The Mental Health Care Patient Management System (Mentcare)



Similar documents
431 SUPPORT INDIVIDUALS WHERE ABUSE HAS BEEN DISCLOSED

Consultation Paper: Standards for Effectively Managing Mental Health Complaints

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

Incident Reporting Procedure

H5VV 04 (SCDHSC0042) Lead Practice for Health and Safety in the Work Setting 1

System Specification. Objectives

SECURITY MANAGEMENT Produce security risk assessments

GUIDELINE NO. 22 REGULATORY AUDITS OF ENERGY BUSINESSES

CORK INSTITUTE OF TECHNOLOGY

Exhibit E - Support & Service Definitions. v1.11 /

IS INFORMATION SECURITY POLICY

SECURITY RISK MANAGEMENT

32 PROMOTE, MONITOR AND MAINTAIN HEALTH, SAFETY AND SECURITY IN THE WORKING ENVIRONMENT

SCDHSC0437 Promote your organisation and its services to stakeholders

Information Security Guideline for NSW Government Part 1 Information Security Risk Management

SCDHSC0393 Promote participation in agreed therapeutic group activities

Part 1 Overview of clinical governance Clinical governance the concept 1-3

CPP40707 Certificate IV in Security and Risk Management

UoB Risk Assessment Methodology

Coping with a major business disruption. Some practical advice

1 The key purpose identified for those working in health and social care settings is to provide an integrated, ethical

H5PJ 04 (SCDHSC0045) Lead practice That Promotes the Safeguarding of Individuals

Chapter 1- Introduction. Lecture 1

INTERNATIONAL NETWORK FOR QUALITY ASSURANCE AGENCIES IN HIGHER EDUCATION

Guide for Clinical Audit Leads

H5RE 04 (SCDHSC0437) Promote Your Organisation and Its Services to Stakeholders

Hazard Identification, Risk Assessment and Management Procedure. Documentation Control

XXX000YY Certificate IV in Government Security

Standard 5. Patient Identification and Procedure Matching. Safety and Quality Improvement Guide

Business Continuity Planning

2011 School-assessed Coursework Report. Information Technology Applications ( ): Units 3 and 4 UNIT 3 GENERAL COMMENTS

Applying the Principle of Least Privilege to Windows 7

Third Party Security Requirements Policy

Release: 1. CHCCM703A Apply effective case management practice

Health and Safety Management in Healthcare

Mitigating and managing cyber risk: ten issues to consider

ASTH416 Develop practices which promote choice, well-being and protection of all individuals

Code of Practice for Social Service Workers. and. Code of Practice for Employers of Social Service Workers

The IP3 accreditation process. Bob Hart Chief Assessor September 2008

CRITICAL/NON CRITICAL INCIDENT MANAGEMENT AND REPORTING PROCEDURE

Information Governance and Management Standards for the Health Identifiers Operator in Ireland

in the Northern Territory

The potential legal consequences of a personal data breach

When should this tool be used?

How to investigate an Accident and Incident.

Complaints Standard. for Suppliers. Categorised as Basic (B or F)

Tier 3/4 Social Work Services

Principles for the assessment and management of complaints and notifications

Quality Management Plan 1

Technology Delivery Co Ordinator

Clinical Incident Management Policy

Statutory duty of candour with criminal sanctions Briefing paper on existing accountability mechanisms

STRESS POLICY. Stress Policy. Head of Valuation Services. Review History

Introduction to Information Technology Course Number 10009

NOS for Network Support (903)

SCDHSC0233 Develop effective relationships with individuals

Online participation: Guidance for school governors

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO

DGD ACT Health Data Quality Framework

A Guide to Accident Investigations

Point of View. Competition and choice in the audit market

H5T9 04 (SCDHSC0393) Promote Participation in Agreed Therapeutic Group Activities

BUSINESS CONTINUITY PLANNING

Sustainable Development, Climate Change, and Renewable Energy in Rural Central America. Dr. Debora Ley

PRIVACY BREACH POLICY

Lecture 2. Anis Koubaa

Subject: Establishment of a Safety Management System (SMS)

/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE. By Melbourne IT Enterprise Services

Dutch Accreditation Council (RvA) Policy rule Nonconformities. Corrective action

F36D 04 (LMC B1) Lead and manage provision of care services that respects, protects and

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Security Management of Government Buildings

D 1. Working with people Develop productive working relationships with colleagues. Unit Summary. effective performance.

INTERNATIONAL AC CREDITATION STANDARDS FOR HEALTHCARE EXTERNAL EVALUATION ORGANISATIONS

Managing Special Authorities. for PCI Compliance. on the. System i

Manchester City Council Role Profile. Service Manager (Database Analysis), Grade 9

Release: 1. ICAPMG601A Establish IT project governance

Youth Allowance or ABSTUDY

Incident Reporting Policy

FACS Community Complaints Guidelines for Ageing and Disability Direct Services

Information security risk management using ISO/IEC 27005:2008

35 PROMOTE CHOICE, WELL-BEING AND THE PROTECTION OF ALL INDIVIDUALS

Nuclear Safety Council Instruction number IS-19, of October 22 nd 2008, on the requirements of the nuclear facilities management system

Code of Ethics & Practice

Chapter 1- Introduction. Lecture 1

Code of Ethics and Professional Responsibilities for Healthcare Ethics Consultants

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

Stellenbosch University. Information Security Regulations

Work-related stress can be caused by psychological hazards such as work design, organisation and management, and issues like bullying and violence.

(a) the kind of data and the harm that could result if any of those things should occur;

INDEX 1.0 HEALTH, SAFETY & ENVIRONMENT 1.1 INTRODUCTION 1.2 OBJECTIVES 1.3 HEALTH, SAFETY & ENVIRONMENT STATEMENT 1.4 ENVIRONMENTAL STATEMENT

Hospital pharmacy technician role / service definition grid

Electronic business conditions of use

Transcription:

The Mental Health Care Patient Management System (Mentcare)

The Mentcare system ² This system (not its real name but a real system) is a generic medical information system that is configured for use in different regional health trusts ² It supports the management of patients suffering from mental health problems and provides information on their treatment to health service managers

System goals ² To provide management information that allows health service managers to assess performance against local and government targets ² To provide medical staff with timely information to facilitate the treatment of patients

Mental health care ² Patients do not always attend the same clinic but may attend in different hospitals and local health centres ² Patients may be confused and disorganised, miss appointments, deliberately or accidentally lose medication, forget instructions and make unreasonable demands on staff ² Mental health care is safety-critical as a small number of patients may be a danger to themselves and others

Concerns ² Are issues that an organisation must pay attention to and that are systemic ie they apply to the system as a whole ² They are cross-cutting issues that may affect all system stakeholders ² Help bridge the gap between organisational goals and system requirements ² May exist at a number of levels so may be decomposed into more specific sub-concerns

Concerns Software and hardware Operators The organisation Society Security Cost Safety

Concerns in the MHCPMS ² We have identified the principal concerns in the Mentcare system as: Safety - the system should help reduce the number of occasions where patients cause harm to themselves and others Privacy - patient privacy must be maintained according to the provisions of the Data Protection Act and local ethical guidelines Information quality - the information maintained by the system must be accurate and up-to date Operational costs - the operational costs of the system must be reasonable

Concern decomposition ² Concerns are decomposed into sub-concerns: Information integrity Information quality Information accuracy Information timeliness

The safety concern Accidental self-harm Safety Patient safety Staff safety Public safety Deliberate self-harm Incorrect treatment Adverse reaction to medication Mental Health Act

From concerns to questions ² A problem that I find with hazard analysis is the requirements gap. You identify the hazards and possible root causes but there is no method for going from there to requirements ² To address this, we proposed that, after sub-concerns are identified, you should then explicitly identify questions and sub-questions associated with each concern ² Answers to these questions come from system stakeholders and help generate system requirements

Generic questions ² What information relates to the sub-concern being considered? ² Who requires the information and when do they require it? ² How is the information delivered? ² What constraints does the (sub) concern impose? ² What are the consequences of failing to deliver this information?

Deliberate self-harm sub-concern ² Information about previous history of self-harm or threats of self-harm ² Medical staff during consultations. Relatives and carers ² Can be delivered to medical staff directly through the system. Delivered to relatives and carers through a message from the clinic ² No obvious constraints imposed ² Failing to deliver may mean an incident of preventable self-harm occurs

Concern-cross checking ² A generic problem in complex systems is requirements conflicts where different system requirements are mutually contradictory ² In my view, separating safety analysis in the RE process increases the likelihood of conflict and the costs of resolving that conflict ² Concerns partially address this problem as it allows cross-checking at a higher level of abstraction than the requirements themselves

Concern comparison ² Concerns should be compared in pairs to assess the likelihood of of potential conflicts ² Safety and information quality Conflicts only likely if the requirements allow erroneous or out of date information to be maintained in the system ² Safety and privacy Privacy may impose limits on what information can be shared and who can access that information. Requirements on information sharing and access should be checked ² Safety and operational costs Operational processes that require extensive staff time may be problematic

Requirements derivation ² Requirements are derived from the answers to the questions associated with concerns. ² However, there is not a simple 1:1 relationship between answers and requirements ² By using answers to questions, the problem of stakeholders suggesting requirements that are too specific is reduced

Mentcare requirements ² The system shall provide fields in each patient record that allow details of incidents or threats of deliberate selfharm to be maintained ² The records of patients with a record of deliberate selfharm shall be highlighted to bring them to the attention of clinical system users ² The system shall only permit the transmission of personal patient information to accredited staff and to the patient themselves