http://www.emqus.com/index.php?/emq/article/achieving_organizational_security_and_user_nirvana_with_biometrics_and_other_forms_of_strong_authentication_559
This EMR access monitoring checklist will help you build a successful access monitoring review process to ensure compliance and meet HIPAA standards.
It was with great regret that I canceled my trip to Healthport’s first HIM Educational Summit earlier this week. (A rampant stomach bug claimed me as the last victim in our family of four, and so I thought my healthcare conference colleagues would, in fact, appreciate my absence.) I had been scheduled to moderate a discussion on the exchange of personal health information within an accountable care organization (ACO) – a topic that I thought I knew a lot about, until I began researching the subject.
In support of its “Better Health, Better Care” initiative, a strategy and action plan established by the Scottish Government in 2007, NHS Scotland wanted to remove unnecessary cost, delays and better manage the workflow complexity associated with accessing electronic patient data. Building the best security was also a key priority to help protect the increasing volumes of sensitive information while allowing for maximum clinician-patient service improvement.