Computers in the Ambulatory Care Setting

Slides:



Advertisements
Similar presentations
C OMPUTING E SSENTIALS Timothy J. O’Leary Linda I. O’Leary Presentations by: Fred Bounds.
Advertisements

FIRST COURSE Essential Computer Concepts. XP New Perspectives on Microsoft Office 2007: Windows XP Edition2 Objectives Compare the types of computers.
McGraw-Hill Technology Education © 2004 by the McGraw-Hill Companies, Inc. All Rights Reserved. Introduction to Computer Essentials.
1-1 Presentation Tips Click the mouse to advance the slides Click the hyperlink to directly advance to the slide associated with the link; click Return.
Chapter 1. What is computer fluency? The knowledge possessed by people who are able to navigate the digital world successfully NOT THIS.
Information Technology, the Internet, and You
Information Technology, the Internet, and You © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Competencies (Page 1 of 2)
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 1 Information Technology, The Internet, and You.
Microsoft Office 2010 Introduction to Computers and How to Purchase Computers and Mobile Devices.
FIRST COURSE Essential Computer Concepts. 2 Objectives Compare the types of computers Describe the components of a computer system Describe input and.
Introduction to Computers
The Office Procedures and Technology
MANAGEMENT INFORMATION SYSTEMS Data Raw facts and figures. Information Knowledge gained from processing data. Management information system (MIS) Organized.
Computers in the Ambulatory Care Setting
Brief overview Basic Concepts of Computer. What is a computer? A computer is a tool to process data Data Alphabet/Numeric Graphic Sound.
Living in a Digital World Discovering Computers Fundamentals, 2010 Edition.
Chapter 2: Information Technology and AISs
Health Information Technology Basics January 8, 2011 by Leola McNeill adapted from Information Technology Basics by June 2009, Kayla Calhoun & Dr. Frank.
 Information technology is defined as the use of computer hardware and software to manage information.  Six functions of data management: Convert.
Computer Concepts – Illustrated 8 th edition Unit A: Computer and Internet Basics.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
Using Technology to Manage Information Chapter 14.
1-1 Presentation Tips Click the mouse to advance the slides Click the hyperlink to directly advance to the slide associated with the link; click Return.
McGraw-Hill Career Education© 2008 by the McGraw-Hill Companies, Inc. All Rights Reserved. Microsoft Office 2007 Introduction to Computer Essentials.
Working with HIT Systems
Chapter 5 Technology in the Business Office Copyright © 2011, 2006 Mosby, Inc., an affiliate of Elsevier. All rights reserved.
Component 8/Unit 6aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 6a System Security Procedures.
Component 3-Terminology in Healthcare and Public Health Settings Unit 16-Definitions and Concepts in the EHR This material was developed by The University.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Chapter 1 Information Technology, the Internet, and You Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. 1-1.
361 Hardware, Software, and Computer Performance Lec 2.
© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Copyright © 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole.
Computing Fundamentals Module Lesson 1 — Introducing Computers
What’s out there and who’s using it
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
Explain the five parts of an information system: people, procedures, software, hardware, and data.
Essential Computer Concepts
Fundamental of Information Communication Technology (ICT)
Using Technology to Manage Information
UNIT 19 Data Security 2.
Computer Hardware-Meeting the machine
Unit 2: Computer Systems
Basic Introduction to Computers
مقدمة في الحاسب الآلي T. Arwa Alsarami.
Chapter 1 : 1.1 Computer Concepts
Objectives Overview Explain why computer literacy is vital to success in today's world Describe the five components of a computer Discuss the advantages.
Information systems are involved in many of the things we encounter each day.
Chapter 6 Purchasing and Maintaining a Computer
Introduction to Computers
Presentation Tips Click the mouse to advance the slides
Click the mouse to advance the slides
Jeopardy Security Risks Hardware & Software Computer Types Networking
Information Technology, the Internet, and You
Chapter 1 – Introduction to Computers
Click the mouse to advance the slides
Fundamentals of Information Systems
County HIPAA Review All Rights Reserved 2002.
Click the mouse to advance the slides
Introduction to Computers
Computers in the Ambulatory Care Setting
Presentation Tips Click the mouse to advance the slides
Presentation Tips Click the mouse to advance the slides
Computing Fundamentals Module Lesson 1 — Introducing Computers
Copyright 2005 Prentice- Hall, Inc.
Information Technology and AISs
Introduction to the PACS Security
Presentation transcript:

Computers in the Ambulatory Care Setting Chapter 11 Computers in the Ambulatory Care Setting

The Computer System Basic system Central processing unit (CPU) Input device Output device Software (See Figure 11-2)

The Computer System [Figure 11-1]

The Computer System Types of computer systems Personal computers (PCs) Supercomputers Mainframe computers Minicomputers Microcomputers Smartphones Personal digital assistants (PDAs) Tablet or Netbook Laptop or desktop

Components of Computer System Hardware Components you can see, touch, or hear Data input devices Central processing unit Data output devices Data storage devices ROM and RAM memory Data storage memory RAID storage

Components of Computer System Software Frequently referred to as computer program System software (operating system) Application software Drivers

Components of Computer System Documentation Define how programs operate Patches Licenses Hardware and software compatibility (Assign or discuss the Critical Thinking box)

Components of Computer System Computer networks Networking is the electronic or optical connection of computers and peripheral equipment for purpose of sharing information and resources

Components of Computer System Types of networks Local area network (LAN) Wide area network (WAN) Internet Connecting networks Hard-wired system Wireless system (WiFi, Bluetooth®, satellite systems, cellular technology) WiMAX

Components of Computer System Systems security Operating system Firewall Anti-virus software Password Training

Components of Computer System Systems security Inventory control Data management Data backup Manual selection of WiFi access points Personal access points Deactivate file sharing by your computer Enable email encryption

Components of Computer System Systems security Virus protection programs Recognizing secured sites [Figure 11-3]

Components of Computer System Systems security Firewalls System backup Power outage, electrical surge, static discharge protection devices

Cloud Computing Like computer rental agency where order is placed for applications (apps) to be performed Provide all computing needs for fixed service price on pay-for-use-basis Reduced cost Improvement in resource availability time More secure data backup Better disaster recovery

Computer Maintenance by Office Personnel Replace printer ink, toner cartridges, refill paper trays Defragmentation File removal Installation of security patches Service agreement management

Use of Computers in Medical Office General office procedures Word processing, spreadsheets, graphics, databases, online communication programs, accounting programs Maintaining EMR and EHR; managing clinic or practice Clinical and laboratory applications (See Procedure 11-1: Perform Routine maintenance of Office Computers and Ancillary Equipment with Documentation)

Use of Computers in Medical Office EMR versus EHR EMR: Individual patient records EHR: Combined EMRs from a variety of sources into a master database TPMS Total Practice Management System Deals with day-to-day operations of medical practice Certification Commission for Health Information Technology (CCHIT)

TPMS Data Flow [Figure 11-5]

Use of Computers in Medical Office Portable computers in the medical office Personal data assistants (PDAs) Smartphones Tablet PCs [Figure 11-6]

Design Considerations for a Computerized Medical Office Software selection Choose knowledgeable and trustworthy vendor Develop plan for computerization Hardware selection Determine whether you are going to network Must meet minimum requirements for software programs Must meet requirements for data transmission (See Procedure 11-2: Software Installation) (See Procedure 11-3: Hardware Installation) (Assign or discuss the Critical Thinking activity)

Design Considerations for a Computerized Medical Office Ergonomics Eyestrain Cumulative trauma disorder Posture Using footrest can help posture problems >> [Figure 11-10]

Patient Confidentiality Adherence to HIPAA regulations Ensure computer-literate personnel employed to set up the system Establish protocols Define who can access and modify data Provide identification, dating, and authenticating mechanisms for those changes and additions

Patient Confidentiality Persons other than authorized personnel should not be able to read files Firewalls in place Passwords or PINs should not be shared Printers and fax machines located where unauthorized personnel cannot view them AMA computer confidentiality

HIPAA Standards for Safeguarding PHI Confidentiality protocols and procedures Staff training Identification of authentication protocols Access control of computer output, modification, or destruction of files Security of transmitted data Control of discarded records, storage media, and computer hardware

Professionalism in Computerized Medical Office Close attention to detail when entering or retrieving information from computer Work within legal scope of your training Become actively involved Adapt to change

Professionalism in Computerized Medical Office Work ethic Enhance skills through CE EHR affects entire office staff