Cataloging and Comparing Logging Mechanism Specifications for Electronic Health Record Systems
نویسندگان
چکیده
Electronic health record (EHR) systems must log all transactions with protected health information (PHI) to deter unauthorized behavior and prevent users from denying that they created, read, updated, or deleted PHI. However, a plethora of standardization and governing organizations publish documentation (such as standards, suggestions, and requirements) to outline transactions that should be logged and the data that should be captured for each log entry. The objective of this research is to guide the design of electronic health record systems by cataloging suggested information that should be captured by logging mechanisms from both healthcare and non-healthcare documentation. In this paper, we focus on three types of information: data transactions, security events, and log entry content. We collect a set of ten healthcare-related and six nonhealthcare related documents that contain specifications for logging mechanisms. From these 16 sources, we catalog 11 data transactions, 77 security events, and 22 data elements for log entry content. Overall, we identify 14 security events and 2 data elements for log entry content that are not explicitly addressed by healthcare documents. We found that developers must consider 13 of the 16 documents to extract 100% of the security events and log entry content cataloged.
منابع مشابه
The Electronic Health Record System May Destroy the Empathy
Aims: The use of the electronic health record systems has been developed in the health system, but it is still not known whether empathy is created in the visit of the patient despite this system. Therefore, this study was designed with the purpose of comparing patients’ perceptions about physicians’ empathy after the patient viewed standardized and scripted video vignettes of two physicians on...
متن کاملSecure Logging and Auditing in Electronic Health Records Systems: What Can We Learn from the Payment Card Industry
Introduction Both health information technology (HIT) and the payment card industry (PCI) involve the exchange and management of sensitive, protected information. Compared to the PCI, HIT could consider protected health information (PHI) more sensitive than PCI cardholder data. If cardholder data is breached in the PCI, payment card companies may then remove fraudulent charges from the customer...
متن کاملAttribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملComparison of Manual and Electronic Methods of Nursing Record: A Nurse's Perspective
Recording nursing reports is considered as a quality assurance tool for patients and nurses. Nowadays, the presence of electronic health record systems is an indicator of development. Studies on advantages and disadvantages of the electronic and manual recording methods have shown different results. In this study, electronic and manual recording of nursing reports were compared from the perspec...
متن کاملHealthcare Reimbursement and Quality Improvement: Integration Using the Electronic Medical Record; Comment on “Fee-for-service Payment - an Evil Practice That Must Be Stamped Out?”
Reimbursement for healthcare has utilized a variety of payment mechanisms with varying degrees of effectiveness. Whether these mechanisms are used singly or in combination, it is imperative that the resulting systems remunerate on the basis of the quantity, complexity, and quality of care provided. Expanding the role of the electronic medical record (EMR) to monitor provider practice, patient r...
متن کامل