SlideShare une entreprise Scribd logo
1  sur  8
EMR Policy & Procedures By Shannon Hullum
Passed by Congress in 1996 to set a national standard for electronic transfers of health data. To protect the privacy of medical information To protect payment information Policies and Procedures Purposes Confidentiality Authenticity of users Timeliness and accuracy of data entry Failure to comply results in disciplinary actions Regulations - Purposes Health Insurance Portability and Accountability Act (HIPPA)  An accent, click to edit the text inside. An accent, click to edit the text inside.
Proprietor of EMR Patients may access, copy, and request amendments to their medical records via request to the institution that created the file
Health information management (him) Medical staff This department is responsible for the safety and security of EMRs Deals with maintenance, accessibility, data integrity and quality, and retention of data Protects records from unauthorized or accidental changes Petitioned for patient information Assures proper collection, gathering, and presentation of records for legal and administrative use Responsible for documentation entered into the EMR The information must be timely,  accurate, pertinent, and complete Staffing Responsibilities
Employee Accessibility & Security Standards Procedures should be strictly enforced Limited to those directly involved with patient care Records Secure passwords and or access codes IDs Full signatures and or initials for each entry  Signatures Data exclusively available to personnel or department according to need, firewalls for outside access, audit trails for user tracking  Security
Discipline Breech Investigation Consequences
Corrections Instead of a deletion, an addendum is added to the existing record Documents must include a signature, date, time, and reason for amendment Advantages Enhances safety, value, and efficiency of patient care Accuracy of Records
References Legal medical record standards. (2008). Retrieved from http://www.ucopedu/ucophome/coordrev/.../legal-medical-record-policy.pdf HIPPA basics: Medical privacy in the electronic age/ Privacy rights clearinghouse. (2011). Retrieved from http://www.privacyrights.org/fs/fs8a-hipaa.htm

Contenu connexe

Tendances

Electronic Medical Record
Electronic Medical RecordElectronic Medical Record
Electronic Medical Recordadnanemed
 
Mha690 healthcare confidentiality
Mha690 healthcare confidentialityMha690 healthcare confidentiality
Mha690 healthcare confidentialityasharp625
 
Introduction hippaa
Introduction hippaaIntroduction hippaa
Introduction hippaaTina Peña
 
Hipaa training by p. lynch
Hipaa training by p. lynchHipaa training by p. lynch
Hipaa training by p. lynchplynch2012
 
Mha 690 ppt hipaa for healthcare professionals
Mha 690 ppt hipaa for healthcare professionalsMha 690 ppt hipaa for healthcare professionals
Mha 690 ppt hipaa for healthcare professionalslee5lee
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcherEmed32
 
Health information security system
Health information security systemHealth information security system
Health information security systemDiana Fernandez
 
Health information system security
Health information system securityHealth information system security
Health information system securitykristinleighclark
 
Helium EHR Overview
Helium EHR OverviewHelium EHR Overview
Helium EHR Overviewemrceo
 
Electronic Health Records Integration with Corrections Case Management
Electronic Health Records Integration with Corrections Case ManagementElectronic Health Records Integration with Corrections Case Management
Electronic Health Records Integration with Corrections Case ManagementDavid Martin
 
About HIMSS (Healthcare Information and Management Systems Society) by Dr.Mah...
About HIMSS (Healthcare Information and Management Systems Society) by Dr.Mah...About HIMSS (Healthcare Information and Management Systems Society) by Dr.Mah...
About HIMSS (Healthcare Information and Management Systems Society) by Dr.Mah...Healthcare consultant
 
TaylorWk1d2assignment
TaylorWk1d2assignmentTaylorWk1d2assignment
TaylorWk1d2assignmentmya1743
 
Confidentiality presentation(1)
Confidentiality presentation(1)Confidentiality presentation(1)
Confidentiality presentation(1)Kimberlin1
 

Tendances (17)

Electronic Medical Record
Electronic Medical RecordElectronic Medical Record
Electronic Medical Record
 
Mha690 healthcare confidentiality
Mha690 healthcare confidentialityMha690 healthcare confidentiality
Mha690 healthcare confidentiality
 
Introduction hippaa
Introduction hippaaIntroduction hippaa
Introduction hippaa
 
Hipaa training by p. lynch
Hipaa training by p. lynchHipaa training by p. lynch
Hipaa training by p. lynch
 
Mha 690 ppt hipaa for healthcare professionals
Mha 690 ppt hipaa for healthcare professionalsMha 690 ppt hipaa for healthcare professionals
Mha 690 ppt hipaa for healthcare professionals
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcher
 
Health information security system
Health information security systemHealth information security system
Health information security system
 
Health information system security
Health information system securityHealth information system security
Health information system security
 
HIPAA Presentation
HIPAA PresentationHIPAA Presentation
HIPAA Presentation
 
Understanding the HIPPA Act
Understanding the HIPPA ActUnderstanding the HIPPA Act
Understanding the HIPPA Act
 
Helium EHR Overview
Helium EHR OverviewHelium EHR Overview
Helium EHR Overview
 
What is hipaa
What is hipaaWhat is hipaa
What is hipaa
 
Electronic Health Records Integration with Corrections Case Management
Electronic Health Records Integration with Corrections Case ManagementElectronic Health Records Integration with Corrections Case Management
Electronic Health Records Integration with Corrections Case Management
 
About HIMSS (Healthcare Information and Management Systems Society) by Dr.Mah...
About HIMSS (Healthcare Information and Management Systems Society) by Dr.Mah...About HIMSS (Healthcare Information and Management Systems Society) by Dr.Mah...
About HIMSS (Healthcare Information and Management Systems Society) by Dr.Mah...
 
HIPAA
HIPAAHIPAA
HIPAA
 
TaylorWk1d2assignment
TaylorWk1d2assignmentTaylorWk1d2assignment
TaylorWk1d2assignment
 
Confidentiality presentation(1)
Confidentiality presentation(1)Confidentiality presentation(1)
Confidentiality presentation(1)
 

Similaire à Emr policies and procedures ppt

Unit-IV EMR b.sc II sem 2022.pptx
Unit-IV EMR b.sc II sem 2022.pptxUnit-IV EMR b.sc II sem 2022.pptx
Unit-IV EMR b.sc II sem 2022.pptxanjalatchi
 
Why is data privacy a crucial aspect of using Electronic Records.pptx
Why is data privacy a crucial aspect of using Electronic Records.pptxWhy is data privacy a crucial aspect of using Electronic Records.pptx
Why is data privacy a crucial aspect of using Electronic Records.pptxMocDoc
 
Electronic Health Record (EHR)
Electronic Health Record (EHR)Electronic Health Record (EHR)
Electronic Health Record (EHR)sourav goswami
 
Records Management Principles for Community Health
Records Management Principles for Community HealthRecords Management Principles for Community Health
Records Management Principles for Community Healthnstanzer
 
HIPPA and EMR Core Education Training
HIPPA and EMR Core Education TrainingHIPPA and EMR Core Education Training
HIPPA and EMR Core Education TrainingAndreaSchullerMPACBI
 
Electronic health records
Electronic health recordsElectronic health records
Electronic health recordsJocelyn Garcia
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxamartya2087
 
Maintaining patient confidentiality
Maintaining patient confidentialityMaintaining patient confidentiality
Maintaining patient confidentialityLooney47
 
Unit-IV EMR b.sc II sem 2022.pptx
Unit-IV EMR b.sc II sem 2022.pptxUnit-IV EMR b.sc II sem 2022.pptx
Unit-IV EMR b.sc II sem 2022.pptxanjalatchi
 
1Running head PATIENT DATA15Running head PATIENT DATA.docx
1Running head PATIENT DATA15Running head PATIENT DATA.docx1Running head PATIENT DATA15Running head PATIENT DATA.docx
1Running head PATIENT DATA15Running head PATIENT DATA.docxfelicidaddinwoodie
 
Poster Peg And Sirisha Final
Poster   Peg And Sirisha FinalPoster   Peg And Sirisha Final
Poster Peg And Sirisha Finalpegscheible
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarcEtienne6
 
How to Build HIPAA Compliant Healthcare Apps: Everything You Should Know!
How to Build HIPAA Compliant Healthcare Apps: Everything You Should Know!How to Build HIPAA Compliant Healthcare Apps: Everything You Should Know!
How to Build HIPAA Compliant Healthcare Apps: Everything You Should Know!default default
 
Mha 690 presentation hippa
Mha 690 presentation hippaMha 690 presentation hippa
Mha 690 presentation hippabelle0508
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality12ort
 
UCLA compliance training
UCLA compliance trainingUCLA compliance training
UCLA compliance trainingTCromwell01
 

Similaire à Emr policies and procedures ppt (20)

Unit-IV EMR b.sc II sem 2022.pptx
Unit-IV EMR b.sc II sem 2022.pptxUnit-IV EMR b.sc II sem 2022.pptx
Unit-IV EMR b.sc II sem 2022.pptx
 
HIPAA Complaince
HIPAA ComplainceHIPAA Complaince
HIPAA Complaince
 
Why is data privacy a crucial aspect of using Electronic Records.pptx
Why is data privacy a crucial aspect of using Electronic Records.pptxWhy is data privacy a crucial aspect of using Electronic Records.pptx
Why is data privacy a crucial aspect of using Electronic Records.pptx
 
Electronic Health Record (EHR)
Electronic Health Record (EHR)Electronic Health Record (EHR)
Electronic Health Record (EHR)
 
Records Management Principles for Community Health
Records Management Principles for Community HealthRecords Management Principles for Community Health
Records Management Principles for Community Health
 
HIPPA and EMR Core Education Training
HIPPA and EMR Core Education TrainingHIPPA and EMR Core Education Training
HIPPA and EMR Core Education Training
 
Dr. Obumneke Amadi-Onuoha Scripts- 8
Dr. Obumneke Amadi-Onuoha Scripts- 8Dr. Obumneke Amadi-Onuoha Scripts- 8
Dr. Obumneke Amadi-Onuoha Scripts- 8
 
Electronic health records
Electronic health recordsElectronic health records
Electronic health records
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
 
Maintaining patient confidentiality
Maintaining patient confidentialityMaintaining patient confidentiality
Maintaining patient confidentiality
 
Unit-IV EMR b.sc II sem 2022.pptx
Unit-IV EMR b.sc II sem 2022.pptxUnit-IV EMR b.sc II sem 2022.pptx
Unit-IV EMR b.sc II sem 2022.pptx
 
1Running head PATIENT DATA15Running head PATIENT DATA.docx
1Running head PATIENT DATA15Running head PATIENT DATA.docx1Running head PATIENT DATA15Running head PATIENT DATA.docx
1Running head PATIENT DATA15Running head PATIENT DATA.docx
 
Poster Peg And Sirisha Final
Poster   Peg And Sirisha FinalPoster   Peg And Sirisha Final
Poster Peg And Sirisha Final
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentation
 
Mha690 disc 2 week 1
Mha690 disc 2 week 1Mha690 disc 2 week 1
Mha690 disc 2 week 1
 
How to Build HIPAA Compliant Healthcare Apps: Everything You Should Know!
How to Build HIPAA Compliant Healthcare Apps: Everything You Should Know!How to Build HIPAA Compliant Healthcare Apps: Everything You Should Know!
How to Build HIPAA Compliant Healthcare Apps: Everything You Should Know!
 
Mha 690 presentation hippa
Mha 690 presentation hippaMha 690 presentation hippa
Mha 690 presentation hippa
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
UCLA compliance training
UCLA compliance trainingUCLA compliance training
UCLA compliance training
 

Dernier

Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 

Dernier (20)

Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 

Emr policies and procedures ppt

  • 1. EMR Policy & Procedures By Shannon Hullum
  • 2. Passed by Congress in 1996 to set a national standard for electronic transfers of health data. To protect the privacy of medical information To protect payment information Policies and Procedures Purposes Confidentiality Authenticity of users Timeliness and accuracy of data entry Failure to comply results in disciplinary actions Regulations - Purposes Health Insurance Portability and Accountability Act (HIPPA) An accent, click to edit the text inside. An accent, click to edit the text inside.
  • 3. Proprietor of EMR Patients may access, copy, and request amendments to their medical records via request to the institution that created the file
  • 4. Health information management (him) Medical staff This department is responsible for the safety and security of EMRs Deals with maintenance, accessibility, data integrity and quality, and retention of data Protects records from unauthorized or accidental changes Petitioned for patient information Assures proper collection, gathering, and presentation of records for legal and administrative use Responsible for documentation entered into the EMR The information must be timely, accurate, pertinent, and complete Staffing Responsibilities
  • 5. Employee Accessibility & Security Standards Procedures should be strictly enforced Limited to those directly involved with patient care Records Secure passwords and or access codes IDs Full signatures and or initials for each entry Signatures Data exclusively available to personnel or department according to need, firewalls for outside access, audit trails for user tracking Security
  • 7. Corrections Instead of a deletion, an addendum is added to the existing record Documents must include a signature, date, time, and reason for amendment Advantages Enhances safety, value, and efficiency of patient care Accuracy of Records
  • 8. References Legal medical record standards. (2008). Retrieved from http://www.ucopedu/ucophome/coordrev/.../legal-medical-record-policy.pdf HIPPA basics: Medical privacy in the electronic age/ Privacy rights clearinghouse. (2011). Retrieved from http://www.privacyrights.org/fs/fs8a-hipaa.htm