Remote-access Guide

emr remote access north carolina

by Prof. Giles Quitzon V Published 2 years ago Updated 1 year ago
image

What is epic for EMRs?

At the authors’ institution (the Medical University of South Carolina [MUSC]), the Epic system was implemented for EMRs. Access to the EMR system for general users is a rigorous process involving investigation and documentation of private information (e.g., Social Security numbers) in order to acquire the requisite unique login and password.

What is for employees simplified remote access (SRA)?

For Employees Simplified Remote Access (SRA) is a way for employees using HCA owned devices to quickly, easily, and securely access the HCA network from outside the hospital. Users will no longer need security tokens to connect to the hospital systems; instead, they will use a 3-4 ID and password.

Can Research monitors access Phi stored in an EMR?

When protected health information (PHI) is stored in an EMR, there is inherent risk that general access to these systems for source verification purposes could allow research monitors to also have access to the PHI of non-study participants.

How does remote monitoring work with Epic inbox?

This new functionality adds the benefit of allowing for easy remote monitoring; a monitor is sent a link by e-mail that sends him/her directly to an Epic InBox, where view-only, real-time chart information of patients assigned by the study coordinator through the restricted access template may be accessed.

image

Apple iOS 8 – hCare Access (VDI)

iOS is now supported with hCare Access after updating to the new version of Citrix Receiver in the App Store.

For Employees

Simplified Remote Access (SRA) is a way for employees using HCA owned devices to quickly, easily, and securely access the HCA network from outside the hospital. Users will no longer need security tokens to connect to the hospital systems; instead, they will use a 3-4 ID and password.

What is EMR in healthcare?

As hospital systems and healthcare institutions adopt electronic medical records (EMRs), this creates a new challenge in the normal conduct of clinical research. When protected health information (PHI) is stored in an EMR, there is inherent risk that general access to these systems for source verification purposes could allow research monitors to also have access to the PHI of non-study participants.

When was the restricted access monitor process initiated?

The restricted-access monitor process was initiated in January 2015 in parallel with the release of the first signed institutional policy outlining the process. The first six months the process was in place was considered a pilot phase under strict oversight by the MUSC compliance office.

How many monitors were used in the 2017 restricted access template?

As of August 2017, 18 months post-implementation, 490 monitors had utilized the restricted access template. On a monthly basis, up to 100 patient charts have been accessed appropriately, with compliance continuing to come up with zero instances of inappropriate access during post-monitoring visit audits.

What is Epic system?

Access to the EMR system for general users is a rigorous process involving investigation and documentation of private information (e.g., Social Security numbers ) in order to acquire the requisite unique login and password.

What is restricted access template?

In addition, the restricted-access template removes all visual depictions suggesting the ability to edit or navigate outside the patient chart. Prior to the development of this template, access restriction was not a defined process specific to facilitating monitor access.

Does MUSC allow view only access to Epic?

Cognizant of the limitations of available methods, MUSC undertook the development of a means of granting external research monitors access to Epic in a way that allowed view-only, real-time access to study patients’ complete medical records, while prospectively limiting them to the charts of patients who had consented to the trial being monitored. Here we describe the methods and outcomes with our “solution” to this problem.

Is MUSC University Identity Account secure?

One limitation identified during this process was the necessity of issuing an MUSC university identity account to research monitors required for them to access Epic. Although these accounts are restricted and secure, almost 500 users had to be added and maintained as account holders in the institutional identity management system. In addition, in order to ensure security, these accounts were prohibited from being utilized remotely, therefore preventing remote monitoring, although such an option was becoming widely requested by corporate sponsors.

image
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9