Professional Documents
Culture Documents
Nursing Informatics (MIDTERMS)
Nursing Informatics (MIDTERMS)
Nursing Informatics (MIDTERMS)
COVERAGE:
II. Conditions for coverage of specialized
➢ Policies, Guidelines, and Laws in Nursing services by suppliers
Informatics Part of Medicare laws that govern
➢ Nursing Information System providers and require that all PHI be
➢ Nursing Information System Team kept confidential and protected
➢ Leadership Role of the Nurse in the against loss, destruction, or
Management of Nursing Information unauthorized use
System requires the written approval of
➢
the patient before it is used or
forwarded. Hospitals must protect
POLICIES, GUIDELINES, AND LAWS IN this information against
NURSING INFORMATICS unauthorized use and
➢ Patients have the right to privacy and current Electronic Health
information shared with healthcare providers.
Records allow for monitoring and
➢ It is essential to be aware of federal and state
laws so that Protected Health Information (PHI) securing data.
remains secure when stored and transmitted by Patients always have a right to
electronic health record systems. access their records; an institution
is allowed to charge a usual and
Protected Health Information is health customary fee for paper copy
information (i.e., a diagnosis, a test costs. These laws extend to home
health agencies and long-term
result, an x-ray, etc.) that is maintained
care facilities.
in the same record set as individually III. Institutional Review Boards
identifiable information
➢ governed by state and federal laws and require
informed written consent and data security and
privacy.
IMPORTANT LAWS AND REGULATIONS IN HEALTH INFORMATICS
Privacy act of 1974 ➢ State laws vary and may include special
requirements with regard to drug and alcohol
➢ Regulates information collected by the federal treatment, special disease states, and mental illness
government and its agencies. The legislation
allows citizens to know what information is
collected about them, assure the veracity of that IV. JCAHO (Joint Commission on Accreditation
data and obtain copies of the information. The of Healthcare Organizations)
Veterans Health Administration and Indian ➢ a private organization that has been used since
Health Services are subject to these regulations. 1965 to accredit hospitals and facilities, which
I. Alcohol and Drug abuse Patient allowed for their participation in Medicare.
Confidentiality ➢ In 2010, the process changed to provide for review
The Confidentiality of Alcohol and by Centers for Medicare and Medicaid Services
Drug Abuse Patient Records rule (CMS) prior to facility participation. JCAHO has had
allows for additional privacy in any varying abilities to control and determine rules
federally-assisted drug or alcohol related to patient care, several of which pertain to
abuse program. Identity, diagnosis, PHI confidentiality. These rules are constantly under
and treatment are treated as review and have included a large number of recent
confidential information. Patient revisions coinciding with the increasing prevalence
impairment does not excuse the of EHRs.
release of confidential patient
HITECH ACT (Health Information Technology for Economic and
information.
clinical Health) (Act of 2009)
TUMANGDAY 2F CPU-SN
Nursing Informatics (MIDTERMS) 03/13/2023
➢ empowers the Federal Department of Health and ➢ goals for all, though, are the same: to “help
Human Services (HHS) to oversee the promotion modernize and personalize health care, encourage
of Health IT – including quality, safety and security greater innovation, support research, and streamline
as well as the secure information exchange. the system,” according to the act’s mission
V. HIPAA (Health Insurance Portability and statement.
Accountability Act) (1996) 1. Intellectual Property Law
➢ enacted to allow for the continuance of health ➢ deals with laws to protect and
insurance coverage in situations involving job enforce the rights of the creators and
changes or loss. Major provisions of this law were owners of inventions, writing, music,
enacted to formulate and regulate federal guidelines designs, and other works, known as
and standards pertaining to electronic healthcare. "intellectual property."
Standards were developed to allow for identifications ➢ Includes copyright, trademark, patents,
of providers, health insurance plans, and employers, and trade secrets.
including the National Provider Identifier Standard ➢ IP is protected in law by, for example,
(NPIS), which provides every physician with a patents, copyright, and trademarks,
unique number used in all aspects of healthcare. which enable people to earn recognition
VI. Affordable Care Act of 2010 or financial benefit from what they invent
➢ was set up to fundamentally change the way people or create.
are insured; goals include lowering healthcare costs ➢ creations of the mind, such as
and making coverage accessible to previously inventions; literary and artistic works;
uninsured people. The law is undergoing major designs; and symbols, names and
changes as issues with its implementation are images used in commerce.
encountered. Final resolutions should be expected in
the coming years as interpretations of its standards PATENT (lasts generally 20 years from the filing
are developed and enacted. As revisions are date)
implemented, there may be many changes to the
way healthcare is delivered, including control of PHI. ➢ exclusive right granted for an
VII. FDASIA (Food and drug administration invention, which is a product or a
Safety and Innovation of 2012) process that provides, in general, a
➢ resulted in the collaboration of the HHS and FDA to new way of doing something, or
recommend a regulatory framework for Health IT to offers a new technical solution to a
improve mobile applications and other means to problem.
promote patient safety and innovation in healthcare
delivery.
➢ patent owner has the exclusive right to
VIII. MACRA (Medicare Access & CHIP (Childrens
prevent or stop others from
Health Insurance Program) Reauthorization commercially exploiting the patented
Act of 2015) invention. In other words, patent
➢ intended to ensure that physicians are paid fairly, protection means that the invention
that Medicare Part B costs are controlled, and that cannot be commercially made, used,
healthcare is improved. distributed, imported or sold by others
➢ In August 2015 it signaled a move away from the without the patent owner's consent.
sustainable growth rate formula once used to ➢ Patents are territorial rights. In general,
determine physician reimbursement and toward a the exclusive rights are only applicable
model based on the quality, efficiency, value and in the country or region in which a patent
effectiveness of the medical care provided. has been filed and granted, in
➢ Also, will combine existing quality reporting accordance with the law of that country
programs into one new system. or region
IX. 21st Century Act
➢ Passed by both houses of Congress and signed into
law by President Obama in December 2016, covers TRADEMARK (protected by IP rights lasts for 10
many facets of healthcare. years)
TUMANGDAY 2F CPU-SN
Nursing Informatics (MIDTERMS) 03/13/2023
➢ Collection of all rights enjoyed by the published. If the work was not published, it shall
owner of an artistic or literary work be protected for 50 years counted from the
➢ Derivative works are also protected as creation of the work.
new works provided that it does not
affect the existing copyright on original Can a copyright be transferred or assigned? Yes.
works. (Dramatizations, translations, Copyright can be transferred or assigned in whole or
adaptations, abridgements, in part.
arrangements, and other alterations of SPECIAL LAWS THAT ENSURE THE PROTECTION TO COPYRIGHT
literary music works) OWNERS OF AUDIO-VISUAL WORKS
TUMANGDAY 2F CPU-SN
Nursing Informatics (MIDTERMS) 03/13/2023
➢ Peer-to-peer services
NURSING INFORMATION SYSTEM
- the newest of these three
1. Internet Applications Internet applications, and
also the most controversial,
➢ a client/server application that uses because its uses have
standard Internet protocols for created problems related to
connecting the client to the server the access and use of
3 most important internet services: copyrighted materials
➢ E-mail (Electronic Mail)
- Most widely used and - fastest growing, most
successful internet controversial, and
applications potentially most important
- Principal Internet application areas of Internet
E-mail is fueled by 2 factors applications
1. Increasing numbers - based on the sharing of
of INTERNET physical resources, such as
SERVICE hard drives, processing
PROVIDERS (ISPs) cycles, and individual files
2. number of physical among computers and other
devices capable of intelligent devices.
supporting e-mail
has grown to TWO BASIC P2P MODELS
include highly
portable devices 1. based on a central host
such as personal computer that
digital assistants coordinates the
(PDAs) and cellular exchange of files by
telephones. indexing the files
available across a
The formulation of Multipurpose Internet Mail network of peer
Extensions (MIME) and its adoption by software computers. highly
developers has made it much easier to send and controversial because it
receive attachments, including word-processed has been employed
documents, spreadsheets, and graphics. widely to support the
unlicensed exchange of
➢ Web browsing commercial sound
- application that had the recordings, software,
greatest influence on the and other copyrighted
dramatic expansion of the materials.
Internet and its use during 2. Under the second
the 1990s. model, which may prove
- developed in a highly ultimately to be far more
commercialized important, peer-to-peer
environment dominated by applications aggregate
such corporations as and use otherwise idle
Microsoft and Netscape, resources residing on
and heavily influenced by low-end devices to
the World Wide support high-demand
computations. For
Web Consortium (W3C). example, a specially
W3C- founded 1994 by Tim designed screensaver
Berners-Lee (original running on a networked
computer may be
architect of the web)
TUMANGDAY 2F CPU-SN
Nursing Informatics (MIDTERMS) 03/13/2023
TUMANGDAY 2F CPU-SN
Nursing Informatics (MIDTERMS) 03/13/2023
TUMANGDAY 2F CPU-SN