Canonical – each person has only one • Invariable – will not change over time
  • 9. Patient identifiers Benefits – Easy linkage of records – Facilitate health information exchange – Reduce errors and costs arising from duplicate records – Medical record identifier errors compromise quality of care and can be costly – Cost increases with length of time error not identified Risks – Easy linkage of records – Potentially compromise privacy and confidentiality
  • 10. 2. Transactions • Transaction standards are designed to encourage electronic commerce for health claims. • HIPAA (Health Insurance and privacy act) mandates use of these standards for health care business electronic data exchange “Administrative simplification”
  • 11. Transactions standards cover – Health claims and equivalent encounter information – Enrollment and disenrollment in a health plan – Eligibility for a health plan – Health care payment and remittance advice – Health plan premium payments – Health claim status – Referral certification and authorization – Coordination of benefits
  • 12. 3. Message exchange standards Allow data and application interoperability • Major standards include – Health Level 7 (HL7) – Digital Imaging and Communications (DICOM) – IEEE – NCPDP and SCRIPT – ELINCS – Continuity of Care Record (CCR)
  • 13. 4. Terminology standards Benefits of computerization of clinical information depends upon its “normalization” • Clinical language is inherently vague, which is at odds with the precision of computers • Computers have no intelligence • Computers can only do what programmers and users tell them to do • Computers process numbers and symbols very fast and accurately • Computers have extraordinarily great memory • It is up to humans to define the meaning or semantics of information represented in a compute
  • 14. Standardized terminology • Information capture – documenting findings, conditions, and outcomes • Communication – transferring information • Knowledge organization – classification of diseases, treatments, etc. • Information retrieval – accessing knowledge based information • Decision support – implementing decision support rules
  • 16. Personal privacy vs. the common good • Personal privacy is important. • Common good of society is more important. Where do your views fit?
  • 17. • Privacy – right to keep things to yourself • Confidentiality – right to keep things about you from being disclosed to others • Security – protection of your personal information
  • 18. Security Issues • Who owns information? • How is informed consent implemented? • When does public good exceed personal privacy? • What conflicts are there with business interests?
  • 19. Problems of Poor security • Patients avoid health care • Patients lie • Providers avoid entering sensitive data • Providers devise work-arounds • Disclosure problems continue
  • 20. Security for paper records • Difficult to audit trail of paper chart • Fax machines are easily accessible • Records frequently copied for many reasons – New providers, insurance purposes • Records abstracted for variety of purposes – Research – Quality assurance – Insurance
  • 21. Technologies to secure information Deterrents Obstacles – Alerts – Authentication – Audit trails – Authorization System management – Integrity precautions management – Software – Digital signatures management – Encryption – Analysis of – Firewalls vulnerability – Rights management
  • 22. Protected health information (PHI) • Name • Social security number • Address (street address, city, • Internet protocol (IP) address county, zip code) • Any vehicle or device serial • Names of relatives number • Names of employers • Medical record number • E-mail address • Health plan beneficiary • Fax number number • Telephone number • Account number • Birth date • Certificate/license number • Finger or voice prints • Web URL • Photographic images • Any other unique identifying number, characteristic, or code
  • 23. Costs of Informatics • Health IT costs and return on investment (ROI) – “What do I get back („return‟) for the money I'm being asked to spend („investment‟)?” • Cost-benefit defined – “Ratio of money value of benefit divided by cost” • Cost-benefit in the outpatient setting – Increased time for first 4 months but thereafter saved time that was either spent seeing more patients or reducing work hours – Only a few practices implemented comprehensive quality improvement efforts, usually when insurers paid explicitly for it – System payback achieved at average of 2.5 years. – Factors associated with success included • Near complete use of system functions • Having local EHR champion and supportive practice culture
  • 24. • Cost-benefit in integrated delivery setting – Laboratory and radiology order entry • Reduction of time spent processing orders – Pharmacy order entry • Reduced adverse drug events • Improved cost savings through better formulary compliance – Documentation • Reduction in cost due to use of structured documentation in outpatient setting
  • 25. • Overcoming the economic obstacles – Centrally funded. – Grants – Financial incentives – Tie into quality of care initiatives
  • 26. This weeks assignments 1. View this lecture online for review. 2. Read article: How to write a term paper 3. Participate in discussion: Personal privacy vs Common good of society- which is more important. View Read Discuss
  • 27. • Thank you – Dr Ebtissam Al-Madi – ealmadi@ksu.edu.sa