03.08.2013 Views

Public Health Law Map - Beta 5 - Medical and Public Health Law Site

Public Health Law Map - Beta 5 - Medical and Public Health Law Site

Public Health Law Map - Beta 5 - Medical and Public Health Law Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

difficult to authenticate, unless the computer entry ports have biosensors, such as<br />

fingerprint or retina scanners. This makes it hard to tell if the correct provider really<br />

entered the data. Electronic records also allow the use of form data such as a canned<br />

review of systems designed to support billing for a given diagnosis. Again, properly<br />

designed records will prevent this, but it will be years before there are adequate<br />

st<strong>and</strong>ards <strong>and</strong> certifications for medical records software.<br />

The fourth problem is privacy. All medical care practitioners know that medical<br />

privacy is more of a myth than a reality. Too many people see records <strong>and</strong> it is too hard<br />

to secure them to ensure real privacy for any specific record. On balance, however, the<br />

system is fairly secure because the difficulty of retrieving <strong>and</strong> copying more than a few<br />

records makes large-scale information theft impossible. In an electronic system,<br />

however, a breach in security can mean the theft of all of the data, without even a<br />

warning that it is gone. Given a big enough selection of records <strong>and</strong> the means to fish<br />

through them electronically, an infov<strong>and</strong>al could do real harm. This might be in the<br />

form of public embarrassment or humiliation, or in blackmail dem<strong>and</strong>s to keep the<br />

information secret.<br />

<strong>Medical</strong> care practitioners who use electronic records systems must ensure that the<br />

records are secure. This means both electronic security <strong>and</strong> physical security—many<br />

serious breaches of computer security can be traced to passwords <strong>and</strong> operating<br />

information that was retrieved from dumpsters or stolen by cleaning staff. In many<br />

offices the easiest way to steal the data is to just walk out with a backup tape. The<br />

requirements for proper computer security are beyond the scope of this book. Any<br />

office that uses electronic records must work with a computer security expert to ensure<br />

that the system is secure. It is important to not just take the word of the vendor, but to<br />

get an independent evaluation of both the system <strong>and</strong> the general security in the<br />

offices.<br />

F. References - <strong>Medical</strong> Records<br />

Barrows RC Jr, Clayton PD. Privacy, confidentiality, <strong>and</strong> electronic medical records. J<br />

Am Med Inform Assoc. 1996;3:139–148.<br />

Barton HM. <strong>Medical</strong> records can win or lose a malpractice case. Tex Med. 1990;86:33–<br />

36.<br />

Berlin L. Alteration of medical records. AJR. 1997;168:1405– 1408.<br />

Burton K. Your memory/your patient’s memory <strong>and</strong> your medical records. WV Med J.<br />

1996;92:308–309.<br />

Butler RN. Who’s reading your medical records? Geriatrics. 1997;52:7–8.<br />

Campbell SG, Gibby GL, Collingwood S. The Internet <strong>and</strong> electronic transmission of<br />

medical records. J Clin Monit. 1997;13:325–334.<br />

Carman D, Britten N. Confidentiality of medical records: the patient’s perspective. Br<br />

J Gen Pract. 1995;45:485–488.<br />

378

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!