Question 1
Numerous strategies are applicable in mitigating the risks of threats to privacy and data integrity for electronic health records. One mechanism would be the use of unique encryptions only availed to patients for personalized access to their information ( Houlding, 2011) . It would ensure that a patient is can access their information through the use of such encryptions while keeping outsiders or any other individuals from these records and data. Organizations can also incorporate high-performance hardware assisted security with the traditional software security controls to ensure that security risks are reduced ( Houlding, 2011) . An example would be a hardware trusted root element. A strategy that would work well with the rest would be training healthcare professionals in data security and privacy, the detection of possible threats and easily applicable solutions to prevent or delay access during the initial stages of an attack.
Question 2
By 2018, Dr. Faber was required to abide by the meaningful use stage 3 requirements despite his use of other stages in previous years. At this stage, he needs to develop appropriate physical, technical and administrative safeguards to further protect electronic protected health information (ePHI). He is also required to adopt the electronic generation and transmission of permissible discharge prescription. Provide patients with electronic access to their information, he needs to use certified electronic health record technology ( CEHRT ) in coordinating care for patients, engage in health information exchange when during a transition or when referring a patient (Rinehart-Thompson, 2018). He further need engage with a public health agency and report meaningful public health data.
Delegate your assignment to our experts and they will do the rest.
I believe that the first requirement of stage three meaningful use is most important. It requires a facility or practitioner to have in place administrative, technical and physical safeguards to protect electronic information available in CEHRT (Rinehart-Thompson, 2018). It is the most important requirement as it promotes the unquestionable protection of patient and facility information.
Stage 1 meaningful use of EHR involves the initial adoption of electronic health records by healthcare professionals and facilities while stage 2 involved the continued use of technology in health information for quality improvement while stage 3 strongly emphasizes for strategies to safeguard CEHRTs (Rinehart-Thompson, 2018).
On certification of products, Dr. Faber needs to be aware that accreditation is done by the Electronic Healthcare Network Accreditation Commission. He will need to use the Quality Payment Program that was initiated in 2018 and which allows for simplification in payment adjustments (Rinehart-Thompson, 2018).
References
Houlding, D., & MSc,. (2011). Health Information at Risk: Successful Strategies for Healthcare Security and Privacy. Healthcare IT Program Of ce Intel Corporation, white paper .
Rinehart-Thompson, L. A. (2018). Introduction to health information privacy and security . AHiMA Press.