Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    data analytics for pharmacy trends
    How Data Analytics Is Tracking Trends in the Pharmacy Industry
    5 Min Read
    car expense data analytics
    Data Analytics for Smarter Vehicle Expense Management
    10 Min Read
    image fx (60)
    Data Analytics Driving the Modern E-commerce Warehouse
    13 Min Read
    big data analytics in transporation
    Turning Data Into Decisions: How Analytics Improves Transportation Strategy
    3 Min Read
    sales and data analytics
    How Data Analytics Improves Lead Management and Sales Results
    9 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Safeguarding Patient Data in EHRs
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Big Data > Data Mining > Safeguarding Patient Data in EHRs
Data MiningData WarehousingSecurity

Safeguarding Patient Data in EHRs

onlinetech
onlinetech
5 Min Read
SHARE

A recent blog by the HIPAA, HITECH & HIT legal blog of Fox Rothschild revealed a survey administered by the Office of Inspector General (OIG) of the U.S. Dept. of Health & Human Services (HHS). The EHR (electronic health record) technology questionnaire is part of a study on fraud and abuse safeguards in EHRs.

A recent blog by the HIPAA, HITECH & HIT legal blog of Fox Rothschild revealed a survey administered by the Office of Inspector General (OIG) of the U.S. Dept. of Health & Human Services (HHS). The EHR (electronic health record) technology questionnaire is part of a study on fraud and abuse safeguards in EHRs.

The questionnaire may serve as insight for hospitals attempting to establish safeguards with their digital systems to protect electronic protected health information (ePHI) and prevent a potential HIPAA violation. The topics include:

Basic EHR Information
This includes what type of EHR technology is used, whether a commercial vendor product, internally developed, or a hybrid solution using both vendor and internally developed products. Additionally, it includes whether or not the hospital is part of a network of hospitals that use the same EHR technology, and the length of time the hospital has been using it.

More Read

Web 2.0 – Ensuring Your Data is the Asset
“We’re developing a bag of algorithms to be plugged together,” said William Pulleyblank, chief of…”
Predicting the next Viral Tweet
Measuring Solid State Storage Performance: A Journey Through Time
The Hidden Dangers Of The Internet of Things [Infographic]

A question regarding how diagnoses and procedures are coded includes the options of manually coded by professionals, or automatic software coding. The OIG is also interested in whether or not the hospital has plans to adopt computer-assisted coding.

Access Controls
The survey asks about the following user authorization controls used to limit access to the EHR system:

  • Unique user ID/Password
  • Token-based (the use of an ID card, or badge)
  • Biometrics (could be in the form of a fingerprint to validate identity)
  • Public-key (digital certificates)

In addition, the survey asks about the following access control policies and procedures:

  • Automatic user log-off/session time-out
  • Minimum password configuration rules
  • Regularly changing passwords
  • User agreements or contracts to prevent password sharing

Tracking Outside Entities (Third-Parties)
The OIG asked questions about third-party (i.e., payers) access to EHR systems, and how they connect, whether remotely or on-site. They are also interested in tracking third-party system activity with unique user IDs, and the specific limitations hospitals put on third-party access to their systems (and, if any, types of data and types of control).

Another question brings insight into the OIG and their interest in barriers that may exist, prohibiting outside entities from accessing EHR systems. This may be an indicator that secure, streamlined information exchange is a priority, as they list a number of barriers that include EHR technology/hardware doesn’t support capability; insufficient human resources; funding restrictions/additional costs to implement; insufficient EHR training; inability to integrate with existing systems; concerns with patient privacy and more.

Audit Logs
The survey asks about an EHR system’s audit log and tracking of access and changes, and the specific events that the audit log records:

  • Each entry or access into an EHR system
  • Signature events (proactive or auto default completion of a patient encounter)
  • Export of EHR document (printed, electronically exported, emailed)
  • Amendments, corrections or modifications of data
  • Import of data
  • Disabling of audit log
  • Release of encounter for billing
  • Access by an authorized outside entity

Specific audit data that is recorded may include:

  • National provider ID (NPI)
  • Data/Time/User stamps
  • Access type
  • Internet Protocol (IP)/Media Access Control (MAC) address
  • Network Time Protocol (NTP)/Simple Network Time Protocol (SNTP) synchronized time
  • Method of data entry
  • Data/Time/User stamp of author

Questions include who can delete, disable or edit the audit log, as well as who specifically analyzes log data, and how often. Daily log review is required to meet PCI DSS compliance, and it is highly recommended to meet HIPAA compliance. HIPAA requires the ability to monitor log-in attempts and reporting discrepancies (§164.308(a)(5)(ii)(C) of the HIPAA Security Standards Administrative Safeguards). As a subset of the Security Awareness and Training Standard (§164.308(a)(5)), log-in monitoring requires tracking failed log-in attempts to make workforce members aware of password management and system use.

Find out more about the technical, administrative and physical security services needed to meet HIPAA compliance, and more about HIPAA hosting requirements for vendors and covered entities by reading our HIPAA Compliant Hosting white paper.

Related Links:
The HIPAA Police Are On Their Way!

References:
OIG EHR Questionnaire Focuses on Fraud Safeguards

TAGGED:EHRhipaa
Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

dedicated servers for ai businesses
5 Reasons AI-Driven Business Need Dedicated Servers
Artificial Intelligence Exclusive News
data analytics for pharmacy trends
How Data Analytics Is Tracking Trends in the Pharmacy Industry
Analytics Big Data Exclusive
ai call centers
Using Generative AI Call Center Solutions to Improve Agent Productivity
Artificial Intelligence Exclusive
warehousing in the age of big data
Top Challenges Of Product Warehousing In The Age Of Big Data
Big Data Exclusive

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

Increased Demands for BI within Healthcare IT

4 Min Read

How a HIPAA Breach Can Negatively Impact Your Business

4 Min Read
data privacy and HIPAA
Security

Data Analytics Solutions To HIPAA Compliance During Quarantine

6 Min Read
HIPPA compliance
Best PracticesBig DataData ManagementInside CompaniesITLocationPolicy and GovernancePrivacySecurity

HIPAA Breach Lessons Learned

5 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

giveaway chatbots
How To Get An Award Winning Giveaway Bot
Big Data Chatbots Exclusive
data-driven web design
5 Great Tips for Using Data Analytics for Website UX
Big Data

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?