LESSON 11: Other Hospital Information Systems Cardiology Information System
LESSON 11: Other Hospital Information Systems Cardiology Information System
Definition
The cardiology information system (CIS) is mainly focused on the storage and
retrieval of cardiology centric images. This system usually receives an order with patient
demographics from other information management systems. Once the images are acquired
from imaging modalities. They are profiled based on the order and stored for further distribution,
viewing, and long-term archiving (Katipula & Ireland, 2013).
The information used by cardiologists for the diagnosis and treatment of illnesses caries
from personal notes (history, physical examination), to signals (electrocardiograms), images
(echocardiograms, angiograms, CT MRI), and reports from investigations and procedures. All
these types of information can currently be provided in digital format, and the system serves as
repository of these forms of images. Unfortunately, most systems are limited by their storage
capabilities and do not include post-processing functions.
Evolution of CIS
Decades ago, the requirements for an electronic medical information system were
restricted by the availability of equipment. A good database schema combined with a functional
user interface war deemed adequate. In the 1970s, available cardiology information systems
originated form manufacturer environment, whose technical specifies would be considered
ridiculous in today‟s context.
In the 19080s, modular systems that emphasized the use of real-time applications and
mini computers became the trend (Turney & Kohls, 1997). Over the years, the trend for smaller
computers remained, but the introduction of the internet became a turning point that shifted the
focus of most systems towards creating networks and facilitating integration. Cardiology
information systems nowadays have unique features that enable remote access and easy
retrieval. Some systems have also attempted to integrate radiology information systems (RIS) to
involve more administrative processes and go beyond storage purposes.
Benefits of CIS
Different CIS, coming from different sellers, vary in their available features. However, the
following in the most common benefits:
Functionalities of CIS
1. Editing, Viewing, and Storing Multi-Modal Cardiology Data – With the help of CIS,
different types of data, including those of computed tomography (CT), cardiac ultrasound
(echocardiography), magnetic resonance imaging (MRI), nuclear imaging (PET and
SPECT), and angiography may be managed on a single platform.
2. Remote Access – The use of networks and integrated information systems, coupled
with the availability of the internet and tablets and smart phones, offers flexibility to CIS.
3. Visualization and Reporting Capabilities – Two of the main benefits of CIS are the
ease and the consistency of reporting. As a result, virtual real-time information retrieval
is possible anytime and anywhere with just a couple of clicks.
4. EHR Integration – CIS may be integrated with existing electronic health record systems;
this results in the enhancement of the quality of services of the health professionals by
offering a more comprehensive view of the patient care spectrum.
The use of RIS in health care institutions has many advantages in the context of
improving overall operations of the institution. The system enables easier access to patient
information because it can be integrated in referring to the doctor‟s electronic health record
(HER) system, resulting in better patient experience. It also allows faster processing of
payments because the insurance plans of patients may be verified prior to their visit and
electronic payment is an available option. It also permits reports to be easily generated and sent
to the requesting department which dramatically improves the efficiency of the workflow of the
institution.
Functions RIS
Patient Management – The system tracks the patient‟s entire workflow within the
radiology department. It can add images and generate reports to EHRs for easy retrieval
and viewing by the authorized radiology staff.
Scheduling – The system allows staff to schedule appointments for in-patients and out-
patients.
Patient Tracking – Patient tracking means tracing the patient‟s radiology history starting
from admission to discharge and coordinating it with his or her past, present, and future
appointments.
Results reporting – Results reporting is possible through the statistical reports
generated by RIS. The reports may be done for a single patient or a group of patients,
as well as for specific procedures depending on the needs.
Image tracking – RIS was traditionally used to track individual films and associated
data. Nowadays, RIS-PACS systems managed by radiology departments cover the
entire clinical workflow of the medical enterprise.
Billing – Billing is made convenient through the system‟s financial record keeping and
processing of electronic payments and automated claims.
Cardiology information system (CIS) is mainly focused on the storage and retrieval of
cardiology centric images.
The benefits and features of CIS include ease of access while maintaining data security,
flexibility in the workflow, and enhanced comparability.
The functionalities of CIS are editing, viewing, and storing multi-modal cardiology data;
remote access; visualization and reporting capabilities; and EHR integration.
A radiology information system (RIS) is a network software system designed to manage
medical imagery and associated data. An RIS is especially useful for tracking radiology
imaging orders and billing information, and is often used in conjunction with picture
archiving and communication systems (PACS) and vendor neutral archivals (VNA) to
manage image archives and for record-keeping and billing within a hospital information
system (HIS).
LESSON 12: Materials Management Systems
The management function of hospital materials – that is, to ensure that services are
rendered successfully from one source to an end user – covers several areas of the hospital
and could dramatically affect the expenses of the medical institution. Executing this function in a
manner that lessens expenses and ensures adequate cash flow requires effective management
of a large amount of information from several sources.
Purchasing
In HIS by BisBox, a purchase request marks the beginning of the procurement process.
Using this form, the user notifies the purchasing department regarding the needed items and
services. It contains the quantity, as well as a timeframe for the items requested. It has the
authorization information needed to proceed with the purchase. The requested items are then
confirmed using the purchase order and a supplier is nominated. Once completed, the order is
sent to the supplier for processing.
Finally, the items are checked during receipt of the delivery. The receiver, which is
usually the Central Supplies department, uses the purchase order as basis for accepting the
delivered items that should be checked for indents and damages. Afterwards, the said items are
then releases to the requesting department.
Inventory Control
Inventory is one of the biggest expenses for most medical institutions (Johnston, 2014).
Inventory control plays an important part in refining the quality of health care services since lives
of people are on the line and medical costs are increasing.
Since the importance of inventory control has been recognized, the usage of a materials
management systems brings an advantage. In this system, the inventory item maintenance
screen has many sections. The upper portion contains master information. Additional options
appear after the selection of an existing items. “Item Lab” is used for maintenance of the
attributes of an inventory item, such as product type, item class, item type, and others. If the
balance and order activity is zero, items can be deleted using this option. Users may set the
product type to group similar items for sales analysis and inventory reporting. Most the inventory
reports are based on a certain product type. The “Item Availability” forms specific inventory level
across all warehouses.
There are some instances when items are damaged either upon receipt from the
supplier or during the move from the source to another location. Some suppliers allow return of
goods that have indents or the like, with a guarantee of replacement without any additional
payments. This applies to distribution and retail industries where the goods for sale are fast
moving. Normally, damaged items are moved to another warehouse for them to be monitored.
Reorder Level and Minimum and Maximum Inventory Ordering
Enquiries and Quotations for Drugs, Consumables, Assets, and General Items
According to Webrino (2018), the following documents are required in the materials
management process:
1. Enquiries – The enquiries mark the beginning of the purchasing process. These
establish the relationship between the entity and the right supplier. The supplier provides
information on the availability and price of the required items.
2. Quotations – Quotations contain vital information regarding the requirements which
include price, delivery details, payment terms, and etc. Companies usually review two to
three quotations before selecting the supplier.
3. Orders – The buyer shows the intention to purchase the required item by issuing a
purchase order. A purchase order is placed to signify intention to engage in commercial
operations for a specific product or service. Upon agreement, the order becomes a
contract between the health care institution and the supplier.
4. Invoices – An invoice is also called a bill. It is a commercial document that indicates the
product, the ordered quantity, and the agreed price. The supplier issues this to the buyer
to show the products and services that were sold or provided to the buyer.
5. Documents – Documents are statutory requirements used during purchase and sale
transactions. These ensure smooth transition and completion of the process.
Purchase Quotations
Preferred Vendors
Companies typically maintain a list of preferred vendors from whom inventory items are
usually purchased. They look for a vendor who has on time performance, offers reasonable
costs, provide high quality products and services, offers fully licensed, bonded, and insured
products and services, and has good business practices.
Purchase Request
Purchase Orders
A purchase order is a legally binding contract which shows that the seller has already
accepted the order issued by the buyer (SAP, 2012). It should contain: information about the
buyer and seller (name, address, contact details, and etc.): order number and order date; items
description (quantity, unit, and total price), shipping information (shipping date and address);
billing address; and the authorized signature.
Approval Process
The person who creates the document, either a purchase or order in the originator.
When the said originator adds documents to materials management system, the systems
checks for any approval requirements. If the document fails to meet the approval requisites, the
originator is notified that the document needs approval. The document is temporarily saved as a
draft.
When the approval process is launched, an internal request is immediately sent to the
first approval stage. This request is received in the messages/alerts overview window, and the
approver can access the document. Approval can be done through a mobile phone if the
devices are integrated. An internal notification goes back to the originator with a link to the
rejected document when the approver rejects the document. The originator can amend the
documents and the approval procedure will continue until the conditions are adequately satisfied
(SAP, 2012).
The following policies should be followed for the proper receipt and inspection of goods
(the York College, 2017):
1. Signing for Deliveries – The person who receives the delivery should inspect the
delivered items before signing the receiving document and the packing list. Then the
document should be submitted to the appropriate department for reconciliation.
2. Refusing Delivery – The receiving department should refuse to accept any shipment if
the packaging appears to be damaged or if there is any item that does not have a
corresponding purchase order.
3. Record Retention – The packaging list should be provided to the receiving department
during delivery to ensure that there is a proper documentation since it is are taking
possession and legal ownership of the delivered items. If no list was provided, the
department should request the copy from suppler. All files should be kept according to
the guidelines of the entity. This helps track partial and staggered deliveries.
4. Inspecting a Shipment – The personnel receiving the items should inspect the goods to
ensure that the following minimum conditions are met:
a. The received items match the requirements stated in the purchase order (type,
description, color, and etc.)
b. The quantity is correct.
c. The item has no damage, discoloration, and issues.
d. The quantity per unit of measurement is accurate (e.g. one dozen = 12 pieces).
e. Packaging list, certification, and other delivery documentation are completely
provided.
f. Perishable items should be in good condition and have not reached the
expiration dates.
g. The items are functioning properly.
5. Partial Deliveries – When items are delivered partially without proper notification from
the supplier, the receiving personnel should advise the purchasing department for
approval and further instructions, this should also be typically noted in the packaging list
or the receiving document.
6. Tracking of Goods – Goods can be easily tracked/traced when they are managed by
serial number or batch. Through that, aging of products can also be monitored based on
how long they have been in the warehouse.
Purchase Returns along with Returnable/Non-Returnable Gate Pass
Movement of inventory is not limited to purchase returns. Supplies and equipment are
also sometimes required to be taken out of the department for repairs or consignment. For
temporary movement, a returnable gate pass is issued whereas for permanent movement, a
non-returnable gate pass is given. The system can be configured to track returnable and non-
returnable items or equipment. It can also be set to monitor due dates for returnable items and
to provide detailed reports about the status of different inventory items.
In the process of consignment, the vendor or consignor issues materials to the receiver
or consignee and these materials are stored in the consignee‟s premises. The vendor maintains
legal ownership until such materials are removed from consignment stores. The invoice is due
at predetermined intervals. In addition, customers can also arrange take over ownership of the
remaining consignment material after a certain period (SAP 2011).
Expired Stock/Inventory
Upon reaching their expiration dates, some goods, such as food and medicine, can no
longer be utilized. In rare instances, they may be sold to other parties at lower costs. Expiration
dates a decrease in values of items must be reflected in the financial records so discrepancies
in financial statements will be prevented. The amount that reduces inventory in the records is
recognized as a loss which equates to a reduction in profit (Keythman, 2017).
Quarantine Stock/Inventory
When undecided about how to handle defective goods, whether to be sold as scraps,
reworked returned, or used as it is, a quarantine location or warehouse can be used to
temporarily house them until a final decision is reached.
Inventory is put into quarantine if it is initially rejected during (Infor LN Warehousing, 2018):
Production, upon completion of an operation, when specified as “Move rejected end item
to quarantine.”
Inbound inspection upon receipt of:
Manufactured end items
Purchased items
Sold items on sales return orders
Enterprise planning distribution orders
Outbound inspection upon issue of materials to production
While some hospitals have functional inventory databases, the lack of integration does
not give them holistic information, and this affects decision making, both on a managerial level
and during day to day operations. For instance, some drugs are misplaced or misappropriated,
or shortages and surpluses may occur as a result of improper inventory controls in a traditional
system (Infor LN warehousing, 2018). This is where materials management system becomes
advantageous. It provides an overview of the entire institution‟s purchasing and inventory
control processes. As a result, decision makers can have more reliable information and can
monitor the bigger picture.
Issue Methods
Inventory management is a crucial function for any product oriented business. Common
inventory handling methods includes:
a. First In, First Out (FIFO) – Inventory items are sold based on the order they are
purchases. This is the most common technique.
b. Last In, First Out (LIFO) – Last items to enter the system are sold first. This is common
among non-perishable items like petroleum, minerals, and metals.
c. First Expired, First Out (FEFO) – Materials are sold based on the dates they should be
consumed, regardless of when they were purchased.
Materials management systems usually allow tax rates to be defined internally via tax
codes or imported from an external source. Tax configurations are usually accounted on a per
country basis. The following taxes that can usually be processed while posting documents are:
The automatic calculation of the tax dues during the purchasing process makes the
process less susceptible to clerical errors.
An inventory count is a process where a business physically counts its entire inventory.
A physical inventory may be mandated by financial accounting rules or tax regulations to place
an accurate value on the inventory, or the business may need to count inventory so component
parts or raw materials can be restocked. Businesses may use the following tactics to minimize
the disruption caused by physical inventory (CTI Reviews, 2016).
Inventory services provide labor and automation to quickly count inventory and minimize
shutdown time.
Inventory control system software can speed up the physical inventory process.
A perpetual inventory system tracks the receipt and use of inventory, and calculates the
quantity on hand.
Cycle counting, an alternative to physical inventory, may be less disruptive.
The materials management systems offer all of these in addition to the barcode and
RFID capability which are supplementary technologies placed to give the institutions more
accurate and less burdensome inventory counts.
Nowadays, most institutions have existing clinical data repositories (CDR), in electronic
or written format, to represent an aggregated database of clinical information. The repositories
usually houses multitude of laboratory results, diagnostic reports, and various clinical
documentation. These data are readily researchable and exportable, often because the
information is gathered from standard clinical care procedures (Robertson and Williams, 2016).
The repositories integrate physician-entered data with data from different existing information
systems including laboratory, radiology, admission, and pharmacy. They are placed where both
clinical data and other data of interest, such as external data sources and financial data are
assimilated (Carter, 2001).
A clinical data repository can successfully depict the same sample across different
points in time, from varying sources both within and outside the health institutions. Common
kinds of available information in CDR are listed below:
Patient demographics
Patient‟s primary care provider
Medication list
Allergies
Hospital in-patient visits
Emergency department encounters
Outpatient practice visits
Immunizations
Diagnoses
Procedures
Laboratory results
Social history
Vitals
Maintaining them poses a lot of advantages since longitudinal view of patient‟s medical
record can assist in improving patient experience, and having information about the prior test
results and procedures leads to more informed patient care decisions and helps avoid
redundant treatment.
These are different levels of integration in the said repository. These levels depend on
locations, indices, catalogues, semantic translations or equivalences, syntactic structures, and
links to external information. They influence functionality by setting constraints on how easily
someone can make queries for any of the contents. The integration structure from the CDR to
the laboratory information system, for example, may be different for radiology or pharmacy.
These differences might mean that a user may only access certain types of information and use
particular types of queries from a given information system depending on the restrictions which
were set during the integration process. The aforementioned restrictions vary on terms of the
user‟s access. While some CDRs are fairly open other are either employees of an institution or
to members of some research network. Access control to the CDR functions as a safeguard to
uphold data security and integrity.
Wade (2014) emphasized the longitudinal nature of the CDR required a way of linking
various observations of the same identified subject. Most repositories usually contain personally
identified data however, due to privacy issues, they only release de-identified data which can
lead to the emission of some data in dataset. The lack of identifiers could also prevent the
linking of data for some patients. Presented below (Table 13.1) are the different types of clinical
data repositories that Wade classified according to factors described above.
Ball and Douglas (2013) elaborate that a well0deployed clinical repository has multiple
advantages. First advantage is the CDR function to provide longitudinal views of patient
information. It is often organized primarily around patients and secondly around visits or
encounters, a method that easily accommodates views that span multiple visits. This allows
clinicians to trend and chart results independent of the visits and test panel organization.
Another advantage is its capability to provide access to information when needed. Since
it receives information from a multitude of feeder systems, it can create a non-stop shopping
environment. This is done by allowing the clinical staff to access variety of patient-focused
information through consistent and easy-to-use graphical interface (GUI). The GUI access can
be deployed through hand-held devices, bedside computing devices computers in physician‟s
office.
Data collected through an electronic health record system may be retrieved at the
request of an authorized user, whether a physician, medical technologist, nurse, or radiologist.
The electronic health record may present patient care information as text, tables, graphs,
sounds, images, full-motion video, or signals on an electronic screen, phone, pager, or paper
(Bronzino and Peterson, 2014).
Unfortunately, analyzing trends and patterns from large data sets can be challenging
process. This is where data visualization, the art of representing data in a pictorial or graphical
format becomes useful. It helps in simplifying a wide array of information, and it allows decision-
makers to derive analytical results from the information presented visually. Through this,
correlations, patterns, and trends which might be undetected from text-based clinical data can
be revealed and recognized with more ease.
For example, the physician can easily review the results of multiple chest x-rays
obtained over the course of months or years when deciding if a nodule has grown. This
information would have not been accessible basing on textual clinical data alone. Moreover,
patients suffering from specific diseases that require careful carting or monitoring of laboratory
values, including anticoagulation or blood sugar values, can understand what is expected in
their care because of better means of data presentation.
Clinical data repositories (CDR) integrate physician-entered data with data from different
existing information systems including laboratory, radiology, admission, and pharmacy.
A CDR is a systematically structured and gathered “storehouse” of patient-specific data,
which is usually mirrored from a clinical application, or supplemented with data from
other clinical systems.
Repository types include study, electronic health record, registry, warehouse, collection,
and federation.
CDRs offer a cross-continuum view of information since they allow information to be
gathered and viewed from sources other than an acute setting.
Data visualization helps in simplifying a wide array of information, and it allows decision-
makers to derive analytical results from information presented visually.
LESSON 14: Ethics, Privacy, and Security
Technology helped in the modernization of the health care industry; however, this made
practitioners to be dependent on the use of mechanical aids providing patient treatment.
Conversely, human values should continue to govern research and the actual practice in health
care.
Health care informatics covers issues on honourable actions and proper and improper
behaviors in the field of health care. However, most health practitioners are not familiar with
ethical issues even if some issues have been controversial.
Nowadays, privacy and confidentiality are among the popular sources of debate.
However, more important issues such as the use of appropriate informatics tools in clinical
settings, determination of users, system evaluation, system development, and many others
need attention. These and other questions on the various legal and regulatory requirements
need to be addressed (Goodman, 2016).
Information systems store patient‟s records that can be retrieved when needed. These
records assist in the dispensation of health care or other supplementary services which are part
of health informatics. Health informatics is guided by health information ethics defined as the
application of the principles of ethics in the domain of health informatics. The three main
aspects of information ethics are general, informatics, and software ethics (Samuel & Xaiane,
2014).
General Ethics
In public health, general ethics guide the reasoning and decision-making of all people
and organization involved in health care. Two of the ethical principles a health professional must
uphold are autonomy and beneficence and non –maleficence.
1. Autonomy
Autonomy is defined as the idea of either allowing individuals to make their own
decisions in response to a particular societal context, or being free from external
influence or control. Electronic health records (EHR) must maintain respect for
patient autonomy, and this entails certain restrictions about the access, content, and
ownership of records. A compromise must be reached between levels of patient
autonomy and quality of patient records. When patients are given too much control
over their EHRs, this could defeat the purpose of the use of such document because
critical information might be modified or deleted without the knowledge of the health
professionals. Limiting patient access and control over patient records improves
document quality because patients can also verify their own records (Mercuri, 2010).
2. Beneficence and Non-maleficence
These two principles are respectively defined as do good and do no harm. In
health informatics, beneficence relates most significantly with the usage of stored
data in the EHR system, and non-maleficence with how the stored data is protected.
Deeply integrated EHR systems will contain substantial amounts of raw data, and
great potential exists for the conduct of groundbreaking biomedical and public health
researches. These kinds of research will be beneficial to both the individual patient
and the society. With this in mind, new EHRs systems should be developed with the
capacity to allow patients to release information from their EHRs which can be
valuable to researchers and scientists. Similarly, the available consolidated data from
clinical data repositories will allow health care professionals to provide the best
possible treatment for their patients, further upholding the principle of beneficence.
However, the integrated data storage in health informatics is also a breeding
ground for varying threats. Temporary outages, at a minimum, might prevent health
care professionals from performing necessary procedures. At worst, it could even
result in significant patient mortality. Total system failures, however, may cause even
greater damage. In order to avoid these instances, all data must have multiple back-
ups for fast and easy recovery. Since medical records contain very sensitive
information about an individual, the highest level of data security possible should
also be upheld. Vulnerabilities in security put patients at a risky position, and might
ultimately lead to the violation of the principle of non-maleficence (Mercuri, 2010).
Information Ethics
Information ethics is about the ethical behavior expected from an individual assigned to
handle information as prescribed by the International Medical Informatics Association (2016). It
follows seven principles:
Software Ethics
Health informatics ethics relies on the use of the software and process information. It
follows that the activities carried out by the developers might affect the end-users. Therefore,
software ethics is the ethical duties and responsibilities of software developers to the
stakeholders (society, institution and employees, and the profession). They should execute all
system activities with the best interest of the society in mind. They should disclose any threats
or known defects in the software. They should ensure that completed activities serve the best
interests of the institutions and its employees. They should be straightforward about their
personal limitations and qualifications. Finally, they must build products that meet the
professional standards through testing and detailing unresolved issues. In support of the
mentioned responsibilities of software developers, the management should require ethical
approaches in software development (Samuel & Zaiane, 2014).
Privacy and confidentiality are often used interchangeably, but they are not synonymous.
Privacy generally applies to individuals and their aversion to eavesdropping, whereas
confidentiality is more closely related to unintended disclosure of information. For example,
someone who is spying on a certain person to find out about his or her visit to an acquired
immunodeficiency syndrome (AIDS) clinic is a violation of that person‟s privacy. On the other
hand, if someone breaks into the clinic to view an individual‟s patient record, that is in violation
of confidentiality.
There are numerous significant reasons to protect privacy and confidentiality. First,
privacy and confidentiality are widely regarded as rights of all people which merit respect
without the need to be earned, argued, or defended. Second, protection of these rights is
ultimately advantageous for both individuals and society. Patients are more likely to be
comfortable to share sensitive health care data when they believe this information would not be
shared inappropriately. This kind of trust essentially establishes a successful physician-patient
or nurse-patient relationship, and enables the practitioners to perform their jobs better.
Furthermore, the protection of privacy and confidentiality benefits the public health. When
people are not afraid to disclose personal information, they are more inclined to seek out
professional assistance which helps in diminishing the risk of increasing untreated illness and
spreading infectious diseases (Goodman, 2016).
When patients trust medical professionals and health information technology enough to
disclose their health information, the latter will have more holistic view of patients' overall health
and both health care professional and patient can formulate more informed decisions. In
circumstances in which breaches of privacy and confidentiality occur, serious consequences for
the organization await, such as reputational and financial harm, or personal harm to patients.
Poor privacy and security practices heighten the vulnerability of patient information and increase
the risk of successful cyber-attacks (USA Department of Health and Human Services, 2015).
In summary, the idea that physicians should hold health care information in confidence
should be applicable no matter what the circumstance. The obligation to protect privacy and to
keep health information confidential fall on system designers, maintenance personnel,
administrators, and, ultimately to the physicians, nurses, and other frontline users of the
information. The protection of privacy and confidentiality is non-negotiable because it is a duty
that does not fluctuate (Goodman, 2016).
The National Research Council (1997) emphasizes that technological security tools are
essential components of modern distributed health care information systems, and that they
serve five key functions:
Step Description
The patient record (e.g., ID Number,
name, age, sex, location) must be
created in the LIS prior to the test(s). The
Register Patient LIS usually receives these data
automatically from the hospital
registration system when a patient is
admitted.
The attending physician orders the tests
for patient and the procedure is
requested as part of the laboratory‟s
Order Tests
morning blood collection rounds. These
orders are entered into the CIS and they
are sent to the LIS electronically.
The LIS prints a list of all patients who
have to be drawn which also includes the
appropriate number of sample barcode
labels for each patient order. Each
barcode contains the patient ID, sample
contained, and laboratory workstation
which is used to sort the tube once it
Collect Sample
reaches the laboratory. An increasingly
popular approach is for caregivers or
nurses to collect the blood sample.
Sample barcode labels can be printed (on
demand) at the nursing station on a LIS
printer or portable bedside printer prior to
collection.
Once the sample arrives in the
laboratory, the status is updated in the
LIS from “collected” to “received.” This is
done by scanning each sample
Receive Sample container‟s barcode ID into the LIS. Once
the status becomes “received,” the LIS
then transmits the test order to the
analyzer that will perform the required
test.
The sample is loaded to the analyzer,
and the barcode is then read. No work list
is needed because the analyzer knows
what test to perform from order provided
by the LIS. However, when tests are
Run Sample performed manually, the technologist
prints a work list from the LIS. The work
list should contain the names of the
patients and the tests ordered on each
and next to each test is space to record
the result.
The analyzer then produces the results
and sends the same to the LIS. The
result is only viewable to the assigned
technologists until it is released for
general viewing. The LIS can also be
Review Results
programmed to flag certain results-for
example, critical values-so the
technologist can easily identify what
needs to be repeated or further
evaluated.
The technologist is responsible for the
release of the results. Unflagged results
are reviewed and released at the same
time. The LIS can be programmed to
automatically review and release normal
Release Results
results or results that fall within a certain
range. This approach reduces the
number of tests that a technologist has to
view. The results are automatically
transmitted to the CIS upon release.
The physician can now view the results
Report Results on the CIS screen. Reports can be
printed when needed.
about an individual‟s race, ethnic origin, marital status, age, color, and religious,
philosophical, or political affiliations,
about an individual‟s health, education, genetic or sexual life of a person, or to any
proceeding or any offense committed or allegedly committed,
issued by government agencies “peculiar” (unique) to an individual such as social
security number, and
marked as classified by an executive order or act of congress.
The provisions of the law necessitate covered entities to create privacy and security
program to improve the collection of data, limit processing to legitimate purposes, manage
access, and implement data retention procedures.
The act provides for different penalties for varying violations, majority of which include
imprisonment. These violations include:
unauthorized processing,
processing for unauthorized purposes,
negligent access,
improper disposal,
unauthorized access or intentional breach,
concealment of breach involving sensitive personal information,
unauthorized disclosure, and
malicious disclosure .
Any combination or series of acts enumerate above shall make the person subject to
imprisonment ranging from three years to six (6) years, and fine of not less than one million
pesos (₱1,000,000.00) but not more than five million pesos (₱5,000,000.00) (Republic Act No.
10173, Ch. 8, Sec. 33).
Health informatics ethics is the application of the principles of ethics to the domain of
health informatics. There are three main aspects of health informatics ethics; general
ethics, information ethics, and software ethics.
General ethics covers autonomy, beneficence, and non-maleficence.
Informatics ethics refers to privacy, openness, security, access, infringement, least
intrusion and accountability.
Software developers should consider the best interest of the society in general, the
institution and its employees, and the profession.
Administrative, physical, and technical safeguards are placed to regularly monitor
effectiveness and assess the health IT environment.
1. Regulatory adjustments
2. Shifts in consumer behavior patterns
3. Accelerated pace of IT development
Health care consumers want a more customized experience and greater opportunity to
participate in their health care decisions. This means that heath care institutions need to adapt a
more innovative technology, implement an informed patient engagement strategy, and adjust
their organizational structures to drive better patient experiences which may result in numerous
and rapid changes (Quinn, 2017). However, technology alone is not enough. The truth of matter
is that no technology can be successfully implemented without the human factor which
intensities the work processes and gives the appropriate guidance. The need to find the right
balance between technology and human factor is necessary in the roadmap for organizational
changes.
Gathering information about the „as is‟ and „to be‟ status of the current process
Mapping of the process for both „as is‟ and „to be‟ status
Gap analysis
Business care development
Project management
Problem solving
Requirements elicitation techniques
Negotiation skills
In addition, the progress of the change imitative can be measured against the objectives
set by the organization (Downey, 2008). The said objectives will be measures by the key
performance indicators (KPIs) which include reducing rework by x%, improving in stakeholder
satisfaction, for example, customer/employee surveys, reducing time to marker, enhanced
speed of delivery, and having good return on investment (ROI) which is total cost to implement
the initiative versus total savings gained from initiative per period.
In the world of health care, some hospitals are reluctant and indignant towards the idea
of change, and they find it difficult to adjust. Thus, health informatics hopes to change the way
health care institutions conduct their business on a daily basis. Health care providers need to
welcome change and approach information technology with an open mind. Aziz (2007)
emphasizes that mechanism for the transformation of business and clinical processes should be
in place. By encouraging the adoption of innovation in health care information technology by
clinicians, therapists, nurses, and physicians, health care providers can achieve key success
factors (Table 15.1).
Table 15.1 Key Success Factors
Enumerated are the fundamental practices that management needs to embrace as its
well-rounded strategy (Aziz, 2007).
These professionals also ensure that a patient is billed accurately and assure that the
accumulated health care information is compiled and analyzed to assist in making
recommendations that can improve the health care services. They are also expected to devise
policies that address concerns on the delivery of high quality health care and the availability of
quality information for decision making (May, 2014).