© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

C OMPUTING E SSENTIALS Timothy J. O’Leary Linda I. O’Leary Presentations by: Fred Bounds.
© 2014 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
FIRST COURSE Essential Computer Concepts. XP New Perspectives on Microsoft Office 2007: Windows XP Edition2 Objectives Compare the types of computers.
McGraw-Hill Technology Education © 2004 by the McGraw-Hill Companies, Inc. All Rights Reserved. Introduction to Computer Essentials.
1-1 Presentation Tips Click the mouse to advance the slides Click the hyperlink to directly advance to the slide associated with the link; click Return.
Information Technology, the Internet, and You
Information Technology, the Internet, and You
Information Technology, the Internet, and You © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Competencies (Page 1 of 2)
Unit 11 Computers in Health Care
Microsoft Office 2013 ®® Essential Computer Concepts.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 1 Information Technology, The Internet, and You.
Mrs. Staniec. 1. Identify different types of computer devices. 2. Identify the role of the central processing unit. 3. Identify the difference between.
Computers Are Your Future Eleventh Edition Chapter 1: Computers & You Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
New Data Regulation Law 201 CMR TJX Video.
Microsoft Office 2010 Introduction to Computers and How to Purchase Computers and Mobile Devices.
FIRST COURSE Essential Computer Concepts. 2 Objectives Compare the types of computers Describe the components of a computer system Describe input and.
FIRST COURSE Essential Computer Concepts. XP New Perspectives on Microsoft Office 2007: Windows Vista Edition2 Objectives Compare the types of computers.
Chapter 12 Technology in the Workplace
Introduction to Computers
The Office Procedures and Technology
Your Interactive Guide to the Digital World Discovering Computers 2012.
Essential Computer Concepts
Copyright ©2012 Delmar, Cengage Learning. All rights reserved. Chapter 11 Operating Computers and Office Equipment.
Allied Health Assisting
MANAGEMENT INFORMATION SYSTEMS Data Raw facts and figures. Information Knowledge gained from processing data. Management information system (MIS) Organized.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Computers in the Ambulatory Care Setting
Brief overview Basic Concepts of Computer. What is a computer? A computer is a tool to process data Data Alphabet/Numeric Graphic Sound.
Living in a Digital World Discovering Computers Fundamentals, 2010 Edition.
Chapter 2: Information Technology and AISs
Health Information Technology Basics January 8, 2011 by Leola McNeill adapted from Information Technology Basics by June 2009, Kayla Calhoun & Dr. Frank.
 Information technology is defined as the use of computer hardware and software to manage information.  Six functions of data management: Convert.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
Objectives Overview Identify the qualities of valuable information Describe various information systems used in an enterprise Identify the components of.
Introduction Greatest advancement in information processing since invention of printing press Use of computers a necessity in health care.
Copyright (c) 2004 Prentice Hall. All rights reserved. 1 Committed to Shaping the Next Generation of IT Experts. Go! Computer Concepts.
Using Technology to Manage Information Chapter 14.
Explain the purpose of an operating system
1-1 Presentation Tips Click the mouse to advance the slides Click the hyperlink to directly advance to the slide associated with the link; click Return.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
McGraw-Hill Career Education© 2008 by the McGraw-Hill Companies, Inc. All Rights Reserved. Microsoft Office 2007 Introduction to Computer Essentials.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Working with HIT Systems
Chapter 5 Technology in the Business Office Copyright © 2011, 2006 Mosby, Inc., an affiliate of Elsevier. All rights reserved.
From Chapter 1 - Computers- Understanding Technology
© 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Component 3-Terminology in Healthcare and Public Health Settings Unit 16-Definitions and Concepts in the EHR This material was developed by The University.
Computing Fundamentals Module Lesson 1 — Introducing Computers Computer Literacy BASICS.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Chapter 1 Information Technology, the Internet, and You Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. 1-1.
361 Hardware, Software, and Computer Performance Lec 2.
© 2016 Cengage Learning ®. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
ITT_04101 COMPUTER APPLICATIONS Gaper M CIT
RECORDS MANAGEMENT Judith Read and Mary Lea Ginn Chapter 12 Electronic Media and Image Records 1 © 2016 Cengage Learning ®. May not be scanned, copied.
We are a HP tech support provider for HP users facing different level of technical issues with their HP devices like :- Desktop Computers, Laptops, Printers,
Copyright © 2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole.
Copyright © 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole.
Computers in the Ambulatory Care Setting
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
Explain the five parts of an information system: people, procedures, software, hardware, and data.
Using Technology to Manage Information
UNIT 19 Data Security 2.
Chapter 6 Purchasing and Maintaining a Computer
Fundamentals of Information Systems
Introduction to Computers
Computers in the Ambulatory Care Setting
Presentation transcript:

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Chapter 11 Computers in the Ambulatory Care Setting

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. The Computer System Basic system –Central processing unit (CPU) –Input device –Output device –Software

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. The Computer System

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. The Computer System Types of computer systems –Personal computers (PCs) –Supercomputers –Mainframe computers –Minicomputers –Microcomputers Smartphones Personal digital assistants (PDAs) Tablet or Netbook Laptop or desktop

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Components of Computer System Hardware –Components you can see, touch, or hear Data input devices Central processing unit Data output devices Data storage devices –ROM and RAM memory –Data storage memory –RAID storage

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Components of Computer System Software –Frequently referred to as computer program System software (operating system) Application software Drivers

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Components of Computer System Documentation –Define how programs operate –Patches –Licenses Hardware and software compatibility

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Components of Computer System Computer networks –Networking is the electronic or optical connection of computers and peripheral equipment for purpose of sharing information and resources

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Components of Computer System Types of networks –Local area network (LAN) –Wide area network (WAN) –Internet Connecting networks –Hard-wired system –Wireless system (WiFi, Bluetooth ®, satellite systems, cellular technology) –WiMAX

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Components of Computer System Systems security –Operating system –Firewall –Anti-virus software –Password –Training

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Components of Computer System Systems security –Inventory control –Data management –Data backup –Manual selection of WiFi access points –Personal access points –Deactivate file sharing by your computer –Enable encryption

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Components of Computer System Systems security –Virus protection programs –Recognizing secured sites

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Components of Computer System Systems security –Firewalls –System backup –Power outage, electrical surge, static discharge protection devices

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Cloud Computing Like computer rental agency where order is placed for applications (apps) to be performed Provide all computing needs for fixed service price on pay-for-use-basis –Reduced cost –Improvement in resource availability time –More secure data backup –Better disaster recovery

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Computer Maintenance by Office Personnel Replace printer ink, toner cartridges, refill paper trays Defragmentation File removal Installation of security patches Service agreement management

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Use of Computers in Medical Office General office procedures –Word processing, spreadsheets, graphics, databases, online communication programs, accounting programs Maintaining EMR and EHR; managing clinic or practice Clinical and laboratory applications

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Use of Computers in Medical Office EMR versus EHR –EMR: Individual patient records –EHR: Combined EMRs from a variety of sources into a master database TPMS –Total Practice Management System –Deals with day-to-day operations of medical practice –Certification Commission for Health Information Technology (CCHIT)

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. TPMS Data Flow

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Use of Computers in Medical Office Portable computers in the medical office –Personal data assistants (PDAs) –Smartphones –Tablet PCs

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Design Considerations for a Computerized Medical Office Software selection –Choose knowledgeable and trustworthy vendor –Develop plan for computerization Hardware selection –Determine whether you are going to network –Must meet minimum requirements for software programs –Must meet requirements for data transmission

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Design Considerations for a Computerized Medical Office Ergonomics –Eyestrain –Cumulative trauma disorder –Posture Using footrest can help posture problems >>

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Patient Confidentiality Adherence to HIPAA regulations Ensure computer-literate personnel employed to set up the system Establish protocols –Define who can access and modify data –Provide identification, dating, and authenticating mechanisms for those changes and additions

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Patient Confidentiality Persons other than authorized personnel should not be able to read files Firewalls in place Passwords or PINs should not be shared Printers and fax machines located where unauthorized personnel cannot view them AMA computer confidentiality

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. HIPAA Standards for Safeguarding PHI Confidentiality protocols and procedures Staff training Identification of authentication protocols Access control of computer output, modification, or destruction of files Security of transmitted data Control of discarded records, storage media, and computer hardware

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Professionalism in Computerized Medical Office Close attention to detail when entering or retrieving information from computer Work within legal scope of your training Become actively involved Adapt to change

© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Professionalism in Computerized Medical Office Work ethic Enhance skills through CE EHR affects entire office staff