SlideShare una empresa de Scribd logo
1 de 20
Cost and Security Challenges When
    Implementing An Electronic Health Record
Blue Team: Jamie Jackson
Purpose


 Purpose:
 • Discuss the challenges with cost and security of implementation of
   EHR

 • Discuss the causes and effects of these challenges

 • Discuss possible solutions
Problem Statement


 • With the unrelenting pressure and demand for implementing EHR,
   health care systems in the United States are facing many
   challenges with this process.
 • Two most critical factors underlying these challenges are cost of
   implementation and security during and once implemented
Methodology


   • Utilizing medical journals and other resources, as well as
     interviews with administrators and staff from leading hospitals
     and private practices, and health care organizations we were
     able to analyze the effects of these challenges as well as come
     up with possible solutions.
Healthcare
Organizations
Reviewed
 • Medical Center of Lewisville
    – 202 bed for profit community hospital
 • Children’s Medical Center
    – 559 bed not for profit pediatric hospital
 • Baylor Hospital of Plano
    – 112 bed not for profit county hospital
 • Dallas Associated Dermatologist
    – 50 year old dermatology facility
 • Health Information Management Systems Society
    – National Health Information Organization
Barriers to
Implementing EHR
Cost Analysis


 • Lack of adequate funding was cited by 729
   health care providers as the most significant
   barrier to adopting electronic records
 • Estimated that purchasing and installing EHR
   will cost over $32,000 per physician
 • Maintenance about $1,200 per month
 • Vendor costs account for 60-80% of these
Cost Analysis


 When implementing an EHR system there are
   several costs to consider:
 • Start Up Costs

 • Software Maintenance Costs before, during, and
   after implementation

 • Training costs
Cost Analysis
Cost Analysis
Security Analysis


 Michael Matthews, chief executive officer of health-information
   technology firm MedVirginia, said security is on everyone's
   mind.

   "Many in the field will argue that data is actually more secure in
   electronic format than paper," Matthews said. "There are audit
   trails left every time an electronic health record is accessed,
   who accessed it, what results within the record have been
   accessed. Whereas with paper records, you have no idea who
   has looked at it, who made copies, what has been taken out of
   it."
Types of Breaches
U.S. Department of Health & Human Services


  HHS.gov website gathered a list of breaches of unsecured
  protected health information affecting 500 or more
  individuals in the U.S.. They posted 108 reported types of
  breaches (2009-2010).

     -Types of breaches included: theft, improper disposal,
     unauthorized access, loss, hacking/IT incident, Incorrect
     mailing, other

     - Location of breached information: laptop, desktop,
     network server, email, portable devices, EHR, other
Security Analysis
Security Analysis
Security Analysis
Conclusions


 • This project has provided an opportunity to
   understand the EHR technology system and the
   challenges during implementation as it relates to
   cost and security. Understanding the benefits of
   the technologies and the problems experienced
   by doctors who use the technologies can help
   others make a better decision for their practice.
Findings

 •   No true monetary savings due to the purchasing of new technology, software,
     hiring and ongoing training

 •   Trade off: increased efficiency, accuracy and safety

 •   If any savings it would be among larger institutions, which already draw in
     enough revenue for the funding of EHR systems

 •   Cost outweighed security as the largest concern to the implementation of EHR

 •   Vendors have taken advantage of the necessity of implementing EHR by
     padding their prices

 •   Most security breaches are from carelessness among staff ,lack of training,
     inadequate funding for security
Recommendations


 • Quality leadership that embraces the goals of the organization
   regarding EHR
 • Training, training, training
 • Factor in additional equipment costs needed in addition to EHR
   product
 • Do not try to change the organization to meet the needs of the HER
 • Review and evaluate the organization as well as several different
   products
 • Make sure that EHR chosen is interoperable with technology
   already being used; i.e. billing systems, EMR
 • Look into discounts/perks offered by insurers for EHR use
References


 •   Breaches affecting 500 or more individuals. (2010). Retrieved from
      http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule/postedbreaches.html

 •   Ponemon Institute LLC, Initials. (2010, November 9). Dgs health law blog [Web log message].
                Retrieved from http://www.dgshealthlaw.com/uploads/file/Ponemon_Benchma
          k_Study_on_Patient_Privacy_and_Data_Security%5B1%5D%281%29.pdf
Questions/Answers

Más contenido relacionado

La actualidad más candente

MEDTECH 2013 Closing Plenary, Andy Shaudt, Director of Usability Services, Na...
MEDTECH 2013 Closing Plenary, Andy Shaudt, Director of Usability Services, Na...MEDTECH 2013 Closing Plenary, Andy Shaudt, Director of Usability Services, Na...
MEDTECH 2013 Closing Plenary, Andy Shaudt, Director of Usability Services, Na...MedTechAssociation
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...M2SYS Technology
 
Electronic Medical Records in the Philippines: Issues and Challenges
Electronic Medical Records in the Philippines: Issues and ChallengesElectronic Medical Records in the Philippines: Issues and Challenges
Electronic Medical Records in the Philippines: Issues and ChallengesRomsty
 
Breakout Session: Cybersecurity in Medical Devices
Breakout Session: Cybersecurity in Medical DevicesBreakout Session: Cybersecurity in Medical Devices
Breakout Session: Cybersecurity in Medical DevicesHealthegy
 
Protecting Healthcare Data from Hackers
Protecting Healthcare Data from HackersProtecting Healthcare Data from Hackers
Protecting Healthcare Data from HackersJoshua Spencer
 
A koene ai_in_command_control
A koene ai_in_command_controlA koene ai_in_command_control
A koene ai_in_command_controlAnsgar Koene
 
Hacking Into Medical Devices
Hacking Into Medical DevicesHacking Into Medical Devices
Hacking Into Medical DevicesJane Wang
 
Lecture 11A
Lecture 11ALecture 11A
Lecture 11ACMDLMS
 
Cybersecurity in medical devices
Cybersecurity in medical devicesCybersecurity in medical devices
Cybersecurity in medical devicesSafisSolutions
 
EMR and EHR - The Cost Effective Solution
EMR and EHR - The Cost Effective SolutionEMR and EHR - The Cost Effective Solution
EMR and EHR - The Cost Effective SolutionCodal
 
e-Health evidence and evalaution
e-Health evidence and evalautione-Health evidence and evalaution
e-Health evidence and evalautione-Marefa
 
Electronic Medical Records (EMR) in the Philippines
Electronic Medical Records (EMR) in the PhilippinesElectronic Medical Records (EMR) in the Philippines
Electronic Medical Records (EMR) in the PhilippinesDennis Seymour
 
Healthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALHealthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALSteve Knapp
 
Risks of Open Payments and Medicare Part D Data
Risks of Open Payments and Medicare Part D DataRisks of Open Payments and Medicare Part D Data
Risks of Open Payments and Medicare Part D Dataqordata
 

La actualidad más candente (20)

MEDTECH 2013 Closing Plenary, Andy Shaudt, Director of Usability Services, Na...
MEDTECH 2013 Closing Plenary, Andy Shaudt, Director of Usability Services, Na...MEDTECH 2013 Closing Plenary, Andy Shaudt, Director of Usability Services, Na...
MEDTECH 2013 Closing Plenary, Andy Shaudt, Director of Usability Services, Na...
 
Evaluation of A CIS
Evaluation of A CISEvaluation of A CIS
Evaluation of A CIS
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
 
Electronic Medical Records in the Philippines: Issues and Challenges
Electronic Medical Records in the Philippines: Issues and ChallengesElectronic Medical Records in the Philippines: Issues and Challenges
Electronic Medical Records in the Philippines: Issues and Challenges
 
Breakout Session: Cybersecurity in Medical Devices
Breakout Session: Cybersecurity in Medical DevicesBreakout Session: Cybersecurity in Medical Devices
Breakout Session: Cybersecurity in Medical Devices
 
Protecting Healthcare Data from Hackers
Protecting Healthcare Data from HackersProtecting Healthcare Data from Hackers
Protecting Healthcare Data from Hackers
 
EMR Innovations in Eye Care lit review
EMR Innovations in Eye Care   lit reviewEMR Innovations in Eye Care   lit review
EMR Innovations in Eye Care lit review
 
A koene ai_in_command_control
A koene ai_in_command_controlA koene ai_in_command_control
A koene ai_in_command_control
 
Hacking Into Medical Devices
Hacking Into Medical DevicesHacking Into Medical Devices
Hacking Into Medical Devices
 
Lecture 11A
Lecture 11ALecture 11A
Lecture 11A
 
EMR Intro
EMR IntroEMR Intro
EMR Intro
 
Cybersecurity in medical devices
Cybersecurity in medical devicesCybersecurity in medical devices
Cybersecurity in medical devices
 
Electronic Records
Electronic RecordsElectronic Records
Electronic Records
 
EMR and EHR - The Cost Effective Solution
EMR and EHR - The Cost Effective SolutionEMR and EHR - The Cost Effective Solution
EMR and EHR - The Cost Effective Solution
 
e-Health evidence and evalaution
e-Health evidence and evalautione-Health evidence and evalaution
e-Health evidence and evalaution
 
Electronic Medical Records (EMR) in the Philippines
Electronic Medical Records (EMR) in the PhilippinesElectronic Medical Records (EMR) in the Philippines
Electronic Medical Records (EMR) in the Philippines
 
resumemjs02122015
resumemjs02122015resumemjs02122015
resumemjs02122015
 
Healthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALHealthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINAL
 
Risks of Open Payments and Medicare Part D Data
Risks of Open Payments and Medicare Part D DataRisks of Open Payments and Medicare Part D Data
Risks of Open Payments and Medicare Part D Data
 
Ehr usability
Ehr usabilityEhr usability
Ehr usability
 

Destacado

Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber securityInderjeet Singh
 
Cyber defense electronic warfare (ew)
Cyber defense electronic warfare (ew)Cyber defense electronic warfare (ew)
Cyber defense electronic warfare (ew)ntc thailand
 
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...Brent Guglielmino
 
Cyber Criminals And Cyber Defense
Cyber Criminals And Cyber DefenseCyber Criminals And Cyber Defense
Cyber Criminals And Cyber DefenseKigose
 
Cyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analyticsCyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analyticsLinkurious
 
eBusiness Strategy
eBusiness StrategyeBusiness Strategy
eBusiness StrategyAndy Roy
 
NISTs Cybersecurity Framework -- Comparison with Best Practice
NISTs Cybersecurity Framework -- Comparison with Best PracticeNISTs Cybersecurity Framework -- Comparison with Best Practice
NISTs Cybersecurity Framework -- Comparison with Best PracticeDavid Ochel
 
NIST Cybersecurity Framework - Mindmap
NIST Cybersecurity Framework - MindmapNIST Cybersecurity Framework - Mindmap
NIST Cybersecurity Framework - MindmapWAJAHAT IQBAL
 
Security models for security architecture
Security models for security architectureSecurity models for security architecture
Security models for security architectureVladimir Jirasek
 
FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...
FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...
FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...West Monroe Partners
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber SecurityJAZEEL K T
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017NRC
 
Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker
Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden HackerTechniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker
Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden HackerMicrosoft TechNet - Belgium and Luxembourg
 
brand positioning with examples
brand positioning with examplesbrand positioning with examples
brand positioning with examplesLinel Dias
 

Destacado (16)

Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
 
Cyber defense electronic warfare (ew)
Cyber defense electronic warfare (ew)Cyber defense electronic warfare (ew)
Cyber defense electronic warfare (ew)
 
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
 
Cyber Criminals And Cyber Defense
Cyber Criminals And Cyber DefenseCyber Criminals And Cyber Defense
Cyber Criminals And Cyber Defense
 
Cyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analyticsCyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analytics
 
eBusiness Strategy
eBusiness StrategyeBusiness Strategy
eBusiness Strategy
 
Smart grid security
Smart grid securitySmart grid security
Smart grid security
 
NISTs Cybersecurity Framework -- Comparison with Best Practice
NISTs Cybersecurity Framework -- Comparison with Best PracticeNISTs Cybersecurity Framework -- Comparison with Best Practice
NISTs Cybersecurity Framework -- Comparison with Best Practice
 
NIST Cybersecurity Framework - Mindmap
NIST Cybersecurity Framework - MindmapNIST Cybersecurity Framework - Mindmap
NIST Cybersecurity Framework - Mindmap
 
Security models for security architecture
Security models for security architectureSecurity models for security architecture
Security models for security architecture
 
FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...
FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...
FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017
 
Technical Cyber Defense Strategies Explained!
Technical Cyber Defense Strategies Explained!Technical Cyber Defense Strategies Explained!
Technical Cyber Defense Strategies Explained!
 
Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker
Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden HackerTechniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker
Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker
 
brand positioning with examples
brand positioning with examplesbrand positioning with examples
brand positioning with examples
 

Similar a Blue team pp_(final_4-12-11)[1]

New Age Technology in Healthcare
New Age Technology in HealthcareNew Age Technology in Healthcare
New Age Technology in HealthcareMarcus Selvide
 
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOPodcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOM2SYS Technology
 
Electronic medical record 25.04.2021
Electronic medical record 25.04.2021Electronic medical record 25.04.2021
Electronic medical record 25.04.2021Shazia Iqbal
 
Health Informatics: The Electronic Health Record - Dr. Sam Gharbi
Health Informatics: The Electronic Health Record - Dr. Sam GharbiHealth Informatics: The Electronic Health Record - Dr. Sam Gharbi
Health Informatics: The Electronic Health Record - Dr. Sam GharbiSam Gharbi
 
Shaping a brighter future advancements in health it ccg submission
Shaping a brighter future advancements in health it ccg submissionShaping a brighter future advancements in health it ccg submission
Shaping a brighter future advancements in health it ccg submissionCareer Communications Group
 
Webinar: Overcoming it challenges
Webinar: Overcoming it challengesWebinar: Overcoming it challenges
Webinar: Overcoming it challengesModern Healthcare
 
Nur3563group8 cis
Nur3563group8 cisNur3563group8 cis
Nur3563group8 cistb45004
 
Onc safer guides to safe ehr jan302014_ppt
Onc safer guides to safe ehr jan302014_pptOnc safer guides to safe ehr jan302014_ppt
Onc safer guides to safe ehr jan302014_pptKristenReiter3
 
The Electronic Health Record – Challenges and Solutions
The Electronic Health Record – Challenges and SolutionsThe Electronic Health Record – Challenges and Solutions
The Electronic Health Record – Challenges and Solutionsmosmedicalreview
 
Standards of dental informatics, security issues
Standards of dental informatics, security issuesStandards of dental informatics, security issues
Standards of dental informatics, security issuesEbtissam Al-Madi
 
Univ. of IL Physicians Q Study
Univ. of IL Physicians Q StudyUniv. of IL Physicians Q Study
Univ. of IL Physicians Q StudyDavid Donohue
 
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boroEhr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla borokayla_ann_30
 
The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?Stephen Cobb
 
STUDY PROTOCOL Open AccessSafety Assurance Factors for Ele.docx
STUDY PROTOCOL Open AccessSafety Assurance Factors for Ele.docxSTUDY PROTOCOL Open AccessSafety Assurance Factors for Ele.docx
STUDY PROTOCOL Open AccessSafety Assurance Factors for Ele.docxhanneloremccaffery
 
Best_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfBest_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfJacob Li
 
HIT Policy Committee FDASIA Update
HIT Policy Committee FDASIA UpdateHIT Policy Committee FDASIA Update
HIT Policy Committee FDASIA UpdateBrian Ahier
 
Evaluation of A Clinical Information System
Evaluation of A Clinical Information SystemEvaluation of A Clinical Information System
Evaluation of A Clinical Information Systemnrodrock
 

Similar a Blue team pp_(final_4-12-11)[1] (20)

New Age Technology in Healthcare
New Age Technology in HealthcareNew Age Technology in Healthcare
New Age Technology in Healthcare
 
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOPodcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
 
Electronic medical record 25.04.2021
Electronic medical record 25.04.2021Electronic medical record 25.04.2021
Electronic medical record 25.04.2021
 
Health Informatics: The Electronic Health Record - Dr. Sam Gharbi
Health Informatics: The Electronic Health Record - Dr. Sam GharbiHealth Informatics: The Electronic Health Record - Dr. Sam Gharbi
Health Informatics: The Electronic Health Record - Dr. Sam Gharbi
 
Sustainability of HIEs under CyberSecurity
Sustainability of HIEs under CyberSecuritySustainability of HIEs under CyberSecurity
Sustainability of HIEs under CyberSecurity
 
Shaping a brighter future advancements in health it ccg submission
Shaping a brighter future advancements in health it ccg submissionShaping a brighter future advancements in health it ccg submission
Shaping a brighter future advancements in health it ccg submission
 
3 02
3 023 02
3 02
 
Webinar: Overcoming it challenges
Webinar: Overcoming it challengesWebinar: Overcoming it challenges
Webinar: Overcoming it challenges
 
Nur3563group8 cis
Nur3563group8 cisNur3563group8 cis
Nur3563group8 cis
 
Onc safer guides to safe ehr jan302014_ppt
Onc safer guides to safe ehr jan302014_pptOnc safer guides to safe ehr jan302014_ppt
Onc safer guides to safe ehr jan302014_ppt
 
The Electronic Health Record – Challenges and Solutions
The Electronic Health Record – Challenges and SolutionsThe Electronic Health Record – Challenges and Solutions
The Electronic Health Record – Challenges and Solutions
 
CIS Project
CIS ProjectCIS Project
CIS Project
 
Standards of dental informatics, security issues
Standards of dental informatics, security issuesStandards of dental informatics, security issues
Standards of dental informatics, security issues
 
Univ. of IL Physicians Q Study
Univ. of IL Physicians Q StudyUniv. of IL Physicians Q Study
Univ. of IL Physicians Q Study
 
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boroEhr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
 
The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?
 
STUDY PROTOCOL Open AccessSafety Assurance Factors for Ele.docx
STUDY PROTOCOL Open AccessSafety Assurance Factors for Ele.docxSTUDY PROTOCOL Open AccessSafety Assurance Factors for Ele.docx
STUDY PROTOCOL Open AccessSafety Assurance Factors for Ele.docx
 
Best_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfBest_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdf
 
HIT Policy Committee FDASIA Update
HIT Policy Committee FDASIA UpdateHIT Policy Committee FDASIA Update
HIT Policy Committee FDASIA Update
 
Evaluation of A Clinical Information System
Evaluation of A Clinical Information SystemEvaluation of A Clinical Information System
Evaluation of A Clinical Information System
 

Más de Jamie Jackson

Personal leadership plan
Personal leadership planPersonal leadership plan
Personal leadership planJamie Jackson
 
Challenges of cost and security when transitioning to electronic health records
Challenges of cost and security when transitioning to electronic health recordsChallenges of cost and security when transitioning to electronic health records
Challenges of cost and security when transitioning to electronic health recordsJamie Jackson
 
Hajjys talent management (1)
Hajjys talent management (1)Hajjys talent management (1)
Hajjys talent management (1)Jamie Jackson
 
Latin america final 1
Latin america final 1Latin america final 1
Latin america final 1Jamie Jackson
 
Marketing project final
Marketing project finalMarketing project final
Marketing project finalJamie Jackson
 

Más de Jamie Jackson (7)

Personal leadership plan
Personal leadership planPersonal leadership plan
Personal leadership plan
 
Challenges of cost and security when transitioning to electronic health records
Challenges of cost and security when transitioning to electronic health recordsChallenges of cost and security when transitioning to electronic health records
Challenges of cost and security when transitioning to electronic health records
 
Hajjys talent management (1)
Hajjys talent management (1)Hajjys talent management (1)
Hajjys talent management (1)
 
Latin america final 1
Latin america final 1Latin america final 1
Latin america final 1
 
Zappos final
Zappos finalZappos final
Zappos final
 
Marketing project final
Marketing project finalMarketing project final
Marketing project final
 
Scribe newsletter
Scribe newsletterScribe newsletter
Scribe newsletter
 

Blue team pp_(final_4-12-11)[1]

  • 1. Cost and Security Challenges When Implementing An Electronic Health Record Blue Team: Jamie Jackson
  • 2. Purpose Purpose: • Discuss the challenges with cost and security of implementation of EHR • Discuss the causes and effects of these challenges • Discuss possible solutions
  • 3. Problem Statement • With the unrelenting pressure and demand for implementing EHR, health care systems in the United States are facing many challenges with this process. • Two most critical factors underlying these challenges are cost of implementation and security during and once implemented
  • 4. Methodology • Utilizing medical journals and other resources, as well as interviews with administrators and staff from leading hospitals and private practices, and health care organizations we were able to analyze the effects of these challenges as well as come up with possible solutions.
  • 5. Healthcare Organizations Reviewed • Medical Center of Lewisville – 202 bed for profit community hospital • Children’s Medical Center – 559 bed not for profit pediatric hospital • Baylor Hospital of Plano – 112 bed not for profit county hospital • Dallas Associated Dermatologist – 50 year old dermatology facility • Health Information Management Systems Society – National Health Information Organization
  • 7. Cost Analysis • Lack of adequate funding was cited by 729 health care providers as the most significant barrier to adopting electronic records • Estimated that purchasing and installing EHR will cost over $32,000 per physician • Maintenance about $1,200 per month • Vendor costs account for 60-80% of these
  • 8. Cost Analysis When implementing an EHR system there are several costs to consider: • Start Up Costs • Software Maintenance Costs before, during, and after implementation • Training costs
  • 11. Security Analysis Michael Matthews, chief executive officer of health-information technology firm MedVirginia, said security is on everyone's mind. "Many in the field will argue that data is actually more secure in electronic format than paper," Matthews said. "There are audit trails left every time an electronic health record is accessed, who accessed it, what results within the record have been accessed. Whereas with paper records, you have no idea who has looked at it, who made copies, what has been taken out of it."
  • 12. Types of Breaches U.S. Department of Health & Human Services HHS.gov website gathered a list of breaches of unsecured protected health information affecting 500 or more individuals in the U.S.. They posted 108 reported types of breaches (2009-2010). -Types of breaches included: theft, improper disposal, unauthorized access, loss, hacking/IT incident, Incorrect mailing, other - Location of breached information: laptop, desktop, network server, email, portable devices, EHR, other
  • 16. Conclusions • This project has provided an opportunity to understand the EHR technology system and the challenges during implementation as it relates to cost and security. Understanding the benefits of the technologies and the problems experienced by doctors who use the technologies can help others make a better decision for their practice.
  • 17. Findings • No true monetary savings due to the purchasing of new technology, software, hiring and ongoing training • Trade off: increased efficiency, accuracy and safety • If any savings it would be among larger institutions, which already draw in enough revenue for the funding of EHR systems • Cost outweighed security as the largest concern to the implementation of EHR • Vendors have taken advantage of the necessity of implementing EHR by padding their prices • Most security breaches are from carelessness among staff ,lack of training, inadequate funding for security
  • 18. Recommendations • Quality leadership that embraces the goals of the organization regarding EHR • Training, training, training • Factor in additional equipment costs needed in addition to EHR product • Do not try to change the organization to meet the needs of the HER • Review and evaluate the organization as well as several different products • Make sure that EHR chosen is interoperable with technology already being used; i.e. billing systems, EMR • Look into discounts/perks offered by insurers for EHR use
  • 19. References • Breaches affecting 500 or more individuals. (2010). Retrieved from http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule/postedbreaches.html • Ponemon Institute LLC, Initials. (2010, November 9). Dgs health law blog [Web log message]. Retrieved from http://www.dgshealthlaw.com/uploads/file/Ponemon_Benchma k_Study_on_Patient_Privacy_and_Data_Security%5B1%5D%281%29.pdf

Notas del editor

  1. Literature Review