09.11.2012 Views

Pediatric Informatics: Computer Applications in Child Health (Health ...

Pediatric Informatics: Computer Applications in Child Health (Health ...

Pediatric Informatics: Computer Applications in Child Health (Health ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

314 R.S. Gerstle<br />

PHO, HMO, or medical society. In such arrangements, connections are protected<br />

and messages are encrypted through standard protocols prior to transmission. Thus<br />

physician–physician communications for referrals, consults, follow-up, or general<br />

questions can be made relatively securely and simply with<strong>in</strong> the conf<strong>in</strong>es of that<br />

network.<br />

Where e-mail communication between physicians occurs between networks,<br />

such as between different medical centers, a Virtual Private Network or VPN (to<br />

connect external physicians to those with<strong>in</strong> a network securely) may be established<br />

to comply with HIPAA regulations when a sufficiently high volume of <strong>in</strong>formation<br />

is exchanged between centers.<br />

In addition to encryption, messages may be sent as password-protected e-mail<br />

attachments. Passwords may be assigned through standard word and document<br />

process<strong>in</strong>g tools or through software designed specifically for such a purpose.<br />

Sender and recipient need to have the software tools and knowledge of the password<br />

(or key). The method of protection and the strength of the security depend on<br />

the sensitivity and importance of the <strong>in</strong>formation.<br />

23.3.2 Organization and Personnel Issues<br />

The handl<strong>in</strong>g of e-mail conta<strong>in</strong><strong>in</strong>g PHI once it has been received is equally<br />

important <strong>in</strong> security. Def<strong>in</strong>ed procedures on handl<strong>in</strong>g e-mail: who may access it<br />

(physicians only, nurses, clerical personnel), where they may access it (at work<br />

only, at home, on mobile tools), what they are prescribed to do with it (pr<strong>in</strong>t, save,<br />

delete, forward via e-mail, file with the record) are needed, with an audit trail for<br />

track<strong>in</strong>g messages. Increas<strong>in</strong>gly, EHR vendors are <strong>in</strong>tegrat<strong>in</strong>g e-mail modules <strong>in</strong>to<br />

their products to improve productivity.<br />

Other organizational issues <strong>in</strong>clude handl<strong>in</strong>g permissions for employees who<br />

leave the practice and adequate tra<strong>in</strong><strong>in</strong>g of new employees charged with handl<strong>in</strong>g<br />

cl<strong>in</strong>ical e-mail messages. Periodic review of procedures is needed to assure due<br />

diligence <strong>in</strong> consider<strong>in</strong>g security and efficiency of e-mail practice.<br />

23.4 Issues <strong>in</strong> Improv<strong>in</strong>g Access, Quality, and Revenue<br />

with E-Mail<br />

23.4.1 Access<br />

Although e-mail is ubiquitous, a “digital divide” may exist between “the haves<br />

and the have-nots.” Barriers to e-mail accessibility and usability may <strong>in</strong>clude lack<br />

of access to: computers, Internet access and e-mail, computer and health literacy,<br />

adequate language or typ<strong>in</strong>g skills, and ability to receive responses. For the poor

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!