Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
26
27
29
30
31
1
2
5
7
8
12
13
14
16
17
21
22
23
24
25
26
27
28
1
Proper Management of Medicare/Medicaid Overpayments to Limit Risk of False Claims
2015-01-28    
1:00 pm - 3:00 pm
January 28, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9AM AKST | 8AM HAST Topics Covered: Identify [...]
EhealthInitiative Annual Conference 2015
2015-02-03 - 2015-02-05    
All Day
About the Annual Conference Interoperability: Building Consensus Through the 2020 Roadmap eHealth Initiative’s 2015 Annual Conference & Member Meetings, February 3-5 in Washington, DC will [...]
Real or Imaginary -- Manipulation of digital medical records
2015-02-04    
1:00 pm - 3:00 pm
February 04, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Orlando Regional Conference
2015-02-06    
All Day
February 06, 2015 Lake Buena Vista, FL Topics Covered: Hot Topics in Compliance Compliance and Quality of Care Readying the Compliance Department for ICD-10 Compliance [...]
Patient Engagement Summit
2015-02-09 - 2015-02-10    
12:00 am
THE “BLOCKBUSTER DRUG OF THE 21ST CENTURY” Patient engagement is one of the hottest topics in healthcare today.  Many industry stakeholders consider patient engagement, as [...]
iHT2 Health IT Summit in Miami
2015-02-10 - 2015-02-11    
All Day
February 10-11, 2015 iHT2 [eye-h-tee-squared]: 1. an awe-inspiring summit featuring some of the world.s best and brightest. 2. great food for thought that will leave you begging [...]
Starting Urgent Care Business with Confidence
2015-02-11    
1:00 pm - 3:00 pm
February 11, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Managed Care Compliance Conference
2015-02-15 - 2015-02-18    
All Day
February 15, 2015 - February 18, 2015 Las Vegas, NV Prospectus Learn essential information for those involved with the management of compliance at health plans. [...]
Healthcare Systems Process Improvement Conference 2015
2015-02-18 - 2015-02-20    
All Day
BE A PART OF THE 2015 CONFERENCE! The Healthcare Systems Process Improvement Conference 2015 is your source for the latest in operational and quality improvement tools, methods [...]
A Practical Guide to Using Encryption for Reducing HIPAA Data Breach Risk
2015-02-18    
1:00 pm - 3:00 pm
February 18, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Compliance Strategies to Protect your Revenue in a Changing Regulatory Environment
2015-02-19    
1:00 pm - 3:30 pm
February 19, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Dallas Regional Conference
2015-02-20    
All Day
February 20, 2015 Grapevine, TX Topics Covered: An Update on Government Enforcement Actions from the OIG OIG and US Attorney’s Office ICD 10 HIPAA – [...]
Events on 2015-02-03
EhealthInitiative Annual Conference 2015
3 Feb 15
2500 Calvert Street
Events on 2015-02-06
Orlando Regional Conference
6 Feb 15
Lake Buena Vista
Events on 2015-02-09
Events on 2015-02-10
Events on 2015-02-11
Events on 2015-02-15
Events on 2015-02-20
Dallas Regional Conference
20 Feb 15
Grapevine
Articles

Dec 03: Safety Is Key to Use of EHR

psychiatric services

Electronic health records (EHRs) have many real or potential advantages, but those need to be balanced against equally real and potential opportunities for breaches of privacy, confidentiality, and security, said speakers at the APA Institute on Psychiatric Services in Philadelphia in October.

Done right, EHRs could help physicians coordinate a patient’s care, reduce prescribing errors and drug interactions, and speed administrative tasks and claims processing, said U.S. Air Force Col. Daniel Balog, an assistant professor of psychiatry at the Uniformed Services University of the Health Sciences in Bethesda, Md.

EHRs could also help patients fill out forms, answer screening protocols such as the PHQ-9, and monitor their health information.

Special issues arise for psychiatrists, Balog noted. On which servers will psychotherapy notes reside, and who will be authorized to access them? How will patients’ concerns about EHR vulnerabilities affect their sense of trust and influence how psychiatrists record diagnostic details?

Privacy is the patient’s right,” said Zebulon Taintor, M.D., a psychiatrist in private practice in New York. “Confidentiality is what the doctor does to keep the patient’s information between doctor and patient. Security is what others do.”

And security is the most problematic area for Taintor. Outsiders, he maintained, want to break into EHRs for three reasons: to steal money, identity, and patient data.

To get money, thieves go after credit-card information and bank-account numbers.

Others look for insurance identification numbers. A stolen Medicare card is worth $100 these days, he said. Identity theft can cause the patient to lose insurance coverage, be asked to pay for health care someone else received, or have their credit rating downgraded.

Less often, adverse medical data about a patient may fuel custody battles, employment background checks, or landlord-tenant feuds, he said.

“Technology is getting ahead of protection, and theft gets easier as data are connected in a chain,” said Taintor. “When doctors connect with a hospital system, for instance, it puts all their data at risk.”

The clinical process may also be affected if a patient fears security breaches. Patients may not disclose previous diagnoses such as cancer, mental illness, or sexually transmitted diseases, for example, worried that such medical information could eventually harm them.

Protecting medical information calls for action by patients, physicians, and organizations, said Taintor.

“Patients should look carefully at their Explanation of Benefits for services they did not receive and should protect their health insurance ID cards,” he stated. “If security is breached, they should notify doctors, insurers, hospitals, the police, and the Federal Trade Commission and then check their credit reports.”

Physicians’ offices must institute good computer security practices, such as cancelling passwords once an employee leaves the job, he pointed out. “Think as if you are an organization.”

That’s what Taintor does. When he works with an actual organization, he follows all its health information policies and procedures. In his private practice, he files patient data in a computer that is never connected to the Internet. He uses different passwords when possible and turns off all computers when not in direct use.

And perhaps the field missed another alternative, he said. At a panel on EHRs at the APA annual meeting in 2012, Taintor asked who in the audience would prefer adopting an old tried-and-true system for ensuring medical-record security like that used by the Department of Veterans Affairs. Everyone in the room applauded. ■

source