Technology Assessment and Government Regulations  – PowerPoint Presentation

Technology Assessment and Government Regulations 

Health Information System HSA 520

style.visibilitystyle.visibility

Introduction

Incorporating systems in our United Health Group will pose many benefits in overall operations that take place within the health sector. We need to develop strategic and reliable health information management system that will help us in monitoring, controlling and also coordinating the procedures within our health sector. For this case, I have developed one system (management and clinical administration system) this will help us manage all the patient details, including their secondary data and other forms of documentations. It is my humble plea to the CEO to implement this system to all our departments. This will boost performance through ensuring there are efficiency and effective data mining and security procedures.

style.visibilitystyle.visibilitystyle.visibilitystyle.visibilitystyle.visibility

Benefits of integrating (HIMS) to all the health care departments

Health information systems help to manage information needed by professionals to perform their jobs effectivelyHCISs facilitate faster communication between the patients and the clinical professionals to make sure that only authorized personality’s access information pertaining them. (Asah & Nielsen, 2016)HCIS integrates information such that incase there is need to retrieve some data, then the process can be done easier.These healthcare information systems coordinate action plan among several healthcare professionals through initializing appropriate decision makingIn addition, HICS will help the healthcare organization to store and update certain information that is geared to support report functionalities and certain record keeping (Weaver, et al 2016).

style.visibilitystyle.visibilitystyle.visibilitystyle.visibilitystyle.visibilitystyle.visibility

Cont’

HIMS assist health care providers with basic information on the best way of handling patients in either critical condition or in normal conditionsThese systems helps in capturing, managing and transmitting credible information regarding the patients conditions for the current and future situations.These systems ensures confidentiality and privacy of patient and health care practitioners

style.visibilitystyle.visibilitystyle.visibilitystyle.visibility

Significance HIPPA, EHR, EHI and HITECH(1) Electronic health record(EHR)

EHR Helps in increasing the number of patient participation regarding their careThis strategy helps to improve the quality of care within the healthcare organization and hence reduces the number of inconveniences that might befall on the process of treatment.This platform also increases efficiency and ensures there are minimal costsThese incentive programs provides incentive payments to professionals under Medicaid and Medicare in all critical hospitals (Kotz et al 2016)

style.visibilitystyle.visibilitystyle.visibilitystyle.visibilitystyle.visibility

Information centrality of health care delivery

There is need for training and supporting the healthcare providers to deliver accurate data Data can be shared specifically to many personalities for the purpose of ensuring there is security and confidentiality.Exchanging information from the patient to health care provider is vital for consistent treatment plans

style.visibilitystyle.visibilitystyle.visibilitystyle.visibility

Health Information Portability and Accountability (HIPPA)

This is the main law which governs how healthcare data is shared and literally helps in protecting health information.it ensures the following:These programs requires providers of the designated security and privacy to present officials and their staff the right documents.They provide insurance related transactions for instance submitting allegations of health care claims through electronic media.Health care providers who are under HIPPA have legal responsibilities which are meant to protect and secure patients information.

style.visibilitystyle.visibilitystyle.visibilitystyle.visibilitystyle.visibility

cont’

Health information portability and and accountability (HIPPA) enables healthcare providers with the necessary information of how to handle patients while incorporating high degree of moralsThis program also contains legislations which stipulates the guidelines followed whenever treating patients in hospital.Ethical issues are well discussed by this programs and by the help of health care providers, patients and medical practitioners becomes aware of the repercussions of breaking the rules (Lysyk, 2015).

style.visibilitystyle.visibilitystyle.visibilitystyle.visibility

Impacts of integrating HIMS

Boosts the performance of health professionalsHelps to monitor the procedures of hospital.These systems can encourage idleness in the offices/ departments.Easy decision making Lack of free will to socialize with the patients since the systems work (Ramanathan, 2015) .

style.visibilitystyle.visibilitystyle.visibilitystyle.visibilitystyle.visibilitystyle.visibility

Cont’

Controlling, monitoring and coordinating the other workers and patients will be easy.Security and privacy of data will be enhancedOnly the recognized and authorized people can access the data following the fact that the system will identify the owner using the log in details.

style.visibilitystyle.visibilitystyle.visibilitystyle.visibility

Potential solution to regulations

In order to solve this, the following factors should be incorporated:Tough cases related to healthcare data should be taken to court to determine the owner of the informationDeveloping inner culture of the organization by solving the raised issues within the health care sectorEmploying the executives and the strategic managers who can provide the right decisions regarding the regulations (Adjerid et al 2015).

style.visibilitystyle.visibilitystyle.visibilitystyle.visibilitystyle.visibility

Cont’

As a team of system developers, we need to employ skilled personalities who will be running the databases to enhance securityWe need also to incorporate some standard policies which will subdue theft of dataThese regulations need to be revised again so that we can avoid future inconveniences

style.visibilitystyle.visibilitystyle.visibilitystyle.visibility

Privacy and security measures

Healthcare information should be addressed by qualified personalities who are trained vehementlyEstablishing security and confidential measuresThere is need to perform PHI risk assessment to healthcare data that is unconditionally unidentifiableSecurity measures and policies such as AES-NI (Advanced Encryption Standards New Instructions) should be implemented

style.visibilitystyle.visibilitystyle.visibilitystyle.visibilitystyle.visibility

Cont’

Establishing risk response planBudgeting for the security and privacy since a weaker HIMS is identified when there is little funding on the project (Lysyk, 2014).

style.visibilitystyle.visibilitystyle.visibility

Action plan for data protection

There is need to know different was of classifying data, i.e. confidential and restricted data using Umass Amherst.Identification of accurate data through keeping inventory of the sensitive data in all the departmentsKeep the necessitated data and delete the un useful ones

style.visibilitystyle.visibilitystyle.visibilitystyle.visibility

cont’

Understanding the consequences of breaching the security of dataKnowing the strategic procedures of responding to data insecurity incidencesDocumenting the important businesses that requires sensitive allocation of data (Ramanathan, 2015).

style.visibilitystyle.visibilitystyle.visibilitystyle.visibility

Actions to monitor security and privacy violations

After the implementation of HIMS, there might arise some violations intended to cause problems. I would recommend the following actions to monitor every single security issue:Develop strategic measures to curb all violations that might befall the systemHave an alternative method of reinstating the operations for incase the system failsUse of biometrics whenever need be.

style.visibilitystyle.visibilitystyle.visibilitystyle.visibilitystyle.visibility

cont’

Install strong anti-viruses for instance, Kaspersky to avoid attack by viruses to the devices which run the system.develop a remote system (server) which can be relied upon incase the client system fails.Diagnose system set-up whenever the activities of the day has started. This will help in establishing strong connection with the networks and the users for the purpose of reputable results (Kerzner & Kerzner 2017).

style.visibilitystyle.visibilitystyle.visibilitystyle.visibility

Resources

https://hitconsultant.net/2011/12/12/5-ways-healthcare-organizations-can-reduce-security-breaches/https://www.umass.edu/it/support/security/data-protection-action-planhttps://www.healthit.gov/topic/privacy-security-and-hipaa

style.visibilitystyle.visibilitystyle.visibilitystyle.visibility

References

Weaver, C. A., Ball, M. J., Kim, G. R., & Kiel, J. M. (2016). Healthcare information management systems. Cham: Springer International Publishing.Asah, F., & Nielsen, P. (2016). An Integrated Health Management Information System a Missing block in achieving universal health coverage in Cameroon?.Adjerid, I., Acquisti, A., Telang, R., Padman, R., & Adler-Milstein, J. (2015). The impact of privacy regulation and technology incentives: The case of health information exchanges. Management Science, 62(4), 1042-1063.Kotz, D., Gunter, C. A., Kumar, S., & Weiner, J. P. (2016). Privacy and security in mobile health: a research agenda. Computer, 49(6), 22-30.

style.visibilitystyle.visibilitystyle.visibilitystyle.visibilitystyle.visibility

Cont’

Lysyk, M. C. (2014). Practices for Protecting Privacy in Health Research: Perspectives of the Public, Privacy Guidance Documents and REBs (Doctoral dissertation, Université d’Ottawa/University of Ottawa).Ramanathan, T., Schmit, C., Menon, A., & Fox, C. (2015). The role of law in supporting secondary uses of electronic health information. The Journal of Law, Medicine & Ethics, 43(s1), 48-51.Kerzner, H., & Kerzner, H. R. (2017). Project management: a systems approach to planning, scheduling, and controlling. John Wiley & Sons.

style.visibilitystyle.visibilitystyle.visibilitystyle.visibility

Place an Order

Plagiarism Free!

Scroll to Top