HITEQ Health Center Behavioral Health Integrator Badge
Health centers are increasing the integration of behavioral health in primary care, spurred by an increased focus on whole person care and additional funding. Effective use of health IT in conjunction with patient privacy and confidentiality is imperative to support behavioral health.

According to the Office of the National Coordinator, "Health information technology can help to improve behavioral health care and can further enable care coordination and integration, increase information sharing, and support prevention, treatment, and recovery activities. Access to and the exchange and use of behavioral health information as part of routine care can help to improve continuity in care services and support efforts toward achieving an interoperable health care system across the continuum."

Take some time to read through some of the articles on this page and then fill out the submission form on the right and you will be rewarded with a Health Center Incredible Behavioral Health Integrator badge! This is an official badge that is submitted by the HITEQ Center as a proof of completion to the blockchain. Your credentials can be added to profiles such as LinkedIn and verified through accreditation services such as Accredible and Open Badge.

https://hiteqcenter.org/Services/Badges-Self-paced-Learning/Behavioral-Health-Integrator

 

Interoperability Readiness Scorecard

HITEQ Center, July 2023

Molly Rafferty 0 2489

Many health centers struggle to reap the benefits of technological advancement and investments in health information technology (health IT), while others embrace them and reap rewards. Interoperability is one such example; requiring health centers assess systems, relationships, and implementation.

There are keys to successful interoperability implementation for which health centers must develop processes, stand up infrastructure (within the system, internally and externally, and organization), and then take action.

Process refers to structured processes, policies, and procedures within the health center.

Infrastructure refers to structural capacity and ability within the health center’s technology and staffing structure.

Action refers to full implementation to the point of active and ongoing use and engagement.

This scorecard encourages health centers to consider their processes, infrastructure, and action in a number of key areas. Each area key to interoperability are to be self-graded on a scale of 1 through 5, where 1 is poorly or not yet developed and 5 is well developed. Health centers can also use this to guide discussions and monitor progress over time.

Security Risk Analysis Toolkit

A resource from the Office of the National Coordinator

HITEQ Center 0 21985

A well-done security risk assessment (SRA) will identify security vulnerabilities across the breadth of a healthcare organization's health information systems. Factors will include policy, organizational and technical related requirements to privacy and security measures. ONC, in recognizing the complexity of this task for small to medium healthcare providers developed a toolkit to assist in conducting SRAs.

How to Establish an Ongoing Security Program and Meet Meaningful Use Requirements for Security Risk Analysis

An SRA brief for Health Centers

HITEQ Center 0 13027

In order to comply with the Security Rule of the Health Insurance Portability and Accountability Act (HIPAA), you need to maintain an ongoing security program. The HIPAA Security Rule mandates security standards to safeguard electronic protected health information (ePHI) maintained by electronic health record (EHR) technology, with detailed attention to how ePHI is stored, accessed, transmitted, and audited. This rule is different from the HIPAA Privacy Rule, which requires safeguards to protect the privacy of protected health information (PHI) and sets limits and conditions on the use and disclosure of PHI. 

RSS
Interoperability Readiness Scorecard

Interoperability Readiness Scorecard

Many health centers struggle to reap the benefits of technological advancement and investments in health information technology (health IT), while others embrace them and reap rewards. Interoperability is one such example; requiring health centers assess systems, relationships, and implementation.

There are keys to successful interoperability implementation for which health centers must develop processes, stand up infrastructure (within the system, internally and externally, and organization), and then take action.

Process refers to structured processes, policies, and procedures within the health center.

Infrastructure refers to structural capacity and ability within the health center’s technology and staffing structure.

Action refers to full implementation to the point of active and ongoing use and engagement.

This scorecard encourages health centers to consider their processes, infrastructure, and action in a number of key areas. Each area key to interoperability are to be self-graded on a scale of 1 through 5, where 1 is poorly or not yet developed and 5 is well developed. Health centers can also use this to guide discussions and monitor progress over time.

Security Risk Analysis Toolkit

Security Risk Analysis Toolkit

A well-done security risk assessment (SRA) will identify security vulnerabilities across the breadth of a healthcare organization's health information systems. Factors will include policy, organizational and technical related requirements to privacy and security measures. ONC, in recognizing the complexity of this task for small to medium healthcare providers developed a toolkit to assist in conducting SRAs.

How to Establish an Ongoing Security Program and Meet Meaningful Use Requirements for Security Risk Analysis

How to Establish an Ongoing Security Program and Meet Meaningful Use Requirements for Security Risk Analysis

In order to comply with the Security Rule of the Health Insurance Portability and Accountability Act (HIPAA), you need to maintain an ongoing security program. The HIPAA Security Rule mandates security standards to safeguard electronic protected health information (ePHI) maintained by electronic health record (EHR) technology, with detailed attention to how ePHI is stored, accessed, transmitted, and audited. This rule is different from the HIPAA Privacy Rule, which requires safeguards to protect the privacy of protected health information (PHI) and sets limits and conditions on the use and disclosure of PHI. 

Security 101: Security Risk Analysis

Security 101: Security Risk Analysis

From the ONC YouTube website:

HIPAA requires practices to assess their PHI as part of their risk management process. Learn more about a risk assessment and how your practice can benefit.

RSS

Badge Submission Form