Presented by Jamie Advantages
• EMR systems give immediate access to medical records. You do not have to wait around for medical records to pull out old charts or in some cases we don’t have to wait for another facility to find and send over the information.
Advantages
• Gives the staff the ability to read the chart anywhere if needed and not have to try and translate what someone wrote if the writing is not very neat, and helps to cut down on spelling errors and charting completion.
Example
• Mr. Smith comes into the ED unconscious. The staff does not remember him but they find an ID on him. They type his name into the system and find that he is a type 1 diabetic from his medical history in the doctors office so they can immediately start checking to see how his diabetes is controlled. As a result they find that he was in DKA and were able to start treatment sooner.
PATIENT PRIVACY
• Staff in the past have had to have the chart in order look at the patient chart, now with computer charting we have to be very careful not to look at charts of patients that we are not taking care of. With the user sign on it is easy to determine who was looking at different charts which can cause a HIPAA violation.
HIPAA compliance
According to Summary of the HIPAA Security Rule • Specifically, covered entities must:
• • • • Ensure the confidentiality, integrity, and availability of all e-PHI they create, receive, maintain or transmit; Identify and protect against reasonably anticipated threats to the security or integrity of the information; Protect against reasonably anticipated, impermissible uses or disclosures; and Ensure compliance by their workforce.4
•
The Security Rule defines “confidentiality” to mean that ePHI is not available or disclosed to unauthorized persons. The Security Rule 's confidentiality requirements support the Privacy Rule 's prohibitions against improper uses and disclosures of PHI. The Security rule also promotes
References: 1. U.S. Department of Health & Human Services (2012). Summary of the HIPAA Security Rule. Retrieved July 21, 2012 from http://www.hhs.gov/ocr/privacy/hipaa/underst anding/srsummary.html 2. Charette, Robert (September 2, 2011). Personal Health Information Breaches Most Often Caused by Insiders?. Retrieved August 4, 2012 from http://spectrum.iee.org/riskfactor/computing/it /personal-health-information-breaches-mostoften-caused-by-insiders