SlideShare uma empresa Scribd logo
1 de 11
MHA 690: Health Care Capstone
Instructor: Dr. Hwang-ji Lu
Health Care Capstone
Created by: Seynabou Ndiaye
Monday, September 23rd, 2013
Introduction
• The need to store electronic health information have raised concerns about the
privacy of patients and the security of the data collected.
• Ensuring adequate protection of confidentiality and integrity of patients’
information while at the same time making the information readily available to all
authorized healthcare providers has been a dilemma for healthcare organizations.
• In 1996, the United States Congress passed the Health Insurance Portability and
Accountability Act (HIPAA) to protect the freedom, security, privacy and
confidentiality of individuals.
• Health information data consists of extremely sensitive information, the security of this
information has been an important issue since health care information systems have been
in use.
Introduction Continued
• The increasing need for exchange of healthcare information within
the healthcare industry have revealed issues with system and
applications interoperability.
• The interoperability of systems can be improved by developing
Health information security standards for all healthcare organizations
• The goal of Health Information Management Systems Society is to
have all health organizations who use, send or store health
information to meet the requirements for confidentiality, integrity
and availability and accountability using sound risk management
practices based on recognized standards and protocols by 2014.
Challenges of managing Health Information Systems
• Liability issues
• Ethical issues
• Security issues
• Data access and storage
• Ownership of data
• Controlling and Monitoring employees behaviors
• Ensuring compliance with HIPAA and other
standards of patient privacy and confidentiality
• Lack of interoperability of systems and
applications
Research Sources
• Research revealed that there are two categories of security
concerns when using Electronic Health information :
Inappropriate release of patient information by health
organizations and concerns about the flow of information
across the healthcare industry.
• Technological security tools are available and they serve five
key functions:
1. Availability
2. Accountability
3. Perimeter identification
4. Controlling access
5. Comprehensibility and control
Research sources Continued
• Health Information Portability and Accessibility Act
provide a basic framework for handling health
information
• The healthcare industry recognized the need for more
guidance in protecting health information
• Healthcare providers have access to a range of
technical and organizational practices that can help
protect patients’ health information
Health Insurance Portability and Accountability Act
• In the light of increasing sharing of patient information within the
healthcare industry, the HIPAA rulings were developed to protect the
freedom, security, privacy and confidentiality of Individuals
• “In, 1996, Congress passed Public law 104-191 , otherwise known as
HIPAA” (Tan, 2010, pg 281)
• HIPAA required the Department of Health and human services to
establish new guidelines, key principles and national standards for
handling electronic health transactions.
• Adherence to these HIPAA imposed principles, guidelines and standards
is required from all healthcare Professionals and all healthcare entities in
the US.
HIPAA continued
• HIPAA protects all personal health information either stored
on paper or electronically, located in any US-based health
organization, regardless of the source of this information.
• HIPAA requires that healthcare organizations educate their
employees on how to respect and safeguard the privacy and
confidentiality of the information collected from patients.
• Given the current and future advances in data interchange
technology, HIPAA establishes strategies for health
organizations to stay in compliance with the federal law
Recommendations for Health Information Systems Security
Establish Security Policies and Procedures for healthcare organizations
Protecting the confidentiality and integrity of patients’ information.
Train healthcare employee thoroughly on HIPAA regulations and
compliance
 Monitoring and enforcing guidelines and regulations
Control and Monitor employee behaviors
Technical solutions include using role-based access control, encryption
and authentication mechanisms
Conclusion
• New technologies are being incorporated in the Healthcare Information systems to improve
care management and coordination of patients’ care.
• There are many benefits to the use of new technologies but there are also privacy and security
issues associated with the use of these technologies.
• Health information security and patient privacy have been a very important issue in healthcare
environments
• There are many technical mechanisms available to guarantee privacy, confidentiality and data
security as well as policies, practices and procedures that can be put in place to protect patients’
Information
• Security law, which is a component of HIPAA can help build a relationship based on trust
Between patients and their healthcare providers.
References
• Albena, R. I., & Susan Meyer-Goldstein. (2013). Impact of standards adoption on healthcare transaction performance:
The case of HIPAA. International Journal of Production Economics, 141(1), 277. Retrieved from
http://search.proquest.com/docview/1197624060?accountid=32521
• Hagland, M. (1997). Confidence and confidentiality. Health Management Technology, 18(12), 20-2, 24, 56. Retrieved
from http://search.proquest.com/docview/195637627?accountid=32521
• Klein, R. (2007). Internet-based patient-physician electronic communication applications: Patient acceptance and trust.
E - Service Journal, 5(2), 27-38,40-51. Retrieved from
http://search.proquest.com/docview/194901474?accountid=32521
• McGraw, D., Dempsey, J. X., Harris, L., & Goldman, J. (2009). Privacy as an enabler, not an impediment: Building trust
into health information exchange. Health Affairs, 28(2), 416-27. Retrieved from
http://search.proquest.com/docview/204627057?accountid=32521
• Tan, J.K.H. (2010). Adaptive Health Management Information Systems (3rd ed.) Sudbury: Jones and Bartlett. ISBN:
9780763756918.
• Thomas, C. R. (1997). Privacy, information technology, and health care. Association for Computing Machinery.
Communications of the ACM, 40(8), 92-100. Retrieved from
http://search.proquest.com/docview/237067863?accountid=32521

Mais conteúdo relacionado

Mais procurados

Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
bodo-con
 
nursing informatics chapter 14,15,16,17
nursing  informatics chapter 14,15,16,17nursing  informatics chapter 14,15,16,17
nursing informatics chapter 14,15,16,17
gail18
 
Chapter 13 national health information system
Chapter 13 national health information systemChapter 13 national health information system
Chapter 13 national health information system
naranbatn
 
Nursing informatics ppt (3)
Nursing informatics ppt (3)Nursing informatics ppt (3)
Nursing informatics ppt (3)
Anne Auta
 
Group 4 historical perspective events
Group 4  historical perspective eventsGroup 4  historical perspective events
Group 4 historical perspective events
group04NI
 

Mais procurados (20)

Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
Data Quality Assurance: An Impetus in Improving Partner(s) Data Management an...
Data Quality Assurance: An Impetus in Improving Partner(s) Data Management an...Data Quality Assurance: An Impetus in Improving Partner(s) Data Management an...
Data Quality Assurance: An Impetus in Improving Partner(s) Data Management an...
 
Natalie banner
Natalie bannerNatalie banner
Natalie banner
 
Where to get primary health information
Where to get primary health informationWhere to get primary health information
Where to get primary health information
 
Annual environment and health conference 2018 fionnuala donohue hse epa data ...
Annual environment and health conference 2018 fionnuala donohue hse epa data ...Annual environment and health conference 2018 fionnuala donohue hse epa data ...
Annual environment and health conference 2018 fionnuala donohue hse epa data ...
 
Nursing informatics and healthcare policy, privacy confidentiality and security
Nursing informatics and healthcare policy, privacy confidentiality and securityNursing informatics and healthcare policy, privacy confidentiality and security
Nursing informatics and healthcare policy, privacy confidentiality and security
 
poster presentation on fostering secure and confidential delivery
poster presentation on fostering secure and confidential deliveryposter presentation on fostering secure and confidential delivery
poster presentation on fostering secure and confidential delivery
 
ISSUES IN INFORMATICS
ISSUES IN INFORMATICSISSUES IN INFORMATICS
ISSUES IN INFORMATICS
 
nursing informatics chapter 14,15,16,17
nursing  informatics chapter 14,15,16,17nursing  informatics chapter 14,15,16,17
nursing informatics chapter 14,15,16,17
 
Powerpoint project
Powerpoint projectPowerpoint project
Powerpoint project
 
Where to get primary health information
Where to get primary health informationWhere to get primary health information
Where to get primary health information
 
Sustainability of HIEs under CyberSecurity
Sustainability of HIEs under CyberSecuritySustainability of HIEs under CyberSecurity
Sustainability of HIEs under CyberSecurity
 
Legal and ethical considerations in nursing informatics
Legal and ethical considerations in nursing informaticsLegal and ethical considerations in nursing informatics
Legal and ethical considerations in nursing informatics
 
Chapter 13 national health information system
Chapter 13 national health information systemChapter 13 national health information system
Chapter 13 national health information system
 
E-health and agri-digitization in Bangladesh
E-health and agri-digitization in BangladeshE-health and agri-digitization in Bangladesh
E-health and agri-digitization in Bangladesh
 
Nursing informatics ppt (3)
Nursing informatics ppt (3)Nursing informatics ppt (3)
Nursing informatics ppt (3)
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing Informatics
 
Incorporating emerging technologies with independent pharmacy care
Incorporating emerging technologies with independent pharmacy careIncorporating emerging technologies with independent pharmacy care
Incorporating emerging technologies with independent pharmacy care
 
Group 4 historical perspective events
Group 4  historical perspective eventsGroup 4  historical perspective events
Group 4 historical perspective events
 
Things you need to know about info governance to sell healthtech products int...
Things you need to know about info governance to sell healthtech products int...Things you need to know about info governance to sell healthtech products int...
Things you need to know about info governance to sell healthtech products int...
 

Destaque (8)

Alex Woodward
Alex WoodwardAlex Woodward
Alex Woodward
 
Marketing Strategy
Marketing StrategyMarketing Strategy
Marketing Strategy
 
Act10 grupo29
Act10 grupo29Act10 grupo29
Act10 grupo29
 
Consumer Insights and Social tools
Consumer Insights and Social toolsConsumer Insights and Social tools
Consumer Insights and Social tools
 
Male in the USA
Male in the USAMale in the USA
Male in the USA
 
ABC Training for Business People
ABC Training for Business PeopleABC Training for Business People
ABC Training for Business People
 
Short CV
Short CVShort CV
Short CV
 
Green Banking and Sustainability
Green Banking and Sustainability Green Banking and Sustainability
Green Banking and Sustainability
 

Semelhante a Mha 690 discussion 2 Seynabou

Strategic Plan Listening Session
Strategic Plan Listening SessionStrategic Plan Listening Session
Strategic Plan Listening Session
Brian Ahier
 
HIPAA-HITECH-MU Simplified
HIPAA-HITECH-MU SimplifiedHIPAA-HITECH-MU Simplified
HIPAA-HITECH-MU Simplified
Gretchen Husted
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
12ort
 
Security Best Practices for Health Information Exchange
Security Best Practices for Health Information ExchangeSecurity Best Practices for Health Information Exchange
Security Best Practices for Health Information Exchange
Trend Micro
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
M2SYS Technology
 
International Journal of Telerehabilitation • telere.docx
International Journal of Telerehabilitation • telere.docxInternational Journal of Telerehabilitation • telere.docx
International Journal of Telerehabilitation • telere.docx
tarifarmarie
 
2009 02 17 - Introduction to EHRs for Rehab Providers
2009 02 17 - Introduction to EHRs for Rehab Providers2009 02 17 - Introduction to EHRs for Rehab Providers
2009 02 17 - Introduction to EHRs for Rehab Providers
dvreeman
 

Semelhante a Mha 690 discussion 2 Seynabou (20)

HIPAA
HIPAAHIPAA
HIPAA
 
Standards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health RecordsStandards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health Records
 
DVHIMSS Ensuring Privacy and Security of HIEs in PA
DVHIMSS Ensuring Privacy and Security of HIEs in PADVHIMSS Ensuring Privacy and Security of HIEs in PA
DVHIMSS Ensuring Privacy and Security of HIEs in PA
 
Strategic Plan Listening Session
Strategic Plan Listening SessionStrategic Plan Listening Session
Strategic Plan Listening Session
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 
PHA - Nov 17 Preparing Hospitals for the Digital Requirements of the UHC La...
PHA - Nov 17 Preparing Hospitals  for the Digital Requirements  of the UHC La...PHA - Nov 17 Preparing Hospitals  for the Digital Requirements  of the UHC La...
PHA - Nov 17 Preparing Hospitals for the Digital Requirements of the UHC La...
 
HIPAA-HITECH-MU Simplified
HIPAA-HITECH-MU SimplifiedHIPAA-HITECH-MU Simplified
HIPAA-HITECH-MU Simplified
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Health Data Sharing Scene Setting
Health Data Sharing Scene Setting Health Data Sharing Scene Setting
Health Data Sharing Scene Setting
 
Security Best Practices for Health Information Exchange
Security Best Practices for Health Information ExchangeSecurity Best Practices for Health Information Exchange
Security Best Practices for Health Information Exchange
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
 
International Journal of Telerehabilitation • telere.docx
International Journal of Telerehabilitation • telere.docxInternational Journal of Telerehabilitation • telere.docx
International Journal of Telerehabilitation • telere.docx
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
 
Hippa privacy and security awareness
Hippa privacy and security awarenessHippa privacy and security awareness
Hippa privacy and security awareness
 
Managing Medical Records_ Compliance and Best Practices for Healthcare Provid...
Managing Medical Records_ Compliance and Best Practices for Healthcare Provid...Managing Medical Records_ Compliance and Best Practices for Healthcare Provid...
Managing Medical Records_ Compliance and Best Practices for Healthcare Provid...
 
E-health appications
E-health appicationsE-health appications
E-health appications
 
DHCA-Chapter5
DHCA-Chapter5DHCA-Chapter5
DHCA-Chapter5
 
Health info
Health infoHealth info
Health info
 
FCM3 WHO BUILDING BLOCKS.pptx.pdf
FCM3 WHO BUILDING BLOCKS.pptx.pdfFCM3 WHO BUILDING BLOCKS.pptx.pdf
FCM3 WHO BUILDING BLOCKS.pptx.pdf
 
2009 02 17 - Introduction to EHRs for Rehab Providers
2009 02 17 - Introduction to EHRs for Rehab Providers2009 02 17 - Introduction to EHRs for Rehab Providers
2009 02 17 - Introduction to EHRs for Rehab Providers
 

Último

Dehradun Call Girls Service {8854095900} ❤️VVIP ROCKY Call Girl in Dehradun U...
Dehradun Call Girls Service {8854095900} ❤️VVIP ROCKY Call Girl in Dehradun U...Dehradun Call Girls Service {8854095900} ❤️VVIP ROCKY Call Girl in Dehradun U...
Dehradun Call Girls Service {8854095900} ❤️VVIP ROCKY Call Girl in Dehradun U...
Sheetaleventcompany
 
Ahmedabad Call Girls Book Now 8980367676 Top Class Ahmedabad Escort Service A...
Ahmedabad Call Girls Book Now 8980367676 Top Class Ahmedabad Escort Service A...Ahmedabad Call Girls Book Now 8980367676 Top Class Ahmedabad Escort Service A...
Ahmedabad Call Girls Book Now 8980367676 Top Class Ahmedabad Escort Service A...
Genuine Call Girls
 
Cara Menggugurkan Kandungan Dengan Cepat Selesai Dalam 24 Jam Secara Alami Bu...
Cara Menggugurkan Kandungan Dengan Cepat Selesai Dalam 24 Jam Secara Alami Bu...Cara Menggugurkan Kandungan Dengan Cepat Selesai Dalam 24 Jam Secara Alami Bu...
Cara Menggugurkan Kandungan Dengan Cepat Selesai Dalam 24 Jam Secara Alami Bu...
Cara Menggugurkan Kandungan 087776558899
 
Call Girl in Chennai | Whatsapp No 📞 7427069034 📞 VIP Escorts Service Availab...
Call Girl in Chennai | Whatsapp No 📞 7427069034 📞 VIP Escorts Service Availab...Call Girl in Chennai | Whatsapp No 📞 7427069034 📞 VIP Escorts Service Availab...
Call Girl in Chennai | Whatsapp No 📞 7427069034 📞 VIP Escorts Service Availab...
amritaverma53
 
Difference Between Skeletal Smooth and Cardiac Muscles
Difference Between Skeletal Smooth and Cardiac MusclesDifference Between Skeletal Smooth and Cardiac Muscles
Difference Between Skeletal Smooth and Cardiac Muscles
MedicoseAcademics
 

Último (20)

Dehradun Call Girls Service {8854095900} ❤️VVIP ROCKY Call Girl in Dehradun U...
Dehradun Call Girls Service {8854095900} ❤️VVIP ROCKY Call Girl in Dehradun U...Dehradun Call Girls Service {8854095900} ❤️VVIP ROCKY Call Girl in Dehradun U...
Dehradun Call Girls Service {8854095900} ❤️VVIP ROCKY Call Girl in Dehradun U...
 
Call Girls in Lucknow Just Call 👉👉8630512678 Top Class Call Girl Service Avai...
Call Girls in Lucknow Just Call 👉👉8630512678 Top Class Call Girl Service Avai...Call Girls in Lucknow Just Call 👉👉8630512678 Top Class Call Girl Service Avai...
Call Girls in Lucknow Just Call 👉👉8630512678 Top Class Call Girl Service Avai...
 
Exclusive Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bangal...
Exclusive Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bangal...Exclusive Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bangal...
Exclusive Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bangal...
 
Ahmedabad Call Girls Book Now 8980367676 Top Class Ahmedabad Escort Service A...
Ahmedabad Call Girls Book Now 8980367676 Top Class Ahmedabad Escort Service A...Ahmedabad Call Girls Book Now 8980367676 Top Class Ahmedabad Escort Service A...
Ahmedabad Call Girls Book Now 8980367676 Top Class Ahmedabad Escort Service A...
 
Call Girls Shahdol Just Call 8250077686 Top Class Call Girl Service Available
Call Girls Shahdol Just Call 8250077686 Top Class Call Girl Service AvailableCall Girls Shahdol Just Call 8250077686 Top Class Call Girl Service Available
Call Girls Shahdol Just Call 8250077686 Top Class Call Girl Service Available
 
Chandigarh Call Girls Service ❤️🍑 9809698092 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9809698092 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9809698092 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9809698092 👄🫦Independent Escort Service Cha...
 
Cara Menggugurkan Kandungan Dengan Cepat Selesai Dalam 24 Jam Secara Alami Bu...
Cara Menggugurkan Kandungan Dengan Cepat Selesai Dalam 24 Jam Secara Alami Bu...Cara Menggugurkan Kandungan Dengan Cepat Selesai Dalam 24 Jam Secara Alami Bu...
Cara Menggugurkan Kandungan Dengan Cepat Selesai Dalam 24 Jam Secara Alami Bu...
 
Cheap Rate Call Girls Bangalore {9179660964} ❤️VVIP BEBO Call Girls in Bangal...
Cheap Rate Call Girls Bangalore {9179660964} ❤️VVIP BEBO Call Girls in Bangal...Cheap Rate Call Girls Bangalore {9179660964} ❤️VVIP BEBO Call Girls in Bangal...
Cheap Rate Call Girls Bangalore {9179660964} ❤️VVIP BEBO Call Girls in Bangal...
 
Chandigarh Call Girls Service ❤️🍑 9809698092 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9809698092 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9809698092 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9809698092 👄🫦Independent Escort Service Cha...
 
Call Girl in Chennai | Whatsapp No 📞 7427069034 📞 VIP Escorts Service Availab...
Call Girl in Chennai | Whatsapp No 📞 7427069034 📞 VIP Escorts Service Availab...Call Girl in Chennai | Whatsapp No 📞 7427069034 📞 VIP Escorts Service Availab...
Call Girl in Chennai | Whatsapp No 📞 7427069034 📞 VIP Escorts Service Availab...
 
Race Course Road } Book Call Girls in Bangalore | Whatsapp No 6378878445 VIP ...
Race Course Road } Book Call Girls in Bangalore | Whatsapp No 6378878445 VIP ...Race Course Road } Book Call Girls in Bangalore | Whatsapp No 6378878445 VIP ...
Race Course Road } Book Call Girls in Bangalore | Whatsapp No 6378878445 VIP ...
 
Bhawanipatna Call Girls 📞9332606886 Call Girls in Bhawanipatna Escorts servic...
Bhawanipatna Call Girls 📞9332606886 Call Girls in Bhawanipatna Escorts servic...Bhawanipatna Call Girls 📞9332606886 Call Girls in Bhawanipatna Escorts servic...
Bhawanipatna Call Girls 📞9332606886 Call Girls in Bhawanipatna Escorts servic...
 
Difference Between Skeletal Smooth and Cardiac Muscles
Difference Between Skeletal Smooth and Cardiac MusclesDifference Between Skeletal Smooth and Cardiac Muscles
Difference Between Skeletal Smooth and Cardiac Muscles
 
Kolkata Call Girls Shobhabazar 💯Call Us 🔝 8005736733 🔝 💃 Top Class Call Gir...
Kolkata Call Girls Shobhabazar  💯Call Us 🔝 8005736733 🔝 💃  Top Class Call Gir...Kolkata Call Girls Shobhabazar  💯Call Us 🔝 8005736733 🔝 💃  Top Class Call Gir...
Kolkata Call Girls Shobhabazar 💯Call Us 🔝 8005736733 🔝 💃 Top Class Call Gir...
 
Chennai ❣️ Call Girl 6378878445 Call Girls in Chennai Escort service book now
Chennai ❣️ Call Girl 6378878445 Call Girls in Chennai Escort service book nowChennai ❣️ Call Girl 6378878445 Call Girls in Chennai Escort service book now
Chennai ❣️ Call Girl 6378878445 Call Girls in Chennai Escort service book now
 
7 steps How to prevent Thalassemia : Dr Sharda Jain & Vandana Gupta
7 steps How to prevent Thalassemia : Dr Sharda Jain & Vandana Gupta7 steps How to prevent Thalassemia : Dr Sharda Jain & Vandana Gupta
7 steps How to prevent Thalassemia : Dr Sharda Jain & Vandana Gupta
 
Kolkata Call Girls Naktala 💯Call Us 🔝 8005736733 🔝 💃 Top Class Call Girl Se...
Kolkata Call Girls Naktala  💯Call Us 🔝 8005736733 🔝 💃  Top Class Call Girl Se...Kolkata Call Girls Naktala  💯Call Us 🔝 8005736733 🔝 💃  Top Class Call Girl Se...
Kolkata Call Girls Naktala 💯Call Us 🔝 8005736733 🔝 💃 Top Class Call Girl Se...
 
Call Girls Mussoorie Just Call 8854095900 Top Class Call Girl Service Available
Call Girls Mussoorie Just Call 8854095900 Top Class Call Girl Service AvailableCall Girls Mussoorie Just Call 8854095900 Top Class Call Girl Service Available
Call Girls Mussoorie Just Call 8854095900 Top Class Call Girl Service Available
 
ANATOMY AND PHYSIOLOGY OF RESPIRATORY SYSTEM.pptx
ANATOMY AND PHYSIOLOGY OF RESPIRATORY SYSTEM.pptxANATOMY AND PHYSIOLOGY OF RESPIRATORY SYSTEM.pptx
ANATOMY AND PHYSIOLOGY OF RESPIRATORY SYSTEM.pptx
 
❤️Call Girl Service In Chandigarh☎️9814379184☎️ Call Girl in Chandigarh☎️ Cha...
❤️Call Girl Service In Chandigarh☎️9814379184☎️ Call Girl in Chandigarh☎️ Cha...❤️Call Girl Service In Chandigarh☎️9814379184☎️ Call Girl in Chandigarh☎️ Cha...
❤️Call Girl Service In Chandigarh☎️9814379184☎️ Call Girl in Chandigarh☎️ Cha...
 

Mha 690 discussion 2 Seynabou

  • 1. MHA 690: Health Care Capstone Instructor: Dr. Hwang-ji Lu Health Care Capstone Created by: Seynabou Ndiaye Monday, September 23rd, 2013
  • 2. Introduction • The need to store electronic health information have raised concerns about the privacy of patients and the security of the data collected. • Ensuring adequate protection of confidentiality and integrity of patients’ information while at the same time making the information readily available to all authorized healthcare providers has been a dilemma for healthcare organizations. • In 1996, the United States Congress passed the Health Insurance Portability and Accountability Act (HIPAA) to protect the freedom, security, privacy and confidentiality of individuals. • Health information data consists of extremely sensitive information, the security of this information has been an important issue since health care information systems have been in use.
  • 3. Introduction Continued • The increasing need for exchange of healthcare information within the healthcare industry have revealed issues with system and applications interoperability. • The interoperability of systems can be improved by developing Health information security standards for all healthcare organizations • The goal of Health Information Management Systems Society is to have all health organizations who use, send or store health information to meet the requirements for confidentiality, integrity and availability and accountability using sound risk management practices based on recognized standards and protocols by 2014.
  • 4. Challenges of managing Health Information Systems • Liability issues • Ethical issues • Security issues • Data access and storage • Ownership of data • Controlling and Monitoring employees behaviors • Ensuring compliance with HIPAA and other standards of patient privacy and confidentiality • Lack of interoperability of systems and applications
  • 5. Research Sources • Research revealed that there are two categories of security concerns when using Electronic Health information : Inappropriate release of patient information by health organizations and concerns about the flow of information across the healthcare industry. • Technological security tools are available and they serve five key functions: 1. Availability 2. Accountability 3. Perimeter identification 4. Controlling access 5. Comprehensibility and control
  • 6. Research sources Continued • Health Information Portability and Accessibility Act provide a basic framework for handling health information • The healthcare industry recognized the need for more guidance in protecting health information • Healthcare providers have access to a range of technical and organizational practices that can help protect patients’ health information
  • 7. Health Insurance Portability and Accountability Act • In the light of increasing sharing of patient information within the healthcare industry, the HIPAA rulings were developed to protect the freedom, security, privacy and confidentiality of Individuals • “In, 1996, Congress passed Public law 104-191 , otherwise known as HIPAA” (Tan, 2010, pg 281) • HIPAA required the Department of Health and human services to establish new guidelines, key principles and national standards for handling electronic health transactions. • Adherence to these HIPAA imposed principles, guidelines and standards is required from all healthcare Professionals and all healthcare entities in the US.
  • 8. HIPAA continued • HIPAA protects all personal health information either stored on paper or electronically, located in any US-based health organization, regardless of the source of this information. • HIPAA requires that healthcare organizations educate their employees on how to respect and safeguard the privacy and confidentiality of the information collected from patients. • Given the current and future advances in data interchange technology, HIPAA establishes strategies for health organizations to stay in compliance with the federal law
  • 9. Recommendations for Health Information Systems Security Establish Security Policies and Procedures for healthcare organizations Protecting the confidentiality and integrity of patients’ information. Train healthcare employee thoroughly on HIPAA regulations and compliance  Monitoring and enforcing guidelines and regulations Control and Monitor employee behaviors Technical solutions include using role-based access control, encryption and authentication mechanisms
  • 10. Conclusion • New technologies are being incorporated in the Healthcare Information systems to improve care management and coordination of patients’ care. • There are many benefits to the use of new technologies but there are also privacy and security issues associated with the use of these technologies. • Health information security and patient privacy have been a very important issue in healthcare environments • There are many technical mechanisms available to guarantee privacy, confidentiality and data security as well as policies, practices and procedures that can be put in place to protect patients’ Information • Security law, which is a component of HIPAA can help build a relationship based on trust Between patients and their healthcare providers.
  • 11. References • Albena, R. I., & Susan Meyer-Goldstein. (2013). Impact of standards adoption on healthcare transaction performance: The case of HIPAA. International Journal of Production Economics, 141(1), 277. Retrieved from http://search.proquest.com/docview/1197624060?accountid=32521 • Hagland, M. (1997). Confidence and confidentiality. Health Management Technology, 18(12), 20-2, 24, 56. Retrieved from http://search.proquest.com/docview/195637627?accountid=32521 • Klein, R. (2007). Internet-based patient-physician electronic communication applications: Patient acceptance and trust. E - Service Journal, 5(2), 27-38,40-51. Retrieved from http://search.proquest.com/docview/194901474?accountid=32521 • McGraw, D., Dempsey, J. X., Harris, L., & Goldman, J. (2009). Privacy as an enabler, not an impediment: Building trust into health information exchange. Health Affairs, 28(2), 416-27. Retrieved from http://search.proquest.com/docview/204627057?accountid=32521 • Tan, J.K.H. (2010). Adaptive Health Management Information Systems (3rd ed.) Sudbury: Jones and Bartlett. ISBN: 9780763756918. • Thomas, C. R. (1997). Privacy, information technology, and health care. Association for Computing Machinery. Communications of the ACM, 40(8), 92-100. Retrieved from http://search.proquest.com/docview/237067863?accountid=32521