Information Security Checklist for Case Management Departments
Information Security Checklist for Case Management Departments
How many of the following information security protections are in your case management program? If components are missing, make the changes necessary to strengthen your commitment to confidentiality.
Does your case management program have:
-A well-defined information security policy?
- Procedures that reflect the security policy of the department?
- Clearly defined responsibilities for authorizing access to patient information?
- Procedures for protecting information sent via voice mail, e-mail, faxes, cellular phones, and wireless computer systems?
- Access to the most current state and federal statutes governing patient confidentiality and release of information?
- A means to prevent former employees from gaining unauthorized access to information?
- Staff who have received training in the organizationwide and departmental policies for protecting information?
- Periodic confidentiality awareness inservices for employees?
- Computer files that are properly protected against unauthorized access (includes the case management database as well as computer links with other providers, computer-based patient records, and electronic data interchange with payers)?
- Staff members who are familiar with the security features of computerized databases?
- Methods to ensure that staff members are complying with the laws and regulatory requirements covering protection of patient information (e.g., state and federal statutes, requirements of the Health Care Financing Administration and the Joint Commission)?
Subscribe Now for Access
You have reached your article limit for the month. We hope you found our articles both enjoyable and insightful. For information on new subscriptions, product trials, alternative billing arrangements or group and site discounts please call 800-688-2421. We look forward to having you as a long-term member of the Relias Media community.