1 / 15

Preventing Breach of Information with the use of electronic Medical Record.

Preventing Breach of Information with the use of electronic Medical Record. . Frostburg State University Fende Bokossah . . What is confidentiality? .

olisa
Download Presentation

Preventing Breach of Information with the use of electronic Medical Record.

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Preventing Breach of Information with the use of electronic Medical Record. Frostburg State University FendeBokossah.

  2. What is confidentiality? • Confidentiality is a legal agreement signed by the both the patient and healthcare providers that limits access of patient’s health information. • This contract enables restriction of patient data to only authorized users. • Cerner is a type of Electronic medical records used at my place of work.

  3. Confidentiality • Cerner has helped in addressing the subject of privacy and confidentiality to a great extend, however there are still some loop holes.

  4. WORKFLOW DIAGRAM BEFORE Login to patient data on Cerner No activity after 15 minutes Forgets to Logout Allows access/ login to multiple computers at same time. Stay logged in Patient’s health records accessed by unauthorized users Violation of HIPAA

  5. The Problem Cerner enables multiple assess to users from different computers which exposes patient information to unauthorized personnel. For example. A nurse forgets to log out of her computer, yet goes on to log on to another computer there by leaving the other computer unattended.

  6. The Problem • Currently Cerner allows users to remain logged on after a prolonged period of inactivity. • This also allows access to patient data by unauthorized users if the computer is left unattended.

  7. The solution • To correct this problem, the ability to access multiple computers by the same individual should be prevented or limited to charge nurses and unit managers. • This will enable users to log off from one computer before logging on to another computer, thereby protecting patient information.

  8. Solution continuation • Also the computer system should have a built-in capability of automatically logging off after a two-minute period of inactivity. • This added feature will limit or prevent the access of patient health information by unauthorized personnel.

  9. WORKFLOW DIAGRAM AFTER.

  10. Incorporating Change • The Lewin’s change theory is a three step model that shows the strategies used in order to introduce modifications or change at the workplace.

  11. Unfreeze

  12. Change

  13. Refreeze

  14. Timeline Refreeze Unfreeze Change 3days 3days 1day

  15. References • McGonigle, D., & Mastrian, K. (2012). Nursing informatics and the foundation of knowledge. (2 ed.). Burlington: Jones & Bartlett Learning. • http://www.google.com/search?q=confidentiality+with+electronic+medical+records&source

More Related