SlideShare a Scribd company logo
Component 4: Introduction to
Information and Computer Science

            BCC PPT 1
Computer Definition
• According to Webster's Dictionary:
      one that computes; specifically : a
       programmable usually electronic device that
       can store, retrieve, and process data


• Originally term applied to people



Component 4                                          2
Types of Computers
                 Personal Computers
•   Desktop computer
•   Laptop/Notebook/Netbook
•   Tablets/iPad
•   Smartphones                                                    Laptop
                                                                   http://en.wikipedia.org/wiki/Laptop




                                                                                  iPad
                                                                                  © Glenn Fleishman

              Android Smartphone
              http://en.wikipedia.org/wiki/File:Android_home.png


Component 4                                                                                       3
Computer Software
              Application Software
• Application software are the programs you
  run
• Includes
      – Word processors
      – EMR
      – Spreadsheets
      – Browsers
                           OpenOffice Word Processor
      – Video Games

Component 4                                            4
More Components
• Networks
      – Allow computer to connect to others and to
        Internet
      – Hardware: network ports, connections, routers
      – Software: OS and NOS
• Databases
      – Collection of data easily stored and retrieved
      – Hardware: server (computer and storage)
      – Software: DBMS

Component 4                                              5
Computer Software and
                   Hardware
• Software is the interface between the user
  and the computer
• Without meaningful, easy to use
  applications, people wouldn't use
  computers
• If the hardware is slow, people won't use
  the applications
• Important to get a good balance
Component 4                                6
Early Electronic Medical
                  Records
• At this time, early EMRs were developed
• Dr. Morris Collen began storing patient data
  at Kaiser Permanente in the late 1960s
• COSTAR was developed at Massachusetts
  General in 1968
• Health Evaluation through Logical Processing
  (HELP) was started at LDS Hospital in 1967
• The concepts and plans that eventually
  became VA VistA were developed in 1970s

Component 4                                      7
Electronic Medical Records
• Become more pervasive in the 1990s
• In 1996, HIPAA was passed establishing
  rules for accessing and storing electronic
  medical records
• By 2000, 16% private physicians, VistA screenshot
  < 10% hospitals used EMRs
• By 2005, 25% private
  physicians used EMRs

 Component 4                                      8
Since Then…
• Personal Data Assistants introduce hand
  held computing
      – Smartphones replace PDAs
• Wireless networks are widely available
      – Mobile computing is now pervasive
• Social networking sites connect people
• Computers and the Internet are ubiquitous
• HITECH Act passed in 2009 to provide
  incentives for EMR use starting in 2011
Component 4                                 9
The Future?
• Computing technology will continue to
  become faster, more powerful and smaller
• Mobile and cloud computing are hot topics
• More ubiquitous?
• More embedded computers?
• Difficult to say for sure…


                                Cloud Computing Diagram
Component 4                                        10
Internet Security and Privacy Concerns
• Why be concerned about Internet Security?
      Your personal data is always at risk when connected
       to the Internet, regardless of connection type.
      Checking account may be drained before you can act.
      Credit may be destroyed if personal data stolen (and
       impersonated).
      Corporate secrets may be stolen and sold to
       competitors.




Component 4                                               11
Everyone’s Online Today
• Information Overload
      When debit cards emerged, many people refused to
       use them because of privacy and security concerns.
      People today are very comfortable with online
       banking and are comfortable conducting business
       over the Internet.
• Social networking sites facilitate sharing
      People are comfortable sharing personal information
       in online communities even though this subjects them
       to privacy invasion.
      Posting your birth date, mother’s maiden name, etc.
       may enable an attacker to impersonate you.
Component 4                                                 12
What is Privacy?
• Most privacy law revolves around privacy
  between a person and the government.
• According to Wikipedia, “The law of privacy
  regulates the type of information which may be
  collected and how this information may be used
  and stored.”
      i.e., privacy relates to people.




Component 4                                        13
What is Confidentiality?
• Not the same as privacy.
• According to Wikipedia, “Confidentiality is
  commonly applied to conversations between
  doctors and patients. Legal protections prevent
  physicians from revealing certain discussions
  with patients, even under oath in court. The rule
  only applies to secrets shared between
  physician and patient during the course of
  providing medical care.”
      i.e., confidentiality relates to data.

Component 4                                           14
Federal Rules Emerge
• HIPAA (Health Insurance Portability and
  Accountability Act) was enacted in 1996 by the
  federal government.
• HIPAA requires that health care providers and
  health insurance companies as well as care
  clearinghouses (organizations that translate
  claims data into and out of HIPAA-standard
  format) abide by privacy and security standards.



Component 4                                      15
HIPAA and Privacy
• Privacy Rule
      HIPAA requires those covered by the act to provide
       patients a “Notice of Privacy Practices” when care is
       first provided.
      The Privacy Rule covers paper and electronic private
       health information.
• Security Rule
      Covers administrative, physical, and technical data
       safeguards that secure electronic health record data.



Component 4                                                    16
Free Online PHR Systems
          Readily Available
• PHRs are maintained by individuals.
• Some PHRs are not covered by HIPAA rules.
• Resources:
      Google Health - www.google.com/health/
      Microsoft HealthVault - www.healthvault.com/
      WebMD Health Manager - http://www.webmd.com/phr




Component 4                                          17
EHRs Used by Health Care
           Providers
• EHRs are maintained by health care providers.
• EHRs are covered by HIPAA rules.
• EHRs utilize centralized database systems to integrate
  patient intake, medical care, pharmacy, billing, etc. into
  one system.
• Departments/entities may not be in same physical
  location, so patient data must travel over the Internet.
• People can view their own health record, taking
  ownership of its contents, ensuring accuracy, etc.


Component 4                                                    18
EHR Security Q & A
• How is my data sent over the Internet?
      It is to be sent in an encrypted, secure manner over
       the Internet.
• Is my data safe?
     • Much depends on each organization’s physical record
       and network security practices.
     • No data is 100% secure against theft or misuse.
• Who can view my health records?
      Only those who need to know or view the contents of
       your health record should be able to view it.
      You must authorize all other access.
Component 4                                                   19
Putting it All Together
• A computer system is made up of the hardware
  (including the CPU, RAM, and I/O devices) and
  operating system (OS) software installed on a computer.
      – Examples of devices that contain an OS include cell phones,
        PDAs, robots/robotic devices, routers, switches, laptops, and
        computers (desktops, servers, and Web servers).
• An OS is made up of thousands of computer programs
  that securely manage how hardware interacts with non
  OS – or “application” – software installed on the
  computer.
      – Google Earth is application software, which is a free program
        that a user can install on a computer.
      – Microsoft Word is a commercial application in the Microsoft
        Office suite of programs.
Component 4                                                             20
Specialized Health Care CPUs
• Medical imaging done in CT and MRI scans require
  specialized architectures.
• The GE Healthcare CT750 HD computed tomography
  scanner scans and stores hundreds of terabytes of data.
      – This type of equipment, which features Intel’s Xeon-based SGI
        Altix UV CPU, must discern “the soft tissue and organs at almost
        a molecular level” and do so in real-time.
• Desktop and server CPUs cannot provide this type of
  performance.




Component 4                                                            21
Purpose of a Database
•   Receive data
•   Store data
•   Retrieve data
•   Provide internal security




Component 4                           22
Hierarchy and Terminology of a
                 Database




Component 4                            23

More Related Content

PPTX
Presentation on Information Privacy
PPT
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
PPTX
Chapter 05 Digital Safety and Security
PPTX
Societal Impact of Information Technology
DOCX
It seminar isr
PPTX
The Accidental Cloud: Privacy and Security Issues in a BYOD World
PPT
Security is a Culture GB v 9
DOCX
R15 a0533 cf converted
Presentation on Information Privacy
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Chapter 05 Digital Safety and Security
Societal Impact of Information Technology
It seminar isr
The Accidental Cloud: Privacy and Security Issues in a BYOD World
Security is a Culture GB v 9
R15 a0533 cf converted

What's hot (20)

PPTX
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
PPT
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
PPTX
Case study on Physical devices used in Computer forensics.
PDF
CS6004 Cyber Forensics
KEY
Cloud and mobile computing for lawyers
PPTX
Mikial Singh Nijjar | The Definition of Computer Science
PPTX
Data protection and security
PPT
PPTX
Cyber forensic-Evedidence collection tools
PPTX
computer and society impact of Computer in society
PDF
Cyber forensic readiness cybercon2012 adv j fick
PPTX
Chapter 4 2016
PPTX
Impact of computers on society
PDF
The role and impact of IT in society
PDF
20121119 Cybercrime : a basis for cyberwar ?
PDF
Information Security for Small Business
PPT
Hr Wcu General Security Awareness Training Ed01
PPTX
Module 8 security and ethical challenges
 
PDF
20140314 Belgian Senate Judicial action of police on social media
PPTX
Business ethics ppt
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Case study on Physical devices used in Computer forensics.
CS6004 Cyber Forensics
Cloud and mobile computing for lawyers
Mikial Singh Nijjar | The Definition of Computer Science
Data protection and security
Cyber forensic-Evedidence collection tools
computer and society impact of Computer in society
Cyber forensic readiness cybercon2012 adv j fick
Chapter 4 2016
Impact of computers on society
The role and impact of IT in society
20121119 Cybercrime : a basis for cyberwar ?
Information Security for Small Business
Hr Wcu General Security Awareness Training Ed01
Module 8 security and ethical challenges
 
20140314 Belgian Senate Judicial action of police on social media
Business ethics ppt
Ad

Viewers also liked (19)

PDF
Modul prak-algo
PPTX
Migration
PDF
M phil-computer-science-secure-computing-projects
PDF
Yash Technolodies
PPTX
Test Practice Sheet for 8th - Sumer
PPT
Photo Favors - Step and Repeat - Red Carpet
PDF
يوم هام للتغيير الاحد 30 سبتمبر 2012
PPTX
Examen informatica
DOC
ipekTurcanCV Eng2
PDF
2014 a29 karan_rathod
PPT
Drupalaton - Drupal and iOS
PDF
لماذا رفض قداسة البابا شنوده استقبال الوفد الامريكى للحريات الدينيه
PDF
Ti-TiO2-Complete
PPTX
Software engg lect1
PPT
Presentation health staff_wellness_call_01_16_08
PDF
يد الله غريس هالسل
DOCX
Curriculum Vitae - Loutfy H. Madkour (2)
PDF
Презентация ООО "Эдмаркет"
Modul prak-algo
Migration
M phil-computer-science-secure-computing-projects
Yash Technolodies
Test Practice Sheet for 8th - Sumer
Photo Favors - Step and Repeat - Red Carpet
يوم هام للتغيير الاحد 30 سبتمبر 2012
Examen informatica
ipekTurcanCV Eng2
2014 a29 karan_rathod
Drupalaton - Drupal and iOS
لماذا رفض قداسة البابا شنوده استقبال الوفد الامريكى للحريات الدينيه
Ti-TiO2-Complete
Software engg lect1
Presentation health staff_wellness_call_01_16_08
يد الله غريس هالسل
Curriculum Vitae - Loutfy H. Madkour (2)
Презентация ООО "Эдмаркет"
Ad

Similar to Bcc comp4 ppt1 (20)

PPTX
Quality of information
PPTX
Ch15 power point
PPTX
Feisal nanji himss 13 -- finalfinalfinal
PPTX
Internet of Things TCLG Oct 23 2014
PDF
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
PPT
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
PDF
Health Data Encryption: The Seven Principals of Privacy
PPTX
Chapter #1.pptx
PPTX
Chapter1_2018.pptxddfsdfffffffffffffffffffffffffff
PPTX
Chapter 13
PPTX
An Introduction on Design and Implementation on BYOD and Mobile Security
PPTX
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
PDF
BYOD: Device Control in the Wild, Wild, West
PPT
Kawser Hamid : ICO and Data Protection in the Cloud
PPTX
The Need for Information Security (powerpoint)
PPTX
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
PPTX
Information System.pptx
PPTX
Security & Privacy - Lecture E
PPTX
optimization and technology of something
Quality of information
Ch15 power point
Feisal nanji himss 13 -- finalfinalfinal
Internet of Things TCLG Oct 23 2014
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
Health Data Encryption: The Seven Principals of Privacy
Chapter #1.pptx
Chapter1_2018.pptxddfsdfffffffffffffffffffffffffff
Chapter 13
An Introduction on Design and Implementation on BYOD and Mobile Security
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
BYOD: Device Control in the Wild, Wild, West
Kawser Hamid : ICO and Data Protection in the Cloud
The Need for Information Security (powerpoint)
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Information System.pptx
Security & Privacy - Lecture E
optimization and technology of something

Recently uploaded (20)

PPTX
GDM (1) (1).pptx small presentation for students
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
RMMM.pdf make it easy to upload and study
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Pharma ospi slides which help in ospi learning
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Cell Structure & Organelles in detailed.
PDF
Complications of Minimal Access Surgery at WLH
PDF
01-Introduction-to-Information-Management.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Lesson notes of climatology university.
GDM (1) (1).pptx small presentation for students
Abdominal Access Techniques with Prof. Dr. R K Mishra
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Final Presentation General Medicine 03-08-2024.pptx
RMMM.pdf make it easy to upload and study
VCE English Exam - Section C Student Revision Booklet
2.FourierTransform-ShortQuestionswithAnswers.pdf
Microbial diseases, their pathogenesis and prophylaxis
Supply Chain Operations Speaking Notes -ICLT Program
Pharma ospi slides which help in ospi learning
Microbial disease of the cardiovascular and lymphatic systems
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Cell Structure & Organelles in detailed.
Complications of Minimal Access Surgery at WLH
01-Introduction-to-Information-Management.pdf
Anesthesia in Laparoscopic Surgery in India
Lesson notes of climatology university.

Bcc comp4 ppt1

  • 1. Component 4: Introduction to Information and Computer Science BCC PPT 1
  • 2. Computer Definition • According to Webster's Dictionary: one that computes; specifically : a programmable usually electronic device that can store, retrieve, and process data • Originally term applied to people Component 4 2
  • 3. Types of Computers Personal Computers • Desktop computer • Laptop/Notebook/Netbook • Tablets/iPad • Smartphones Laptop http://en.wikipedia.org/wiki/Laptop iPad © Glenn Fleishman Android Smartphone http://en.wikipedia.org/wiki/File:Android_home.png Component 4 3
  • 4. Computer Software Application Software • Application software are the programs you run • Includes – Word processors – EMR – Spreadsheets – Browsers OpenOffice Word Processor – Video Games Component 4 4
  • 5. More Components • Networks – Allow computer to connect to others and to Internet – Hardware: network ports, connections, routers – Software: OS and NOS • Databases – Collection of data easily stored and retrieved – Hardware: server (computer and storage) – Software: DBMS Component 4 5
  • 6. Computer Software and Hardware • Software is the interface between the user and the computer • Without meaningful, easy to use applications, people wouldn't use computers • If the hardware is slow, people won't use the applications • Important to get a good balance Component 4 6
  • 7. Early Electronic Medical Records • At this time, early EMRs were developed • Dr. Morris Collen began storing patient data at Kaiser Permanente in the late 1960s • COSTAR was developed at Massachusetts General in 1968 • Health Evaluation through Logical Processing (HELP) was started at LDS Hospital in 1967 • The concepts and plans that eventually became VA VistA were developed in 1970s Component 4 7
  • 8. Electronic Medical Records • Become more pervasive in the 1990s • In 1996, HIPAA was passed establishing rules for accessing and storing electronic medical records • By 2000, 16% private physicians, VistA screenshot < 10% hospitals used EMRs • By 2005, 25% private physicians used EMRs Component 4 8
  • 9. Since Then… • Personal Data Assistants introduce hand held computing – Smartphones replace PDAs • Wireless networks are widely available – Mobile computing is now pervasive • Social networking sites connect people • Computers and the Internet are ubiquitous • HITECH Act passed in 2009 to provide incentives for EMR use starting in 2011 Component 4 9
  • 10. The Future? • Computing technology will continue to become faster, more powerful and smaller • Mobile and cloud computing are hot topics • More ubiquitous? • More embedded computers? • Difficult to say for sure… Cloud Computing Diagram Component 4 10
  • 11. Internet Security and Privacy Concerns • Why be concerned about Internet Security?  Your personal data is always at risk when connected to the Internet, regardless of connection type.  Checking account may be drained before you can act.  Credit may be destroyed if personal data stolen (and impersonated).  Corporate secrets may be stolen and sold to competitors. Component 4 11
  • 12. Everyone’s Online Today • Information Overload  When debit cards emerged, many people refused to use them because of privacy and security concerns.  People today are very comfortable with online banking and are comfortable conducting business over the Internet. • Social networking sites facilitate sharing  People are comfortable sharing personal information in online communities even though this subjects them to privacy invasion.  Posting your birth date, mother’s maiden name, etc. may enable an attacker to impersonate you. Component 4 12
  • 13. What is Privacy? • Most privacy law revolves around privacy between a person and the government. • According to Wikipedia, “The law of privacy regulates the type of information which may be collected and how this information may be used and stored.”  i.e., privacy relates to people. Component 4 13
  • 14. What is Confidentiality? • Not the same as privacy. • According to Wikipedia, “Confidentiality is commonly applied to conversations between doctors and patients. Legal protections prevent physicians from revealing certain discussions with patients, even under oath in court. The rule only applies to secrets shared between physician and patient during the course of providing medical care.”  i.e., confidentiality relates to data. Component 4 14
  • 15. Federal Rules Emerge • HIPAA (Health Insurance Portability and Accountability Act) was enacted in 1996 by the federal government. • HIPAA requires that health care providers and health insurance companies as well as care clearinghouses (organizations that translate claims data into and out of HIPAA-standard format) abide by privacy and security standards. Component 4 15
  • 16. HIPAA and Privacy • Privacy Rule  HIPAA requires those covered by the act to provide patients a “Notice of Privacy Practices” when care is first provided.  The Privacy Rule covers paper and electronic private health information. • Security Rule  Covers administrative, physical, and technical data safeguards that secure electronic health record data. Component 4 16
  • 17. Free Online PHR Systems Readily Available • PHRs are maintained by individuals. • Some PHRs are not covered by HIPAA rules. • Resources:  Google Health - www.google.com/health/  Microsoft HealthVault - www.healthvault.com/  WebMD Health Manager - http://www.webmd.com/phr Component 4 17
  • 18. EHRs Used by Health Care Providers • EHRs are maintained by health care providers. • EHRs are covered by HIPAA rules. • EHRs utilize centralized database systems to integrate patient intake, medical care, pharmacy, billing, etc. into one system. • Departments/entities may not be in same physical location, so patient data must travel over the Internet. • People can view their own health record, taking ownership of its contents, ensuring accuracy, etc. Component 4 18
  • 19. EHR Security Q & A • How is my data sent over the Internet?  It is to be sent in an encrypted, secure manner over the Internet. • Is my data safe? • Much depends on each organization’s physical record and network security practices. • No data is 100% secure against theft or misuse. • Who can view my health records?  Only those who need to know or view the contents of your health record should be able to view it.  You must authorize all other access. Component 4 19
  • 20. Putting it All Together • A computer system is made up of the hardware (including the CPU, RAM, and I/O devices) and operating system (OS) software installed on a computer. – Examples of devices that contain an OS include cell phones, PDAs, robots/robotic devices, routers, switches, laptops, and computers (desktops, servers, and Web servers). • An OS is made up of thousands of computer programs that securely manage how hardware interacts with non OS – or “application” – software installed on the computer. – Google Earth is application software, which is a free program that a user can install on a computer. – Microsoft Word is a commercial application in the Microsoft Office suite of programs. Component 4 20
  • 21. Specialized Health Care CPUs • Medical imaging done in CT and MRI scans require specialized architectures. • The GE Healthcare CT750 HD computed tomography scanner scans and stores hundreds of terabytes of data. – This type of equipment, which features Intel’s Xeon-based SGI Altix UV CPU, must discern “the soft tissue and organs at almost a molecular level” and do so in real-time. • Desktop and server CPUs cannot provide this type of performance. Component 4 21
  • 22. Purpose of a Database • Receive data • Store data • Retrieve data • Provide internal security Component 4 22
  • 23. Hierarchy and Terminology of a Database Component 4 23

Editor's Notes

  • #3: Computers, by definition, are very general and include most electronic devices. Far more broad that just your desktop or laptop. Historically, the term referred to people who performed computations. As mechanical and then electronic computers were developed and used, the term no longer has been used for people. Image from http://arcweb.archives.gov/arc/action/ExternalIdSearch?id=552357&amp;jScript=true
  • #4: The first computers were extremely large and expensive—were developed by the government, universities and industry. In the 1970&apos;s, computers for personal use were introduced. These were used by businesses, too, and eventually become commonplace by the 1980s and 90s. Desktop computers were the first personal computers; then laptops were introduced. Notebooks and netbooks are basically smaller, lighter laptops. Tablet computers have touch screens and are usually small and light. The iPad is the latest tablet computer. Today, personal computing has become even more ubiquitous with the advent of mobile computing and smartphones. Initially mobile phones weren&apos;t considered to be personal computers, but now, smartphones have functionality and systems similar to personal computers—operating system, large memory, significant storage, network connectivity, applications (apps). Personal computers are becoming faster, more powerful and smaller as technology progresses. Ipad image from http://commons.wikimedia.org/wiki/File:IPad-02.jpg
  • #5: Applications are what make computers fun for most users. They are the reasons we use our computers for work, social networking and play. There are so many applications available it&apos;s impossible to list them all. Image from http://en.wikipedia.org/wiki/File:OpenOffice.org_Writer.png
  • #6: There are still other parts of a computer that could be considered &amp;quot;components&amp;quot;. These two are used on many computers and are a combination of both hardware and software. Networks connect to other computers and to the Internet. There are hardware ports on PC&apos;s to do this; cables connect PC&apos;s to routers and other network connections. The OS of the computer and the Network OS of the network are what make the network work. Databases are often parts of large applications. You may not have one on your PC, but you may connect to one, especially online. Databases require a server, which is a computer with a large amount of storage, along with a DBMS to make it work. Databases store data in such a way that it&apos;s quickly and easily stored and retrieved (much faster than a flat file or a spreadsheet).
  • #8: COSTAR is still in use today. Reminds physicians of clinical guidelines. HELP provides decision support, such as the automated antibiotic consultant. Helped physicians prescribe antibiotics more effectively and appropriately, reduced doses, cost and adverse events. VistA still in use today; public domain. Was first to use a graphical user interface.
  • #9: As these advances in computing were happening, Electronic Medical Records (EMRs) got their foothold. More versions of them were developed. They became more user friendly with the addition of Graphical User Interfaces. HIPAA (Health Insurance Portability and Accountability Act) included provisions for establishing standards for electronic medical records.
  • #11: What&apos;s in store for health care technology?
  • #12: A current hot topic is smartphone security. If you lose your phone, could the finder access your finances? Is your phone encrypted? Can it be ‘remote erased’ if lost?
  • #14: Wikipedia, Online: http://en.wikipedia.org/wiki/Privacy_law, 2010. Information about privacy law. Retrieved: July 6, 2010.
  • #15: Wikipedia, Online: http://en.wikipedia.org/wiki/Confidentiality, 2010. Confidentiality. Retrieved: July 6, 2010.
  • #16: Wikipedia, Online: http://en.wikipedia.org/wiki/Hipaa, 2010. Information about HIPAA. Retrieved: July 6, 2010. Joy Pritts, HHS. Internal Privacy and Security Memo: June 1, 2011.
  • #17: Governs who views data, how data is transported electronically, security measures, etc.
  • #18: A PHR is a Personal Health Record. Note that this term is different than what you usually hear: EHR, or electronic health record.
  • #19: Patient data must travel over the Internet, such as when a doctor’s office bills an insurance company. HIPAA is the Health Insurance Portability and Accountability Act of 1996 (including subsequent amendments). Healthcare providers, healthcare clearinghouses, and health plan providers are subject to federal rules governing security and other rules related to electronic health records. The primary federal rule governing EHRs is known as HIPAA [hip-uh]; HIPAA being the “Health Insurance Portability and Accountability Act” of 1996, including its subsequent amendments. Organizations that must adhere to HIPAA rules are called “covered entities.” Data in EHRs are also subject to HIPAA rules when they are maintained by covered entities. Google Health, a free, online, electronic, personal health record, offered by Google, is not a covered entity. Data you enter in Google’s health record system are not protected by HIPAA rules.