10-530-160Healthcare Informatics
Course Information
Description
Emphasizes the role of information technology in healthcare through an investigation of the electronic health record (EHR), business, and health information software applications. Learners will develop skills to assist in information systems design and implementation.
Total Credits
4
Course Competencies
-
Use technology including hardware and software (common business, HIM and EHR applications) to ensure data management, execution of work process, HIM processing, and health record (EHR and PHR) creation and use. (IV.A.1 - 4.)Assessment Strategiesthrough an assignment, report, quiz, exam, case study or group projectusing common business, HIM and health record software applicationsCriteriayou use hardware and software to execute HIM work processesyou use common business applicationsyou use internet and intranet technologyyou use HIM specific applicationsyou use EHR applicationsyou distinguish between HIS applications (patient registration, ADT, EHR, PHR, lab, radiology, pharmacy, voice recognition, ROI, coding and registries)you illustrate the relationship of various relationship of the various applications/systems for data collection, how they communicate and share data and how they look in terms of the various workflows (HIM, Rev cycle etc.)
-
Create retention, destruction and recovery policy for EHI (electronic health information) (IV.C.3.)Assessment Strategiesthrough an assignment, report, quiz, exam, case study or group projectusing common business, HIM and health record software applicationsCriteriapolicy complies with state and federal laws and regulations and accrediting body standardspolicy considers facility needspolicy considers EHI (electronic health information) destruction optionspolicy includes disaster recovery plan
-
Apply legislative, accreditation and certification standards related to health information initiatives (III.A.1., III.A.2. and III.B.1.)Assessment Strategiesthrough an assignment, report, quiz, exam, case study or group projectgiven a policyusing common business and health record software applicationsCriteriayou examine the policyyou compare the policy against the legislation and standards for complianceyou identify what has been met and what has not been metyou make recommendations for what must be changed
-
Examine database architecture and design (IV.B.1.)Assessment Strategiesthrough an assignment, report, quiz, exam, case study or group projectusing a commercially available database applicationthrough a given or created network use policyCriteriayour database includes required data elementsyour database is relationalyour database includes field categorization and description for each data elementyou design an electronic input formyour assessment addresses PHI securityyou interpret a data model
-
Generate reports to facilitate information retrieval (IV.A.1. and IV.C.2.)Assessment Strategiesthrough an assignment, report, quiz, exam, case study or group projectusing a previously created database applicationusing common business, HIM and health record software applicationsCriteriayour query selects the data required to respond to the requested informationyour report is professional designed and presentedyour report design includes the use of at least one calculated or summation fieldyour report is prefaced with an explanatory memorandum
-
Participate in the planning, integration, testing, evaluation and support for an EHR (IV.A.5.)Assessment Strategiesthrough an assignment, report, quiz, exam, case study or group projectusing common business and health record software applicationsCriteriayou use a systematic approachyou distinguish between team rolesyou compare systems against criteriayou address organizational needsyou create a test planyou analyze the impact of the EHR on the HIM profession
-
Protect data integrity and validity (IV.D.2. and IV.D.3.)Assessment Strategiesthrough an assignment, report, quiz, exam, case study or group projectusing common business, HIM and health record software applicationsCriteriayou analyze data integrityyou develop security monitoring mechanism
-
Assess electronic data storage options (IV.C.1.)Assessment Strategiesthrough an assignment, report, quiz, exam, case study or group projectusing common business, HIM and health record software applicationsCriteriayour assessment compares electronic data storage optionsyour assessment compares the advantages of electronic data storage optionsyour assessment compares the disadvantages of electronic data storage options
-
Evaluate confidentiality and security measures used to protect PHI/EHI (III.B.2., IV.A.4., IV.D.1. and IV.D.3.)Assessment Strategiesthrough an assignment, report, quiz, exam, case study or group projectusing common business, HIM and health record software applicationsCriteriayour assessment identifies potential internal and external security risksyour assessment identifies options to mitigate the identified risksyour assessment addresses application and network securityyou assess user access against applicable state, federal and accrediting agency requireyou assess PHI disclosures against applicable state, federal and accrediting agency requirementsevaluation identifies the areas compliant with security policiesevaluation identifies areas not in compiancecompliance with security policiesevaluation provides improvement mechanismsevaluation is specificevaluation includes follow-up timeline