DEVELOPING A PERSONALLY CONTROLLED HEALTH RECORD (PCHR) USING MICROSOFT VISUAL C# SESSION 9 SUMMARY.

Slides:



Advertisements
Similar presentations
System Security & Patient Confidentiality General Lesson 1.
Advertisements

1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Westbrook Technologies from Document Management’s Role in HIPAA.
CHAPTER © 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2 The Use of Health Information Technology in Physician Practices.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
System Design System Design - Mr. Ahmad Al-Ghoul System Analysis and Design.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
M. Guymon Pleasant Grove High School Spring 2003 Ethics & Computer Technology Day 18.
Click a NOTUS Suite- product for a short description NOTUS REGIONAL NOTUS Regional helps regions perform the tasks related to the reimbursement of providers.
1 Lesson 14 Sharing Documents Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Lesson 1-Introducing Basic Network Concepts
2 The Use of Health Information Technology in Physician Practices.
Developing a Records & Information Retention & Disposition Program:
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 3 Introduction and Setup.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 9 Tests, Procedures, and Codes.
Management of Information and Communication
Operating Systems.
EMRs, EHRs, PHRs, questions and answers
Electronic Health Records
ELECTRONIC MEDICAL RECORDS By Group 5 members: Kinal Patel David A. Ronca Tolulope Oke.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 5 Personal Health Records Electronic Health Records for Allied.
The University of Kansas Medical Center Shadow Experience Training.
MS Access Advanced Instructor: Vicki Weidler Assistant:
By: Piyumi Peiris 11 EDO. Swipe cards are a common type of security device used by many people. They are usually a business-card-sized plastic card with.
LMR Fall Release 11/2/2012. Notes: Placeholders and Accelerator Keys Users of the LMR have requested a way to define a placeholder within a Note or Custom.
© 2009 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Career Education Computers in the Medical Office Chapter 2: Information Technology.
Protected Health Information (PHI). Privileged Communication An exchange of information between two individuals in a confidential relationship. (Examples:
BioMedical Computing and Standards. BioMedical Computing Medical Equipment Cellular and system simulation Data mining for medical correlations Determining.
Chapter 11 Databases. 11 Chapter 11: Databases2 Chapter Contents  Section A: File and Database Concepts  Section B: Data Management Tools  Section.
Topics Covered: Data preparation Data preparation Data capturing Data capturing Data verification and validation Data verification and validation Data.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 8 The Personal Health Record.
The Use of Health Information Technology in Physician Practices
NHIN Direct Project Communications Work Group Messages for Physicians August 24, 2010.
Ethics & Computer Essentials. R. Stewart Fayetteville High School Ethics A set of principles of right conduct A theory or a system of.
Ethics & Computer Technology. Ethics are…  A set of principles of right conduct.  A theory or a system of moral values.  The rules or standards.
HIPAA PRIVACY AND SECURITY AWARENESS.
Health Information Technology Basics January 8, 2011 by Leola McNeill adapted from Information Technology Basics by June 2009, Kayla Calhoun & Dr. Frank.
University Health Care Computer Systems Fellows, Residents, & Interns.
UNIT 8 Seminar.  According to Sanderson (2009), the Practice Partner is an electronic health record and practice management program for ambulatory practices.
The potential to bring huge benefits to Patients..
* Property of STI Page 1 of 18 Software: Systems and Applications Basic Computer Concepts Software  Software: can be divided into:  systems software.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
Working with HIT Systems
School of Health Sciences Week 8! AHIMA Practice Briefs Healthcare Delivery & Information Management HI 125 Instructor: Alisa Hayes, MSA, RHIA, CCRC.
Project MED INF 403 DL Winter 2008 Group 3. Group Members Michael Crosswhite Maureen Farrell Julia Hernandez R Steven McDonald Jennifer Ogg David Robbins.
Component 3-Terminology in Healthcare and Public Health Settings Unit 16-Definitions and Concepts in the EHR This material was developed by The University.
ONE® Pages Training Presentation North York General Hospital.
R. Stewart Fayetteville High School Ethics & Computer Technology Day 18.
PCI-DSS: Guidelines & Procedures When Working With Sensitive Data.
1 Lesson 14 Sharing Documents Computer Literacy BASICS: A Comprehensive Guide to IC 3, 4 th Edition Morrison / Wells.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 5 The Patient Chart.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
DEVELOPING A PERSONALLY CONTROLLED HEALTH RECORD (PCHR) USING MICROSOFT VISUAL C# SESSION 1 BACKGROUND.
Citrix MetaFrame Conferencing Manager 3.0 Codename – “Opal” Release Date – April 27, 2004.
Terminology in Healthcare and Public Health Settings Electronic Health Records Lecture b – Definitions and Concepts in the EHR This material Comp3_Unit15.
1 (c) 2013 FabSoft. MOST Cloud Service What is a Cloud Service? A cloud service is internet-based, meaning that MOST is hosted on a server farm on the.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
Scott Van Heest IT Specialist, Data Analysis and Support Team, NPCR, CDC Denise Farmer CDC/NPCR Contractor Division of Cancer Prevention and Control National.
ICAD3218A Create User Documentation.  Before starting to create any user documentation ask ‘What is the documentation going to be used for?’.  When.
Documentation in Practice Dept. of Clinical Pharmacy.
Electronic Records Management Alan Cameron Records Management Consultant.
Electronic Health Records (EHR)
Introduction to ONE Mail
Lesson 14 Sharing Documents
ONE® Mail Training Presentation
CLINICAL INFORMATION SYSTEM
HIPAA Overview.
Introduction to the PACS Security
Presentation transcript:

DEVELOPING A PERSONALLY CONTROLLED HEALTH RECORD (PCHR) USING MICROSOFT VISUAL C# SESSION 9 SUMMARY

WHAT DID YOU DEVELOP?  A Personally Controlled Health Record (PCHR):  Allows an individual to capture, access, and manage his own health information securely.  The PCHR captures information on the following:  Allergies  Immunisations  Medication  Test results  Medical conditions  Medical procedures

SOCIAL IMPACT OF A PCHR  Allows individual to create lifelong summary of his health information in one convenient place.  Especially useful for individuals that must manage chronic conditions.  May also help to improve quality of care and communication between patients and healthcare providers.

SOCIAL IMPACT OF A PCHR (continued)  Patient can make printout of his/her PCHR available to his healthcare provider.  Availability of more data about a patient’s health will help healthcare providers to make better decisions.  PCHRs may also help to save costs since duplication of tests could be avoided if previous test results are available.

WHAT DESIGN ASPECTS DID YOU TAKE INTO ACCOUNT WHEN DEVELOPING THE PCHR?  User-friendly, professional user interface.  Protecting sensitive data by means of encryption.  Ensuring that the PCHR is portable.  Protecting an individual’s privacy.

USER INTERFACE DESIGN PRINCIPLES DISCOVERED DURING SESSIONS 2 & 3  Allow user to easily move between controls to capture data by using the TAB key on the keyboard.  Ensure consistent and appropriate use of colours.  Use fonts that are easy to read, preferably sans serif fonts.  Keep in mind that user reads from left to right.  Ensure that controls are neatly aligned.

USER INTERFACE DESIGN PRINCIPLES DISCOVERED DURING SESSIONS 2 & 3 (continued)  Vertical and horizontal spacing should be consistent and used appropriately to avoid clutter.  Ensure consistency across entire application.  Messages displayed to the user should:  be user-friendly and professional.  be clear and descriptive.  not use terms that will confuse the user.

WHY IS THE USER INTERFACE DESIGN SO IMPORTANT?  The user interface determines the usability of the application.  If the user struggles to understand the user interface he will struggle to use the application.  End-users often judge the quality of the application based on the user-interface.

LIMITATIONS OF APPLICATION  Addressing the following limitations of the application would make the application more realistic for use in the real world:  Access  Portability  Synchronization

LIMITATIONS OF APPLICATION (continued)  Access  Currently user is the only person that can log in to view record.  Would be useful if healthcare provider and others (for example health insurance provider) could also log in to view record.

LIMITATIONS OF APPLICATION (continued)  Access (continued)  Class discussion:  What information in a person’s PCHR should the healthcare provider be able to view?  What information in a person’s PCHR should a representative of the health insurance provider be able to view?

LIMITATIONS OF APPLICATION (continued)  Portability  Currently the user can only print or save his health record as a MS Word document.  This document can then be ed, faxed, or copied onto a portable storage medium for distribution to relevant stakeholders such as a healthcare provider.

LIMITATIONS OF APPLICATION (continued)  Portability (continued)  The user can only access and edit his record on the computer that it is currently installed on.  Would be even more useful if user was able to access and edit his record on any computer.  This would make the record more portable.

LIMITATIONS OF APPLICATION (continued)  Synchronization  Synchronization of different versions and copies of a person’s health record are not addressed by this application.  Would increase the usability of this application in the real world if the user was able to access the application from various devices to read and update his health record seamlessly.

ETHICAL IMPLICATIONS OF STORING HEALTH DATA ELECTRONICALLY  A PCHR is created and maintained by an individual to record his own health information.  PCHRs differ from Electronic Medical Records (EMRs).  An EMR is created and maintained by a healthcare provider about an individual.  Access to a PCHR is controlled entirely by the individual.  Access to the EMR is controlled by the healthcare provider – the individual can still request access to his own medical record at any time.

ETHICAL IMPLICATIONS OF STORING HEALTH DATA ELECTRONICALLY (continued)  There are also various issues regarding the ownership of the data if a patient’s health data is stored in an EMR by a healthcare provider.  Class discussion:  Who do you think should be regarded as the owner of the data?  The patient?  The healthcare provider that creates and maintains the record?  The company that created the EHR software?  The company that maintains the data servers that the EHRs are stored on?

SUMMARY  Concepts and trade-offs that you discovered during the completion of this project include:  The impact of a user-friendly user interface on the usability of an application.  The advantages of re-using code.  The importance of protecting sensitive data by means of encryption/decryption and the associated trade-offs of encryption/decryption.  The importance of underlying concepts such as adherence to software development best practices.

Any concluding remarks?