Hcr 210 Records Controls Paper

Only available on StudyMode
  • Download(s) : 656
  • Published : May 6, 2013
Open Document
Text Preview
Records Controls
HCR 210
April 21, 2013

Records Controls
Small, medium, and large facilities take many security measures to protect their business and clients. In an effort to keep patient records safe there are secure file rooms, password protected computers, doors that require access codes or key cards, among other things. If records were not secured, medical facilities would run the risk of confidential material getting into the wrong hands. There are differences and similarities in the way each size facility handles medical records. The handling of medical records includes security measures, tracking, and circulation. All size facilities use similar security measures when using an electronic filing system. Most facilities use passwords and access codes to access the information. Passwords and access codes are only given to certain staff members, not the entire staff. Limiting the number of people with access to records can cut down on the possibility of the information falling into the wrong hands. In the case of some small facilities, only one person has the access code/password to the system. Many small facilities still prefer to use paper records, which can be positive or negative. Small facilities usually only have two or three physicians to see all the patients. This allows each physician to work on a smaller scale and makes record keeping easier. Patient records are typically kept in one location and any new information is kept in a separate area until it can be anchored within the patient record. Most medium-sized facilities have made the move to electronic records. New records are often kept in secured locations until they can be scanned into the computer system. Records can be accessed via password protected computers. Large facilities have made the same move as medium-sized facilities. All electronic records are kept in secured areas with limited access and loose information is kept secured until it is scanned into the computer. Tracking...
tracking img