Confindetiality
By Mike Jackson
Privacy Issues
• Possibly sending e-mail to wrong person
• Accidentally leaving computer open
• Unintended access to medical records
Solutions
• Double checking all e-mails before sending
• Timed log-off on all computers inactive
• Not sharing passwords with other staff
Safety Concerns
• Patient contacting physician via e-mail for
emergency situations
• Patient waiting on e-mail reply before acting
• Physician giving instructions to wrong patient
Precautions
• Physician clearly communicating what
electronic correspondence is to be used for
• Physician stressing patient to visit clinic or
emergency room for specific issues
• Physician double checking patient records
before responding
Company Recommendations
• Training all new staff on policies and
procedures to protect patient privacy
• Monthly in-services to ensure policies and
procedures are being followed
• Only allowing limited access to medical
records
• Frequent audits to determine what
information is being accessed and by who

Confindetiality

  • 1.
  • 2.
    Privacy Issues • Possiblysending e-mail to wrong person • Accidentally leaving computer open • Unintended access to medical records
  • 3.
    Solutions • Double checkingall e-mails before sending • Timed log-off on all computers inactive • Not sharing passwords with other staff
  • 4.
    Safety Concerns • Patientcontacting physician via e-mail for emergency situations • Patient waiting on e-mail reply before acting • Physician giving instructions to wrong patient
  • 5.
    Precautions • Physician clearlycommunicating what electronic correspondence is to be used for • Physician stressing patient to visit clinic or emergency room for specific issues • Physician double checking patient records before responding
  • 6.
    Company Recommendations • Trainingall new staff on policies and procedures to protect patient privacy • Monthly in-services to ensure policies and procedures are being followed • Only allowing limited access to medical records • Frequent audits to determine what information is being accessed and by who