A VNA Maintains Patient Privacy and Security – Understanding the Requirements that Make Up a VNA #HealthIT #Healthcare

A VNA Maintains Patient Privacy and Security

A VNA needs to support audit trails in a manner that is easy accessible and retrievable. Authorization rules are typically provided by a different application but could also be part of the VNA. This also satisfies legal concerns, as it can be proven that a certain physician retrieved a particular case. Instead of each device keeping these audit trails in a semi-proprietary manner, it makes the life of a system administrator much easier if this information is updated and maintained in a central location, in a standard format as specified by IHE in its ATNA profile definition.

Data integrity is also critical, which is why some vendors implement digital signatures to make sure that alterations can be detected.

Lastly, there are some institutions that require non-volatile media like magneto-optical devices or other write-once media, for their long-term archiving. This is because the information on rewritable media such as RAID’s could be compromised by viruses or other malicious software. It is not possible if the data is burned to a medium that is not erasable and cannot be modified.

  • A VNA needs to support audit trails
  • Authorization rules could be provided by the VNA
  • Data integrity is critical
  • Digital signatures are sometimes implemented to detect alterations
  • Some institutions require non-volatile media for long-term archiving

For more information about developing a Vendor Neutral Architecture, the VNA Institute of Technology, or to enroll for CPHIMS (CE) Continuing Education Hours, visit http://www.vnait.org.For information about TeraMedica, visit: http://www.teramedica.com


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: