100%(1)1 out of 1 people found this document helpful
This preview shows page 1 - 3 out of 8 pages.
1Unit 8 AssignmentSelecting and Adopting a Health Information SystemStella MyersKaplan UniversityHS420: Advanced Health InformaticsProfessor Robert TedeschiJune 13, 2017As the Director of Health Information for one of the world’s largest health systems it is my obligation to choose and implement a new yet improve electronic health records system. I have designed a plan to deliver key issues identified with the selection and adaptation process of said systems. This design incorporates instructive projects for employees regrading security and privacy, administration control of personal health information assessment of vendors in the determination process, and a running transaction of agreements.Educational Programs for PHIElectronic Health Records (EHR) are critical to the effectiveness and quality care that patients receive. With the progression and utilization of EHRs, Health Information Management
2Selecting and Adopting a Health Information System(HIM) additionally turns into an essential variable. They are extremely required with fortifying protection and security necessities for accessing personal health information (PHI). Indeed, eventhough their requirement of regulations and laws, there are still issues identified with adult education of privacy and security controls. As an executive my authority is an imperative aspect in tending to issues. I am the role model for highlighting the significance of securing patient data. This is a crucial measure in my healthcare organizations privacy and security exercises. To battle the problem of authority designation of Security Officers is the key. These officers will be in charge of advancing a culture of ensuring patient protection and securing tolerant data. Another educational test in this division is documentation; documentation of hazard risk analysis, HIPAA related approaches, and reports are a requirement under the HIPAA Security Rule. Moreover, documentation is a learning apparatus to show how you performed in your facilities hazard risk analysis and implantation of safeguards to address an identified risk. The solution developed is to ensure that staff can reference the master record for security breech discoveries, choices, and actions. This is by far less demanding than a complete recreation and more precise; should an inspection regarding compliance take place. Security risk analysis should also be completed; this will provide learning of potential dangers to the integrity of PHI. Consequently, education to staff about the ongoing security risks analysis procedures may show an issue. One arrangement is to have an assigned arrangement that plainly traces duties regarding each hazard investigation part. Managing PHIPersonal health information is exceptionally sensitive data. Be that as it may, it is utilizedas a part of various courses in different offices, for example, billing, reporting, and research.