The security of medical informations and specificities of the patient

Courses Number: 00008

Introduction:
The protection of the privacy of patients and the insurance of their health information is one of the basic requirements for the programs of electronic health records. Referred to own stimulus programs of electronic health records for health care and medical assistance as a "meaningful use software" in this course. On the other hand, the actual measures of privacy and security protects your medical and clinical business of civil and criminal penalties. It may be available in hospitals at the moment on some special privacy and security measures, such as examination rooms, the privacy practices of notice, or a safe way to send patient information to the billing, but this is not enough.
 Ensuring the privacy and security of health information, including the information that exist in EHR, is the main element in building trust that is required to achieve the benefits inherent in the electronic exchange of health information. If certain people or certain other participants in the network do not have confidence in the electronic exchange of information because of the potential or actual risks to electronic health information or the completeness and accuracy of this information.

First part: What is privacy and security and what are the reasons of their attention.

Second part: privacy and security and meaningful use.
- The basic measure 12.
- Make sure you comply with the requirements of privacy meaningful use.
- The basic measure 14.
- Make sure you comply with security requirements for meaningful use.
- Identify the risks that threaten your medical organization.
- What is the analysis of security risks?
- Mitigate risks that threaten the medical organization.
- Managing the five risks that involves the security elements.
- The threat of cyber-attacks.
- Our worst enemy.

Third part: Plan of 10 steps to respond to the parts concerning with the privacy and security of the meaningful use.
- First step: to confirm that you " Believer entity."
- Second Step: Doing leadership roles.
- Third Step: documenting the values ​​of your operations, your results, and your actions.
- Forth Step: analyze security threats.
-Fifth Step: develop an action plan.
-Sixth Step: manage risks and mitigate it.
    - Private settings to the security of you electronic health record information.
    - Policies and written procedures.
    - Continuous monitoring of your security infrastructures.
- Seventh Step: prevention through education and training.
    - Education and training of the workforce.
    - Make the protection of patient information a part of your usual work.
- Eighth Step: communication with patients.
    - To fulfill the responsibilities towards the rights of patients in health information.
    - Online communication with patients.
- Ninth Step: Update the trading partner agreements
- Tenth Step: ratification of the target of meaningful use of security threats analysis.

Forth Part: the integration of privacy and security in the medical organization.
- Understanding of patients' rights in health information and responsibilities of health care providers.
- US laws as an example restriction on the use of patient information and disclosure.
- How to keep your health information safe for your patients.
- The security rules of the law subjecting Health Insurance Portability and US accounting.
- Work with vendors of electronic health records and medical information technology.
-What can be done in the case of breach of protected health information is secured.
- Breach notification rule.
- Compliance with the laws and other requirements.

Fifth part: Privacy and security resources.
Course includes the following:
- regulatory information and guidance Booklet.
- Meaningful use booklet - Privacy and security.
- Tools booklet.
- Releases booklet, facts papers.
- Booklet of Relations with patients and the privacy and the security of health information.

Duration of the course:
  45 hours of training.

Don't have an account yet? Register Now!

Sign in to your account