Historically, the Electronic Health Records has existed since 1960’s. Notably, Larry Weed realized there was a dire need for a third party to verify the diagnosis issued by physicians independently. The above-mentioned need compelled Weed to invent a Problem Oriented Medical Record that was to assist in medical practice. Reportedly, in 1972, Regenstreif also played a role in the advancement of the EHR. Interestingly, the said institute developed the first medical record system (Carter, 2008). However, the physicians did not embrace the specified technology. Finally, in 1991 the institute of medicine suggested that comes the year 2000; every physician should be using computers in their medical operation in the betterment of medical healthcare.
Notably, the primary purpose of EHR is safely to store electronic information of patients or country population. The mentioned information can be cross-shared by varied healthcare settings. The fact is, both the patients and the organizations are in a position to access the electronic information. Also, the same information can be of used by the federal government in making significant decisions.
Apparently, EHR has myriad benefits to both medical practitioners and patients. The EHR systems improve efficiency and save time whilst attending to patients since the data is retrievable. Moreover, the system enables the patients to access their medical records. Conversely, the EHR is subjected to risk as patient’s information can be accessed by the unauthorized individuals. Also, technical failure coupled with network failure inhibits the system from function.
There are legal concerns surrounding the implementation of EHR. During the transition from paperwork to an electronic system, patient information might be inaccurately captured leading to admission of errors. Consequently, the physician might be misled by the error to administer a wrong diagnosis (Schwab & Gelfman, 2005). Secondly, the mentioned system can be accessed by unauthorized persons. Prevalently, Centre for Medicare and Medicaid services together with HIM professionals are involved in the transfer of data to the EHR incentive programs and protection of data respectively.
Yes, EHR must be completely protected from any unauthorized accessibility. The protection can be conducted by the use passwords and PIN numbers to impede the entrance of unauthorized persons. Secondly, the usage of the audit trail will assist various health centers that use EHR to have a glimpse of who evaluated the system, a person who made the changes and the time of the mentioned changes. Thirdly, the usage of the encryption will protect the stored data and only permit the persons who can unlock the set encryption (Roach, 2006).
HIPAA Security Rule gives a synopsis of the security rule. The mentioned security rule includes the person who is covered by EHR. Secondly, HIPAA Security Rule discloses the information protected. Lastly, the mentioned Security Rule ensures enough caution is installed to protect the electronic health information. The HIPAA Security Rule protects the information contained in the EHR, and this means the information of both the patients and the organization are safe and secure.
Yes, EHR is accepted in the legal cases. The procedure starts by authentication of the information provided by EHR. The certification process will then take place; it affirms that the paper provided is a duplicate of the original. Thirdly, the Health Information Manager will be guided by the federal laws and regulations on the information that warranty disclosure. Fourthly, the EHR information is then disclosed to the discovery process. Lastly, the information obtained is admissible to the law court. Notably, only the authorized personnel are allowed to print records needed in the lawsuit. The above process is very simple; it only requires knowledge in federal laws and regulations.
As an HIPAA privacy officer, I am mandated to ensure the information in the EHR is not compromised or accessed by unauthorized personnel. A breach in the system indicates improper use of the protected information of anything that compromised the confidentiality of EHR. I will train the staff to report incidents or cases that has led to unauthorized accessibility of the EHR system or inappropriate use of the mentioned system. The reported collected will enable me to conducted a risk assessment leading to an effective, secure and efficient EHR.
References
Carter, J. M. (2008). Electronic Health Records: A Guide for Clinicians and Administrators. USA: American College of Physicians.
Schwab, N. C., & Gelfman, M. H. (2005). Legal Issues in Schools Health Services: A Resource for School Administrative, School Attorneys, School Nurses. USA: iUniverse
Roach, W. H. (2006). Medical Records and the Law. UK: Jones & Bartlett Learning