Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
26
27
29
30
31
1
2
5
7
8
12
13
14
16
17
21
22
23
24
25
26
27
28
1
Proper Management of Medicare/Medicaid Overpayments to Limit Risk of False Claims
2015-01-28    
1:00 pm - 3:00 pm
January 28, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9AM AKST | 8AM HAST Topics Covered: Identify [...]
EhealthInitiative Annual Conference 2015
2015-02-03 - 2015-02-05    
All Day
About the Annual Conference Interoperability: Building Consensus Through the 2020 Roadmap eHealth Initiative’s 2015 Annual Conference & Member Meetings, February 3-5 in Washington, DC will [...]
Real or Imaginary -- Manipulation of digital medical records
2015-02-04    
1:00 pm - 3:00 pm
February 04, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Orlando Regional Conference
2015-02-06    
All Day
February 06, 2015 Lake Buena Vista, FL Topics Covered: Hot Topics in Compliance Compliance and Quality of Care Readying the Compliance Department for ICD-10 Compliance [...]
Patient Engagement Summit
2015-02-09 - 2015-02-10    
12:00 am
THE “BLOCKBUSTER DRUG OF THE 21ST CENTURY” Patient engagement is one of the hottest topics in healthcare today.  Many industry stakeholders consider patient engagement, as [...]
iHT2 Health IT Summit in Miami
2015-02-10 - 2015-02-11    
All Day
February 10-11, 2015 iHT2 [eye-h-tee-squared]: 1. an awe-inspiring summit featuring some of the world.s best and brightest. 2. great food for thought that will leave you begging [...]
Starting Urgent Care Business with Confidence
2015-02-11    
1:00 pm - 3:00 pm
February 11, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Managed Care Compliance Conference
2015-02-15 - 2015-02-18    
All Day
February 15, 2015 - February 18, 2015 Las Vegas, NV Prospectus Learn essential information for those involved with the management of compliance at health plans. [...]
Healthcare Systems Process Improvement Conference 2015
2015-02-18 - 2015-02-20    
All Day
BE A PART OF THE 2015 CONFERENCE! The Healthcare Systems Process Improvement Conference 2015 is your source for the latest in operational and quality improvement tools, methods [...]
A Practical Guide to Using Encryption for Reducing HIPAA Data Breach Risk
2015-02-18    
1:00 pm - 3:00 pm
February 18, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Compliance Strategies to Protect your Revenue in a Changing Regulatory Environment
2015-02-19    
1:00 pm - 3:30 pm
February 19, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Dallas Regional Conference
2015-02-20    
All Day
February 20, 2015 Grapevine, TX Topics Covered: An Update on Government Enforcement Actions from the OIG OIG and US Attorney’s Office ICD 10 HIPAA – [...]
Events on 2015-02-03
EhealthInitiative Annual Conference 2015
3 Feb 15
2500 Calvert Street
Events on 2015-02-06
Orlando Regional Conference
6 Feb 15
Lake Buena Vista
Events on 2015-02-09
Events on 2015-02-10
Events on 2015-02-11
Events on 2015-02-15
Events on 2015-02-20
Dallas Regional Conference
20 Feb 15
Grapevine
Articles

May 19 : Emr – The Importance of Hipaa Compliance

healthcare

HIPAA primarily focuses on technology and security standards as they apply to all electronic exchanges of confidential patient information through electronic medical records (EMRs).

Section 264 of HIPAA, the Privacy Rule, pertains to all patients’. Protected health information (PHI) in any EMR format. Electronic, written, verbal. Image. This rule applies to three types of covered entities and their business associates: health care plans, clearinghouses. Providers.

Health care providers initially concentrated on electronic data interchange by submitting standardized electronic claims via their practice management systems to clearinghouses or insurance companies. Only a handful of administrative parties were privy to a limited amount of patient information, such as diagnosis or procedural codes.

However, as a result of providers beginning to use EMRs, e-prescribing. Online communications, protected health information is available to several clinical and administrative personnel at multiple locations, round the clock. Although security and privacy standards are interchangeable terms, it’s the security standard that dominates HIPAA compliance in regards to EMRs.

Unfortunately, there are numerous limitations which prevent comprehensive compliance with the Privacy Rule, including factors such as a lack of resources, administrative support. Interoperability between systems, as well as budget constraints to train new staff.

This lag in HIPAA compliance comes at a time when patients are becoming more aware of their rights to understand and control how their health information is used and disclosed. The most frequent security problems involve small physician practices, due to a lack of adequate safeguards, such as exposure to computer screens. Other security vulnerabilities involve practices engaging in the improper disposal of PHI.

In order to avoid misuse or improper access of PHI, practices and their business associates must address security concerns involving firewalls, password protection, encryption. Related considerations. The government has also ensured HIPAA compliance by implementing HIPAA audits. The audits focus on specific issues like policies and procedures for ensuring privacy, confidentiality of the PHI of patients. The evaluation of security violation action plans. Other security measures including employee background checks, internal restrictions on accessibility of private information and physical security measures are all examined to determine if they fit within the guidelines established under HIPAA.

Considering the initial focus of the HIPAA audits and the ideas behind the recent attempts at modifying EMR legislation, we can begin to see forthcoming changes to the guidelines in dealing with EMRs. The question now is when’ll these changes be implemented?

Source