You are on page 1of 16

Other Hospital Information Systems CIS and RIS

Radiology Information Systems


Cardiology Information Systems ● Tracks Radiology image orders in conjunction
● For the storage and retrieval of with:
Cardiology-centric images. ● PACS
● Communicates with other information systems to - Picture Archive & Communicating System
retrieve orders with the patient demographics - It is a healthcare technology for short and long
and other information and subsequently profiles term storage, retrieval, management, distribution
it against the images and stored for further and presentation of images.
distribution, viewing or long-term archive. ● VNA
- Vendor Neutral Archive
Relevant information for cardiologists - In a health information technology context, it is
● Personal notes (history, physical exam) as medical imaging used by the healthcare
● Signals (electrocardiograms) professionals that stores images in a standard
● Images (echocardiograms, angiograms, CT, format and interface, making medical imaging
MRI) data accessible through different picture
● Reports from investigations/procedure archiving and communication systems (PACS).

HISTORY and EVOLUTION - Within a Hospital Information System


● 1970S - AVAILABLE CARDIOLOGY
INFORMATION SYSTEM ORIGINATED FROM Advantages of RIS
A MAINFRAME ENVIRONMENT, THE
TECHNICAL SPECIFICS OF WHICH WOULD ● Better communication with referring doctors
BE CONSIDERED RIDICULOUS IN THE ● Faster payments
PRESENT DAY SETTING. ● Improved efficiency
● 1980S – MODULAR SYSTEMS BECAME A
TREND WHICH EMPHASIZED THE USE OF Functions of RIS
REAL-TIME APPLICATIONS AND MINI Patient Management - An RIS can track a patient's
COMPUTERS workflow within the radiology department.
● INTERNET BECAME A TURNING POINT IN Scheduling - The RIS allows staff to make
THE CIS EVOLUTION appointments for both inpatients and outpatients.
Patient Tracking - Using a RIS system, providers can
CIS now… track a patients entire radiology history from admission
● Cardiology information systems nowadays have to discharge and coordinate the history with past,
unique features that enable remote access and present, and future appointments.
easy retrieval. Some CIS have also attempted to Result Reporting - A RIS can generate statistical
integrate with a Radiology Information System to reports for a single patient, group of patients, or
create a Cardiovascular Information System that particular procedures.
is capable of more than just storage, particularly Image Tracking - Traditionally, radiology providers uses
involving more administrative processes RIS to track individual films and their associated data
Billing - RIS systems provide detailed financial
Functionalities record-keeping and process electronic payments and
automated claims, though these functions are becoming
Editing, Viewing and Storing MultiModal Cardiology incorporated into medical organizations’ overall EHR
Data - All data relevant to cardiology is consolidated systems.
and managed on a single platform
Remote Access - Cardiology data anywhere you need
it.
Visualization and Reporting Capabilities - Ease and
consistency in reporting.
EHR Integration - Offers a more comprehensive view
of the patient care spectrum
.
Benefits and Features
● Ease of access while maintaining data
security - No need to seek multiple
departments, CIS consolidates all cardiology
data in one system
● Flexibility in the workflow - This allows doctors
to access cardiology data anywhere they go,
offering improved efficiency in their service
● Enhanced Comparability - Allows healthcare
professionals to make more informed decisions
for the benefit of their patient
MATERIALS MANAGEMENT SYSTEM Alignment With Sales Projections

making sure that services go successfully from one • Sales projections can be wildly inaccurate
source to an end user difficult to predict disease and accident
lessens expenses and ensures adequate cash flow patterns, and patients are notoriously
MATERIALS MANAGEMENT INFORMATION SYSTEM reluctant to switch doctors, hospitals, and
(MMIS) manage functions like purchasing, accounting, health insurance
inventory management, and patient supply charges • It prevents waste, frees up cash that would
have gone to excess inventory and helps
FUNCTIONS OF MMIS
medical companies identify trends they
• PURCHASING might not have seen before

Compliance With Regulations

• A company that routinely fails to serve the best


interests of patients can quickly find itself being
investigated, sued, or simply shunned by health-
care consumers
• Knowing what inventory is on hand and what
items are needed can keep a medical company
responsive and prevent closer scrutiny by
regulators.
WAYS TO MAKE PURCHASE QUOTATIONS:
Single quotations- manually or out of a purchase Establishing Buying Cycles
requisition
Multiple quotations- the purchase quotation wizard
could be used • Instead of responding to needs for supplies and
Quotation- created from sales orders by using the equipment, inventory personnel can anticipate
procurement confirmation wizard needs based on previous cycles -> can eliminate
shortages and overages.
• Tracked to determine whether trends are
INVENTORY CONTROL shifting and need to be adjusted.
• Inventory is one of the biggest expenses for
most medical institutions (Johnston, 2014) ITEM MASTER MAINTENANCE- MEDICAL AND NON-
• Plays an important part in refining the quality of MEDICAL INVENTORY ITEMS
healthcare services Lives of people are on the
line, as well as because medical costs are INVENTORY ITEM MAINTENANCE
increasing • The upper portion contains master information
• “Item Tab” is used for maintenance of the
STRATEGIES TO IMPROVE INVENTORY CONTROL: attributes of an inventory item, such as product
type, item class, item type, etc.
Making Sure Shippers Are Accurate • “Item Availability” form specifies
• Most medical suppliers use third-party shippers, inventory levels across all warehouses
and the tracking system must ensure that the
correct supplies were loaded at the warehouse
• Reveal whether medical supplies have been
properly handled in transit.
ITEM INDENTS AND ISSUES • seller's point of view -> intention to sell and is
referred to as a sales order
• In some cases, items are damaged either upon
orders become a contract between the buyer
receiving from the supplier or during the move
and seller.
from the source to another location
• Some suppliers allow returns of the said goods
that have indents or the like, with a guarantee INVOICES
of replacement without any additional
• invoice or bill is a commercial document issued
payments
by a seller to the buyer, indicating the products,
• Damaged items are moved to another
quantities, and agreed prices for products or
warehouse for them to be monitored.
services the seller has provided the buyer
• indicates the sale transaction only.
RE-ORDER LEVEL, RE-ORDER QUANTITY, MINIMUM
AND MAXIMUM LEVELS FOR EACH STORE
DOCUMENTS
• Re-order level is the minimum quantity of an
• Documents need to be created in order to
item that a company has in stock, so when the
enable a quotation, order, invoice, tax forms etc.
stock reached the minimum quantity stated, the
to be used
item must then be re-ordered
• These documents are statutory requirements to
Min/Max inventory ordering method enable smooth transition of the processes
involved in successfully completing a sale /
• The ”Min” value is representative of a stock
purchase.
level that prompts a re-order, and the “Max”
value is representative of a new targeted stock
level that follows the re-order. COMPARISON OF QUOTATIONS AND PREFERRED
Economic Order Quantity (EOQ) -> main VEDNOR DOR EACH ITEM
difference of these two—Max and Min
PURCHASE QUOTATIONS

• document for requesting prices and delivery


ENQUIRIES AND QUOTATIONS FOR DRUGS,
information from a vendor before the purchase
CONSUMABLES, ASSETS AND GENERAL ITEMS
order.
• complete history of the sourcing process: create
Enquiries - start point of a sale or purchase process a purchase quotation -> send the document to a
lead to getting information from a vendor/supplier for vendor when a response from the vendor is
the requirement at hand establishing a connection with received, with a list of prices and delivery dates,
the right vendor/supplier in order to get a quotation, one can enter the information in the purchase
place the order and receive the requirements. quotation
Quotations- state important information such as price, • the information tracked enables one to choose
delivery times, delivery details, payment terms, taxation the right vendor for the purchase
etc. • helps in lessening expenses, improving the
quality and increasing on-time delivery
• allows one to compare offers in order to pick
ORDER the appropriate vendor for the purchase
scenario
• stated intention, either spoken or written, to
engage in a commercial transaction for specific
products or services
• buyer's point of view -> expresses the intention
to buy and is called a purchase order
PREFERRED VENDORS Shipping Date: when the goods will be delivered to the
SEVERAL QUALITIES OF A PREFERRED VENDOR THAT A final location
COMPANY LOOKS FOR ARE: Billing Address: location of where the invoice should
be sent so the Buyer can pay
• On-time performance
Signature: signature of Buyer offering to buy and
• Reasonable costs signature of Seller accepting
• High quality of products and services Order Date: when the business transaction occurred
• Fully licensed, bonded, and insured
• Good Business practices
APPROVAL PROCESS
PURCHASE REQUESTS, ORDER CREATION AND
• Originator- The person who creates the
APPROVAL PROCESS
document, either a purchase request or order
• An internal request is immediately sent to the
PURCHASE REQUEST first approval stage when the approval process
is launched
• Purchase Request or Purchase Requisition is a • This request is received in the Messages/Alerts
document that notifies the purchasing Overview window, and the approver can access
department that certain items or services need the document
to be replenished • Approval can be done through a mobile phone if
• The document stipulates a timeframe and the devices are integrated
required quantities for the items requested. In • Internal notification goes back to the originator
certain instances, it also contains authorization with a link to the rejected document should the
to acquire assets approver reject the document
• For enhanced accountability and documentation • The originator can amend the document, and
purposes, some companies require a purchase the approval procedures will continue until the
requisition for all purchases, but others only approval conditions are adequately satisfied
require them for specific kinds of purchases,
such as those that would require greater capital
outlay. RECEIPT AND INSPECTION OF GOODS:

PURCHASE ORDERS
Signing for Deliveries
• a document which records a business
transaction between the buyer and the seller • the person receiving the product should sign the
• buyer issues his order, and upon seller receiving documents provided by the supplier or
acceptance of the order, a legally binding shipping company.
contract is created between the parties • inspect the items before signing the receipt and
should also initial the packing list.
A simple Purchase Order will identify the following
• submit the packing list to the appropriate
basic elements:
person (Accounts Payable, Requester, Asset
Management) for financial reconciliation.
Buyer: name, address, and contact info of party giving
money for goods
Refusing Delivery
Seller: name, address, and contact info of party
receiving money for goods • departments should refuse to accept shipments
Order Number: a unique ID number to track each if they are unable to confirm that the order was
business transaction placed by their department, or if the packing
Item Description: details, quantity of goods, cost per appears sufficiently damaged to warrant
unit, and total price of goods concern.
Shipping Address: where the goods will be shipped
Record Retention PURCHASE RETURNS ALONG WITH RETURNABLE/NON-
RETURNABLE GATE PASS
• The receiving Department takes physical
possession and legal ownership of the
shipment. • Defective or substandard quality goods,
• provide the department with a packing list for incorrect order delivery, and deterioration
all shipments delivered to the among inventory purchased and sold are usually
department. common in business
• If the supplier fails to provide the packing list, • When purchased goods are returned, the
the department should contact the supplier to material management system updates inventory
request that copies be sent to the department levels to reflect the decrease in quantity.
for its files. • Supplies and equipment are also sometimes
• The need for saving receiving documents is required to be taken out of the department for
particularly important when accepting any repairs or consignment
partial or staggered deliveries over a period of temporary movement Returnable Gate Pass is
time. issued
• Non-returnable Gate Pass permanent
movement.
1. The products conform to the purchase order • The material management system can be
requirements and other relevant configured to track returnable and non-
documents (for example: correct model returnable items of inventory or equipment
number, description, size, type, color, ratings, monitor due dates for returnable items, and
etc.) provide detailed reports about the status of
2. The quantity ordered against the quantity different inventory items.
shipped or delivered.
3. There is no damage or breakage.
CONSIGNMENT STOCK RECEIPT, CONSUMPTION, AND
4. The unit of measurement count is correct (e.g. if
REGULARIZATION
the unit of measurement on the purchase order
is one dozen, there should be 12 in the • Consignment- the vendor or consignor issues
package). materials to the receiver or consignee, and
5. Delivery documentation (packing list, these materials are stored on the consignee’s
certifications, etc.) is acceptable. premises.
6. Perishable items are in good condition and • The vendor maintains legal ownership until such
expiration dates have not been exceeded. materials are removed from consignment
7. Products are operable or functional. stores.
• The invoice is due at predetermined intervals,
such as monthly.
Partial Deliveries
• Customers can also arrange to take over
• Departments should contact the appropriate ownership of the remaining consignment
Purchasing Agent whenever a purchase is material after a certain period of time
received as a partial delivery without
acknowledgment or notification from the
EXPIRED STOCK AND QUARANTINE
supplier. This information is typically noted on
the packing list.
EXPIRED STOCK/INVENTORY
Tracking of Goods
• Upon reaching their expiration dates, some
• Goods can be easily tracked /traced when they
goods, such as food and medicine, can no longer
are managed by Serial or Batch.
be utilized.
Aging of products can also be done if the items
are slow moving/stay longer in the warehouse.
• It may be sold to other parties at a lower cost. LIFO, FIFO, FEFO ISSUES METHODS
• inventory expires and its value falls below its
First In, First Out (FIFO) – Inventory items are sold in the
original cost this must be reflected in the
order they are purchased. This is the most common
financial records so as not to misstate the
technique.
financial statements.
Last In, First Out (LIFO) – The last to enter the system
• The amount that reduces inventory in your
are sold first. This is common among non-perishable
records is recognized as a loss that is a reduction
items like petroleum, minerals, and metals.
in profit
First Expired, First Out (FEFO) – Materials are sold
based on date they should be consumed, regardless of
QUARANTINE STOCK/INVENTORY when it was purchased.

• Inventory is put into quarantine if initially


rejected during -> Production, upon completion GENERIC TAX FORMULA CONFIGURATIONS
of an operation, when specified as Move
• Material Management Systems usually allow tax
Rejected End Item to Quarantine.
rates to be defined internally via tax codes, or
Inbound inspection upon receipt of: imported from an external source
-Tax on sales and purchases
➢ Manufactured end items Purchased items -Additional taxes like VAT
➢ Sold items on sales return orders -Sales and Use tax as in USA
➢ Enterprise Planning distribution orders -Withholding tax like income tax in India
➢ Outbound inspection upon issue of:
Materials to production
PERIODIC PHYSICAL STOCK-TAKING AND
ADJUSTMENTS WITH TRACKING
DRUGS AND CONSUMABLE ISSUES AND RETURNS TO
PATIENTS • An inventory count is a process where a
business physically counts its entire inventory
- Inventory services provide labor and
• 30 to 50% of hospital charges are actually automation to quickly count inventory and
attributable to diagnostics, drugs, and minimize shutdown time.
consumables, and doctors get only between 10 - Inventory control system software can speed up
to 20% the physical inventory process.
• drugs and consumables take up the bulk of - A perpetual inventory system tracks the receipt
expenditure and use of inventory and calculates the quantity
• Material Management Systems become on hand.
advantageous -> provides an overview of the - Cycle counting, an alternative to physical
entire institution’s purchasing and inventory inventory, may be less disruptive
control processes, decision- makers can have
more reliable information, and can monitor the • Barcode and RFID are supplementary
bigger picture technologies that can be used in combination
with the Material Management System in order
to have more accurate and less burdensome
inventory counts
Clinical Data Repositories
Federation - A repository distributed across multiple
 Houses a multitude of laboratory results, locations, where each location retains control over access
diagnostic reports, and various clinical to its own data, and is responsible for making the data
documentation comparable with the data of other locations.
 Data are readily searchable and exportable,
MULTIPLE VIEWS FOR PATIENT MEDICAL RECORD
often because the information is gathered from
standard clinical care procedures (Robertson  Structure of clinical data repositories allows
and Williams, 2016) data to be extracted along dimensions such as
 Integrates physician-entered data with data time (by year, month, week, or day), location, or
from different existing information systems diagnosis among many others
including laboratory, radiology, admission, and  User can view the number of patients with
pharmacy among others having a certain type of diagnosis, lab result, or
 Location where both clinical data and other data prescription within a year, then a month in that
of interest, such as external data sources and year, and further into a day in that month
financial data, are assimilated  Allows clinicians to trend and chart results
independent of the visits and test panel
Common kinds of available information in the CDR:
organization.
 Patient Demographics  Provide access to information where it is
 Hospital Inpatient Visits needed. Creates a “one-stop shopping”
 Diagnoses environment
 Patient’s Primary Care Provider  GUI access can be deployed through hand-held
 Emergency Department Encounters devices, bedside computing devices, computers
 Procedures in physician offices, or computing devices
 Medication List deployed at nursing stations
 Outpatient Visits  Cross-continuum view of information, since they
 Laboratory Results allow information to be gathered and viewed
 Allergies from sources other than an acute setting.
 Immunizations
 Social History GRAPHICAL REPRESENTATION OF LAB RESULTS AND
 Vitals VITALS

 The electronic health record may present


Types of Clinical Data Repository patient care information as text, tables, graphs,
sounds, images, full-motion video, or signals on
Study - A database that collects observations for a an electronic screen, phone, pager, or
specific clinical research study. paper (Bronzino and Peterson, 2014)
Electronic Health Record - A database of observations
made as a result of direct health care.
Registry - Observations collected and organized for the
purpose of studying or guiding particular outcomes on a
defined population. Associated studies are either multiple
or long term and evolving over time.
Warehouse - A repository that adds level of integration
and quality to the primary (research or clinical) data of
single institution, to support flexible queries for multiple
uses. Is broader in application than a registry.
Collection - A library of heterogeneous data sets from
more organizations than a warehouse or more sources
than a registry. Organized to help users find a particular
data set, but not to query for data combined across data
sets.
ETHICS, PRIVACY, AND SECURITY  Beneficence and Non- maleficence
Defined as “do good” and “do no harm”,
respectively.
Content
 Beneficence relates most significantly with the
 Ethics in Health Informatics use of the stored data in the EHR system
-General Ethics  Non-maleficence with data protection
-Informatics Ethics
-Software Ethics
Principle of Beneficence in Health Informatics
 Privacy, Confidentiality and Security
-Levels of Security in HIS  Conduction of groundbreaking biomedical and
-Levels of Security in LIS public health research
-Data Privacy Act
Principle of Non- maleficence in Health Informatics
Health informatics Ethics
 Temporary Outage
 Application of the principles of ethics to the  Total System Failure
domain of health informatics  Data Security

Ethics in Health Informatics Informatics Ethics

 Principle of Information-Privacy and Disposition


– All have fundamental right to privacy
– Thus the control over the collection, storage,
access, use, communication, manipulation,
linkage and disposition of data about
themselves

 Principle of Openness
– The collection, storage, access, use,
communication, manipulation, linkage and
disposition of personal data must be disclosed
General Ethics in an appropriate and timely fashion to the
Autonomy subject or subjects of those data

 Defined as either allowing individuals to make  Principle of Security


their own decisions in response to a particular – Data that have been legitimately collected
societal context, or as the idea that no one about persons or groups of persons should be
human person does not have the authority nor protected by all reasonable and appropriate
should have power over another human person measures against loss degradation,
 Electronic health records (EHR) must maintain unauthorized destruction, access, use,
respect for patient autonomy, and this entails manipulation, linkage, modification or
certain restrictions about the access, content, communication.
and ownership of records  Principle of Access
 Limiting patient access and control over patient – The subjects of electronic health records have
records improves document quality because the right of access to those records and the
they can become proofreaders of their own right to correct them with respect to its
patient history (Mercuri, 2010). accurateness, completeness and relevance.
 Principle of Legitimate Infringement  Developers should strive to build products that
– The fundamental right of privacy and of are of high standard, by thoroughly testing and
control is conditioned only by the legitimate, detailing unresolved issues.
appropriate and relevant data-needs of a free,
responsible and democratic society, and by the
Privacy, Confidentiality and Security
equal and competing rights of others
 Privacy generally applies to individuals and their
 Principle of the Least Intrusive Alternative aversion to eavesdropping
– Any infringement of the privacy rights of a  Confidentiality is more closely related to
person or group of persons, and of their right of unintended disclosure of information
control over data about them, may only occur in
the least intrusive fashion and with a minimum  Privacy and confidentiality are widely regarded
of interference with the rights of the affected as rights of all people which merits respect
parties. without need to be earned, argued, or defended
 Protection of privacy and confidentiality is
 Principle of Accountability ultimately advantageous for both individuals
– Any infringement of the privacy rights of a and society
person or group of persons, and of the right to
control over data about them, must be justified
to the latter in good time and in an appropriate  Privacy and confidentiality protection also
fashion. benefits public health.

Software Ethics  When people are not afraid to disclose personal


information, they are more inclined to seek out
 The software developer has ethical duties and professional assistance, and it will diminish the
responsibilities to the following stakeholders: risk of increasing untreated illnesses and
Society spreading infectious diseases (Goodman, 2016).

 Best interest of the society. Developers should  When breaches of privacy and confidentiality
be mindful of social impacts of software occur -> serious consequences for your
systems. organization, such as reputational and financial
Includes disclosing any threats or known defects harm, or harm to your patients
in software
 Poor privacy and security practices heighten the
Institution and employees vulnerability of patient information and
increases the risk of successful cyber-attacks
 Best interests of the institution and its (USA Department of Health and Human
employees, while balancing their duties to the Services, 2015).
public, including being straightforward about
personal limitations and qualifications
Obligations to protect privacy and to keep confidences
fall on:
 The software developer has ethical duties and
responsibilities to the following stakeholders: –System designers
–Maintenance personnel
–Administrators
Professional Standards and, ultimately, to the:
–Physicians
 Software products should meet expected
–Nurses
professional standards.
–Other frontline users of the information legitimate need; and
Comprehensibility and control: ensuring that record
owners, data stewards, and patients understand and have
Levels of Security in the Hospital Information effective control over appropriate aspects of information
System privacy and access.

Administrative Safeguards Levels of Security in the Laboratory Information


 Continual risk assessment of your health IT
environment
System
 Continual assessment of the effectiveness of
Register Patient - Patient record (eg. ID number, name,
safeguards for electronic health information
sex, age, location) must be created in the LIS before tests
 Detailed processes for viewing and administering
can be ordered. LIS usually automatically receives these
electronic health information
data from a hospital registration system when a patient is
 Employee training on the use of Health IT to
admitted.
appropriately protect electronic health information
Order test - Physician orders tests on a patient to be
 Appropriately reporting security breaches (eg. To
draw as part of the laboratory's morning blood collection
those enteties required by law ir contract) and
rounds. The order is entered into the CIS and
ensuring continued health IT operations.
electronically sent to the LIS.
Collect sample - Before morning blood collection, the LIS
Physical Safeguards
prints a list of all patients who have to be drawn and the
 Office alarm systems
appropriate number of sample bar-code labels for each
 Locked offices containing computing equipment that
patient order. Each barcode has a patient ID, sample
store electronic health information
contained, and laboratory workstation that can be used
 Security guards
to sort the tube once it reaches the laboratory. Another
increasingly popular approach is for patient caregivers or
Technical Safeguards
nurses to collect the blood sample. Immediately prior to
 Securely configured computing equipment (eg. Virus
collection, sample barcode labels can be printed (on
checking, firewalls)
demand) at the nursing station on an LIS printer or
 Certified applications and technologies that store or
portable bedside printer.
exchange electronic health information
Receive Sample - When the samples arrive in the
 Access controls to health IT and electronic health
laboratory, their status has to be updated in the LIS from
information (eg. Authorized computer accounts)
"collected" to "received." This can be done by scanning
 Encryption of electronic health information
each sample container's barcode ID into the LIS. Once the
 Auditing of Health IT operations
sample is "received," the LIS transmits the test order to
 Health IT backup capabilities (eg. Regular backups of
the analyser who will perform the test.
electronic health information to another computer
Run sample - The sample is loaded onto the analyser,
file server)
and the bar code is read. Having already received the test
5 Key Function order from the LIS, the analyser knows which tests to
perform on the patient. No work list is needed. For
Availability: ensuring that accurate and up-to- date manually performed tests, the technologist prints a work
information is available when needed at appropriate list from the LIS. The work list contains the names of the
places; patients and the tests ordered on each. Next to each test
Accountability: helping to ensure that health care is a space to record the result.
providers are responsible for their access to and use of
information, based on a legitimate need and right to Levels of Security in the Laboratory Information System
know;
Review Result - The analyser produces the results and
Perimeter identification: knowing and controlling the
sends them to the LIS. These results are only viewable to
boundaries of trusted access to the information system, technologists because they have not been released for
both physically and logically; general viewing. The LIS can be programmed to flag
Controlling access: enabling access for health care certain results —for example, critical values so the
providers only to information essential to the technologist can easily identify what needs to be repeated
performance of their jobs and limiting the real or or further evaluated.
perceived temptation to access information beyond a
 Automatic log-off after long periods of inactivity
Release Results - The technologist releases the results.
Unflagged results are usually reviewed and released at Data Privacy Act of 2012
the same time. The LIS can also be programmed to  Aim “to protect the fundamental human right of
automatically review and release normal results or
privacy, of communication while ensuring free
results that fall within a certain range. The latter
flow of information to promote innovation and
approach reduces the number of tests that a technologist
has to review. Upon release, the results are automatically growth.” (Republic Act. No. 10173, Ch. 1,
transmitted to the CIS. Sec. 2)
 Data Privacy Act applies to individuals and legal
Report Results - The physician can view the results on entities that are in the business of processing
the CIS screen. Reports are printed when needed from the personal information.
LIS.  The law applies extraterritorially
Safeguards for the Laboratory Information System  It covers the personal information of Filipino
citizens regardless of the place of residence.
Administrative Safeguards  The main principles that govern the approach
for the Data Privacy act include:
 Continuous employee training on the use of the LIS
– Transparency;
 Periodic review of standards in identifying which – Legitimacy of purpose; and
results should be flagged – Proportionality
 Strengthen laboratory authorization and supervision
 Consent is one of the major elements highly-
policies
valued by the Data Privacy Act.
 Implement strict rules and regulations regarding the  The act provides that consent must be
testing procedures documented and given prior to the collection of
all forms of personal data, and the collection
 Release guidelines on proper disposal of laboratory
must be declared, specified, and for a legitimate
specimen
purpose.
 Enforce policies on the proper use of laboratory  Furthermore, the subject must be notified
workstations Impose disciplinary measures as about the purpose and extent of data
needed processing, with details specifying the need for
automated processing, profiling, direct marketing,
Physical Safeguards
or sharing.
 Periodic maintenance of laboratory equipment  These factors ensure that consent is freely-
given, specific, and informed.
 Biometrics or other security protocol for  However, an exception to the requirement of
laboratory access consent is allowed in cases of contractual
agreements where processing is essential to
 Controlled temperature both for equipment and
pursue the legitimate interests of the parties,
specimen
except when overridden by fundamental rights
 Contingency operations plan and freedom.
 Such is also the case in responding to national
 Use of appropriate personal laboratory safety emergencies.
equipment

Technical Safeguards

 Automated identity confirmation procedures for


users requesting access

 Regular change of username and password

 Different access capabilities based on user position


Data Privacy Act describes sensitive personal
information as those being:
– About an individual’s race, ethnic origin, marital
status, age, color, and religious, philosophical or political
affiliations;
– About an individual’s health, education, genetic or
sexual life of a person, or to any proceeding or any
offense committed or alleged to have committed;
– Issued by government agencies “peculiar” (unique) to
an individual, such as social security number;
- Marked as classified by executiv

order or act of Congress.

Data Privacy Act of 2012

Exceptions

 Consent of the data subject;


 Pursuant to law that does not require consent;
 Necessity to protect life and health of a person;
 Necessity for medical treatment;
 Necessity to protect the lawful rights of data
subjects in court proceedings, legal
proceedings, or regulation

The act provides for different penalties for varying


violations, majority of which include imprisonment.
These violations include:

 Unauthorized processing
 Processing for unauthorized purposes
 Negligent access
 Improper disposal
 Unauthorized access or intentional breach
 Concealment of breach involving
sensitive personal information
 Unauthorized disclosure; and
 Malicious disclosure

Penalty

 Any combination or series of acts


enumerated above shall make the person
subject to
imprisonment ranging from three (3) years to six
(6) years, and a fine of not less than One million
pesos (Php1,000,000.00) but not more than Five
million pesos (Php5,000,000.00) (Republic Act.
No. 10173, Ch. 8, Sec. 33).
CHANGE IN HEALTH INFORMATICS Proski’s ADKAR® Model

• “Awareness of the business reasons for change;


4 TYPES OF CHANGE • Desire to engage and participate in the change;
• Knowledge about how to change,
• Operational changes can influence the way
• Ability to implement change, and;
dynamic business tasks are led, including the
• Reinforcement to ensure change sticks”.
computerization of a particular business
segment. Kotter’s 8-Step Model of Change
• Strategic changes occur when the business
direction, in relation to its vision, mission, and • Developed by Harvard Business School’s John
philosophy, is altered. Kotter
• Cultural changes influence the internal • Focuses on efficient and effective change
organizational culture management in a competitive world.
• Political changes in human resources occur • Building a strong, collaborative team and a solid
primarily due to political reasons of varying strategy;
types • Creating effective communication channels;
• Supporting staff empowerment;
• Using a phased and steady approach; and
OVERVIEW OF CHANGE MANAGEMENT • Securing the change within an organization’s
• Organizations are driven to change in order to culture
respond to the many pressures they encounter
from their environment.
• These pressures usually include:
-Global competition;
-Changes in customer demand;
-Technological advances;
-New legislation

CHANGE MANAGEMENT PROCESS MODELS


APPLICATION OF CHANGE MANAGEMENT
Kurt Lewin’s three-step “Unfreeze- Change-Refreeze”
model Change management is a series of tools, techniques and
processes aimed at successfully effecting change.
• Proposed by the universally recognized founder
of social psychology in the 1950s.
• Highly relevant today and often used as the Downey (2008) described common tools and
basis for many change management strategies. techniques that a change management practitioner
might use during a change initiative, which include:

• Questioning skills to gather information about


the ‘as is’ and ‘to be’ status of the business
process
• Process mapping for both ‘as is’ and ‘to be’
processes
• Gap analysis
• Business case development
• Project management
• Problem solving
• Requirements elicitation techniques • Frequently celebrate success by honoring
Negotiation skills contributors to keep the motivation and
momentum
• Monitor and measure key indicators (e.g. using
It is crucial that progress of the change initiative can be
a dashboard to report progress and
quantified against the objectives set by the
benchmarks)
organization. These KPIs might include:
• Involve those affected by the change in
• Reducing rework by x% decision- making (e.g. choice of computer carts,
• Improvement in stakeholder satisfaction, for COW)
example, customer/employee surveys • Other creative actions e.g. monthly prizes for
• Reduced time to market high performing teams, provide snacks & drinks
• Enhanced speed of delivery
• The return on investment, that is, the total cost HEALTH INFORMATION PROFESSION
to implement the initiative versus total savings
gained from the initiative per period.
• Health Information Management (HIM)
professionals, credentialed with their academic
Key success factors at the leadership level in healthcare
preparation, work experience, commitment to
organizations
patient advocacy, and professional code of
• Setting vision and strategy roadmap ethics, have a specialized skill set that uniquely
• Formation of governance board to set direction, qualifies them to assume the role both of
to prioritize work, and to allocate resources privacy official and/or security officials who
• Designate an executive sponsor, departmental store, protect, and transmit information in all
champions, and program manager media and formats
• Define reporting requirements for status • Stewards and guardians of patient health
reporting in order to keep projects moving information
forward • They represent the patient’s interests in matters
• Manage users’ expectations; prepare them for of privacy and security, information release,
casualties, stress, and general sense of issues and guidelines regarding record access,
ambiguity and general consumer education about personal
health records.
• They specialize in managing patient health
Key success factors at the program level information and medical records, administering
• Clear and frequent dissemination of information computer information systems, and classifying
using standard coding systems, the diagnoses,
• Building a strong project leadership
and procedures for health care services
team/steering team and other action/functional
provided to patients.
teams
• Committed to the timely and accurate collection
• Providing education and training on the new
of health information and its maintenance,
changes – workflow and technology
storage, retention, and disclosure, Health
• Forming integrated problem-solving teams to
Information Management Professionals ensure
address critical and complex issues
that such information is kept private, secure,
• Empowering staff and end-users to change
and in accordance with federal and state laws.
things, by removing barriers and obstacles
• Adoption - make the change stick by
reinforcement, until old traditions are replaced
with new
A Health Information Management Professional: • providing accurate coding of diagnoses and
procedures from patient visits with health care
• Collects, aggregates, analyzes, and disseminates
providers, ensuring accurate patient billing and
patient health information.
proper reimbursement to health care providers
• Committed to the timely and accurate collection
• compiling and analyzing health care data from
of health information and its maintenance,
patients, assisting with the identification of
storage, retentions, and disclosure.
ways to better utilize health care resources,
• Represents patients’ interest in matters of
uncovering public health patterns, improving
privacy and security, information release, and
patient care, and providing critical information
issues and guidelines regarding record access.
for health care research
• developing policies to support the delivery of
A Health Information Management Professional: high quality health care by ensuring the
availability of quality information for accurate
• Certified by the American Health Information health care decision making.
Management Association
• Ensures confidential patient information is kept
private, secure, and in accordance with federal TELEMEDICINE IN THE PHILIPPINES
and state laws
• Common features include 24/7 call centers,
diagnosis using images sent via email, medical
Health Information Management Professionals fall into certificates, and treatment plan summaries.
many job categories with varied titles, including: These kinds of telemedicine centers usually
have a corresponding mobile app to facilitate
easier access.
• Health Information Management Department • Some may have video consultation with doctors,
Director patient education, free doctor or nurse home
• Health Information Management System visits, and delivery of medication and
Manager prescriptions in exchange for a fixed monthly
• Information Security Officer subscription fee.
• Chief Privacy Officer
• Health Data Analyst • Over-the-phone telemedicine providers:
• Health Record Technician Specialist - Medgate
• Clinical Coding Specialist - Lifeline
• Patient Information Coordinator
• Physician Practice Manager • Mobile App-based Telemedicine centers:
• Health Information Administrator - MyPocketDoctor
• Revenue Cycle Specialist - MyDocNow
• Director of Quality Management
• Health Information Manager
The National Telehealth Center is the leading research
• Health Information Technologist/Technician
unit in the University of the Philippines responsible for
developing cost effective tools and innovations in the
The typical day-to-day activities of a Health realm of information and communications technology
Information Management Professional include: (ICT) for improving health care.

• collecting, aggregating, analyzing, and Department of Science & Technology (DOST) has also
disseminating patient health information for begun distributing the breakthrough “RXBox”
doctors’ offices, hospitals, managed care telemedicine device developed by engineers and
organizations, insurance companies, research researchers from University of the Philippines (UP)
and policy agencies, and other health care
facilities and related industries
Diliman and UP Manila

RXBox has features that enable teleconsultations via


email, video call, or SMS.

It has sensors that can measure a patient’s blood


pressure, temperature, oxygen saturation rate, pulse
rate, and even the electrocardiogram rate, and this
information may all be sent to the specialist doctor via
email or SMS, aiding in patient care.

Afterwards, the RXBox stores and files data into a


community health information system (Ronda, 2016).

You might also like