In the September 2011 blog post, The Challenges of Meaningful Use in Small, Independent Practices, I reported on a talk given to a group of primary care practitioners and how their questions indicated they were having difficulties understanding MU requirements.   Perhaps the most surprising finding was that many attendees fromContinue Reading

Last month the Washington Post ran an article, Health-care Sector Vulnerable to Hackers, Researchers Say, which sounded alarms concerning the security of clinical systems.   Reflecting on the state of HIT security, the article quotes Avi Rubin, a security researcher: I have never seen an industry with more gaping security holes,”Continue Reading

Two weeks ago I wrote about the value of EHR timelines and audit trails. Today’s post takes that discussion a little further by demonstrating various ways of keeping track of data accesses and changes in EHR data element values.   Of course, this functionality is useful for any clinical database thatContinue Reading

As EHR use increases, the number of complaints about incoherent paper printouts has grown.  However, it isn’t just clinicians who are having problems.   EHRs Prove a Difficult Witness in Court , an article from the Journal of AHIMA, details the legal headaches that can occur as a result of theContinue Reading

Since the last resources-related post, two additional pages have been added— Usability and Security.   Resource pages offer practical information for those implementing systems and research information for informatics researchers and system designers. Usability The initial version of the usability page focuses on major national policy reports/documents and selected research articlesContinue Reading