Skip to content

Domain

Date

Time

All times in Central Time.

2:55-3:45 p.m.

Event Type

Share This Session

Share on facebook
Share on twitter
Share on linkedin
Share on email
Share on whatsapp

Guide to Protecting Patient Data in the EHR

Healthcare organizations are on alert more than ever, with heightened sensitivity to privacy concerns regarding PHI. According to a recent article on CNBC.com, providers are being inundated with requests from companies who want to make medical records more searchable. With much uncertainty surrounding these requests globally, including references to “temptation data,” providers must now take a more skeptical approach to all requests they receive, starting with the entities closest to their patients—the payer.

As electronic health information exchange becomes more prevalent, payers are increasingly seeking direct access to EHR systems for automated medical record collection and aggregation. These payers suggest that access to EHRs can expedite claims processing, reviews, and audits without negative impact to the provider. However, there are inherent risks when providers give access to payers. Providers should recognize they have choices about how to share this data with payers, and they should carefully evaluate the benefits and risks to their organizations and their patients when doing so. Failure to engage in these discussions can lead to critical privacy gaps.

Presenters at this session will explore the challenges and responsibilities for health information management in sharing patient data. They will highlight both benefits and disadvantages of process management and identify key stakeholders and their responsibilities in safeguarding PHI from inappropriate collection and use from payers.

Learner Outcomes

Attendees of this session will learn:

• About payer access management, and the choices providers have for sharing patient data.
• Advantages and challenges of managing the process, and the responsibilities of HIM and key stakeholders to safeguard PHI from inappropriate collection and use by payers and entities abroad.
• Lessons from real-life experiences in payer access management.
• Four key recommendations to provide appropriate parameters for secure, efficient, and restricted access to PHI.

Speaker


Rita Bowen, MA, RHIA, CHPS, CHPC, SSGB
Privacy, Compliance and HIM Policy, MRO Norristown, PA

Greg Ford
Requester Relations and Receivables Administration, MRO Norristown, PA
Play Video