Verified Document

Legislation Review Matrix Research Paper

Healthcare Legislation Healthcare Information Systems Legislation Since 2000

Health information technology has become a topic of discussion for healthcare organizations, professionals, and lawmakers in recent years as the government consigns tax dollars and presents legislation that will make new healthcare information systems more affordable and available over the coming years. Healthcare information systems innovators are also trying to design systems that are more user friendly and comply with the needs of multiple organizations. In 2004, President Bush signed an executive order which set a ten-year window on developing and implementing electronic health records systems across the United States (EHealthWV, 2004). Healthcare information technology had already been addressed in the HIPAA standards, some of which became law in 2001 and 2003 (Maruca, 2010). State legislatures began a concerted effort to address the issue of electronic healthcare systems in 2007, a year in which "74 bills were passed in 39 states and the District of Columbia" (HITCh, 2007). Besides the glut of state provisions, the American Recovery and Reinvestment Act of 2009 allocated more than $20 billion to different measures (HIMSS, 2009), and the Affordable Care Act of 2010 added further money and aid...

This net of healthcare information system legislation is an effort to solve the issues surrounding the implementation of this issue and they have done a credible job. However, there are still issues that need to be addressed.
Problem Statement

Healthcare information systems are put in place to aid the introduction of an individual's health information into a records keeping system. The old method of a nurse or other healthcare professional taking paper notes and assigning those to a folder is antiquated and problematic. It is very possible to make errors. It is difficult to share information with other professionals concerned with the patient's healthcare, and paper records are subject to quick decay. Many of these issues can be seen when people use health information technology also, but new generations are always trying to correct for these. The real problem with healthcare information systems legislation is that it creates a web of bureaucracy that sometimes makes it difficult to properly treat patients, and even more problematic security issues can cause a great deal of problems for patients whose information is entered into an electronic database.

Legislation and Solutions

When lawmakers are made aware of a problem they will often rush to create legislation, especially if a new technology can potentially harm constituents, rather than allowing the technology to mature so that they can determine what is the best course of action. Unfortunately, by the time this happens, there is a large web of healthcare legislation that, though out of touch with the technology, is still in force and may hamper efforts to move forward. This is an unfortunate consequence of legislation in general.

The first attempt to somehow regulate the new technology was contained in the law that created HIPAA. This act was created to make sure that patients medical records remained private and secure. Only people who needed to know the information contained in a patient's record were allowed access. Knowing that this would be complicated with the introduction of healthcare information systems technology, HIPAA does have a provision for the securing of electronic medical records also (Maruca, 2010). This legislation has been successful, but it has had to be amended several times as new technology becomes available.

In 2004, President George W. Bush talked about electronic health records in his State of the Union Address. He said then that he…

Sources used in this document:
References

EHealthWV. (2004). Health information technology backgrounder. Retrieved from http://www.ehealthwv.org/shared/content/ehealth_wv_files/EHR- Backgrounder_%5B7%5D.pdf

HIMSS. (2009). The American Recovery and Reinvestment Act of 2009: Summary of key health information technology provisions. Retrieved from http://www.himss.org/content/files/HIMSS_SummaryOfARRA.pdf

Health Information Technology Champions (HITCh). (2007). 2007 enacted legislation on health information technology. Retrieved from http://www.ncsl.org/issues- research/health/2007-enacted-health-information-technology-legisla.aspx

Maruca, W. (2010). HIPAA and HIT changes in Patient Protection and Affordable Care Act. Retrieved from http://hipaahealthlaw.foxrothschild.com/2010/03/articles/health-reform/hipaa-and- hit-changes-in-patient-protection-and-affordable-care-act/
Mertz, K. (2008). Health information technology 2007 and 2008 state legislation. National Conference of States Legislatures. Retrieved from http://www.ncsl.org/print/health/forum/HIT_Enacted.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Matrices for Human Trafficking. They Observe That
Words: 762 Length: 2 Document Type: Essay

matrices for human trafficking. They observe that although in recent years great progress has been made towards understanding and of the problem and combating it, little development has been made in effectuating measures that can specifically delineate it and in developing effective ways to collect the data. This results in contradictory information on the subject and on few studies being based on extensive research. It was only fairly recently that

Human Trafficking: Literature Review Perhaps the Most
Words: 1160 Length: 3 Document Type: Literature Review Chapter

Human Trafficking: Literature Review Perhaps the most significant act of legislation passed to deal with the growing global problem of human trafficking was the Trafficking Victims Protection Act of 2000. This law established specific federal penalties for trafficking in persons, as well as offered added protections for victims. However, according to Anthony M. Destefano's 2007 The war on human trafficking: U.S. policy assessed, the years subsequent to the passage of this

Analyzing the Comparison Matrix
Words: 1435 Length: 4 Document Type: Essay

socialization of doctoral students the authors John C. Weidman and Elizabeth L. Stein utilize the framework for graduate and professional socialization to explain the socialization of doctoral students to academic rules of research and scholarship. The researchers reveal information about the perceptions of doctoral students on social science and on the foundation of education. The researchers also present information socialization of the students with their peers and with members

Delphi Study Influence of Environmental Sustainability Initiatives...
Words: 17687 Length: 60 Document Type: Literature Review

Delphi Study: Influence of Environmental Sustainability Initiatives on Information Systems Table of Contents (first draft) Green IT Current Methods and Solutions Green IT and energy costs Green It and Email Systems Green IT and ICT Green IT and ESS Green IT and TPS Green IT and DSS Green IT and other support systems Green IT and GHG reduction Green IT and the Government Sector Green IT and the Corporate Sector Future Prospects of Green IT in the software industry The paper focuses on how the

Google Introduction and Description of the Company
Words: 6398 Length: 22 Document Type: Essay

Google Introduction and Description of the Company Organizational Structure Industry Analysis Value Proposition Financial Performance Figure 1.1 Revenue and Net Income Growth TOWS Strategies BCG Matrix Leadership Alliances Measures Google is a highly successful Internet company that makes most of its money through online advertising. It has been able to achieve this success through a combination of leadership and culture. The company's many strengths are in general aligned with the opportunities that exist in the marketplace. As a result, Google has the

Business Ethics How Important Is an Individual's
Words: 3263 Length: 10 Document Type: Essay

Business Ethics How important is an individual's privacy in the workplace? Is an individual's privacy in the workplace the most important consideration to be taken into account? What constitutes privacy in a workplace environment? Do the goals and the mission of the organization supersede an individual's desire to protect his or her privacy? Is it ethical for an employer to collect and disperse personal information from employees without their knowledge? How

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now