1. Identify one of the following healthcare management opportunities you encountered in one of the
previous performance assessments completed in this
... [Show More] program:
The Healthcare management opportunity will be from C427 Technology Applications in Healthcare.
2. Identify one of the following professional lenses:
The Capstone task will be from the manager professional lens of the hospital’s Healthcare
Administrator.
3. Summarize the opportunity selected in part A1 from the perspective of the professional lens
selected in part A2.
As the healthcare administrator for a small critical access hospital, I have been tasked with
investigating the recent data breach. My team, which consists of the director of nursing, director of
support services, the director of pharmacy, and Health Information Management (HIM) director, and I
have also been tasked with the implementation of a new electronic health record (EHR) system. The
board of directors has requested this be completed within two weeks.
4. Provide a process overview by doing the following:
a. Describe the process as it is being performed today.
Several staff members were identified to have had direct involvement in the data breach. Legal
claims have been filed by several patients. They have the intent to sue the hospital. Steps need
to be taken to keep this from happening again and to regain the confidence of our community
and patients.
i. Describe the operational environment.
The hospital currently has many stakeholders, internal and external. The most important
stakeholder is the patient. Without the patients, there would not be a need for the hospital’s
existence. Therefore, we need to redeem the integrity of this hospital to move forward. The
other stakeholder’s involved are the board of directors, our community, vendors, staff, and
physicians. We will work towards the best solution for all involved to repair the damage and
be better in the future.
ii. Outline the sequence of events of the process.
The first step will be to address the breach itself. We will need to meet with our legal counsel
to prepare a public announcement and determine what steps to take to settle the matter out
of court, if possible. We do not want this to be a prolonged process.
The next step in the process is to enhance information security to remove the threat of
additional breaches. This will be achieved by data encryption, workstation security, document
security and implementation of a new EHR system.
iii. Describe the constraints of the process.
The largest constraint will be employee response. Change does not come easy to anyone.
The staff will be expected to take on several changes in a very short time frame. Another
constraint will be financial. It will be costly to implement security measures, to purchase and
implement the new EHR system, and provide staff training for both. Lastly time constraints
will play a large part in completing these goals.
This study source was downloaded by 100000859467982 from CourseHero.com on 04-03-2023 15:56:46 GMT -05:00
https://www.coursehero.com/file/96559764/Task-1-C439-Healthcare-Management-Capstonedocx/
C a p s t o n e - T a s k 1 P a g e | 3
iv. Describe risk factors of the process.
Risk factors of the process are employee compliance of the new security measures, the
financial risks of a new EHR and its implementation, and patient buy-in that enough changes
were implemented to ensure their privacy and safety.
5. Propose a process that addresses the constraints and risk factors identified in part A4aiii and part
A4aiv by doing the following:
a. Describe the proposed process that addresses the constraints and risk factors identified in
part A4aiii and part A4aiv
Transparency and communication are the key to addressing the identified constraints and risk
factors. Staff meetings will be held to introduce the new security measures and EHR system.
The information will also be outlined on the Hospital’s intranet. Time will be allotted during the
staff meetings for questions and answers.
A financial will plan will made and implemented to address the costs of the new security
measures, EHR system, and training.
i. Outline the sequence of events of the new process.
Multiple meetings will be held to ensure attendance of all staff. The meeting dates and times
will be posted in the employee break areas, unit huddle boards, and the intranet. Staff will
receive communication of their scheduled meeting time. The information provided at the
meetings will be posted to the intranet. The new security measures will be implemented
immediately following the meetings. The EHR system training will be completed within three
weeks after meetings have been completed.
ii. Identify potential constraints of the new process.
The meetings will need to be scheduled to cause the least disruption to patient care and still
have adequate staffing for all units. A similar schedule will be followed for EHR training.
iii. Identify potential risk factors of the new process.
- Patient safety will also be addressed by ensuring adequate staffing during the meetings.
- PHI privacy and security
- System downtime - workflow and data recovery
- Employee buy-in
- Loss of Patient data during migration from the old system
- Initial investment
iv. Discuss how this new process impacts its external environment.
The implementation of new security measures and a new EHR system will impact patient
privacy and security. Patient billing will also be impacted by the new system, as billing and
coding will be part of the package for the new system. Claims will be sent electronically to all
insurance providers which will increase accuracy and timeliness of claims. Supply chain will
be impacted, as well. Part of the new system will include an inventory software system. The
inventory software will be integrated with the EHR system for patient billing [Show Less]