Nt1310 Unit 4 Thr

Decent Essays
Complete Name: Unit 4 Student Name: Davidson, Amber Nicole

**********************************************************************************************************
1. Name at least four things checked for in a DUR.

Student Answer: When a physician is writing an electronic prescription, they must select the drug and enter the SIG information. The EHR system scans the patient's chart for any known alergies. past and current diagnoses, and a list of your current medications. The information is then passed to a drug utilization review (DUR) program that compares the prescriptions to a database of most common known drugs, The database includes prescription drugs as well as over-the-counter drugs, and even herbal supplements and vitamins
…show more content…
It can also have information on physicians, medical staff, and facility employees. The MPI is typically a computerized system intended to prevent duplicate registrations for the same patient. It takes key identifying facts from patient demographic information. This information includes the patient's full name, date of birth, gender, and social security number. A list is created of all the patients that are registered anywhere in the health care facility. Registration clerks can see if the patient is already registered and avoid creating duplicate records in the system by checking the MPI first (Garlee, 201).What is the purpose? It provides a clear and complete view of the patient demographics that a health care organization is working with. MPIs ensure that every patient is represented only once, and with constant demographic identification, within all systems of hospital data. By being organized, hospitals and clinincs can provide more efficient and accurate care for their patients.ReferenceGarlee, R. (2011). Health Information Technology and Management. Prentice

Related Documents

  • Decent Essays

    Nt1310 Unit 5 Lab 3

    • 441 Words
    • 2 Pages

    Jonathan Desmond DCN Lab 5 Kali Kali is a live Linux distribution which can be put onto a USB and loaded directly onto a computer. Kali, having being bundled with a variety of testing tools such as Wireshark and Metasploit Framework, is utilized to assess the security of a target machine. The creator of Kali, Mati Aharoni first thought of the idea during a consultation which banned the use of external hardware as well as the stipulation that client computers could only be used if the data remained untouched. He then thought to use a live Linux distribution to assess the client’s security flaws.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    In the case of the State of Washington’s EDIE database, information technology and systems support helped in managing the EDIE data. It organized, stored, assessed, analyzed, and interpreted patient data whenever they visited the Emergency room. The data in the EDIE database became information and then knowledge to physicians which supported them in making fast decisions on patients admitted to the emergency room. Thus, having a well-managed database puts an organization at a competitive advantage. The emergency visits dropped as well as substantial amount of the state’s Medicaid costs.…

    • 284 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Unit 4

    • 545 Words
    • 3 Pages

    IV. EXPERIMENTAL RESULTS We validated the effectiveness and the advantages of our proposed design by testing both hardware and software. We have divided the validation process in two steps: 1) validating the Microcontroller based dispensing unit and 2) Tracking patient’s adherence to the prescribed medication from the server in two ways a) tracking by central nursing stuff when used within hospital b) tracking by patient’s care taker when used within house.…

    • 545 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Nt1330 Unit 3

    • 1174 Words
    • 5 Pages

    Secure Shell (SSH) In this paper, I will discuss the network protocol Secure shell, better known as SSH. Interest in choosing this protocol came from my frequent use of SSH to run applications on the remote servers in Coover Hall. Because of this, I will be exploring the details on how the protocol works, vulnerabilities associated with it and mitigation techniques put in place to counter attacks. SSH is a Cryptographic Network Protocol created to replace Telnet.…

    • 1174 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    Nt1310 Unit 4

    • 239 Words
    • 1 Pages

    Unclear points: 1. What is the purpose of F.2 in the context? 2. Why the rpm of 46, 48 were used, and the 48 rpm was chosen during the validation check? 3.…

    • 239 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 3

    • 271 Words
    • 2 Pages

    -------------------------------------------------------------------------------- Security ( show explanationhide explanation ) This is a public or shared computer Select this option if you are connecting from a public computer. Be sure to log off and close all browser windows to end your session.…

    • 271 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 7

    • 1149 Words
    • 5 Pages

    1. Focus on the overall “security assessment” risk rating that appears at the top of your report. Considering what security measures you (or the computer owner) have undertaken for your computer, does the assessment surprise you? Why or why not? What measures should you plan to undertake if the green checkmark did not appear?…

    • 1149 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 4

    • 672 Words
    • 3 Pages

    Response / Analysis 3 Directions: READ the Directions. Answer the question(s) below in 500-750 words. Enter your answer onto this document; once you are done, upload this document to D2L. Do NOT change the font, font size, or margins. Margins are set at 1” right, 1” left, 1” top, and 1” bottom. Font is Calibri and font size is 12.…

    • 672 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The program will also allow for the agency to keep track of patient visit listing where, when and what they reason(s) for office or ER visits. For example, if a patient presented in the doctor’s office and had lab work as well diagnostic testing and then return two days later, thus saving time and money by avoiding repeating blood work unless there is a need due to changes in diagnosis. It increases the quality of care as far as waiting time and even possibly can avoid hospital…

    • 735 Words
    • 3 Pages
    Improved Essays
  • Great Essays

     The patient leaves the medical facility.  The staff scans all documentation into the computer.  Patient records are ready for billing and sending to the proper insurance company.  Scan medical records are faster and easier to locate.…

    • 973 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Mc4 Unit 4 Paper

    • 505 Words
    • 3 Pages

    One may produce population health and wellness reports. You can ensure costly tests, labs, and scans are not lost and needlessly duplicated. Interoperability ensures records can be accessed at any Medical Treatment Facility (MTF) worldwide. The security systems surrounding it prevent unauthorized access and protects from loss due to natural or man-made disasters.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In addition, the newly formed MPI MCO-SIU Liaison Program will incorporate a new team-approach to collaborating with MCO-SIU’s in terms of monitoring and tracking cases referred by the MCO-SIU’s as well as regularly collaborating on the latest advances in addressing issues of fraud, waste and abuse regarding Medicaid. This includes the identification of new trends, schemes, and activities which are identified as conducive to fraud, waste, and…

    • 585 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Your information is available in case there is an emergency and you can’t explain your health history at the time. The care provider can find your health records easier than trying to find out from you if you can’t talk. Your information is stored in an electronic form to keep it safe and protected in case of a disaster, like a hurricane or F5 tornado. When using electronic records you can see who accessed, when it was accessed, and why your record was accessed. Having this access to information on your health record helps enforce laws and regulations governing access.…

    • 1561 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    The committee on professional development of AHIMA states that health information management (HIM) professionals are responsible for improving “the quality of healthcare by insuring that the best information is available for making any healthcare decision” by managing healthcare data and information resources (Zeng, MD, PhD, Reynolds, EdD, RHIA, & Sharp, MBA, RHIA, 2009) . Explain policies and standards that govern health IT Health information technology (health IT) involves the exchange of health information in an electronic environment. According, to the U.S. Department of Health & Human Services (HHS) the widespread use of health IT within the health care industry will improve the quality of health care, prevent medical errors, reduce…

    • 274 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    There are two versions of MPI. The first is automated MPI’s which is used on computers and consistent of a database that identified data about the patient and the service of care that they received at any…

    • 390 Words
    • 2 Pages
    Improved Essays