SlideShare a Scribd company logo
1 of 11
How We Can
Protect Our
Patients
Gabriel Foddrell
Caring for Our Patients
 Taking care of our
patients goes
beyond providing
them with top-of-the-
line medical care.
 Taking care of our
patients goes
beyond providing
them with
exceptional
customer service.
Our Responsibility
 Our responsibility is
to:
 Protect our
patients
 Ensure their safety
 Secure their
privacy
Opportunities
 There are many opportunities for
individuals to obtain patient data
 The patient encounter sheet can be
viewed
 The patient’s file can be accessed
 The patient’s electronic medical records
can be accessed
EMR Information
 Includes:
 Scanned Charts
 Diagnostic
information
 Lab Orders
 Lab Results
 Ancillary Orders
 Ancillary Results
 Reference
Content
 Drug &
Immunization
 History
 Allergies
 Patient Schedule
 Patient personal
identifiers, i.e. SS#
& DOB
Method for Securing Patient
Privacy
 Do not share your
password with
anyone at work
under any
circumstance
Method for Securing Patient
Privacy Continued
 Change your password
regularly
 Passwords should be
changed every six to
eight weeks
 Be sure your password
does not appear on
the screen when you
are keying it into the
system. You never
know who may be
lurking around the
corner.
Method for Securing Patient
Privacy Continued
 Be sure not to
leave patient
medical records
open that are
easily viewable
 Do not leave
patient encounter
sheets out in the
open
Method for Securing Patient
Privacy Continued
 Always logout of
the software when
you leave your
work station
 Always lock your
computer when
you leave your
work station
Questions?
Reference
 HemiData: Unlocking the Power of
Electronic Health Information
http://www.hemidata.com/emr.html

More Related Content

What's hot

What's hot (7)

Amanda Thomas Resume 1 (1)
Amanda Thomas Resume 1 (1)Amanda Thomas Resume 1 (1)
Amanda Thomas Resume 1 (1)
 
LOR Amber Oldham
LOR   Amber   OldhamLOR   Amber   Oldham
LOR Amber Oldham
 
Dr_Sitzlar_Recommendation
Dr_Sitzlar_RecommendationDr_Sitzlar_Recommendation
Dr_Sitzlar_Recommendation
 
Melissa_resume final
Melissa_resume finalMelissa_resume final
Melissa_resume final
 
Resume
ResumeResume
Resume
 
2017 Tara Dunn CMA resume
2017 Tara Dunn CMA resume2017 Tara Dunn CMA resume
2017 Tara Dunn CMA resume
 
HIPAA_60141
HIPAA_60141HIPAA_60141
HIPAA_60141
 

Viewers also liked

Persons with disabilities.ppt
Persons with disabilities.pptPersons with disabilities.ppt
Persons with disabilities.pptDemining
 
Конституційно-правові межі та особливості мовної політики України на сучасном...
Конституційно-правові межі та особливості мовної політики України на сучасном...Конституційно-правові межі та особливості мовної політики України на сучасном...
Конституційно-правові межі та особливості мовної політики України на сучасном...Vitaly Datsiuk
 
DG SYSTEM SELECTION IN URBAN AREA
DG SYSTEM SELECTION IN URBAN AREADG SYSTEM SELECTION IN URBAN AREA
DG SYSTEM SELECTION IN URBAN AREAHaryo Agung Wibowo
 
Детский Литературный Клуб
Детский Литературный КлубДетский Литературный Клуб
Детский Литературный Клубlizzy_island
 
Atomic energy
Atomic energyAtomic energy
Atomic energyDemining
 
MODELO PAI ODONTOLOGIA UNIVERSIDAD DE CARABOBO
MODELO PAI ODONTOLOGIA UNIVERSIDAD DE CARABOBOMODELO PAI ODONTOLOGIA UNIVERSIDAD DE CARABOBO
MODELO PAI ODONTOLOGIA UNIVERSIDAD DE CARABOBOPropedeutico UCV / USB
 
Article 25
Article 25Article 25
Article 25Demining
 
DC link ripple analysis on five phase pwm voltage source inverter with unbala...
DC link ripple analysis on five phase pwm voltage source inverter with unbala...DC link ripple analysis on five phase pwm voltage source inverter with unbala...
DC link ripple analysis on five phase pwm voltage source inverter with unbala...Haryo Agung Wibowo
 
ecosis-user-manual
ecosis-user-manualecosis-user-manual
ecosis-user-manualpcmartkl1234
 
Ecoleave approval-user-manual
Ecoleave approval-user-manualEcoleave approval-user-manual
Ecoleave approval-user-manualpcmartkl1234
 
Ecoleave-HR-user-manual
Ecoleave-HR-user-manualEcoleave-HR-user-manual
Ecoleave-HR-user-manualpcmartkl1234
 

Viewers also liked (12)

Persons with disabilities.ppt
Persons with disabilities.pptPersons with disabilities.ppt
Persons with disabilities.ppt
 
Конституційно-правові межі та особливості мовної політики України на сучасном...
Конституційно-правові межі та особливості мовної політики України на сучасном...Конституційно-правові межі та особливості мовної політики України на сучасном...
Конституційно-правові межі та особливості мовної політики України на сучасном...
 
DG SYSTEM SELECTION IN URBAN AREA
DG SYSTEM SELECTION IN URBAN AREADG SYSTEM SELECTION IN URBAN AREA
DG SYSTEM SELECTION IN URBAN AREA
 
Insurance Company
Insurance CompanyInsurance Company
Insurance Company
 
Детский Литературный Клуб
Детский Литературный КлубДетский Литературный Клуб
Детский Литературный Клуб
 
Atomic energy
Atomic energyAtomic energy
Atomic energy
 
MODELO PAI ODONTOLOGIA UNIVERSIDAD DE CARABOBO
MODELO PAI ODONTOLOGIA UNIVERSIDAD DE CARABOBOMODELO PAI ODONTOLOGIA UNIVERSIDAD DE CARABOBO
MODELO PAI ODONTOLOGIA UNIVERSIDAD DE CARABOBO
 
Article 25
Article 25Article 25
Article 25
 
DC link ripple analysis on five phase pwm voltage source inverter with unbala...
DC link ripple analysis on five phase pwm voltage source inverter with unbala...DC link ripple analysis on five phase pwm voltage source inverter with unbala...
DC link ripple analysis on five phase pwm voltage source inverter with unbala...
 
ecosis-user-manual
ecosis-user-manualecosis-user-manual
ecosis-user-manual
 
Ecoleave approval-user-manual
Ecoleave approval-user-manualEcoleave approval-user-manual
Ecoleave approval-user-manual
 
Ecoleave-HR-user-manual
Ecoleave-HR-user-manualEcoleave-HR-user-manual
Ecoleave-HR-user-manual
 

Similar to Protect Patient Privacy With Proper EMR Security

Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)bholmes
 
Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)bholmes
 
Patientconfidentiality bydavis
Patientconfidentiality bydavisPatientconfidentiality bydavis
Patientconfidentiality bydavisnight9999
 
Why is data privacy a crucial aspect of using Electronic Records.pptx
Why is data privacy a crucial aspect of using Electronic Records.pptxWhy is data privacy a crucial aspect of using Electronic Records.pptx
Why is data privacy a crucial aspect of using Electronic Records.pptxMocDoc
 
Moving To electronic health record Cooper
Moving To electronic health record CooperMoving To electronic health record Cooper
Moving To electronic health record CooperAlicia Cooper
 
Ethical And Legal Aspects Of Health Care
Ethical And Legal Aspects Of Health CareEthical And Legal Aspects Of Health Care
Ethical And Legal Aspects Of Health CareLajpat Rai
 
Patient confidentiality 2
Patient confidentiality 2Patient confidentiality 2
Patient confidentiality 2Alice Felton
 
Computerized Clinical Decisions are supported by My Health Records..pdf
Computerized Clinical Decisions are supported by My Health Records..pdfComputerized Clinical Decisions are supported by My Health Records..pdf
Computerized Clinical Decisions are supported by My Health Records..pdfssuserbed838
 
Why Can't More People Use My Health Records.pdf
Why Can't More People Use My Health Records.pdfWhy Can't More People Use My Health Records.pdf
Why Can't More People Use My Health Records.pdfssuserbed838
 
How EMRs Help Patients With Chronic Diseases.pdf
How EMRs Help Patients With Chronic Diseases.pdfHow EMRs Help Patients With Chronic Diseases.pdf
How EMRs Help Patients With Chronic Diseases.pdfJuno EMR
 
QRepublik Medical IDs Product Presentation1.pdf
QRepublik Medical IDs Product Presentation1.pdfQRepublik Medical IDs Product Presentation1.pdf
QRepublik Medical IDs Product Presentation1.pdfQREPUBLIC, INC.
 
Records Management Principles for Community Health
Records Management Principles for Community HealthRecords Management Principles for Community Health
Records Management Principles for Community Healthnstanzer
 
Confidentiality
ConfidentialityConfidentiality
ConfidentialityLLSS64
 
Practical lessons from rolling-out web-based PHRs
Practical lessons from rolling-out web-based PHRsPractical lessons from rolling-out web-based PHRs
Practical lessons from rolling-out web-based PHRsRowan Purdy
 
How To Track You Health Care Information
How To Track You Health Care InformationHow To Track You Health Care Information
How To Track You Health Care InformationDeresa Claybrook
 
Advantage of Patient Portal in Personal Health Records.pdf
Advantage of Patient Portal in Personal Health Records.pdfAdvantage of Patient Portal in Personal Health Records.pdf
Advantage of Patient Portal in Personal Health Records.pdfssuserbed838
 
Klara guide to secure messaging in healthcare
Klara guide to secure messaging in healthcare Klara guide to secure messaging in healthcare
Klara guide to secure messaging in healthcare Alexis Sheehy, MBA
 
Medical Software and Hardware
Medical Software and HardwareMedical Software and Hardware
Medical Software and HardwareHridyanshSharma5
 

Similar to Protect Patient Privacy With Proper EMR Security (20)

Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)
 
Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
Patientconfidentiality bydavis
Patientconfidentiality bydavisPatientconfidentiality bydavis
Patientconfidentiality bydavis
 
Why is data privacy a crucial aspect of using Electronic Records.pptx
Why is data privacy a crucial aspect of using Electronic Records.pptxWhy is data privacy a crucial aspect of using Electronic Records.pptx
Why is data privacy a crucial aspect of using Electronic Records.pptx
 
Moving To electronic health record Cooper
Moving To electronic health record CooperMoving To electronic health record Cooper
Moving To electronic health record Cooper
 
Orientation 2011-2012
Orientation 2011-2012Orientation 2011-2012
Orientation 2011-2012
 
Ethical And Legal Aspects Of Health Care
Ethical And Legal Aspects Of Health CareEthical And Legal Aspects Of Health Care
Ethical And Legal Aspects Of Health Care
 
Patient confidentiality 2
Patient confidentiality 2Patient confidentiality 2
Patient confidentiality 2
 
Computerized Clinical Decisions are supported by My Health Records..pdf
Computerized Clinical Decisions are supported by My Health Records..pdfComputerized Clinical Decisions are supported by My Health Records..pdf
Computerized Clinical Decisions are supported by My Health Records..pdf
 
Why Can't More People Use My Health Records.pdf
Why Can't More People Use My Health Records.pdfWhy Can't More People Use My Health Records.pdf
Why Can't More People Use My Health Records.pdf
 
How EMRs Help Patients With Chronic Diseases.pdf
How EMRs Help Patients With Chronic Diseases.pdfHow EMRs Help Patients With Chronic Diseases.pdf
How EMRs Help Patients With Chronic Diseases.pdf
 
QRepublik Medical IDs Product Presentation1.pdf
QRepublik Medical IDs Product Presentation1.pdfQRepublik Medical IDs Product Presentation1.pdf
QRepublik Medical IDs Product Presentation1.pdf
 
Records Management Principles for Community Health
Records Management Principles for Community HealthRecords Management Principles for Community Health
Records Management Principles for Community Health
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Practical lessons from rolling-out web-based PHRs
Practical lessons from rolling-out web-based PHRsPractical lessons from rolling-out web-based PHRs
Practical lessons from rolling-out web-based PHRs
 
How To Track You Health Care Information
How To Track You Health Care InformationHow To Track You Health Care Information
How To Track You Health Care Information
 
Advantage of Patient Portal in Personal Health Records.pdf
Advantage of Patient Portal in Personal Health Records.pdfAdvantage of Patient Portal in Personal Health Records.pdf
Advantage of Patient Portal in Personal Health Records.pdf
 
Klara guide to secure messaging in healthcare
Klara guide to secure messaging in healthcare Klara guide to secure messaging in healthcare
Klara guide to secure messaging in healthcare
 
Medical Software and Hardware
Medical Software and HardwareMedical Software and Hardware
Medical Software and Hardware
 

Recently uploaded

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Recently uploaded (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Protect Patient Privacy With Proper EMR Security

  • 1. How We Can Protect Our Patients Gabriel Foddrell
  • 2. Caring for Our Patients  Taking care of our patients goes beyond providing them with top-of-the- line medical care.  Taking care of our patients goes beyond providing them with exceptional customer service.
  • 3. Our Responsibility  Our responsibility is to:  Protect our patients  Ensure their safety  Secure their privacy
  • 4. Opportunities  There are many opportunities for individuals to obtain patient data  The patient encounter sheet can be viewed  The patient’s file can be accessed  The patient’s electronic medical records can be accessed
  • 5. EMR Information  Includes:  Scanned Charts  Diagnostic information  Lab Orders  Lab Results  Ancillary Orders  Ancillary Results  Reference Content  Drug & Immunization  History  Allergies  Patient Schedule  Patient personal identifiers, i.e. SS# & DOB
  • 6. Method for Securing Patient Privacy  Do not share your password with anyone at work under any circumstance
  • 7. Method for Securing Patient Privacy Continued  Change your password regularly  Passwords should be changed every six to eight weeks  Be sure your password does not appear on the screen when you are keying it into the system. You never know who may be lurking around the corner.
  • 8. Method for Securing Patient Privacy Continued  Be sure not to leave patient medical records open that are easily viewable  Do not leave patient encounter sheets out in the open
  • 9. Method for Securing Patient Privacy Continued  Always logout of the software when you leave your work station  Always lock your computer when you leave your work station
  • 11. Reference  HemiData: Unlocking the Power of Electronic Health Information http://www.hemidata.com/emr.html