Healthcare Technology

Essay by lnyoungUniversity, Master'sA-, January 2007

download word file, 4 pages 3.7

Healthcare technology managers have to consider a number of requirements, constraints and objectives when choosing a healthcare technology system. John Quinn reviewed a number of these requirements in his article. One requirement consideration is its compliance with the HIPPA regulations. The U.S. Health Insurance Portability and Accountability Act of 1996 stipulate that certain requirements must be incorporated into clinical transformation systems. HIPAA compliance is more than just a regulatory issue; it is a business driver and an opportunity to implement increased efficiencies. Another requirement that should be addressed is connected to the HIPPA requirement. This is the consideration used in providing a secure system. To better understand the complexity of these requirements, we can apply it to a particular system used in the medical field.

Today there is an increase in wireless technology in hospitals. One of the devices used today is a point of care device. The most helpful point of care technology introduced to the industry has been the Personal Data Assistant.

In general, wireless computing technology allows caregivers to access, update, and transmit critical patient and treatment information using radio signals instead of hardwired systems or paper-based records allows for increased efficiency and patient safety. This technology has allowed providers to code patient encounters, streamline patient scheduling, and make medical records more accessible to providers. There are plenty of reasons to be excited about the advent of this point-of-care (POC) device. I will enhance patient safety and streamline healthcare delivery by giving physicians and other healthcare workers "anytime-anywhere" access to stores of patient information. But the huge promise of POC devices creates new challenges for healthcare technology managers. The challenge is in creating a secure, integration-friendly environment that easily facilitates the deployment of these devices.

POC devices use, and may originate, some of the data elements and...