Module 6 assignment 3 telemedicine (2)

438 views

Published on

  • Be the first to comment

Module 6 assignment 3 telemedicine (2)

  1. 1. … Healing at a Distance By: PETER JUNE RUFON BSN-RN
  2. 2. Definition: • Telemedicine is the delivery of health-related services and information using telecommunications and other technologies. • It is “healing at a distance”. • It works by bridging the information and communication gap between patients and health care members of community using technology.
  3. 3. Concept:
  4. 4. Types: • Synchronous (Real-Time) = the exchange of pre-recorded data between two or more individuals at different times. = Example: e-mail describing medical case to an expert who sends back an opinion, diagnosis & management. • Asynchronous (Store-and-Forward) =requires the involved individuals to be simultaneously present for immediate exchange of information. = Example: phone referrals, videoconferencing and robotic surgery.
  5. 5. Issues: • Technical Issues: = lack of supporting infrastructure. = variation in computer expertise among patients. • Ethical Issues: = data security = privacy concerns.
  6. 6. Supports… • • • • • Data Entry Data Review Patient Education Videoconferencing Electronic Monitoring …increases productivity and quality service.
  7. 7. CONCEPTS OF SECURITY: • • • • • • Authentication Transport Security Authorization Access Control Auditing Physical Security
  8. 8. Authentication = user ID and password, thereby securing the access to only allowed personnel and access allowed information.
  9. 9. Transport Security = secured exchange of information over the internet since data is encrypted.
  10. 10. Authorization = individual can access the file and patients information dependent on the rights given.
  11. 11. Access Control – limits access to specified data.
  12. 12. Auditing = traceability for monitoring, evaluation and improvements.
  13. 13. Physical Security – clinical data must be housed in a secured room with locks to be accessed by qualified personnel to reduce or eliminate tampering.
  14. 14. Computer security is never absolute. • It is always a matter of … relative risk …relative benefit

×