The trusted source for
healthcare information and
How many of the following information security protections are in your case management program? If components are missing, make the changes necessary to strengthen your commitment to confidentiality.
Does your case management program have:
-A well-defined information security policy?
- Procedures that reflect the security policy of the department?
- Clearly defined responsibilities for authorizing access to patient information?
- Procedures for protecting information sent via voice mail, e-mail, faxes, cellular phones, and wireless computer systems?
- Access to the most current state and federal statutes governing patient confidentiality and release of information?
- A means to prevent former employees from gaining unauthorized access to information?
- Staff who have received training in the organizationwide and departmental policies for protecting information?
- Periodic confidentiality awareness inservices for employees?
- Computer files that are properly protected against unauthorized access (includes the case management database as well as computer links with other providers, computer-based patient records, and electronic data interchange with payers)?
- Staff members who are familiar with the security features of computerized databases?
- Methods to ensure that staff members are complying with the laws and regulatory requirements covering protection of patient information (e.g., state and federal statutes, requirements of the Health Care Financing Administration and the Joint Commission)?