11.07.2015 Views

Medical Records and the Law

Medical Records and the Law

Medical Records and the Law

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

500 CHAPTER 13: ELECTRONIC HEALTH RECORDSmodem-to-modem links; in-house routers, servers, <strong>and</strong> bulletinboards; commercial third-party host services; <strong>and</strong> <strong>the</strong> Internet. (For amore detailed description of security risks related to Internet e-mail,see <strong>the</strong> discussion of <strong>the</strong> Internet later in this chapter.) As people becomemore accustomed to <strong>the</strong> benefits of e-mail, <strong>the</strong>y use this mediumto transmit a wide variety of sensitive information, including patientdata, large documents for research projects, budgets, <strong>and</strong> o<strong>the</strong>r confidentialtime-critical information. At many healthcare organizations,e-mail is used as a communication vehicle between patients <strong>and</strong> <strong>the</strong>ircaregivers.The development of e-mail technologies (that is, modes of e-mailcommunication) has been occurring at such a rapid pace, however, thatat times <strong>the</strong> related implementation of technological safeguards haslagged behind. This raises confidentiality <strong>and</strong> security challenges forhealthcare facilities in relation to <strong>the</strong> transmission of patient healthcareinformation via e-mail. Organizations that are HIPAA covered entitiesmust comply with all <strong>the</strong> requirements of <strong>the</strong> Privacy <strong>and</strong> SecurityRules with respect to <strong>the</strong> transmission of PHI by e-mail. O<strong>the</strong>rs involvedin <strong>the</strong> healthcare industry will likely be subject to state laws governinghealth information privacy <strong>and</strong> security.Among o<strong>the</strong>r things, this will require healthcare facilities to provide<strong>the</strong>ir staffs with training to ensure organization-wide recognition of<strong>the</strong> security risks associated with e-mail <strong>and</strong> compliance with applicableprivacy <strong>and</strong> security policies <strong>and</strong> procedures. All healthcare professionalsusing e-mail to transmit patient healthcare information shouldunderst<strong>and</strong> that e-mail affords individuals no more confidentiality thanwritten memor<strong>and</strong>a or letters—<strong>and</strong>, in <strong>the</strong> absence of adequate technologicalsafeguards, may in fact offer less privacy <strong>and</strong> security. Healthcareprofessionals who use e-mail must recognize <strong>the</strong> necessity ofexercising caution when transmitting patient information, <strong>and</strong> shouldbe trained concerning <strong>the</strong> importance <strong>and</strong> means of sending e-mailmessages that do not compromise <strong>the</strong> integrity of data, create <strong>the</strong> potentialfor a privacy or security breach, or contain inappropriate statementsthat could be misconstrued.Before outlining recommended safeguards that healthcare facilitiesmay want to consider in addressing e-mail security risks, it is worthbriefly noting relevant federal law (<strong>and</strong> corresponding state laws) enactedwith <strong>the</strong> legislative intent to provide enhanced protection for <strong>the</strong>privacy of electronic communications. Title III of <strong>the</strong> Omnibus CrimeControl <strong>and</strong> Safe Streets Act of 1968, also known as <strong>the</strong> federal wire-

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!