Explaining Accesses to Electronic Health Records

Size: px
Start display at page:

Download "Explaining Accesses to Electronic Health Records"

Transcription

1 Explaining Accesses to Electronic Health Records Daniel Fabbri, Kristen LeFevre and David A. Hanauer {dfabbri, klefevre, Electrical Engineering & Computer Science, University of Michigan, 226 Hayward Ave. Ann Arbor, MI 4819 USA Department of Pediatrics, University of Michigan Medical School, 15 E Medical Center Dr. Ann Arbor, MI 4819 USA ABSTRACT Electronic health record systems (EHRs) are increasingly used to store patient medical information. To ensure the responsible use of this data, EHRs collect access logs, which record each access to sensitive data (e.g., a patient s record). Using the access log, it is easy to determine who has accessed a specific medical record. However, in addition to this information, we observe that for various applications such as user-centric auditing, it is also important to understand why each access occurred. In this paper, we study why accesses occur in EHRs. Our goal is to provide an explanation describing why each access occurred (e.g., Dr. Dave accessed Alice s medical record because Dr. Dave has an appointment with Alice). Using data from the University of Michigan Health System, we demonstrate that most accesses to EHRs occur for a valid clinical or operational reason, and often the reason is documented in the EHR database. Specifically, we observe three general types of explanations (direct, group, and consultation), and we show that these explanations can explain over 9% of the accesses in the log. Moreover, we identify collaborative groups that help to explain additional accesses. 1. INTRODUCTION Electronic health record systems (EHRs) are often used to store patient health information. As more data are stored in EHRs, the security of the data and privacy of the patients become paramount. In the United States, recent legislation such as the Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) impose new requirements governing the responsible management of patient data. For example, HIPAA stipulates that patients can request an accounting of the disclosure of their protected health information by hospitals and other "covered entities. One way to provide an accounting of disclosures would be to develop a user-centric auditing system. Such a system would provide a portal where the patient could login and view a list of all accesses to his medical record. The portal would provide the patient with This work was supported by NSF grants CNS and IGERT Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. KDD-DMH 11, August 21, 211, San Diego, California, USA. Copyright 211 ACM /11/8...$1.. Dr. Dave had an appointment with Alice on Jan 3, 21. Lid Date User Patient L1 Mon Jan 3 1:16:57 21 Nurse Nick Alice L116 Mon Jan 3 11:22:43 21 Dr. Dave Alice L127 Mon Jan 3 17:9:3 21 Radiologist Ron Alice Figure 1: Sample access log and explanation information about who has accessed his record, when each access occurred, and possibly a coded description describing the type of action (e.g., viewed labs, or updated medications). Unfortunately, this information can be hard to analyze and may cause undue concern, particularly if the list of accesses is long. For example, while a patient is likely to know the name of his primary care doctor, he probably does not know the name of the intake nurse. To understand how their medical information is used, patients will also want to understand why their medical information was accessed. EXAMPLE 1.1. Consider a sample patient Alice, who had a broken arm. She was treated by Dr. Dave at the hospital, and several x-rays were taken. Later, when Alice logs into the auditing portal, she sees a list of all accesses to her medical record (Figure 1). This list can be very long, so ideally, when she clicks on an access, the system should provide a text explanation: L1 Nurse Nick works with Dr. Dave, and Dr. Dave has an appointment with Alice on Jan 3, 21. L116 Dr. Dave has an appointment with Alice on Jan 3, 21. L127 Ron is a radiologist, and he reviewed Alice s x-rays. One approach to producing explanations would require the user (doctor or other staff member) to explicitly enter a reason for each access. While some systems may require this (e.g., [1]), it is too burdensome to be a general solution. In an ideal world, we would be able to generate explanations automatically. From the above example, it is interesting to observe that the explanation for each access can actually be generated using information that is located elsewhere in the EHR database. For example, Alice s appointment with Dr. Dave is recorded in the appointments table. The EHR database also records the fact that Alice had an x-ray taken, and that Ron is a radiologist. In this paper, we study the extent to which EHR accesses can be explained using data located elsewhere in the EHR database. We describe a large-scale empirical study using a data set from the University of Michigan Health System s CareWeb EHR system. The data set includes a log of over 4 million accesses and

2 1 # Accesses Date List Pa(ent's Documents/ Imaging View Pa(ent's Document View Pa(ent's Labs View Pa(ent's Demographics View Pa(ent's Schedule List Image Documents View Pa(ent's Problem Summary List Record Results List Other Frac3on of Accesses Write Read Figure 2: Accesses Per Hour (12/21) Figure 3: Actions Figure 4: Read-Write Distribution de-identified information about the patients whose medical records were accessed, including appointments, labs, and medications. Based on our results, we conclude that a large majority of EHR accesses can be explained automatically. The remainder of this paper is organized as follows: We begin with a basic description of the data set in Section 2. In Section 3, we use the access log to provide an overall characterization of CareWeb usage patterns. In Section 4, we investigate the extent to which EHR accesses can be explained automatically. We identify three different types of explanations (direct, group, and consultation), and observe that over 9% of accesses can be explained using information already located in the EHR database. In order to support group explanations, it is important that we be able to automatically identify collaborative groups (i.e., groups of users who work together). Section 4.2 demonstrates that this can be done effectively by observing shared patients in the access log. The paper concludes with discussions of related and future work in Sections 5 and DATA DESCRIPTION We analyzed a large data set from CareWeb, the University of Michigan Health System s locally-developed, web-based EHR system. The data set includes a comprehensive access log. Each time a user (e.g., a doctor or other UMHS staff member) accesses a patient record, the system automatically records information about the access, including the time, UserID, PatientID, and a description of the action performed. An access corresponds to a user reading or writing data. We analyzed the log records collected during one week (December 13-19, 21). During this period, the log recorded over 4M accesses, referencing over 12K distinct users and 124K distinct patients. The number of distinct user-patient pairs is approximately user patient pairs 5K, which gives a user-patient density of = users patients.3. The data set also includes mappings from UserIDs to department codes (e.g., Pediatrics or Nursing-Pediatrics). For the users mentioned in the log, we observed 291 distinct department codes. Finally, we obtained de-identified information about the patients whose records were accessed. This information is stored in eight database tables: Appointment, Document, Inpatient Medication, Lab, Outpatient Medication,, Service/Order, and Visit. For example, the Appointment table lists the date of each appointment, the PatientID, and the UserID of the doctor. The Inpatient Medication table lists the date, the UserID of the person who entered the medication, the UserID of the person who requested the Table # Records Log 4.5M Appointment 51K Document 76K Inpatient Medication 122K Lab 45K Outpatient Medication 12K 17K Service/Order 16K Visit 3K Table 1: Data Overview medication, and the UserID of the person who administered the medication. We extracted data for these tables from the weeks before, during and after the week in which the log was created. Table 1 lists the number of records in each table. It is important to point out that our data set is, in some sense, incomplete. We only received a subset of the log (one week) and a subset of information about the patients referenced in the log. As a result, we do not have access to information such as appointments that were scheduled more than one week before or after the period covered by the log. Nonetheless, the data set provides valuable insight, and a more extensive study covering a larger period of time is an interesting topic for future work. 3. BASIC USAGE In this section, we use the access log to provide a basic characterization of CareWeb usage patterns. 3.1 Log Characteristics First, we examined the general properties of the access log. Figure 2 shows the number of accesses per hour over the week (December 13-19, 21). Clearly, the accesses follow a diurnal pattern, where the number of accesses is low in the early morning, increases through the day, drops during lunch, increases in the afternoon, and then declines again in the evening. Additionally, fewer accesses occur on the weekend (December 18-19) than during the week. Intuitively, the number of accesses appears to be proportional to the number of people working in the hospital system at a given point of time. While the raw number of accesses can be useful, we are also interested in the types of actions that are executed. Along with each access, CareWeb records a description of the action that was performed. There are 124 distinct action types. Figure 3 shows the eight most frequent actions, which account for over 65% of all accesses. Unsurprisingly, the most common action is to view a list of a patient s documents, and the second most common action is to view a patient s document (e.g., doctor s note).

3 # Users # Users # Patients # Patients # Accesses # Patients Accessed # Accesses # Users Who Accessed a Patient's Record Figure 5: Accesses Per User Figure 6: Patients Per User Figure 7: Accesses Per Patient Figure 8: Users Per Patient Accesses/User Patients/User Accesses/Patient Users/Patient UMHS Int Med - General Medicine (Physicians) UMHS Int Med - General Medicine (Physicians) Cancer Center UMHS Internal Medicine (Physicians) Central Staffing Resources UMHS Int Med - General Medicine (Physicians) Central Staffing Resources Cancer Center Int Med - Outpatient Svcs - Taubman UMHS Internal Medicine (Physicians) Pathology Health Information Management Physician Services Medical Students Operating Rooms/PACU UMHS Pediatrics - General Medicine (Physicians) Health Information Management Cancer Center Medical Students Cancer Center Central Staffing Resources Physician Services UMHS Family Medicine (Physicians) Health Information Management Medical Students Figure 9: Top departments by access behavior. For example, Internal Medicine physicians access the most medical records and the most unique patients. Finally, we examined the number of actions that read data vs. write data. Figure 4 shows that most accesses only read EHR data, while a smaller fraction modify the data. 3.2 User and Patient Characteristics Due to the different types of jobs within the hospital system, EHR users access patient records in different ways. For instance, some users repeatedly access the same patient s record, while others access many different patients records. Similarly, patients have their medical records accessed in different ways. For some patients, only their primary care physician accesses their medical record; other patients have large teams of doctors. To better understand the types of users and patients in our data set, we analyzed the log of accesses based on four quantitative measures: 1. Total number of accesses per user (accesses/user) 2. Number of distinct patients accessed per user (patients/user) 3. Total number of accesses to a patient s medical record (accesses/patient) 4. Number of distinct users that access a patient s medical record (users/patient) Figures 5, 6, 7 and 8 show the distribution of each measure using a log-log scale. We find that all four measures have heavily-skewed ("long-tail") distributions. While the average user performed 358 accesses (39 distinct patients) during the week, most users accessed very few records. Similarly, the average patient s record was accessed 36 times (4 distinct users), but most patients records were accessed very few times. For both patients and users, there is a small subset of "heavy" users and patients. To further understand who these people are, we examined the users and patients in the tails of the distribution. For example, for accesses per user, we identified the top 1% of users (i.e., those with the most accesses). Among these users, the most frequent department codes are shown in Figure 9. Notice that internal medicine physicians perform the most accesses, and they access the most unique patients. In general, physicians tend to be among the heaviest users. We also looked at the top 1% of patients (i.e., those with the most accesses to their records). Because we were working with de-identified data, we were not able to examine the patients characteristics directly. Instead, we looked at the department codes of the users who accessed the patients records, which gives us a good idea of where the patients were being treated. Figure 9 shows the common department codes of the users who treated this group of patients. Interestingly, and perhaps unsurprisingly, many of the patients were treated by users from the Cancer Center. When we look at the patients whose records were accessed by the most distinct users, we find that the users are from radiology, pathology and the operating room. These departments make sense for heavily accessed patients, since patients with x-rays, labs or who are in the operating room are typically treated by teams of hospital employees. 4. EXPLAINING ACCESSES The main hypothesis of this paper is that most accesses to EHR records occur for a valid clinical or operational reason, and often this reason is actually documented elsewhere in the EHR database. Returning to example 1.1, Dr. Dave accessed Alice s record because Alice had an appointment with Dr. Dave, and indeed, this appointment is recorded elsewhere in the EHR database. In this section, we identify three types of explanations, and demonstrate empirically that they can be used to explain a significant number of accesses in the log. Direct Explanations: The access can be explained based on an event (e.g., an appointment or a doctor s note) that involves both the patient and the user. For example, Dr. Dave accessed Alice s medical record because Dr. Dave has an appointment with Alice.

4 1.8 Recall Appointment Document Inpa6ent Meds Inpa6ent Meds (Requested By) Inpa6ent Meds (Administered By) Labs (Ordered By) (Updated By) (Authorized By) (Began By) (Ordered By) Service/Order Service/Order (Requested By) Visit Repeat Access Explana6ons Events Figure 1: Frequency of events and direct explanations in the database for all accesses. 1.8 Recall Appointment Document Inpa6ent Meds Inpa6ent Meds (Requested By) Inpa6ent Meds (Administered By) Labs (Ordered By) (Updated By) (Authorized By) (Began By) (Ordered By) Service/Order Service/Order (Requested By) Visit Explana6ons Events Figure 11: Frequency of events and direct explanations in the database for first accesses. Group Explanations: The access can be explained based on an event that involves the patient and a member of the user s group (e.g., someone with the same department code, or who works with the user), but not the user himself. For example, Nurse Nick accessed Alice s medical record because Nurse Nick works with Dr. Dave and Dr. Dave has an appointment with Alice. Consultation Explanations: The access can be explained because the user works in a department that provides consultation services related to an event involving the patient. For example, Radiologist Ron accessed Alice s medical record because Alice had an x-ray taken. 4.1 Direct Explanations A direct explanation explains why a user accessed a patient s medical record based on an event stored in the database. Common events include appointments, visits to the hospital, doctor s notes and accesses in the log. A full list of the events we consider is provided in Table 1. Figure 1 shows the event recall for each of the events. We define the recall of an event to be the proportion of accesses in the log that mention a patient who was involved in an event of that type Accesses F or P atients W ith T he Event (Event Recall = ). For Log example, if every patient mentioned in the log had an appointment, then the event recall for appointments would be 1.. The events with the highest recall were services/orders that were requested for patients (71% of all accesses), patient documents such as a doctor s note (7%), and outpatient medication prescriptions (67%). Additionally, approximately 88% of the accesses correspond to the event of a repeat access; a repeat access means that the user previously accessed the same patient s record. Of course, in order for an event to explain a particular access, the event should involve the same patient and user. Intuitively, an explanation connects the user who accessed the medical record to the patient whose record was accessed. For example, Dr. Dave accessed Alice s medical record because Alice had an appointment with Dr. Dave. However, Alice s appointment does not imply that any hospital employee should access her medical record. Figure 1 shows the explanation recall for a set of hand-crafted direct explanations, such as having an appointment with a patient. The recall of an explanation is the proportion of accesses that are Accesses Explained Log explained (Explanation Recall = ). If every access could be explained by an appointment, then the explanation recall for appointments would be 1.. Of course, we observe that the explanation recall is lower than the event recall. While many patients have appointments, it is relatively less likely to have an appointment with the particular user who accessed the patient s record. Nonetheless, each type of event can be used to directly explain some accesses. While repeat accesses make up a majority of the log, it is more interesting to explain why a user accesses a patient s record for the first time. Therefore, we additionally analyzed the set of first accesses in the log. It is important to note that since we only have a subset of the log, repeat accesses may appear as first accesses. Figure 11 shows the recall for the first accesses from the log. We observe that the general proportion of events and explanations is similar to those for all accesses, except that the recall for the events and explanations are slightly lower. A user-centric auditing system would utilize all of the direct explanations when attempting to explain why an access occurred. Figure 12 shows the recall when the direct explanations are combined. When we only consider first accesses, we are able to explain approximately 22% of the accesses. In contrast, 86% of the first accesses correspond to a patient who experienced an event. We hypothesize that the recall is lower for explanations than events because only a subset of the events mention the user who accessed the

5 1 1 Recall All (First Accesses) All (All Accessses - Other Than Repeat Access) All (All Accesses) Recall (First Accesses) Accesses/User Pa2ents/User Accesses/Pa2ent Users/Pa2ent Explana>ons Events Top 1% Bo@om 1% Figure 12: Recall Summary - Direct Explanations patient s record (e.g., Alice s appointment mentions Dr. Dave, not Nurse Nick). We will address this issue in Section 4.2. When we consider all the accesses in the log and all the direct explanations other than the repeat access explanation, we are able to explain approximately 43% of the accesses for which there are events for 92% of the accesses. Lastly, when we consider all the accesses in the log and all direct explanations, we can explain approximately 91% of the accesses for which there are events for 98% of the accesses. This result supports our hypothesis that EHRs store a reason for why most accesses occur. Interestingly, 2% of accesses in the log correspond to patients that did not experience at least one event from the tables listed in Table 1. There are multiple possible reasons for this gap in information. First, since our data set was extracted from a specific timeframe, relevant events that occurred outside our timeframe were missed. Second, the university s health system has many researchers that access patient information; these accesses typically do not have an event for the patient. Lastly, it is possible that there are additional data sources in the hospital that we were unaware of that could have been used to help explain accesses, but were not included in our data set User and Patient Characteristics Additionally, we examined whether specific types of users accesses could be explained more effectively. Using the top and bottom 1% of users based on the four measures from Section 3.2, we calculated the recall for the groups. Figure 13 shows the explanation recall for first accesses given the eight groups. Interestingly, the top-1% of users that access the most medical records have a higher explanation recall (33%) when compared to all users in our data set (22%). Moreover, the bottom-1% of users that access the fewest medical records have a lower explanation recall (15%). The bottom-1% of patients who are accessed by the least number of users have an even worse explanation recall of 3%. We hypothesize that EHRs store more information for heavy users, which allows us to explain a higher proportion of their accesses Temporal Patterns Lastly, we analyzed when accesses could and could not be explained. Figure 14 shows the fraction of accesses that cannot be explained per hour for both all accesses and first accesses (F raction Unexplained = 1 Explanation Recall). We observe that the fraction of unexplained accesses varies with the number of accesses in the system. Additionally, at night, the fraction of accesses that cannot be explained is lowest. We hypothesize that this occurs because hospitals are minimally staffed at night and do not have many ancillary staff. It is also important to note that the fraction of all accesses that cannot be explained trends downwards during the week as fewer accesses are incorrectly represented as first accesses. Figure 13: Explanation Recall By User Behavior Type Fraction Unexplained All Accesses First Accesses Date Figure 14: Unexplained Accesses Over Time 4.2 Group Explanations So far, we have only considered accesses that can be explained directly by an event that involves the same user and patient. However, this fails to explain many real accesses. For example, consider Nurse Nick from Example 1.1 who works with Dr. Dave. Alice has an appointment only with Dr. Dave, not with Nurse Nick. More generally, as we showed in Figures 1 and 11, while most patients are involved in events, relatively few of these events constitute direct explanations. Because of cases like this, we also consider what we will call group explanations. In addition to event information, a group explanation also incorporates user groups. For example, in the simplest case, we can create groups of users by department code (i.e., place all users with the same department code into a single group). An explanation can then be constructed for any access where there is an event involving the patient and some member of the user s group. For example, we might find that Dr. Mike accessed Alice s record because Dr. Mike works in Pediatrics, and Alice had an appointment with Dr. Dave, who also works in Pediatrics. Unfortunately, groups based on department code are often insufficient for explaining accesses. In particular, in our data set, we found that often users who work together have different department codes (e.g., Pediatrics and Nursing-Pediatrics). Instead, we want to infer true collaborative groups based on the real working relationships between users. One approach to inferring collaborative groups involves looking at the access log. Intuitively, if two users work together, they will often access the same patients records. Thus, we inferred collaborative groups using the following approach: First, we constructed a weighted network graph where the nodes are users, and there exists an edge between two nodes if the users accessed the same patient s medical record. The weight of an edge depends on how often the two users access the same patients medical records. We assign

6 # Users Degree Cancer Center Pathology UMHS Int Med - Hem/Onc (Physicians) UMHS (Physicians) Radia>on Oncology Clinical Trials Office Central Staffing Resources Pharmacy Other UMHS Psychiatry (Physicians) Psychiatry - Hospital Psychiatry - Social Work Social Work Physician Services Nursing - CAP6 (Child & Adolescent Psych) Medical Students Nursing - Psych 9C/D (Adult Psych) Psychiatry - Business Office Other Figure 15: Degree distribution in the collaborative network representation Figure 16: Collaborative Group I (Cancer Center) Figure 17: Collaborative Group II (Psychiatric Care) weights to edges using an approach similar to the one described in previous work by Chen et al. [5]. Figure 15 shows the node degree distribution from the resulting network. As is often the case in social and collaborative networks, the distribution is heavily skewed. Second, we directly applied a weighted graph clustering algorithm [14], which discovers a set of groups and an assignment of users to groups. We recursively applied this clustering algorithm on each group to create a hierarchical clustering. Intuitively, groups at the bottom level of the hierarchy are more tightly connected than groups at the top level of the hierarchy. Using the above approach, we created groups using the first six days of accesses in the log. We manually inspected the 33 top-level groups in the hierarchy, and we were able to identify groups that represented the Cancer Center and psychiatric care, among others. Figures 16 and 17 show the department codes of users assigned to these two groups. Introducing collaborative groups can potentially create false positive explanations. To measure the trade-off, we performed a precision and recall experiment. For the experiment, we constructed a fake log with an equivalent number of accesses as the real log. Entries in the fake log were created by selecting pairs of users and patients uniformly at random. We define precision to be the number of real accesses explained over all accesses explained (P recision Real Accesses Explained Real+F ake Accesses Explained. = Figure 18 shows the precision and explanation recall for the first accesses from day seven of the log. We used only appointment, document and visit events for this experiment. Depth zero corresponds to every user being placed in a single group. Additionally, the figure includes the precision and recall when the samedepartment explanation is used. The figure shows that more general groupings (lower numbers in the hierarchy) provide the best explanation recall, but lower precision. For instance, using the groups at depth one, the group explanations explain 33% of the first accesses compared to 13% when only the direct explanations are used with the appointment, document and visit events. As we use groups at lower depths of the hierarchy (higher numbers), the precision approaches 1.. We attribute the high precision to the low user-patient density; for these tightly connected groups, it is unlikely that a fake access corresponds to an actual appointment in the database. We also observe that the collaborative groups perform better than the same-department groups since most teams in the hospital are multi-disciplinary. 4.3 Consultation Explanations Initially, we only requested data for patient appointments, visits and documents. However, after a preliminary analysis, we discovered that a number of accesses that could not be explained were made by users from departments that provide services to the hos Same Dept. Precision Depth In Group Hierarchy Recall (First Accesses) Figure 18: Group Explanation Precision and Recall (Using Appointments, Documents, Visits and Log Day 7) pital (e.g., radiology, pathology and pharmacy). Users in these departments typically do not have appointments with patients. Instead, there is often an explicit request for a service that is stored in the database. Following the request, these users perform the consultation service. EXAMPLE 4.1. Continuing with Example 1.1, Alice has an x- ray taken of her arm. A request is then sent to the radiology department to review the x-ray and diagnose the injury. The request does not specifically state which radiologist will review the x-ray. Radiologist Ron sees the request, accesses Alice s medical record and provides a diagnosis. Consultation explanations explain accesses based on the fact that specific departments provide consultation services when specific events occur. For example, Radiologist Ron accessed Alice s medical record because Alice had an x-ray and Ron is a radiologist. We looked at three specific types of consultation explanations: radiology events, medication events and lab events. Specifically, we examined how many accesses corresponded to (i) patients who had a radiology event and were accessed by radiologists, (ii) patients who had an inpatient or outpatient medication event and were accessed by a pharmacist and (iii) patients who had a laboratory event and were accessed by a pathologist. Figure 19 shows the explanation recall for first accesses of each of the consultation explanations as well as the recall when all the consultation explanations are combined (All). When combined, the consultation explanations account for approximately 5% of the first accesses.

7 Recall (First Accesses) Inpa-ent Meds Labs Outpa-ent Meds Figure 19: Consultation Explanation Recall 5. RELATED WORK As more information is stored digitally, it becomes more important to provide an accurate accounting for how sensitive data is used. There have been multiple instances where data has been accessed inappropriately. For example, in 28, Britney Spears medical record was inappropriately accessed by multiple hospital employees; these employees were subsequently fired for their behavior [15]. Inappropriate accesses also occur in non-medical database systems. For example, Barack Obama s passport information was inappropriately accessed at the U.S. State Department [8]. Recent work has proposed methods to detect inappropriate access behavior in electronic health record systems. For example, Chen et al. analyze a hospital system s access log to detect anomalous insiders [5]. Anomalous users are detected by measuring the difference in accesses pattern from one user to other EHR users that access similar medical records. In this work, the authors consider a user to be the unit of suspiciousness. In contrast, we consider single accesses as the unit of suspiciousness and attempt to explain why each access occurred. We believe this is appropriate when users are typically well behaved but irregularly access inappropriate information. Other work has considered how to set access control policies for EHRs to restrict access to sensitive data. Malin et al. propose a data-driven system that mines common usage patterns [1]. For example, one possible mined usage pattern is that a surgeon will likely access a patient s medical record after it is accessed in the emergency room. Deploying access controls in EHRs can be challenging. It would be dangerous to delay a patient s treatment while a doctor waits to be given permission to access a patient s medical record, so it is common to instead apply "access control policies" after the fact to detect that misuse has already occurred. As EHRs become more prevalent, users are increasingly using search systems to find and retrieve patient information. Researchers have begun to study the queries issued to EHRs. For example, Natarajan et al. provide an analysis of clinical queries in an electronic health record search utility [13]. The authors classify queries into categories such as navigational, transactional, and searches. Moreover, searching for complex medical information can be challenging due to a user s lack of experience or lack of knowledge in a specific domain. To make EHR search easier, Zheng et al. propose a collaborative search system [17]. In the system, users can share search bundles that preserve their search knowledge. In this work, we considered application-level logging, which is commonly found in EHRs. Typically, these logs store the time, the UserID and PatientID for each access. A recent body of work has focused on the related problem of SQL log auditing. These logs store the SQL text of the operations executed on the database; All this type of logging is provided by most commercial DBMSs [9, 12, 16]. For these types of logs, it is nontrivial to determine who has accessed sensitive data. Recent models and systems have been proposed to address this problem for SQL logs [2, 7, 11]. Lastly, in some sense, explaining why accesses occur in an electronic health record system is similar to the problems faced in data provenance [3, 4, 6]. While there are some connections between the two problem spaces, we are not aware of other systems that can be applied directly to explain why accesses occur in EHRs. 6. CONCLUSION AND FUTURE WORK In this paper, we showed that most accesses in electronic health record systems occur for a clinical or operational reason, and this reason is usually documented in the EHR database. Common reasons to access medical records include preparing for a patient s appointments and diagnosing an x-ray. Using this information, we demonstrated that over 9% of the accesses recorded during a week at the University of Michigan Health System can be explained. In particular, we observed three types of explanations from the data set: direct, group and consultation explanations. To support group explanations, we identified collaborative groups that can be combined with EHR data to explain additional accesses. There are many interesting related problems for future work: Automated Misuse Detection: One important application of explanations lies in user-centric auditing systems. However, these explanations can also likely be used for alternative purposes such as automated misuse detection. Current approaches for detecting misuse typically involve a manual audit of the access log. If we are able to automatically explain why an access occurs, then the auditor would only have to analyze the accesses that cannot be explained, reducing the audit time. Temporal Groups: Hospitals are composed of dynamic teams that change over time. For instance, medical students and residents change services weekly or monthly. We plan to explore how these groups change over time and the frequency of the changes. Understanding Hospital Workflows: Intuitively, patients with the same medical conditions will be treated in the same manner. We plan to examine if hospital workflows can be mined from the access log and EHR database information. Grouping Explained and Unexplained Accesses: Multiple users may access a patient s medical record for the same reason. Alternatively, a single user may access a patient s record for many different reasons. We will consider how to group these accesses and explanations. We will also consider grouping unexplained accesses. 7. REFERENCES [1] Cerner power chart [2] R. Agrawal, R. J. Bayardo, C. Faloutsos, J. Kiernan, R. Rantzau, and R. Srikant. Auditing compliance with a Hippocratic database. In VLDB, 24. [3] P. Buneman, S. Khanna, and W. chiew Tan. Why and where: A characterization of data provenance. In ICDT, 21. [4] A. Chapman and H. V. Jagadish. Why not? In SIGMOD, 29. [5] Y. Chen and B. Malin. Detection of anomalous insiders in collaborative environments via relational analysis of access logs. CODASPY, 211.

8 [6] J. Cheney, L. Chiticariu, and W. C. Tan. Provenance in databases: Why, how, and where. Foundations and Trends in Databases, 29. [7] D. Fabbri, K. LeFevre, and Q. Zhu. Policyreplay: Misconfiguration-response queries for data breach reporting. In VLDB, 21. [8] G. Kessler. Two fired for viewing Obama passport file. Washington Post, March [9] D. Kiely. SQL Server 28 Security Overview for Database Administrators. SQL Server Technical Article, October 27. [1] B. Malin, S. Nyemba, and J. Paulett. Learning relational policies from electronic health record access logs. J. of Biomedical Informatics, 211. [11] R. Motwani, S. Nabar, and D. Thomas. Auditing SQL queries. In ICDE, 28. [12] A. Nanda. Fine-grained auditing for real-world problems. Oracle Magazine. [13] K. Natarajan, D. Stein, S. Jain, and N. Elhadad. An analysis of clinical queries in an electronic health record search utility. International Journal of Medical Informatics, 21. [14] M. Newman. Analysis of weighted networks. Phys. Rev. E, 24. [15] C. Ornstein. Hospital to punish snooping on Spears. L.A. Times, 28. [16] T. J. Wasserman. DB2 UDB Security Part 5: Understanding the DB2 Audit Facility, March 26. [17] K. Zheng, Q. Mei, and D. A. Hanauer. Collaborative search in electronic health records. J Am Med Inform Assoc, 211.

Industry leading Education. Certified Partner Program. Get Involved. #cgwebinar

Industry leading Education. Certified Partner Program. Get Involved. #cgwebinar Industry leading Education Certified Partner Program Please ask questions For todays Slides http://compliancy-group.com/ slides023/ Todays & Past webinars go to: http://compliancy-group.com/ webinar/ Get

More information

Auditing Medical Records Accesses via Healthcare Interaction Networks

Auditing Medical Records Accesses via Healthcare Interaction Networks AMIA 2012 Annual Symposium via Healthcare Interaction Networks You Chen, Ph.D. Biomedical Informatics Dept., Vanderbilt University November 6, 2012 (Joint work with Bradley Malin and Steve Nyemba) $675,000

More information

Query Log Analysis of an Electronic Health Record Search Engine

Query Log Analysis of an Electronic Health Record Search Engine Query Log Analysis of an Electronic Health Record Search Engine Lei Yang 1, Qiaozhu Mei 1,2, Kai Zheng 1,3, David A. Hanauer 4,5 1, School of Information 2. Department of EECS 3. School of Public Health

More information

Big Data Analytics for Mitigating Insider Risks in Electronic Medical Records

Big Data Analytics for Mitigating Insider Risks in Electronic Medical Records Big Data Analytics for Mitigating Insider Risks in Electronic Medical Records Bradley Malin, Ph.D. Associate Prof. & Vice Chair of Biomedical Informatics, School of Medicine Associate Prof. of Computer

More information

Auditing EMR System Usage. You Chen Jan, 17, 2013 You.chen@vanderbilt.edu

Auditing EMR System Usage. You Chen Jan, 17, 2013 You.chen@vanderbilt.edu Auditing EMR System Usage You Chen Jan, 17, 2013 You.chen@vanderbilt.edu Health data being accessed by hackers, lost with laptop computers, or simply read by curious employees Anomalous Usage You Chen,

More information

EHRs vs. Paper-based Systems: 5 Key Criteria for Ascertaining Value

EHRs vs. Paper-based Systems: 5 Key Criteria for Ascertaining Value Research White Paper EHRs vs. Paper-based Systems: 5 Key Criteria for Ascertaining Value Provided by: EHR, Practice Management & Billing In One www.omnimd.com Before evaluating the benefits of EHRs, one

More information

Managing the Insider Threat: Real-time Monitoring of Access Patterns to ephi

Managing the Insider Threat: Real-time Monitoring of Access Patterns to ephi Managing the Insider Threat: Real-time Monitoring of Access Patterns to ephi Mac McMillan (CynergisTek, HIMSS) Jennings Aske (Partners Healthcare) Mike Terra (Oracle Corp.) Daniel Fabbri (U. Michigan)

More information

Keywords: Regression testing, database applications, and impact analysis. Abstract. 1 Introduction

Keywords: Regression testing, database applications, and impact analysis. Abstract. 1 Introduction Regression Testing of Database Applications Bassel Daou, Ramzi A. Haraty, Nash at Mansour Lebanese American University P.O. Box 13-5053 Beirut, Lebanon Email: rharaty, nmansour@lau.edu.lb Keywords: Regression

More information

Case Studies. Table of Contents

Case Studies. Table of Contents Table of Contents 1 Integration with an Oncology EMR and an External Billing System 3 2 Automated Patient Portal 4 3 Client Scheduling 5 4 Client Server based EMR 6 Version 0.0 Page 2 of 8 1 INTEGRATION

More information

SQL Auditing. Introduction. SQL Auditing. Team i-protect. December 10, 2009. Denition

SQL Auditing. Introduction. SQL Auditing. Team i-protect. December 10, 2009. Denition SQL Auditing Team i-protect December 10, 2009 Introduction We introduce an auditing algorithm for determining whether a database system is adhering to its data disclosure policies [3]. Consider Bob (homeless,

More information

Introduction to Information and Computer Science: Information Systems

Introduction to Information and Computer Science: Information Systems Introduction to Information and Computer Science: Information Systems Lecture 1 Audio Transcript Slide 1 Welcome to Introduction to Information and Computer Science: Information Systems. The component,

More information

Adoption of Information Technology in Healthcare: Benefits & Constraints

Adoption of Information Technology in Healthcare: Benefits & Constraints Adoption of Information Technology in Healthcare: Benefits & Constraints A WiredFox Technologies White Paper 2 Adoption of Information Technology in Healthcare: Benefits & Constraints By Jeff Yelton 3

More information

9 Features Your Next EMR Needs to Have. DocuTAP White Paper

9 Features Your Next EMR Needs to Have. DocuTAP White Paper 9 Features Your Next EMR Needs to Have DocuTAP White Paper 9 Features Your Next EMR Needs to Have An efficient workflow is paramount to an urgent care s success. The difference between making a profit

More information

Chapter 3: Data Mining Driven Learning Apprentice System for Medical Billing Compliance

Chapter 3: Data Mining Driven Learning Apprentice System for Medical Billing Compliance Chapter 3: Data Mining Driven Learning Apprentice System for Medical Billing Compliance 3.1 Introduction This research has been conducted at back office of a medical billing company situated in a custom

More information

3/30/2011. HITECH and Meaningful Use: What it means for patients & families. HITECH and Meaningful Use

3/30/2011. HITECH and Meaningful Use: What it means for patients & families. HITECH and Meaningful Use HITECH and Meaningful Use: What it means for patients & families Gena Cook CEO, Navigating Cancer Five Major Goals of HITECH Improvements through a transformed delivery system 1 Improve the quality, safety

More information

Achieving Value from Diverse Healthcare Data

Achieving Value from Diverse Healthcare Data Achieving Value from Diverse Healthcare Data Paul Bleicher, MD, PhD Chief Medical Officer Humedica Boston MA The Information Environment in Healthcare Pharma, Biotech, Devices Hospitals Physicians Pharmacies

More information

Electronic Medical Records vs. Electronic Health Records: Yes, There Is a Difference. A HIMSS Analytics TM White Paper. By Dave Garets and Mike Davis

Electronic Medical Records vs. Electronic Health Records: Yes, There Is a Difference. A HIMSS Analytics TM White Paper. By Dave Garets and Mike Davis Electronic Medical Records vs. Electronic Health Records: Yes, There Is a Difference A HIMSS Analytics TM White Paper By Dave Garets and Mike Davis Updated January 26, 2006 HIMSS Analytics, LLC 230 E.

More information

Find the signal in the noise

Find the signal in the noise Find the signal in the noise Electronic Health Records: The challenge The adoption of Electronic Health Records (EHRs) in the USA is rapidly increasing, due to the Health Information Technology and Clinical

More information

Clintegrity 360 QualityAnalytics

Clintegrity 360 QualityAnalytics WHITE PAPER Clintegrity 360 QualityAnalytics Bridging Clinical Documentation and Quality of Care HEALTHCARE EXECUTIVE SUMMARY The US Healthcare system is undergoing a gradual, but steady transformation.

More information

Clinical Research Management Training Program Electronic Medical Records: Access, Use and Compliance for Research March 11, 2013

Clinical Research Management Training Program Electronic Medical Records: Access, Use and Compliance for Research March 11, 2013 Clinical Research Management Training Program Electronic Medical Records: Access, Use and Compliance for Research March 11, 2013 Linda Metro, RHIA Director, Health Information Management Electronic Medical

More information

Custom Report Data Elements: 2012 IT Database Fields. Source: American Hospital Association IT Survey

Custom Report Data Elements: 2012 IT Database Fields. Source: American Hospital Association IT Survey Custom Report Data Elements: 2012 IT Database Fields Source: American Hospital Association IT Survey COMPUTERIZED SYSTEM IMPLEMENTATION 3 Bar Coding 3 Computerized Provider Order Entry 3 Decision Support

More information

The Human Experiment- Electronic Medical/Health Records

The Human Experiment- Electronic Medical/Health Records The Human Experiment- Electronic Medical/Health Records Patient safety is one of the primary stated intentions behind the push for computerized medical records. To the extent illegible handwriting leads

More information

Medicaid EHR Incentive Program. Focus on Stage 2. Kim Davis-Allen, Outreach Coordinator Kim.davis@ahca.myflorida.com

Medicaid EHR Incentive Program. Focus on Stage 2. Kim Davis-Allen, Outreach Coordinator Kim.davis@ahca.myflorida.com Medicaid EHR Incentive Program Focus on Stage 2 Kim Davis-Allen, Outreach Coordinator Kim.davis@ahca.myflorida.com Understanding Participation Program Year Program Year January 1 st - December 31st. Year

More information

ELECTRONIC HEALTH RECORDS

ELECTRONIC HEALTH RECORDS ELECTRONIC HEALTH RECORDS Understanding and Using Computerized Medical Records CHAPTER TEN LESSON ONE Privacy and Security of Health Records Understanding HIPAA HIPAA: acronym for Health Insurance Portability

More information

ELECTRONIC MEDICAL RECORDS. Selecting and Utilizing an Electronic Medical Records Solution. A WHITE PAPER by CureMD.

ELECTRONIC MEDICAL RECORDS. Selecting and Utilizing an Electronic Medical Records Solution. A WHITE PAPER by CureMD. ELECTRONIC MEDICAL RECORDS Selecting and Utilizing an Electronic Medical Records Solution A WHITE PAPER by CureMD CureMD Healthcare 55 Broad Street New York, NY 10004 Overview United States of America

More information

PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS. PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software

More information

WHITE PAPER. QualityAnalytics. Bridging Clinical Documentation and Quality of Care

WHITE PAPER. QualityAnalytics. Bridging Clinical Documentation and Quality of Care WHITE PAPER QualityAnalytics Bridging Clinical Documentation and Quality of Care 2 EXECUTIVE SUMMARY The US Healthcare system is undergoing a gradual, but steady transformation. At the center of this transformation

More information

Transformational Data-Driven Solutions for Healthcare

Transformational Data-Driven Solutions for Healthcare Transformational Data-Driven Solutions for Healthcare Transformational Data-Driven Solutions for Healthcare Today s healthcare providers face increasing pressure to improve operational performance while

More information

Advanced Solutions for Accountable Care Organizations (ACOs)

Advanced Solutions for Accountable Care Organizations (ACOs) Advanced Solutions for Accountable Care Organizations (ACOs) Since our founding more than 21 years ago, Iatric Systems has been dedicated to supporting the quality and delivery of healthcare, while helping

More information

Health Record Banking Alliance White Paper

Health Record Banking Alliance White Paper Health Record Banking Alliance White Paper A Proposed National Infrastructure for HIE Using Personally Controlled Records January 4, 2013 Table of Contents Executive Summary...3 I. Overview...5 II. Architectural

More information

How to Achieve Meaningful Use with ICANotes

How to Achieve Meaningful Use with ICANotes How to Achieve Meaningful Use with ICANotes Meaningful use involves using an EHR in a way that the government has defined as meaningful to collect incentive payments. but do not participate. Note: If you

More information

HOW WILL BIG DATA AFFECT RADIOLOGY (RESEARCH / ANALYTICS)? Ronald Arenson, MD

HOW WILL BIG DATA AFFECT RADIOLOGY (RESEARCH / ANALYTICS)? Ronald Arenson, MD HOW WILL BIG DATA AFFECT RADIOLOGY (RESEARCH / ANALYTICS)? Ronald Arenson, MD DEFINITION OF BIG DATA Big data is a broad term for data sets so large or complex that traditional data processing applications

More information

ELECTRONIC HEALTH RECORDS. Nonfederal Efforts to Help Achieve Health Information Interoperability

ELECTRONIC HEALTH RECORDS. Nonfederal Efforts to Help Achieve Health Information Interoperability United States Government Accountability Office Report to Congressional Requesters September 2015 ELECTRONIC HEALTH RECORDS Nonfederal Efforts to Help Achieve Health Information Interoperability GAO-15-817

More information

Ability to view, download, or print a "Continuity of Care Document" or "Health Summary".

Ability to view, download, or print a Continuity of Care Document or Health Summary. The Salina Pediatric Care patient portal offers secure viewing and communication as a service to patients who wish to view parts of their records and communicate with our staff. This can be a valuable

More information

RE: HIPAA Privacy Rule Accounting for Disclosures, RIN 0991-AB62

RE: HIPAA Privacy Rule Accounting for Disclosures, RIN 0991-AB62 Submitted electronically at www.regulations.gov Ms. Susan McAndrew Deputy Director for Health Information Privacy Office for Civil Rights U.S. Department of Health and Human Services Hubert H. Humphrey

More information

Medicals c i e n t i f i c study

Medicals c i e n t i f i c study Medicals c i e n t i f i c study design risks medical-ethics review board 2 Table of contents M e d i c a l - s c i e n t i f i c study Preface 2 Introduction 4 Medical-scientific study 5 Why participate?

More information

MEANINGFUL USE. Community Center Readiness Guide Additional Resource #13 Meaningful Use Implementation Tracking Tool (Template) CONTENTS:

MEANINGFUL USE. Community Center Readiness Guide Additional Resource #13 Meaningful Use Implementation Tracking Tool (Template) CONTENTS: Community Center Readiness Guide Additional Resource #13 Meaningful Use Implementation Tracking Tool (Template) MEANINGFUL USE HITECH s goal is not adoption alone but meaningful use of EHRs that is, their

More information

PARCA Certified PACS System Analyst (CPSA) Requirements

PARCA Certified PACS System Analyst (CPSA) Requirements PARCA Certified PACS System Analyst (CPSA) Requirements Copyright notice: Copyright 2005 PACS Administrators in Radiology Certification Association (PARCA). All rights reserved. All rights reserved. This

More information

Introducing. MEDITECH's Electronic Health Record. Here are the components comprising. MEDITECH's Electronic Health Record...

Introducing. MEDITECH's Electronic Health Record. Here are the components comprising. MEDITECH's Electronic Health Record... Introducing MEDITECH's Electronic Health Record MEDITECH s Electronic Health Record is a well-crafted suite of integrated applications including EPR and PAS designed to support the delivery of safe, cost-effective

More information

Entity Overview and EMR Implementation Status. EMR Implementation: Compliance Challenges. Panel Members 11/29/2013. Moderator: Lynda Hilliard

Entity Overview and EMR Implementation Status. EMR Implementation: Compliance Challenges. Panel Members 11/29/2013. Moderator: Lynda Hilliard EMR Implementation: Compliance Challenges HCCA Upper West Coast Regional Conference December 6, 2013 San Francisco Panel Members Greta Fees Ginny Kim Kevin Longo Moderator: Lynda Hilliard Entity Overview

More information

EMR Implementation: Compliance Challenges

EMR Implementation: Compliance Challenges EMR Implementation: Compliance Challenges HCCA Upper West Coast Regional Conference December 6, 2013 San Francisco Panel Members Greta Fees Ginny Kim Kevin Longo Sutter Health John Muir Health Adventist

More information

Eye Clinic of Bellevue, LTD. P.S. Privacy Policy EYE CLINIC OF BELLEVUE LTD PS NOTICE OF INFORMATION PRACTICES

Eye Clinic of Bellevue, LTD. P.S. Privacy Policy EYE CLINIC OF BELLEVUE LTD PS NOTICE OF INFORMATION PRACTICES Eye Clinic of Bellevue, LTD. P.S. Privacy Policy EYE CLINIC OF BELLEVUE LTD PS NOTICE OF INFORMATION PRACTICES Date of Last Revision: 4/8/03 Effective Date: Immediately This information is made available

More information

Healthcare Professional. Driving to the Future 11 March 7, 2011

Healthcare Professional. Driving to the Future 11 March 7, 2011 Clinical Analytics for the Practicing Healthcare Professional Driving to the Future 11 March 7, 2011 Michael O. Bice Agenda Clinical informatics as context for clinical analytics Uniqueness of medical

More information

May 8, 2013. The Honorable Fred Upton Chairman House Committee on Energy and Commerce United States House of Representatives Washington, DC 20151

May 8, 2013. The Honorable Fred Upton Chairman House Committee on Energy and Commerce United States House of Representatives Washington, DC 20151 May 8, 2013 The Honorable Dave Camp Chairman House Committee on Ways and Means United States House of Representatives Washington D.C. 20515 The Honorable Fred Upton Chairman House Committee on Energy and

More information

Chapter 2 Standards for EHRs 1 Chapter 2 Content: LO 2.1 Describe EHR Standards History LO 2.2 Identify basic HIPAA regulations LO 2.3 List basic CHI regulations LO 2.4 Summarize IOM s Core Functions LO

More information

Health Information Technology

Health Information Technology Health Information Technology chartbook volume II Maine Hospitals Survey 2010 UNIVERSITY OF SOUTHERN MAINE Health Information Technology Maine Hospitals Survey Volume II Authors Martha Elbaum Williamson,

More information

Rethinking Radiology Workflow Automating Workflow Processes

Rethinking Radiology Workflow Automating Workflow Processes Available at: http://www.corepointhealth.com/whitepapers/rethinking-radiology-workflow Rethinking Radiology Workflow Automating Workflow Processes Executive Summary Imaging centers are targeting both internal

More information

Investigating Clinical Care Pathways Correlated with Outcomes

Investigating Clinical Care Pathways Correlated with Outcomes Investigating Clinical Care Pathways Correlated with Outcomes Geetika T. Lakshmanan, Szabolcs Rozsnyai, Fei Wang IBM T. J. Watson Research Center, NY, USA August 2013 Outline Care Pathways Typical Challenges

More information

Understanding the Role of Physician-Focused At-The-Elbow Support During EMR Go-Live

Understanding the Role of Physician-Focused At-The-Elbow Support During EMR Go-Live Understanding the Role of Physician-Focused At-The-Elbow Support During EMR Go-Live Learnings from a mid-sized hospital Epic EMR Implementation. Contents Data Collection... 1 Results... 2...2 Support Events

More information

The now tips, the how tools, and the must timing for your MU path in 2014.

The now tips, the how tools, and the must timing for your MU path in 2014. Meaningful Use in 2014 - Window of Opportunity The now tips, the how tools, and the must timing for your MU path in 2014. Inside you will find: CLICK ON TITLES TO NAVIGATE MU 2014 updates; Must know changes!

More information

Whitepapers on Imaging Infrastructure for Research Paper 1. General Workflow Considerations

Whitepapers on Imaging Infrastructure for Research Paper 1. General Workflow Considerations Whitepapers on Imaging Infrastructure for Research Paper 1. General Workflow Considerations Bradley J Erickson, Tony Pan, Daniel J Marcus, CTSA Imaging Informatics Working Group Introduction The use of

More information

CHAPTER 6. Discussion and Conclusion. patient health information, such as diagnosis, medicine orders, managing patient

CHAPTER 6. Discussion and Conclusion. patient health information, such as diagnosis, medicine orders, managing patient CHAPTER 6 Discussion and Conclusion 6.1 Introduction Health care information system is a computer application to represent patient information in a friendly user interface and allowing users to review

More information

KENYATTA UNIVERSITY TITLE: APPLICATION OF GIS TECHNOLOGY TO HOSPITAL MANAGEMENT, PATIENT CARE AND PATIENT FLOW SYSTEMS

KENYATTA UNIVERSITY TITLE: APPLICATION OF GIS TECHNOLOGY TO HOSPITAL MANAGEMENT, PATIENT CARE AND PATIENT FLOW SYSTEMS KENYATTA UNIVERSITY ESRI 2 ND EDUCATIONAL CONFERENCE UNIVERSITY OF DAR ES SALAAM TITLE: APPLICATION OF GIS TECHNOLOGY TO HOSPITAL MANAGEMENT, PATIENT CARE AND PATIENT FLOW SYSTEMS BY MUGAMBI KELVIN MWENDA

More information

Guidance and Instructions on Configuring Access and Auditing. NYC Dept. of Health and Mental Hygiene. Primary Care Information Project

Guidance and Instructions on Configuring Access and Auditing. NYC Dept. of Health and Mental Hygiene. Primary Care Information Project Guidance and Instructions on Configuring Access and Auditing NYC Dept. of Health and Mental Hygiene Primary Care Information Project Privacy and Security Guidelines for PCIP Participating Practices Purpose:

More information

Understanding. Your Medical Record

Understanding. Your Medical Record Understanding Your Medical Record Table of Contents Choose topics at right by selecting the phrases. To go to the next or previous page, click on the arrows. To return to the table of contents, please

More information

Are the financial incentives worthwhile if my job gets harder to do?

Are the financial incentives worthwhile if my job gets harder to do? ? The purchase and implementation of an electronic health record system (EHR) is no small feat especially for small practices, who frequently have limited resources, staff, and capital to invest. What

More information

A Career in Pediatric Hematology-Oncology? Think About It...

A Career in Pediatric Hematology-Oncology? Think About It... A Career in Pediatric Hematology-Oncology? Think About It... What does a pediatric hematologist-oncologist do? What kind of training is necessary? Is there a future need for specialists in this area? T

More information

Achieving meaningful use of healthcare information technology

Achieving meaningful use of healthcare information technology IBM Software Information Management Achieving meaningful use of healthcare information technology A patient registry is key to adoption of EHR 2 Achieving meaningful use of healthcare information technology

More information

ASHP Professional Development Section Advisory Group. Professional Development Opportunities for Informatics Pharmacists

ASHP Professional Development Section Advisory Group. Professional Development Opportunities for Informatics Pharmacists ASHP Professional Development Section Advisory Group Professional Development Opportunities for Informatics Pharmacists Introduction Many opportunities exist to help informatics pharmacists gain the knowledge

More information

Escalating volume for practice

Escalating volume for practice perfectserve.com 866.844.5484 @PerfectServe SUCCESS STORY IPC Healthcare s Memorial City practice: Effectively managing escalating volume with PerfectServe Facility: IPC Healthcare s Memorial City practice

More information

Keweenaw Holistic Family Medicine Patient Registration Form

Keweenaw Holistic Family Medicine Patient Registration Form Keweenaw Holistic Family Medicine Patient Registration Form How did you first learn of our Clinic? Circle one: Attended Lecture Internet KHFM website Newspaper Sign in window Yellow Pages Physician Friend

More information

PATIENT REGISTRATION Date:

PATIENT REGISTRATION Date: PATIENT REGISTRATION Date: PLEASE PRESENT YOUR DRIVER S LICENSE AND INSURANCE CARDS TO RECEPTION DESK. INSURANCE CO-PAYMENTS ARE EXPECTED BEFORE SERVICES ARE RENDERED. PAYMENT IN FULL IS EXPECTED WHEN

More information

Get to Know the Facts about Electronic. Health Information. It s Secure, Private and Accessible.

Get to Know the Facts about Electronic. Health Information. It s Secure, Private and Accessible. Get to Know the Facts about Electronic Health Information It s Secure, Private and Accessible. Electronic Health Information: It s Secure, Private and Accessible Seems most information you need these days

More information

Transforming Healthcare in Emerging Markets with EMR adoption

Transforming Healthcare in Emerging Markets with EMR adoption Transforming Healthcare in Emerging Markets with EMR adoption Author Ann Geo Thekkel User Experience. Accenture, India Ann.geothekkel@accenture.com Abstract Compromising 24 countries, 35 percent of the

More information

9180 Katy Fwy Houston, TX 77055 713-984-1400 aokmedicalcenter.com

9180 Katy Fwy Houston, TX 77055 713-984-1400 aokmedicalcenter.com Effective Date: September 23, 2013 THIS NOTICE DESCRIBES HOW HEALTH INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY. If you have

More information

Electronic Health Record

Electronic Health Record Electronic Health Record Number of respondents = 37 Are you currently using an EHR in your office? 00% 90% 80% 70% 60% 50% 40% 30% 20% 0% 0% Yes No n=6 n=2 Are currently using an EHR n=6 What product are

More information

PATIENT REGISTRATION Date:

PATIENT REGISTRATION Date: PATIENT REGISTRATION Date: PLEASE PRESENT YOUR DRIVER S LICENSE AND INSURANCE CARDS TO RECEPTION DESK. INSURANCE CO-PAYMENTS ARE EXPECTED BEFORE SERVICES ARE RENDERED. PAYMENT IN FULL IS EXPECTED WHEN

More information

The Patient Centered Medical Home (PCMH): Looking at Examples. and Research on Staffing Models. Nancy Chang. GE-NMF PCLP Scholar 2013

The Patient Centered Medical Home (PCMH): Looking at Examples. and Research on Staffing Models. Nancy Chang. GE-NMF PCLP Scholar 2013 Running head: PATIENT CENTERED MEDICAL HOME 1 The Patient Centered Medical Home (PCMH): Looking at Examples and Research on Staffing Models Nancy Chang GE-NMF PCLP Scholar 2013 PATIENT CENTERED MEDICAL

More information

The deployment of OHMS TM. in private cloud

The deployment of OHMS TM. in private cloud Healthcare activities from anywhere anytime The deployment of OHMS TM in private cloud 1.0 Overview:.OHMS TM is software as a service (SaaS) platform that enables the multiple users to login from anywhere

More information

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely

More information

Qualifying for Medicare Incentive Payments with Crystal Practice Management. Version 4.1.25

Qualifying for Medicare Incentive Payments with Crystal Practice Management. Version 4.1.25 Qualifying for Medicare Incentive Payments with Crystal Practice Management Version 4.1.25 01/01/ Table of Contents Qualifying for Medicare Incentive Payments with... 1 General Information... 3 Links to

More information

IBM Software. IBM Initiate: Delivering Accurate Patient and Provider Identification for Canadian Electronic Health Records

IBM Software. IBM Initiate: Delivering Accurate Patient and Provider Identification for Canadian Electronic Health Records IBM Software IBM Initiate: Delivering Accurate Patient and Provider Identification for Canadian Electronic Health Records IBM Initiate: Delivering Accurate Patient and Provider Identification for Canadian

More information

UNIVERSITY OF WISCONSIN MADISON BADGER SPORTS CAMP HEALTH FORM

UNIVERSITY OF WISCONSIN MADISON BADGER SPORTS CAMP HEALTH FORM UNIVERSITY OF WISCONSIN MADISON BADGER SPORTS CAMP HEALTH FORM Event Name: Dates: Participant Name: Participant cell phone with area code: Custodial Parent/Guardian Name: Phone number: Cell phone: Home

More information

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we

More information

Notice of Privacy Practices

Notice of Privacy Practices Notice of Privacy Practices Microsurgical Eye Consultants 31 Centennial Drive Peabody, Massachusetts 01960 9-18-13 Effective Immediately This notice describes how medical information about you may be used

More information

March 30, 1998 March 30, 2012 SETMA s Journey Toward Electronic Health Records By James L. Holly, MD Your Life Your Health The Examiner March 29, 2012

March 30, 1998 March 30, 2012 SETMA s Journey Toward Electronic Health Records By James L. Holly, MD Your Life Your Health The Examiner March 29, 2012 March 30, 1998 March 30, 2012 SETMA s Journey Toward Electronic Health Records By James L. Holly, MD Your Life Your Health The Examiner March 29, 2012 Fifteen years! In August, 1997, SETMA decided to pursue

More information

HIPAA COMPLIANCE AND

HIPAA COMPLIANCE AND INTRONIS CLOUD BACKUP & RECOVERY HIPAA COMPLIANCE AND DATA PROTECTION CONTENTS Introduction 3 The HIPAA Security Rule 4 The HIPAA Omnibus Rule 6 HIPAA Compliance and Intronis Cloud Backup and Recovery

More information

Medical Decision Logic, Inc.

Medical Decision Logic, Inc. Medical Decision Logic, Inc. mdlogix Registries and Health Science: Applied Health Informatics Presentation Plan Mission, Goals, and Vision Theoretical Foundation (models) Pragmatic Foundation (cases)

More information

Experiences Implementing Ambulatory EMRs and Early Benefits

Experiences Implementing Ambulatory EMRs and Early Benefits Experiences Implementing Ambulatory EMRs and Early Benefits Colleen Rogers, Chad Leaver and Simon Hagens ehealth 2015 Today s Presentation Infoway and Investment in Ambulatory EMR Adoption Progress Emerging

More information

INFORMATION TECHNOLOGIES FOR PATIENT CARE MANAGEMENT

INFORMATION TECHNOLOGIES FOR PATIENT CARE MANAGEMENT SUMMARY Features INTERIN Technology, a complex of software tools and techniques for building health care information systems, was developed in the Program Systems Institute, Russian Academy of Sciences.

More information

Adopting an EHR & Meaningful Use

Adopting an EHR & Meaningful Use Adopting an EHR & Meaningful Use Learn how to qualify for the EHR Incentive Program The materials in this presentation, or prepared as part of this presentation, are provided for informational purposes

More information

Security Middleware Infrastructure for Medical Imaging System Integration

Security Middleware Infrastructure for Medical Imaging System Integration Security Middleware Infrastructure for Medical Imaging System Integration Weina Ma, Kamran Sartipi, Hassan Sharghi Department of Electrical, Computer and Software Engineering, University of Ontario Institute

More information

Features and Fixes for SRS EHR v9.6.029 (Teal)

Features and Fixes for SRS EHR v9.6.029 (Teal) s and Fixes for SRS EHR v9.6.029 (Teal) 10979 10411 11359 11110 11503 11283 11288 Charge Passage CQM Report Reports EDS Labs Reports Reports Reports SRS Portal Charge Passage will now include HCPCS codes,

More information

HIPAA COMPLIANCE AND DATA PROTECTION. sales@eaglenetworks.it +39 030 201.08.25 Page 1

HIPAA COMPLIANCE AND DATA PROTECTION. sales@eaglenetworks.it +39 030 201.08.25 Page 1 HIPAA COMPLIANCE AND DATA PROTECTION sales@eaglenetworks.it +39 030 201.08.25 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and EagleHeaps

More information

MEDGEN EHR Release Notes: Version 6.2 Build 106.6.20

MEDGEN EHR Release Notes: Version 6.2 Build 106.6.20 10/18/2013 MEDGEN EHR Release Notes: Version 6.2 Build 106.6.20 Special Note: Comtron is excited to announce that over the next few weeks all of our Medgen products will be going through a rebranding process.

More information

National Cancer Institute

National Cancer Institute National Cancer Institute Information Systems, Technology, and Dissemination in the SEER Program U.S. DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health Information Systems, Technology,

More information

How To Write An Electronic Health Record

How To Write An Electronic Health Record EHR Requirements David LLOYD and Dipak KALRA CHIME Centre for Health Informatics and Multiprofessional Education, University College London N19 5LW, by email: d.lloyd@chime.ucl.ac.uk. Abstract. Published

More information

ISI Unified Communications Intelligence Tools: Infortel Select and Microsoft Lync : Driving ROI From Your Lync Investment

ISI Unified Communications Intelligence Tools: Infortel Select and Microsoft Lync : Driving ROI From Your Lync Investment ISI SOLUTIONS WHITE PAPER ISI Unified Communications Intelligence Tools: Infortel Select and Microsoft Lync : Driving ROI From Your Lync Investment By: Mitchell Weiss Director of Product Strategy ISI Telemanagement

More information

REGULATORY CHANGES DEMAND AN ENTERPRISE-WIDE APPROACH TO DISCLOSURE MANAGEMENT OF PHI

REGULATORY CHANGES DEMAND AN ENTERPRISE-WIDE APPROACH TO DISCLOSURE MANAGEMENT OF PHI REGULATORY CHANGES DEMAND AN ENTERPRISE-WIDE APPROACH TO DISCLOSURE MANAGEMENT OF PHI Healthcare Organizations Can Adopt Enterprise-Wide Disclosure Management Systems To Standardize Disclosure Processes,

More information

THE 2009 HEALTH INFORMATION TECHNOLOGY FOR ECONOMIC AND CLINICAL HEALTH ACT

THE 2009 HEALTH INFORMATION TECHNOLOGY FOR ECONOMIC AND CLINICAL HEALTH ACT July 2009 THE 2009 HEALTH INFORMATION TECHNOLOGY FOR ECONOMIC AND CLINICAL HEALTH ACT SUMMARY The Health Information Technology for Economic and Clinical Health Act (HITECH) is an important component of

More information

Software Engineering of NLP-based Computer-assisted Coding Applications

Software Engineering of NLP-based Computer-assisted Coding Applications Software Engineering of NLP-based Computer-assisted Coding Applications 1 Software Engineering of NLP-based Computer-assisted Coding Applications by Mark Morsch, MS; Carol Stoyla, BS, CLA; Ronald Sheffer,

More information

Medical Information Systems

Medical Information Systems Medical Information Systems Introduction The introduction of information systems in hospitals and other medical facilities is not only driven by the wish to improve management of patient-related data for

More information

Whitepaper. Choosing the Right Athlete Electronic Health Record System. Dave Glickman Chief Operating Officer, Presagia.

Whitepaper. Choosing the Right Athlete Electronic Health Record System. Dave Glickman Chief Operating Officer, Presagia. Whitepaper Choosing the Right Athlete Electronic Health Record System Dave Glickman Chief Operating Officer, Presagia Page 1 of 13 CONTENTS Introduction... 3 What Makes an Athlete EHR Unique... 4 Getting

More information

MEDGEN EHR Release Notes: Version 6.2 Build 106.6.22

MEDGEN EHR Release Notes: Version 6.2 Build 106.6.22 09/04/2014 MEDGEN EHR Release Notes: Version 6.2 Build 106.6.22 Phone: 516-466-3838 Fax: 516-466-3877 Email: medgensupport@comtronusa.com Please find below recent updates that were made to your Medgen

More information

Patient Flow Through a Hospital. Bria Gottschalk Selena Kaplan Max Raynolds

Patient Flow Through a Hospital. Bria Gottschalk Selena Kaplan Max Raynolds Patient Flow Through a Hospital Bria Gottschalk Selena Kaplan Max Raynolds Introductory Information Industry information Establish and define the nodes Specify the paths Define the modes of travel on the

More information

Travis Goodwin & Sanda Harabagiu

Travis Goodwin & Sanda Harabagiu Automatic Generation of a Qualified Medical Knowledge Graph and its Usage for Retrieving Patient Cohorts from Electronic Medical Records Travis Goodwin & Sanda Harabagiu Human Language Technology Research

More information

American Society of Addiction Medicine

American Society of Addiction Medicine American Society of Addiction Medicine Public Policy Statement On Drug Testing as a Component of Addiction Treatment and Monitoring Programs and in other Clinical Settings [Note: ASAM also has a Public

More information

In Proceedings of the Eleventh Conference on Biocybernetics and Biomedical Engineering, pages 842-846, Warsaw, Poland, December 2-4, 1999

In Proceedings of the Eleventh Conference on Biocybernetics and Biomedical Engineering, pages 842-846, Warsaw, Poland, December 2-4, 1999 In Proceedings of the Eleventh Conference on Biocybernetics and Biomedical Engineering, pages 842-846, Warsaw, Poland, December 2-4, 1999 A Bayesian Network Model for Diagnosis of Liver Disorders Agnieszka

More information

Hitachi s Plans for Healthcare IT Services

Hitachi s Plans for Healthcare IT Services Hitachi Review Vol. 63 (2014), No. 1 41 Hitachi s Plans for Healthcare IT Services Masaru Morishita Kenichi Araki Koichiro Kimotsuki Satoshi Mitsuyama OVERVIEW: The soaring cost of healthcare has become

More information

Electronic Health Record-based Interventions for Reducing Inappropriate Imaging in the Clinical Setting: A Systematic Review of the Evidence

Electronic Health Record-based Interventions for Reducing Inappropriate Imaging in the Clinical Setting: A Systematic Review of the Evidence Department of Veterans Affairs Health Services Research & Development Service Electronic Health Record-based Interventions for Reducing Inappropriate Imaging in the Clinical Setting: A Systematic Review

More information