Question EHR Standards

Instructions

A local internal medicine and cardiology practice has recently implemented their new EHR system from Allscripts. Some relatively minor building renovations were required, and additional hardware was installed. Extensive training sessions and onsite support staff spent several months meeting with all users. Super users and managers were identified and given additional training.During the testing phases, there were several glitches that needed to be addressed. Because of the practices long-standing relationship with a local hospital, they had to electronically communicate seamlessly to coordinate ongoing patient care throughout the healthcare continuum.The EHR from Cerner is used by the hospital. Technology and software issues had to be addressed to ensure interoperability so that complete patient information was transmitted securely. The application of the HL7 messaging standards were evaluated for each system and then the firewall and encryption software were adapted to meet data integrity and secure transmission requirements per the required standards.The patient portal for the physician practice had to be coordinated with the hospitals EHR so that patients were able to see information generated from their hospital admission. The cardiologists and internal medicine physicians were incorporating this information into their outpatient treatment plan. These issues have been addressed and care coordination has become more efficient thanks in part to the new electronic processes incorporated into both EHR systems.QUESTIONS:1. Explain what types of standards protect health data and information systems from unauthorized access.2. Discuss how this might hinder the access from legitimate authorized HCOs or other sources.

Answer

Types of standards that protect health data and information systems from unauthorized access Fundamentally, all health care organizations need properly strategized security protocols to undertake in protecting health care data and information from third parties. These measures include;Network intrusion detection systems: NIDS scrutinize traffic to and from devices accessed on the network. The system conducts a passing traffic analysis on the entire subnet and compares the traffic passed to the library of documented attacks on the subnets (Hersh, 2014)Antivirus systems: These are computer programs that prevent, detect and eliminate malware (Martnez-Prez et al., 2015).Firewalls: Firewalls primarily prevent unauthorized access via private networks.Encryptions: Encryptions converts information...

To avoid plagiarism, part of the answer is hidden. Click on the button below to order the full answer.
Order Answer Back
Price Calculator
Manage orders
Why we are Ranked the best
  • Unlimited Revisions
  • Free 24/7 Support and chat
  • Money back guaranteed
  • Low prices with discounts
  • Experienced writers.
  • Free Unlimited support

Hear from our customers

Get a quote Chat with support Find an expert Frequently asked questions