The design of information flow and security is a major concern in any enterprise. Without consistent and proper flow then statistical or decisional errors may occur. Therefore, the design of the information stream is a chief concern of the Information technologist. It is also important to safeguard the data from inappropriate viewing.
To that end, it is important to map out the pattern. This example uses a doctor-patient visit in a medical clinic of the twenty-first century. The first bit of the whole comes at the front desk confirming the patient identity and insurance information. This must be with human interaction and scanning equipment. Staff verify the ID cards and scan insurance cards into the record. There is a lot of personal information just in this step alone. This information proceeds to the triage nurse who takes the vital signs. Then the data and the patient proceed to the provider for the actual visit.
Currently, there are already three people who can compromise the information and its security. Incorrect data entry and wrong patient are the most common information errors. The remediation for these is double-checking the information at the point of entry or using more automated means such as vital signs sensors connected to the data system. The security is physical in nature. The identification must be assured in the first place, and the insurance records accurate and safeguarded. Remember, the patient’s complaints or diagnosis shall be utterly confidential. If the insurance data is incorrect or not collected, billing will be incorrect and delayed. This is inconvenient and costly. If the vitals are not correct, it wastes time retaking them. The data must be present and accurate prior to seeing the clinician.
The doctor has the responsibility to enter complete information into the patient’s medical record accurately. This will include deliverables to the pharmacy, laboratory, radiology, the insurer, and others. Each of these risks