Verified Document

HIPAA Giving Employees The Freedom Thesis

Figure 1: Electronic Medical Systems Architecture

Source: (Cahn, 2001)

The core building blocks of this framework include the presentation and client layers, where web-based applications aligned with the needs of clinicians, specialist MDs and patients. The need for synchronization across Platform, Storage and Infrastructure and Integration areas of this framework dictate the speed and accuracy of responses to all users of the system. Thinking of this framework as the foundation that the specific processes that clinics, practices and hospitals rely on to complete daily tasks to accomplish their goals and objectives while at the same time ensuring a high level of security across each component. The integration and security requirements are critical for HIPAA compliance.

Another approach to viewing the framework that is emerging from it providers addressing the unmet needs of a medical practice area is shown in Figure 2. This is a framework that has foundational elements focused on Security and Audit Control to protect the privacy of clinicians, MDs, and patients, in addition to making Records Management, Business Process Management, and a Portal Framework available as a system-wide resource for the specific collaboration, content management, search and retrieval implementation plans to act as a unifying it strategy across the diverse patient records in all the systems in a clinic, practice or hospital. Note that this framework also includes support for Expert Network and Learning Management applications to also increase medical professionals' productivity as well.

Figure 2: Electronic Medical Record Systems Hierarchy Source: (Wheatley, 2005)

Conclusion

At the intersection of unmet needs in the healthcare community and the advances being made in enterprise content management, digital asset management, security, collaboration technologies including portals is the emergence of it strategies to fulfill the requirements of HIPAA compliance. There are literally dozens of unmet needs in each discipline of the medical profession, yet for purposes of this paper the top five most prevalent ones are cited. These unmet needs in fact form the foundation of frameworks the it industry is defining strategies to addressing the needs of patient confidentiality and adherence to the standards of the HIPAA standards...

The focus on making more of a pervasive, integrated platform of information that delivers a 360 degree view of the patient, also allowing the patient to comment on their experiences and their satisfaction, is what will become commonplace in the next five years. The integrative role of search technologies as an it approach to unifying all forms of content has also already arrived, and the largest clinics are acting as early adopters, showing the Return on Investment (ROI) of this strategy. All of these developments will be possible based on the advances made in system and process integration due to the widespread adoption of the HIPAA standard.
References

David Cahn (2001, November). ECM fosters the future it framework. MSI, 19(11), 36-38. Retrieved September 22, 2008, from ABI/INFORM Global database. (Document ID: 90248042).

Ram Dantu, Herman Oosterwijk, Prakash Kolan, Husain Husna. (2007). Securing medical networks. Network Security, 2007(6), 13. Retrieved September 28, 2008, from ABI/INFORM Global database. (Document ID: 1294137471).

Barry Hall (2008). Health Incentives: The Science and Art of Motivating Healthy Behaviors. Benefits Quarterly, 24(2), 12-22. Retrieved September 26, 2008, from ABI/INFORM Global database. (Document ID: 1481467951).

David C. Kibbe (2005). 10 STEPS to HIPAA SECURITY COMPLIANCE. Family Practice Management, 12(4), 43-9. Retrieved September 24, 2008, from ABI/INFORM Global database. (Document ID: 834471611).

Julia E. Miller (2006). HIPAA Privacy and Security. Benefits Quarterly, 22(3), 64. Retrieved September 29, 2008, from ABI/INFORM Global database. (Document ID: 1110730401).

Lela D "Kitty" Pumphrey, Ken Trimmer, John Beachboard. (2007). Enterprise Resource Planning Systems and HIPAA Compliance. Research in Healthcare Financial Management, 11(1), 57-75. Retrieved September 22, 2008, from ABI/INFORM Global database. (Document ID: 1426086661).

Glen M. Secor, Mary Laplante. (2006, December). Securing Your Content's Compliance. Document Processing Technology, 14(7), 18-20. Retrieved September 27, 2008, from ABI/INFORM Global database. (Document ID: 1174111381).

Linda Volonino, Janice C. Sipior, Burke T. Ward. (2007). Managing the Lifecycle of Electronically Stored Information. Information Systems Management,…

Sources used in this document:
References

David Cahn (2001, November). ECM fosters the future it framework. MSI, 19(11), 36-38. Retrieved September 22, 2008, from ABI/INFORM Global database. (Document ID: 90248042).

Ram Dantu, Herman Oosterwijk, Prakash Kolan, Husain Husna. (2007). Securing medical networks. Network Security, 2007(6), 13. Retrieved September 28, 2008, from ABI/INFORM Global database. (Document ID: 1294137471).

Barry Hall (2008). Health Incentives: The Science and Art of Motivating Healthy Behaviors. Benefits Quarterly, 24(2), 12-22. Retrieved September 26, 2008, from ABI/INFORM Global database. (Document ID: 1481467951).

David C. Kibbe (2005). 10 STEPS to HIPAA SECURITY COMPLIANCE. Family Practice Management, 12(4), 43-9. Retrieved September 24, 2008, from ABI/INFORM Global database. (Document ID: 834471611).
Cite this Document:
Copy Bibliography Citation

Related Documents

Employee Privacy Torts
Words: 7119 Length: 25 Document Type: Research Paper

Employee Privacy Torts Issues relating to employee privacy have been at the forefront of businesses for many years. This has been fuelled by the dynamic workplace which changes constantly and also by employees and employers being more litigation-conscious. Technology has also spurred on employee privacy issues with e-mail and the internet being related to heightened concerns about vulnerability of employers to litigation. Many employers have thus exacerbated their concerns relating to

Release of Information Properly the
Words: 1450 Length: 5 Document Type: Research Proposal

For the patient, there are equally negative consequences, such as medical identity theft, financial loss and potential damage to their health. Medical identity theft can result in erroneous entries to the patient's health care records, which can affect the patient's medical and financial records for a long time (Federal Trade Commission, 2003 & 2007). In each medical facility, there is a need for trained professionals who can properly process

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now