ONC-ACB Certification ID: 15.04.04.2705.Crit.04.00.1.191111 | Certification Date: Nov 11, 2019
4 Benefits of User Rights and Responsibilities

4 Benefits of User Rights and Responsibilities

With the increased use of technology, data security has become of paramount importance to software development. The use of electronic health records (EHR's) in the medical field has demanded that patient and practice information is not only secure from external people but also from system users within the practice itself. One of the great characteristics of any EHR software is the ability to give users specific rights which align with their responsibilities within the software to maintain the required level of security.

There are many benefits of assigning user rights and responsibilities. In this blog post, we will highlight the top 4:

1. Patient Medical Information is Secure

When a patient visits a health care provider, they are trusting that their information is being protected from anyone who should not have access to it, this may include staff within the practice. This information can include patient progress notes, lab results, and user data who is also a patient at the practice. Within any EHR software, practice administrators should be able to limit which staff member or user group can have access to patient health information. This allows providers to ensure privacy and security of this confidential data.

2. Practice Reporting Information is Not Accessible to All Users

The ability to limit access to financial and system reporting is another key benefit of assigning user rights and responsibilities. Providers who use the software for billing may not want all users to have the ability to check their daily totals or other financials relating the practice. They may also want to limit users access the Meaningful Use and other reports relating to the patient diagnosis. By limiting access to different reports, you will protect your practice’s financials and system data.

3. Only Authorized Users Can Make Changes to the Software

Another important right is the ability to make changes in the actual software that may affect all users. A great example of this is a practice that may want limit who is able to add and change users’ rights in the software, as well as any set preferences that may affect the outcome of the documentation of a visit. This right ensures that only authorized users can make changes such as editing procedures, test codes, and more.

4. Select Authorized Users can be Assigned to Certain Patients

In 2016, a major music star was checked into a hospital and within a short time several internal staff members had accessed their information and leaked it to the press. This story highlights the importance of assigning user rights and responsibilities to ensure health information is only available to the appropriate staff members. Giving select users exclusive rights to certain patients allows for added privacy of patients who may be considered VIP, and also allows for accountability should information be leaked.

Assigning user rights and responsibilities is an important feature in any EHR software. This will allow your practice to maintain the highest quality of care, compliance, and security.

 

For questions or information on assigning user rights and responsibilities with Criterions EHR software, reach out using the form below!

3 Benefits of An Integrated Inventory Tracking Solution

3 Benefits of An Integrated Inventory Tracking Solution

If you are a provider that sells supplies or other products to your patients, you know that keeping track of inventory is important to your bottom line. It is crucial to have an accurate count of your inventory so that you are able to provide patients with the correct resources for treatment, however, manually tracking inventory can be a hassle.

With an inventory tracking solution that integrates with your EHR software, your practice will see increases in efficiency and patient satisfaction. Here are 3 key benefits of an integrated inventory tracking solution:

 

1. Increase Efficiency for Administrative Staff

      • Your Admin team can easily set products and add stock to system to ensure an accurate inventory profile.
      • Office staff can quickly locate previous orders in the system to offer patients products and solutions that are right for them.
      • By having an accurate view of available inventory at the counter, opportunities for additional sales will increase.

2. Easily Track All Products Sold

      • You can easily track a variety of inventory including DME, medications, and over the counter products.
      • As you sell products, your inventory will reflect the current supply on hand. This will help you manage inventory levels.
      • You will be able to see comprehensive tracking of items prescribed during a visit.

3. Avoid Running Low on Inventory

      • By tracking all inventory, you will be able to see which products or supplies you may need to replenish. This helps increase visibility of current stock.
      • Gain insights on inventory by analyzing reports available through your software.

By integrating your inventory tracking with your EHR software, your practice can increase sales, easily track products sold, and avoid running low on product. To learn more about the benefits of an integrated inventory tracking solution, contact us buy completing the form below!

Why your Office Should be Using Multi-Factor Authentication (MFA)

Why your Office Should be Using Multi-Factor Authentication (MFA)

Multi-Factor Authentication is a process that is used to verify a user’s identity by using a second method of authentication in addition to the username and password. After a user logs in using their regular credentials, the system will send a one-time password to the user’s registered device, often via SMS or email. Experts agree that the simplest, single most effective step users can take to protect their accounts is to add MFA to the login process. When your office enables MFA, a crucial layer of security and protection is added.

Aren’t passwords secure enough?

Creating strong, unique passwords is a one step towards ensuring that nobody else can access your secure account. Unfortunately, users often create weak passwords and re-use the same passwords across multiple accounts. Because of this, password theft continues to be an ever-increasing concern in the digital world. Take a look at the following alarming statistics compiled by Panda Security:

  • According to Verizon, 80% of hacking-related breaches are linked to passwords.
  • 4 out of 10 Americans have had their personal data compromised online. Of those, 47% have lost money as a result.
  • 66% of Americans use the same password across multiple online accounts.
  • The healthcare industry had the highest average cost of a data breach in 2020 at $7.13 million.

Do any of your employees connect remotely?

Due to the Covid-19 pandemic, the world has seen a sharp increase in employees working remotely. According to a PricewaterhouseCoopers global survey published in September 2020, over half of the companies that were surveyed had arrangements for employees to work remotely with 80% of those companies expecting this arrangement to become the norm by the end of the pandemic. With the increased number of people connecting remotely, authenticating the credentials of all users is more critical than ever. Using MFA at your office will ensure safety of your company’s important information.

Do I really need to enable MFA on my system?

In a 2019 blog post, Microsoft manager Alex Weinert stated, “Based on our studies, your account is more than 99.9% less likely to be compromised if you use MFA.” According to Google’s Security Blog, adding a two-step verification through SMS text message can stop 100% of automated bots, 96% of bulk phishing attacks, and 66% of targeted attacks.

This additional, easy step ensures that the user logging in is the correct, authenticated user. Even if a user’s credentials are hacked, this extra verification process will ensure that the hackers will still not be able to gain access to their system. Best of all, this additional layer of security only takes a few seconds to implement. Instead of having to buy external additional devices or complicated security systems, MFA technology makes use of resources that users already have access to such as their cell phones and email addresses.

 

We strongly encourage all Criterions users to protect their accounts with Multi Factor Authentication. Please contact support@criterions.com with any questions or complete the form below.

Request a Demo!