NCHIMA 66 th Annual Meeting Managing the Access and Release of - - PowerPoint PPT Presentation

nchima 66 th annual meeting managing the access and
SMART_READER_LITE
LIVE PREVIEW

NCHIMA 66 th Annual Meeting Managing the Access and Release of - - PowerPoint PPT Presentation

NCHIMA 66 th Annual Meeting Managing the Access and Release of Health Information As Health Information Exchange Initiatives Evolve: A Qualitative Study Susan H. Richardson, DHA, MHSA, RHIA, CPHQ, CHTSCP May 5, 2016 HIEs in the United


slide-1
SLIDE 1

NCHIMA 66th Annual Meeting

slide-2
SLIDE 2

Managing the Access and Release of Health Information As Health Information Exchange Initiatives Evolve: A Qualitative Study Susan H. Richardson, DHA, MHSA, RHIA, CPHQ, CHTS‐CP May 5, 2016

slide-3
SLIDE 3

HIEs in the United States

slide-4
SLIDE 4

Release of Information

slide-5
SLIDE 5

Introduction

  • The Health Information Exchange (HIE) initiative began as early

as 1998 as part of the push to develop a national health information technology (IT) infrastructure to improve the quality

  • f patient care (Bernstein, Dutton, Evans, & Fiori, 2006).
  • Former President George W. Bush established the Office of the

National Coordinator for Health Information Technology (ONC) in 2001 to oversee the development of interoperable electronic health records (EHR) to help achieve the goal for every American to have an EHR by 2014 (Johns, 2011).

  • Two federal agencies that have funded HIE projects are the

Agency of Health Research and Quality (AHRQ) and the Health Resources and Services Administration (HRSA) (Bernstein et al., 2006)

  • The National Alliance for Health Information Technology became

involved in the process of naming, defining and standardizing HIE

  • rganizations in 2006 (AHIMA, 2010).
slide-6
SLIDE 6

Background of the Problem

  • Health Information Management (HIM) professionals are

responsible for the management of the patient’s health information within healthcare organizations. This includes ensuring that the access to the information and the release of the information are managed appropriately (Johns, 2011).

  • HIM professionals are ultimately responsible for ensuring the

regulations, such as the Health Insurance Portability and Accountability Act (HIPAA) are adhered to through the development of policies and procedures.

  • The management of health information in an environment that

already allows unlimited access by patients, providers, and payers is a concern.

  • The HIE initiative compounds the concern because health

information will become more accessible as the push for a national health information infrastructure continues, providing access of health information across different networks.

slide-7
SLIDE 7
slide-8
SLIDE 8

Literature Review

  • The HIE initiative is not a new concept but its evolution has been

stymied by the inability to access data across a continuum. Recent technology and the impetus to improve patient outcomes are forces behind the push to move forward with the HIE initiative (Morrissey, 2011).

  • Legislative efforts continue to increase the need for health

information exchanges, which has escalated concerns that the current regulations, such as HIPAA will not be enough to protect

  • PHI. “This heightened legislative and regulatory attention

reflects what is happening in American healthcare today: more and new kinds of organizations are involved in the care process‐‐‐ and these organizations have access to patients’ health information” (Dennis, 2010, p.1).

  • According to Westerlind (2014), the top most challenging issue

facing organizations is the unauthorized access of patient information, as noted in a KLAS study on privacy and security.

slide-9
SLIDE 9

Unauthorized Access

slide-10
SLIDE 10

Problem Statement

  • As HIE’s evolve, the patient’s privacy and confidentiality will be at
  • risk. An increased likelihood of unauthorized access to and

availability of protected health information (PHI) to those without a need to know (AHIMA, 2010) will exist.

  • The specific problem is that the HIM professionals’ ability to

manage the access and release of PHI within the healthcare environment will be affected. The responsibility to diligently monitor and control the flow of information accessed and released within the system will become more difficult (Emery & McDavid, 2011).

  • There is a lack of information about how to ensure that federal

and state PHI requirements are adhered to, how to separate out protected health information (Eramo, 2011) as patient portals are created through the HIEs (Wiedemann, 2011), as well as how to secure health information that is for purposes other than for treatment, payment, and operations (Wiedemann, 2011).

slide-11
SLIDE 11

Problem Statement continued

  • Literature specifically addressing how HIM professionals will

manage the increased access to PHI by other entities is lacking. The literature review is limited about how secure health information is within the electronic environment and confirms that concerns exist about the management of patient confidentiality.

  • There is an absence of established policies and procedures to

manage the access and release of health information, which is another concern.

slide-12
SLIDE 12

Purpose of the Study

  • The purpose of this qualitative research study was

to develop a best practice for HIM professionals to manage strategically the access and release of health information as the availability of PHI increases with the ongoing evolution of HIEs.

  • HIM professionals’ expectations of how the access

and release of information should be managed within a HIE environment was requested.

  • The study provides HIM professionals with the

guidelines to address the privacy and security concerns and challenges for managing the access and release of PHI in a HIE environment.

slide-13
SLIDE 13

Significance of the Study

  • Anderson (2011) stated that results of a National eHealth

Collaborative survey, which consisted of healthcare providers, governments, and HIE operators identified security and privacy issues as the major concern of HIE initiatives.

  • ONC stipulated that HIEs should provide individual access,

allow corrections, be open and transparent, and allow consumers to decide how their PHI will be used, disseminated, and exchanged (AHIMA, 2011). The ONC also require HIEs to allow the collection and use of PHI, limit disclosures to the extent necessary to perform a specific purpose and implement appropriate safeguards.

  • The Center for Democracy and Technology (2012)

emphasized that “accountability for compliance with Federal and state health privacy and security protections should be strengthened” (para 6).

slide-14
SLIDE 14

Significance to HIM Professionals

  • Current HIM skills for managing health information

have been with paper records and within single health care entities.

  • Managing electronic health information across

health care systems is a challenge.

  • According to AHIMA (2011), HIM professionals need

to be vigilant and stay current with the health care regulations, policies, and information standards.

  • The significance of this study was to provide a best

practice so HIM professionals could effectively address and manage the challenges HIEs present in the protection of PHI.

slide-15
SLIDE 15

Scope of the Study

  • The population for the study included HIM

professionals within the state of North Carolina.

  • Participation was limited to the first twenty
  • responders. The study consisted of twelve

participants.

  • The participants were not pre‐selected.
  • Participants were selected based on the following

criteria:

– Responsible for the management of health information, – Employed within a healthcare organization, and – A Member of the North Carolina Health Information Management Association and/or North Carolina Health Information and Communications Alliance.

slide-16
SLIDE 16

Scope of the Study continued..

The participants met the following assumptions:

– The participant had sufficient knowledge of the HIE initiative and understood its potential in the availability and accessing of health information, – The participant was aware of the privacy and security rules and regulations that affect release of information, and – The participant in the study had implemented

  • r had participated in the planning stages of

implementing an EHR within the organization.

slide-17
SLIDE 17

Research Question

Which processes best ensure the security and privacy of health information within the HIE environment?

slide-18
SLIDE 18

Conceptual Framework

  • The conceptual framework was based upon complexity

theory, which is founded upon the belief that systems are complex (Fryer, 2012).

  • Cause and effect does not always apply and all phenomena

cannot be predicted and controlled (Fryer, 2012); however systems will ultimately adapt to the changing environment.

  • Wilson (2009) stated that the complexity theory “refers to

patterns and relationships among the parts, and also the unpredictability” (p. 19)).

  • The complexity theory appropriately addresses the

changing environment that HIM professionals are confronting as internal and external forces affect the management of health information.

slide-19
SLIDE 19

Fryer’s Complex Adaptive Systems Theory

slide-20
SLIDE 20

Research Method and Design

  • The research method for this study was qualitative

incorporating the Delphi technique.

  • The qualitative research method was preferred

because this approach allowed the generation of theories as opposed to the quantitative approach which is designed to test hypotheses (Christensen, Johnson, & Turner, 2011).

  • The Delphi technique fitted the design of this study

by providing a structural analytic process for reflections and comprehension (Moustakas, 1994) because this technique incorporates an iterative process collecting and building upon the responses to the previous round of questions (Skulmoski, Hartman, & Krahn, 2007).

slide-21
SLIDE 21

Methodology Used: Delphi Technique

slide-22
SLIDE 22
slide-23
SLIDE 23

Data Results and Analysis

  • The outcome of the first round resulted in

five themes providing solid examples of what the participants believed should be included when developing a best practice:

– Development of a HIE Security and Privacy Initiative – Management of Access Controls – Develop Protocols/Policies and Procedures – Tracking and Monitoring – Education and Training

slide-24
SLIDE 24

Data Results and Analysis Continued…

  • The results from the first round, with the common themes, were

returned to the participants for a second round of responses. Participants were asked to review the information and recommend which response should be retained, as well as justify the reason. The participants’ responses were noted and all items within each theme were retained for the third round.

  • The third round provided the participants another opportunity to

narrow down the recommendations by ranking responses according to the most important to the least important. Four or more responses with recommendations ranking as the most important for each element within the theme were retained for inclusion in the fourth round. The results in this round noted the elimination of five elements in the number of recommendations overall.

  • The fourth round consisted of the summary of the third round

recommendations retained and participants were asked to review and make comments. All participants agreed to the proposed final recommendations.

slide-25
SLIDE 25

Data Results and Analysis Continued…..

The fifth round served as the final validation of the process. All twelve participants agreed with the following recommendations for the development of the best practice:

slide-26
SLIDE 26
slide-27
SLIDE 27
slide-28
SLIDE 28
slide-29
SLIDE 29

Conclusions

  • According to Sarrico and Hauenstein (2011), hospitals are in a no‐

win situation concerning the electronic transmission of health

  • information. The HIE initiative is to provide access to PHI to

improve patient care but healthcare organizations, specifically HIM professionals are committed to ensuring the security and privacy of PHI.

  • The results of this study are testament that HIM professionals

have the knowledge needed to ensure that the access and release of information is managed appropriately based on the needs of the patient, providers, and other members of the workforce (AHIMA, 2011).

  • The results of the study provided guidelines that HIM

professionals can use to address the future PHI concerns and challenges presented as HIE evolves. The participants’ responses also demonstrated the complexities and variety of approaches for managing the access and release of health information.

slide-30
SLIDE 30

Conclusions continued….

  • The information obtained addressed the perspective of practicing

health information professionals on the necessary elements needed to ensure the ability to monitor, secure, and control

  • nline access to health information by external agencies and
  • ther organizations (Emery & McDavid, 2011), as well as

proactively managing through education and training.

  • The study addressed the opinions and recommendations of a

representative sample of health information professionals and the Delphi technique provided for impartial and objective recommendations without any influencing factors such as social norms, customs, professional standing or organizational culture.

  • The study provided HIM professionals the opportunity to provide

feedback about their concerns and recommendations that were not found specifically addressed in the studies noted within the literature review.

slide-31
SLIDE 31

Our Job: Protecting the Patient’s Health Information

slide-32
SLIDE 32

Recommendations

  • Review organizational policies
  • Review state and government

regulations

  • Review, with the CIO, the information

systems’ strengths and weaknesses

  • Review all new and old technology that

contains information.

slide-33
SLIDE 33

Recommendations

slide-34
SLIDE 34

References

  • AHIMA. (2010, September). Understanding the HIE landscape. Journal of AHIMA, 81(9). 60‐65.
  • AHIMA. (2011, May). HIE management and operational considerations. Journal of AHIMA, 82(5). 56‐

60.

  • AHIMA. "Management Practices for the Release of Information." Journal of AHIMA 83, no.2

(February 2012).

  • Anderson, H. (2011, February 25). Survey: Privacy a top HIE concern. InfoRisk Today.

http://www.inforisktoday.com/survey‐privacy‐top‐hie‐concern‐a‐3383.

  • Bing.com (Images)
  • Bernstein, W., Dutton, M., Evans, L. & Firori, A. (2006). Health information exchange projects: What

hospitals and health systems need to know. American Hospital Association. Chicago, IL. Retrieved from http://www.aha.org/content/00‐10/AHARHIOfinal.pdf.

  • Center for Democracy & Technology. (2012, June 13). Health information exchange brief examines

privacy and security concerns. Published on Center for Democracy & Technology (https://www.cdt.org). Retrieved from https://www.cdt.org/pr_statement/health‐information‐ exchange‐brief‐examines‐privacy‐and‐securityconcerns.

  • Christensen, L.B., Johnson, R.B., & Turner, L. (2011). Research Methods, Designs, and Analysis (11th

ed.) Boston, MA: Allyn & Bacon.

  • Dennis, J.C. (2010). Privacy: The impact of ARRA, HITECH, and other policy initiatives. Chicago, IL:

AHIMA.

  • Emery, S. & McDavid, J. (2011, March). Electronic copy versus electronic access. Journal of AHIMA,

82(3). 40‐41.

  • Eramo, L. A. (2011, March). Patient portals and meaningful use: Using portals to meet the patient

access objectives. Journal of AHIMA, 3(82). 42‐43.

slide-35
SLIDE 35

References

  • Fryer, P. (2012). What are complex adaptive systems? Trojanmice. Retrieved from

http://www.trojanmice.com/articles/complexadaptivesystems.htm.

  • Govtech.com. State Plan Models. Retrieved from http://www.govtech.com/health/4‐Approaches‐

to‐Health‐Information‐Exchanges. html: State Plan Models

  • HealthIT.gov. HIEs in the US. Retrieved from https://www.healthit.gov/policy‐researchers‐

implementers/state‐hie‐implementation‐status

  • Identity Theft Resource Center. (2016, January 25). Retrieved from

http://www.idtheftcenter.org/ITRC‐Surveys‐Studies/2015databreaches.html

  • Johns, M.L. (2011). Health information management technology: An applied approach. Chicago, IL:

American Health Information Management.

  • Morrissey, J. (2011, February). HIE. H&HN. Retrieved from

http://www.hhnmag.com/hhnmag_app/jsp/articledisplay.jsp?dcrpath=HHNMAG/Article/data/02FE B2011/02HHN_Coverstory&domain=HHNMAG.

  • Sarrico, C. & Hauenstein, J. (2011, February). Can EHRs and HIEs get along with HIPAA security

requirements? Healthcare Financial Management, 65(2). Retrieved from MasterFILE Premier.

  • Skulmoski, G.J., Hartman, F.T., & Krahn, J. (2007). The Delphi method for graduate research. Journal
  • f Information Technology Education. 6:1‐21. Retrieved from Education Research Complete

database files.

  • Westerlind, E. (2014, May). Security and privacy perception 2014: High stakes, big challenges. KLAS.

1‐106. Retrieved from www.KLASresearch.com.

  • Wiedemann, L.A. (2011, March). Managing external reviewer requests in the HER: Considerations,

requirements, and associated expenses. Journal of AHIMA, 3(82). 40‐41.

  • Wilson, M. (2009). Complexity theory. Whitireia Nursing Journal, 16. 18‐24. Retrieved from ProQuest

database files.

slide-36
SLIDE 36