Claims
- 1. In a system that includes a computer device, a method for managing data in compliance with regulated privacy, security, and electronic transaction standards, the method comprising the steps for:
receiving a request for information through a single point of entry; retrieving the requested information; assembling a report, wherein the report includes at least one of:
(i) the request; (ii) the requested information; and (iii) an audit trail; and transmitting a copy of the report to the requestor.
- 2. A method as recited in claim 1, wherein the request is an authenticated request.
- 3. A method as recited in claim 1, further comprising the step for determining whether patient authorization exists for responding to the request.
- 4. A method as recited in claim 3, wherein if patient authorization has not been obtained, performing the step for obtaining patient authorization to provide the requested information.
- 5. A method as recited in claim 4, wherein the copy of the report includes patient specific information.
- 6. A method as recited in claim 1, further comprising the step for determining whether to provide de-identified information in response to the request.
- 7. A method as recited in claim 6, wherein if de-identified information is to be provided, performing the step for de-identifying the information requested.
- 8. A method as recited in claim 4, wherein the copy of the report includes de-identified information.
- 9. A method as recited in claim 1, further comprising the step for selectively performing a review of the report.
- 10. A method as recited in claim 1, further comprising the step for selectively encrypting the report.
- 11. A method as recited in claim 1, further comprising the step for selectively archiving the report.
- 12. A method as recited in claim 11, wherein the report is archived for a period of time set by a regulation.
- 13. A system for managing data in compliance with regulated privacy, security, and electronic transaction standards, the system comprising:
a computer system comprising:
a single point of entry that is configured to selectively receive a request for personal information, and a single point of exit that is configured to selectively provide a report in response to the request; and at least one data source in communication with the computer system, wherein the at least one data sources comprises at least a portion of the requested information.
- 14. A system as recited in claim 13, wherein the computer system includes an interface engine.
- 15. A system as recited in claim 13, wherein the request is an electronic request.
- 16. A system as recited in claim 13, wherein the report includes at least one of:
(i) the request; (ii) the requested information; and (iii) an audit trail;
- 17. A system as recited in claim 13, wherein the at least one data source includes at least one of:
(i) medical information; (ii) financial information; and (iii) academic information.
- 18. A computer program product for implementing within a computer system a method for managing data in compliance with regulated privacy, security, and electronic transaction standards, the computer program product comprising:
a computer readable medium for providing computer program code means utilized to implement the method, wherein the computer program code means is comprised of executable code for implementing the steps for:
receiving a request for information through a single point of entry; retrieving the requested information; assembling a report, wherein the report includes at least one of:
(i) the request; (ii) the requested information; and (iii) an audit trail; and transmitting a copy of the report to the requester.
- 19. A computer program product as recited in claim 18, wherein the computer program code means further comprises executable code for implementing the steps for:
determining whether patient authorization exists for responding to the request; and if the patient authorization does not exist, obtaining patient authorization to provide the requested information.
- 20. A computer program product as recited in claim 18, wherein the computer program code means further comprises executable code for implementing the steps for:
determining whether to provide de-identified information in response to the request; and if de-identified information is to be provided, de-identifying the requested information.
- 21. A computer program product as recited in claim 18, wherein the computer program code means further comprises executable code for implementing the step for selectively encrypting the report.
- 22. A computer program product as recited in claim 18, wherein the computer program code means further comprises executable code for implementing the step for selectively archiving the report.
- 23. A computer program product as recited in claim 18, wherein the computer program code means further comprises executable code for implementing the step for archiving the report for a period of time set by a regulation.
RELATED APPLICATIONS
[0001] This application claims priority to U.S. Provisional Patent Application Serial No. 60/380,679 filed May 15, 2002, entitled MANAGING DATA IN COMPLIANCE WITH REGULATED PRIVACY, SECURITY, AND ELECTRONIC TRANSACTION STANDARDS.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60380679 |
May 2002 |
US |