Thank you, Madam Speaker. As I said in the past when asked this question, we do have a number of protocols with respect to who has access to records, but we also do have a quality assurance professional that does review who is accessing files isn’t looking specifically at the files themselves, but is looking at and monitoring access. That person looks to see how many people are accessing, how often an individual might be accessing a particular file, will check to see if somebody has the same surname as the file is accessing it to make sure people are only accessing files they should. If and when individuals have been identified as flagging a file more than is required, that is brought to the attention of the department so they can correct those actions. Thank you, Madam Speaker.
Glen Abernethy on Question 119-17(5): Privacy Protocols For Electronic Medical Records
In the Legislative Assembly on February 17th, 2014. See this statement in context.
Question 119-17(5): Privacy Protocols For Electronic Medical Records
Oral Questions
February 16th, 2014
See context to find out what was said next.