Page 21 - Part 2 Navigating Electronic Media in a Healthcare Setting
P. 21

SVMIC Navigating Electronic Media in a Healthcare Setting


                   card, the moment it is discovered that the device is out of the
                   user’s control, the password and the app must become

                   inaccessible to would-be hackers. It is important to note that

                   according to HIPAA, simply changing the password for the device,
                   in general, is not sufficient. Should confidential patient information

                   be exposed, an authorized user must be able to change the
                   application password that is responsible for maintaining PHI.


                   Remember that HIPAA compliance is the responsibility of covered

                   entities and their business associates. Careful consideration must
                   be given to the products that manage PHI and the created PHI

                   data, because ultimately, protecting ePHI is the responsibility of the
                   practitioner. There are resources available that can educate

                   practices on the benefits and detriments of various companies and
                   entities providing dictation or voice recognition software. As

                   always, if you are not completely familiar with how a program

                   utilizes PHI and how the program protects PHI at every stage,
                   consult an expert professional.


                   Some physicians attempt to protect themselves and/or warn
                   subsequent providers about the potential for inaccuracy when

                   using speech recognition software or other engine-generated

                   transcription tools by including a “disclaimer” with the note such
                   as:


                         “Dictated but not read”

                         “Signed but not read”

                         “Portions of the record may have been created with voice

                          recognition software. Occasional wrong word or ‘sound-a-
                          like’ substitutions may have occurred due to the inherent

                          limitations of voice recognition software. Read the record






                                                        Page | 21
   16   17   18   19   20   21   22   23   24   25   26