01.05.2013 Views

Food-Service-Manual-for-Health-Care-Institutions

Food-Service-Manual-for-Health-Care-Institutions

Food-Service-Manual-for-Health-Care-Institutions

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

een entered into the menu, each item can be priced. Menus can be printed on a computer<br />

screen, and where patients choose from a menu on the screen in their rooms, the program will<br />

tally the needed portions <strong>for</strong> each menu item. Data can be stored <strong>for</strong> catered events, special holidays,<br />

kosher foods, and so <strong>for</strong>th.<br />

Special Reporting<br />

Minimum data sheets are <strong>for</strong>ms that must be completed <strong>for</strong> assessment and care screening of<br />

residents in skilled-nursing facilities.<br />

<strong>Food</strong> service software that is entirely appropriate <strong>for</strong> an individual department’s use may<br />

not have all of the features listed above, but all are available.<br />

In<strong>for</strong>mation from nutrition screening and assessment that has been per<strong>for</strong>med by dietitians<br />

and dietetic technicians can be entered and compared with standards to determine the need <strong>for</strong><br />

additional follow-up. Analysis of drug–nutrient interactions is a dual program between the pharmacy<br />

and clinical nutrition services. The pharmacy department sends to the nutrition manager<br />

a list of specific drugs that may cause an interaction with certain foods. From this in<strong>for</strong>mation,<br />

the nutrition clinical staff can revise menus as applicable and provide instructions to the patient.<br />

Management Issues<br />

Policies and procedures need to be developed concerning employees’ use of computers and computer<br />

software while on duty. The food service manager needs to monitor how the programs are<br />

used. Game playing, excessive Web search, nonbusiness e-mails, and pornography should not be<br />

allowed. The policy and procedures must be specific in the authorization of computer use.<br />

Persons authorized to use a computer should be provided with a password that will need to be<br />

changed frequently. Passwords should not be written down or passed on <strong>for</strong> others to use.<br />

A systems manager should be designated with a specific job description and the authority<br />

to oversee all operations. Back-up personnel need to be trained to assist the manager and train<br />

other users. The system manager should be on the alert <strong>for</strong> viruses or spam to the system and<br />

devise a system to run virus-detection software at least weekly. Viruses can wipe out programs<br />

and damage the computer’s hard drive (see Appendix 10.1).<br />

The systems manager will need to back up programs and data. Backup provides security<br />

in the event of a hard-drive failure, natural disasters, and terrorist activity. All backup data<br />

should be stored in a secure container and off-site. Backup should be run regularly according<br />

to the organization’s policies. The backup data should be tested periodically to determine if the<br />

data are viable and if the staff knows how to load and use the data. Another concern that needs<br />

to be addressed in policies and procedures is downtime. Downtime may be due to power failure,<br />

hardware failure, disasters or emergencies, or other problems. If the downtime lasts <strong>for</strong> an<br />

extended time, manual procedures will need to implemented.<br />

Software Review<br />

Because of the critical role that software plays in a computerized MIS, its per<strong>for</strong>mance should<br />

be reviewed carefully. For instance, a problem would arise if the system were designed to value<br />

inventory by an average cost method and the operation specified the standard cost method.<br />

Problems identified during this process may require modification of customized or full-featured<br />

programs. Usually this is best done by the program developers. However, in the case of generic<br />

software, most problems can be resolved by users.<br />

Hardware and Telecommunications Review<br />

Existing equipment, hardware, and telecommunications systems must be evaluated <strong>for</strong><br />

their efficiency and effectiveness. Input and output devices (such as bar-code readers and<br />

Management In<strong>for</strong>mation Systems<br />

297

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!