You are on page 1of 10

“FINAL REQUIREMENT IN

PHARMACY INFORMATICS”
(LABORATORY)

SUBMITTED BY: ANGELINE KARYLLE C. MEJIA, BS-PHARMACY

SUBMITTED TO: JAY-AR S. NIEBLA, Faculty, VMUF-CICS


1. WHAT IS PHARMACY INFORMATICS?

The American Society of Health-Systems Pharmacy (ASHP) formally

defines it as “the use and integration of data, information, knowledge,

technology, and automation in the medication-use process for the

purpose of improving health outcomes.”2 In more practical terms,

pharmacy informatics is the use of electronic health data to support safe

and effective medication use. Pharmacy informatics can include various

aspects of medication management, from a drug utilization review, to the

use of barcoding technology during product dispensing, to the

development of alert systems to improve prescribing and dispensing of

medications. Pharmacy informatics involves broad collaboration between

pharmacists, pharmacy technicians, physicians, nurses, information

technology personnel, and other health care professionals. As

opportunities in pharmacy informatics develop, so do the duties and

responsibilities of pharmacists and pharmacy technicians related to its

provision. Health information systems already engage pharmacists and

pharmacy technicians across a variety of health care settings, including

e-prescribing, computerized prescriber order entry (CPOE), electronic

medical records (EMRs), electronic health records (EHRs), bar code

dispensing and administration systems (BCMAs), automated dispensing

cabinets (ADCs), controlled substance or prescription drug monitoring

program (PDMP) databases, and immunization registries.


2. WHAT ARE THE 3 COMPONENTS OF WORKING MODEL FOR

PHARMACY INFORMATICS? DEFINE EACH COMPONENT

Before we consider the role of the pharmacy technician in the field of

pharmacy informatics, it is important to first understand the variety of

technologies that pharmacists and pharmacy technicians utilize on a routine

basis within the practice of pharmacy. Such technologies are utilized to achieve

goals that may be classified into 3 general categories:

 Efficacy- quality of patient outcomes

 Efficiency- productivity of pharmacy services team

 Safety- error prevention

3. WHAT ARE THE CHANGES EXPECTED TO RESULT FROM

INFORMATION TECHNOLOGY, ESPECIALLY IN THE FIELD OF

PHARMACY?

The pharmacy industry has changed drastically over the past

decade and technological advances are a major reason why. In the past

decade alone, we’ve seen a dramatic increase in the number of

pharmacy technology advancements as pharmacy IT becomes

increasingly central to how drugs are administered to patients. One of the

key ways in which technology has positively impacted pharmacy is by


helping to minimize preventable medication errors and therefore,

increasing the likelihood of successful patient outcomes.

4. WHY WE SHOULD HAVE COMPASSION FOR THOSE LESS

KNOWLEDGEABLE ABOUT TECHNOLOGY?

Technology will change healthcare over the next decade in ways

that we can only begin to imagine today. What it means to care for

patients is being transformed, along with expectations about how, where

and from whom people access the services that they need. As the pace

of change accelerates the opportunities will be tremendous, but the

journey ahead will be complex and no part of the healthcare sector will

be left untouched. Our readiness to embrace this transformation – and

our ability to translate technology opportunities into sustainable solutions

to our most pressing issues in healthcare – will be the central challenge for

practitioners, providers and policymakers alike. As patients put new

demands on the system, institutions will need to reinvent themselves and

clinicians will need to adapt to changing roles in how they care for their

patients. And with much of the momentum coming from outside

traditional healthcare players, the system will need to learn to work

alongside a new wave of health technology and consumer organizations

that are emerging to help people manage their care.


5. WHAT ARE THE IMPORTANT THINGS TO CONSIDER WHEN

CHOOSING INFORMATION TECHNOLOGY TO SUPPORT NEEDS IN

PHARMACY PRACTICE?

According to the Office of the National Coordinator, HIT must be

knowledgeable in the application of information processing involving

both computer hardware and software that deals with the storage,

retrieval, sharing, and use of health care information, data, and

knowledge for communication and decision making. The role of

information technology in pharmacy practice is dynamic and not likely to

lose relevance in the coming years. To some degree, pharmacists are

interested in information technology because we can envision it

increasing efficiency in our daily tasks and improving our access to vital

information. However, federal legislation is also driving adoption of Health

Information Technology (HIT) for its potential impact on patient safety.

6. WHAT ARE THE DIFFERENT STRATEGIES TO STORE AND KEEP

IMPORTANT DATA OR INFORMATION IN USING INFORMATION

TECHNOLOGY, ESPECIALLY IN THE FIELD OF HEALTH?

Practices often lack basic security policies and procedures, allow

staff members to share passwords, and fail to turn on or properly configure


the security features of their electronic health record (EHR) systems. In

addition, many practices fail to perform security risk assessments, despite

a requirement to do so under the Health Insurance Portability and

Accountability Act (HIPAA). Here are some strategies that experts say can

help practices defend their protected health information (PHI) and their

businesses from cyber criminals; Do a security risk assessment, Control

system access, Don’t store data on user devices, Encrypt data, and Back

up data off site.

7. WHAT ARE THE BASIC CONCEPTS OF NETWORK/INTERNET? DEFINE

EACH CONCEPT.

 Switches

Switches are the foundation of most business networks. A switch

acts as a controller, connecting computers, printers, and servers to a

network in a building or a campus.

Switches allow devices on your network to communicate with each other,

as well as with other networks, creating a network of shared resources.

Through information sharing and resource allocation, switches save money

and increase productivity.

 Routers
Routers connect multiple networks together. They also connect

computers on those networks to the Internet. Routers enable all

networked computers to share a single Internet connection, which saves

money. A router acts a dispatcher. It analyzes data being sent across a

network, chooses the best route for data to travel, and sends it on its way.

Routers connect your business to the world, protect information from

security threats, and can even decide which computers receive priority

over others. Beyond those basic networking functions, routers come with

additional features to make networking easier or more secure. Depending

on your needs, for example, you can choose a router with a firewall, a

virtual private network (VPN), or an Internet Protocol (IP) communications

system.

 Access points

Allows devices to connect to the wireless network without cables. A

wireless network makes it easy to bring new devices online and provides

flexible support to mobile workers.An access point acts like an amplifier for

your network. While a router provides the bandwidth, an access point

extends that bandwidth so that the network can support many devices,

and those devices can access the network from farther away.But an

access point does more than simply extend Wi-Fi. It can also give useful
data about the devices on the network, provide proactive security, and

serve many other practical purposes.

8. WHAT ARE THE DIFFERENT COMPONENTS TO CONSIDER IN

INFORMATION ASSURANCE?

 Integrity

Involves assurance that all information systems are protected and

not tampered with. IA aims to maintain integrity through means such

as anti-virus software on all computer system, and ensuring all staff

with access to know how to appropriately use their systems to

minimize malware, or viruses entering information systems.

 Availability

Simply means those who need access to information, are allowed to

access it. Information should be available to only those who are

aware of the risks associated with information systems.

 Authentication

Involves ensuring those who have access to information, are who

they say they are. Ways of improving authentication involve


methods such as two-factor authentication, strong passwords, bio-

metrics and other devices. Authentication may also be used to not

only identify users, but also other devices.

 Confidentiality

IA involves the confidentiality of information, meaning only those

with authorization may view certain data. This step is closely

mirrored by the six data processing principles of the General Data

Protection Regulation (GDPR), where by personal data must be

processed in a secure manner "using appropriate technical and

oganizational measures" ("integrity and confidentiality").

 Nonrepudiation

The final pillar simply means someone with access to your

organizations information system cannot deny having completed an

action within the system, as there should be methods in place to

prove that they did make said action.

REFERENCES:

1. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5990205/

2. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5990205/
3. https://www.healthcareis.com/blog/three-ways-technology-has-

changed-pharmacy

4. http://www.ams-inc.on.ca/wp-content/uploads/2019/01/Compassion-in-

a-Tech-World.pdf

5. https://www.pharmacytimes.com/view/the-role-of-information-

technology-in-advancing-pharmacy-practice-models-to-improve-

6patient-safety

6. https://www.ncbi.nlm.nih.gov/books/NBK22862/

7. https://www.cisco.com/c/en_sg/solutions/small-business/resource-

center/networking/networking-basics.html

8. https://www.itgovernanceusa.com/information/information-assurance

You might also like