Tuesday, September 10, 2019
Operational Policies and Procedures for HIE Research Paper
Operational Policies and Procedures for HIE - Research Paper Example Conversely, the HIE possesses a structure as well as a syntax of electronic communications that provide standard ways of conveying and delivering information. Hence, the message-based where information is given as a message as well as document-based systems that involve sending information as a structured document/forms. To mention a few of the standards are the Accredited Standard Committee X12 (ASC X12) and the International Organization for Standardization (ISO) (Public Health Data Standards Consortium, 2015). The Health Information Exchange policies involve the lines of arguments that tend to rationalize the coursesà ofà action towards the management of Health Institutes (AHIMA, 2011). Thus, various plans have been put up by the Medicare agencies and practitioners to oversee that patientsââ¬â¢ information are safe and showing support through federal funding for the HIEs. Therefore, Medicare HIE policies can consider the access controls, accounting for disclosures, authorization procedures, as well as consumer education, data integrity and quality among other policies. Thus, under access controls, the Medicare institutions should determine those individuals that require access to the information that are shared within the HIEs as well as establishing the policies and procedures used for managing authentications and auditing. Subsequently, the HIEs should consider reviewing their business associate agreements, language and signatories in addition to their methods for managing sensitive records and patients. By doing so, they ensure access control, as well as functionality of the systems, are stable (AHIMA, 2011). Patient authorization, as well as consent, poses a challenge to most HIEs (Sewell & Thede, 2013). Therefore, it would be of significance for the HIEs to consider their accountability towards disclosures. Thus, this will tend to look into patient/customer requests pertaining their PHIs. Hence, this is achievable in
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.