Herzing University Online Wk 5 Electronic health record EHR Paper

User Generated

nyxehrtre0831

Health Medical

Herzing University Online

Description

  • Perform a web search to find and review EHRs.
  • Select three (3) preferred EHRs.
  • Compare each of the selected EHRs, using the attached assessment form.
  • Fill in the right-hand column with your observations/assessment on why your EHR meets/does not meet each standard. Based on the depth of the information provided, you may have to use the knowledge you’ve gained thus far to make assumptions about the EHR functions. (Tip - Add three columns to the far right of the assessment form, one for each selected vendor)
  • Write a 1-page summary to accompany your assessment form. The summary should include a comparison of the key functions and factors for the EHR.
  • Your assessment form should be in Microsoft Word or Microsoft Excel format. Your summary should be in Microsoft Word format.
  • Cite all sources in APA format.
  • Submit your assessment form and summary for grading.
  • Reminder: You must upload your completed documents using Browse My Computer. Then, hit the Submit button to successfully complete the assignment submission process. Do not copy and paste text into the text box.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

These standards are taken from the HL7 Functional Standards for an EHR document.
It is important to note that the Information Infrastructure standards below represent only a small portion of the entire standards.
ID

Function Name

I.1

Information
Infrastructure

I.1.1.0

EHR Information
Security

I.1.1.1

Entity
Authentication

I.1.1.5

Patient Privacy

I.1.1.5.3

Advisement of
Patient Privacy
Rights

Function Statement

Functional Description

Secure the EHR information.

The EHRS is required to manage
EHR information securely. For this,
all EHRS applications must ensure the
authentication, authorization of
entities (e.g. user and applications)
and control access to the EHR
information.
Authenticate EHRS users and/or Both users and application are subject
entities before allowing access to authentication. EHRS application
to an EHRS.
must provide mechanisms for users
and applications to be authenticated.
Users will have to be authenticate
when they attempt to use the
application, the applications
themselves must authenticate
themselves before accessing EHR
information managed by other
application or remote EHR Systems.
Examples of entity authentication are:
• Username/ password • Digital
certificate • Secure token • Biometrics
Protect the patient’s privacy
Functionality allows for compliance
according to personal, local, and with personal, local, and national
national rules.
rules.

Record that the patient was
informed of current privacy
policies practices.

The EHRS will allow for the
dispensing and tracking of patient
education regarding current privacy
policies and procedures.

Rationale

Your Evaluation – Discuss why the EHR meets/does not meet each standard

1. Support delivery of effective
healthcare 2. Improve patient safety
3 Facilitate management of chronic
conditions 4. Improve efficiency 5.
Facilitate self-health management 6.
Ensure privacy, confidentiality

McKesson
The system meets the standards since
authenticated users only access the data.
Therefore the information is safe.

CureMD
The system meets the security standards
and allows its users to access information
through voice recognition.

Cerner's Power-Chart Ambulatory
The EHR meets the security and privacy
standards. Only the end-users can access
the system using a password.

1. Support delivery of effective
healthcare 2. Improve patient safety
3 Facilitate management of chronic
conditions 4. Improve efficiency 5.
Facilitate self-health management 6.
Ensure privacy, confidentiality

For one to access the McKesson system,
he must possess a digital certificate.
Therefore, the system meets the general
authorization requirements of EHR.

To access the system, one must use the
biometrics used when registering for the
CureMD system. Thus, authentication
standards are met.

The system requires a secure token or
username to access the stored information.
If the password is incorrect, the system
never opens. Thus, the authentication
requirements of EHR are met.

1. Support delivery of effective
healthcare 2. Improve patient safety
3 Facilitate management of chronic
conditions 4. Improve efficiency 5...


Anonymous
Really useful study material!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags