Patient Care Coordination

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/12

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

13 Terms

1
New cards

Medical Record Formats

the way a medical recorde is organized is known as its format; two types of medical record formats are the source-oriented record and the problem-oriented record (POR)

2
New cards

Source-oriented records

used in most offices in the medical office for organizing a paper-based patient record; the documents in a source-oriented record are organized into sections based on the department, facility, or other source that generated the information

3
New cards

Problem-oriented medical record

are organized according to the patient's health problems, developed in 4 stages: establishing a database, compiling a problem list, devising a plan of action for each problem, following each problem with progress notes

4
New cards

Chronological Filing

system is based on dates; units are year, month, and day; most current date is filed first; most commonly used to file documents in a patient's chart

5
New cards

Reverse chronological order

the most recent document is placede on top or in front of the otherts, thus the oldest documents are on the bottom or at the end of that section

6
New cards

Alphabetic Filing

file the patient chart according to the spelling of the last name; if two or more patients have the same last name, then use the first name next followed by using the middle name

7
New cards

Numeric Filing

patients are assigned a number as they begin using the practice and their files are labeled as such; new patients are assigned the next number in order

8
New cards

Authentication

allows the healthcare worker to use the computer network with a password and a log in

9
New cards

Levels of Authorization

allow a computer network to have specific levels of authorization so that certain screens and certain functions are available onlyu to users with the correct level of authentication

10
New cards

Automatic logoff

all users should log out of the computer network when leaving the workstation; if the user forgets to log out, the software has a feature that automatically logs a user off after a predetermined amount of time

11
New cards

Firewall

a system that protects a computer network from unauthorized access from users on its own network or another network on the internet

12
New cards

Encryption

refers to a process by which electronic information is changed into an unreadable form that requires ther original encryption software to reverse the process

13
New cards

HITECH

The Health Information Technology for Economic and Clinical Health Act; increases the security provisions of HIPAA and adds increased financial penalties for privacy violation; requires notifications of patients for unauthorized use and unencrypted disclosure is PHI (patient health information); breaches involving more than 500 patients must be reported to federal agencies and sometimes local media