1 / 11

System Security & Patient Confidentiality

System Security & Patient Confidentiality. General Lesson 1. Objectives. Following completion of this lesson you will be able to: . Define confidentiality . Identify types of data that must be kept confidential . State who has access to confidential patient information

zora
Télécharger la présentation

System Security & Patient Confidentiality

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. System Security & Patient Confidentiality General Lesson 1

  2. Objectives Following completion of this lesson you will be able to: . Define confidentiality . Identify types of data that must be kept confidential . State who has access to confidential patient information . List the ways in which the Meditech System protects both patients and system users.

  3. Confidentiality Every hospital employee, attending physician, and contractor with access to patient-identifiable data has a responsibility to protect patient confidentiality. Safeguarding patient information applies to all forms of patient data – written documents, conversations, computer information and any other electronic forms such as faxes, e-mails or pager messages.

  4. You may view information on a “need to know” basis only. Hospital staff members who have access to patient data may not use the Meditech system to view information on any patients for which they do not have direct care responsibilities.

  5. Employees must contact the Medical Records Department for authorized request to view his/her medical record Employees who currently are or have been patients in this facility and who have access to patient data must sign a release prior to using Meditech system to view their own medical information.

  6. Unattended Computers Personal Computers (PCs) are available for authorized access throughout the hospital. Many of them are in areas that are accessible by patients and their visitors. You must not leave a computer display screen unattended with patient information in view.

  7. Meditech Security While computer technology makes patient information available to a wide range of hospital associates, it also protects both the staff member and the patient through a number of security measures.

  8. User Ids and Passwords Every Meditech user has a unique User ID and Password that identify him or her to the system. The Password protects you by ensuring that only you can enter an order or documentation with you User ID.

  9. Audit Trials The Meditech System is audited regularly in order to insure that the system is being used appropriately. The audits confirm that you ID was used to review only the records of patients for whom you had direct care responsibility.

  10. System “Time-outs” Be sure to always sign off of the Meditech system before you leave the computer in order to ensure that your work is saved and patient information is kept confidential. The Meditech system is designed to automatically sign off if it is left unattended for a prolonged period of time. Be aware that this could cause you to lose unsaved work.

  11. Summary You have completed the lesson, System Security and Patient Confidentiality. . Everyone must protect patient confidentiality . Information that must be kept confidential includes computer information and any other electronic forms such as faxes, e-mails or pager messages . You may only view information about patients for whom you have direct care responsibilities . You may not view your own records without permission . Dispose of confidential paper documents in containers marked for shredding . Audits are performed regularly.

More Related