After enjoying HIMSS13 last week, I am writing one blog per day this week to review the educational sessions I thought were most insightful.

The education session that peaked my interest the most was Session 118, which compared the criteria of HIPAAThe Health Insurance Portability and Accountability Act (HIPAA) was enacted by the U.S. Congress in ... More to those of EHRElectronic Health Record (EHR), as defined in Defining Key Health Information Technology Terms (The ... More Certification. The presenters were Rich Cohan from Providence Health and Adam H. Greene from Davis Wright Tremaine, and the title was “Privacy and Security Challenges of Meaningful Use.”

Based on the title, I went into the session looking to gain insight on privacy and security from a major health system. What immediately caught my attention were the comparisons drawn between the HIPAAThe Health Insurance Portability and Accountability Act (HIPAA) was enacted by the U.S. Congress in ... More rules as compared to EHRElectronic Health Record (EHR), as defined in Defining Key Health Information Technology Terms (The ... More Certification criteria. As a vendor, I have been intimately involved in meeting the privacy and security requirements for EHRElectronic Health Record (EHR), as defined in Defining Key Health Information Technology Terms (The ... More Certification. However, it has been very difficult to figure out how the EHRElectronic Health Record (EHR), as defined in Defining Key Health Information Technology Terms (The ... More Certification criteria relate (or don’t relate) to the HIPAAThe Health Insurance Portability and Accountability Act (HIPAA) was enacted by the U.S. Congress in ... More requirements that providers must follow. This presentation summed it up beautifully.

Mr. Greene presented a table which included the following data in each row:

  • Privacy and security criteria for 2011 EHRElectronic Health Record (EHR), as defined in Defining Key Health Information Technology Terms (The ... More Certification
  • The equivalent privacy and security criteria for 2014 EHRElectronic Health Record (EHR), as defined in Defining Key Health Information Technology Terms (The ... More Certification
  • The HIPAAThe Health Insurance Portability and Accountability Act (HIPAA) was enacted by the U.S. Congress in ... More document number that corresponds to the EHRElectronic Health Record (EHR), as defined in Defining Key Health Information Technology Terms (The ... More Certification criteria
  • Whether the criteria was a requirement under HIPAAThe Health Insurance Portability and Accountability Act (HIPAA) was enacted by the U.S. Congress in ... More rules or not 

this is a great take-a-way from the presentation. i can now utilize this table anytime i need to investigate how a specific ehrElectronic Health Record (EHR), as defined in Defining Key Health Information Technology Terms (The ... More certification criterion applies to a specific hipaaThe Health Insurance Portability and Accountability Act (HIPAA) was enacted by the U.S. Congress in ... More rule.

the presentation also compared meaningful use objectives for patient access to data. this included the timeframes for making the data available per meaningful use and also the amount of data that must be made available. in general the timeframes are much shorter for the meaningful use criteria, but the amount of data that must be presented to the patient is much more comprehensive for hipaaThe Health Insurance Portability and Accountability Act (HIPAA) was enacted by the U.S. Congress in ... More rules. in addition, hipaaThe Health Insurance Portability and Accountability Act (HIPAA) was enacted by the U.S. Congress in ... More requires that all patient requests are fulfilled, while meaningful use only requires a percentage.

many other facets of hipaaThe Health Insurance Portability and Accountability Act (HIPAA) was enacted by the U.S. Congress in ... More and meaningful use were explored as well, including transport of summary of care documents, public health reporting, and patient reminders. the slides from this presentation are a resource that i will utilize when privacy and security questions arise.

for complete information on all the concepts that were covered, you can download the slides here.

Tags:
 Print Friendly