|COMPUTER technology BY DAVID M. OATWAY, RN|
There’s an electronic signature in your future
| One key technology that the Centers for Medicare & Medicaid Services (CMS) needs before moving toward an electronic-record environment is the electronic signature, allowing providers to sign off on healthcare records electronically. Although there are no current mandates for this to happen in long-term care, you will inevitably hear about this technology and probably need to give it some informed thought in the near future. So, what are the implications of the electronic signature, and how will you know one the next time a vendor says he has one?|
At this time there are no universally accepted rules regarding the use or required characteristics of electronic signatures in healthcare settings. The Department of Health and Human Services is required by the Health Insurance Portability and Accountability Act (HIPAA) to develop standards for electronic signatures, but has retracted its initial proposal. There is no federal rule regarding the use of electronic signatures for nursing home care except for a memo dated January 13, 2005, that references the electronic signature rule for hospitals. The memo permits the use of electronic signatures for MDS forms even if the facility does not maintain a completely electronic record.
There are other potential uses for electronic signatures on the horizon. For example, healthcare information can be viewed as operational data that need protection, as would documents that will be used outside the institution such as claims, attachments, orders to vendors (such as laboratory and pharmacy), and other business uses. In addition, some internal documents need authentication by nonemployees, such as residents and family members. Physicians will also need to be able to authenticate notes and orders (although they would resist having a different process for the nursing facility than they use in the rest of their practice).
Implementing Electronic Signatures
An example: Magee-Womens Hospital of University of Pittsburgh Medical Center is seeking to test all women who had pap smears at the facility between 1995 and 2001 because of a lawsuit by hospital pathologists who claim that they never reviewed the results to which their electronic signatures had been affixed. There are liability issues since the records cannot be validated as having been read by a pathologist. What might the consequences be if it can be proved that a patient suffered poor consequences of a health condition as the result of a poorly designed computer system?
We propose that the proper test of compliance is to assume that a record will be used in a court proceeding and will be subject to analysis by sophisticated forensic data experts who will have full access to the system generating the records. This is an excellent reason why clients should receive assurances that the facility’s electronic signature implementation meets the applicable known standards, not just marketing hype.
Implementation of the Electronic Signature
Before an electronic signature is applied, the responsible clinician must have the opportunity to review the document he or she will be signing. Once an entry has been signed, the system must not allow the initial signed entry to be changed. Correction must be by way of an addendum, with an indicator that the original data have been corrected. Passwords, certificates, or other means of identifying individuals must be kept secure.
Data contained in an operational clinical database could be maintained in an intermediate state with the date/time of creation and the identity of the recorder. Data in this format would be editable and would not be considered a signed document. Its status could change to “signed” upon review by the signer and evidence of explicit intention to sign the document, preferably through use of the signer’s private key.
Clinical entries would thus have to have several levels of finality: draft, final, signed, co-signed, corrected (with an indicator of this), and deleted.
These levels will all have to be managed and the process made defensible to forensic data experts.
Emergency procedures to recover data when the individual who signed the data is not available should be developed. People do forget, lose tokens, leave the institution, or become unavailable to supply information that would ordinarily be needed to complete transactions.
Check Your Vendor
David M. Oatway, RN, a long-term care IT consultant based in Key West, Florida, was the Department of Defense Project Officer for the initial clinical requirements phase of the Composite Health Care system (CHCS-I). He worked with HCFA/CMS on the Prospective Payment System for SNFs and contributed to the development of MDS 2.0. He developed one of the first clinical/MDS systems (CHAMP). He is the Chair of the Healthcare Information and Management Systems Society (HIMSS) Long Term Care and Post Acute Special Interest Group and a member of the American Health Information Management Association (AHIMA) and the Health Level Seven (HL7) organization. He was the vice-chair for the American Association of Nurse Assessment Coordinators. To send your comments to the author and editors, e-mail firstname.lastname@example.org. To order reprints in quantities of 100 or more, call (866) 377-6454.
|NOTE: This document is a summary and analysis of the standards, rules, and practices in effect as of September 2005. This document is not intended to be and cannot be relied on as legal advice.|
Topics: Articles , Technology & IT