Gain an understanding of the best practices on how to request external health information.
As we move into a new era of health care with the increased exchange of medical records to provide better, more coordinated care, the question of what information received from outside an organization should be included in a medical record takes on new importance. What with health homes, personal health records, and health information exchanges, as well as increased involvement by patients using digital tools like smartwatches and smartphone apps, there is a torrent of information being directed at medical records, and it is essential to understand what belongs there and what should be rejected, and how. This information may come in the form of unsolicited health information, for example, information that is volunteered by patients or by other health care providers, either at the time the patient arrives for treatment or thereafter, and in some cases even after the patient has been discharged. It may also come in the form of information deliberately requested from outside parties, but the receiving provider may be unsure about whether to incorporate that information into its legal patient record. It is time to establish the necessary processes for filtering and managing incoming information to provide the appropriate patient care and protect the organization from claims of malpractice for not acting on information that may have been in a record but may not have been known to exist. Understanding what is in the medical record is essential for satisfying HIPAA patient rights for access of records and understanding how you receive and manage incoming information is required for protecting information under the HIPAA privacy and security rules. This topic will address these issues and offer practical guidance for those responsible for managing these health records.
Lewis Creek Systems, LLC
- Founder and director of compliance services at Lewis Creek Systems, LLC
- Provides a complete suite of services related to information privacy and security regulatory compliance, including compliance reviews, information flow and risk analyses, technical security reviews, training, and policy development services
- Conducts regular seminars and workshops on healthcare information privacy and security, information management and disposal, and information security risk analysis
- Speaker at national conferences for the American Health Information Management Association and the Workgroup for Electronic Data Interchange
- Recipient of the 2011 WEDI Award of Merit
- M.S. degree, Massachusetts Institute of Technology; B.S. degree, summa cum laude, University of Vermont
- Can be contacted at www.lewiscreeksystems.com
All of your training, right here at Lorman.
Pay once and get a full year of unlimited training in any format, any time!
- Live Webinars
- OnDemand Webinars
- MP3 Downloads
- Course Manuals
- Audio Recordings*
- Executive Reports
- White Papers and Articles
- Sponsored Live Webinars
Additional benefits include:
- State Specific Credit Tracker
- Members Only Newsletter
- All-Access Pass Course Concierge
* For audio recordings you only pay shipping
Questions? Call 877-296-2169 to speak with a real person.
More Program Information
Access to all training products $699/year
Unlimited Lorman Training
With the All-Access Pass there is no guessing what you will need for your yearly training budget. $699 will cover all of your training needs for an entire year!
Once you purchase your All-Access Pass you will never be any further than one-click away from attending any Lorman training course.
Invest in Yourself
You haven't gotten to where you are professionally by luck alone; it's taken a lot of hard work and training. Invest in yourself with the All-Access Pass.