In not less than 200 words discuss
 Health information managers/professionals have a variety of different roles that they are responsible for with regard to record keeping. Which role do you feel is the most important and why? Which one do you think will be the most challenging for you to implement and why? What steps could you take to address this challenge? 
In two different paragraph with not less than 100 words give your personal opinion to Marivette Bedoya and  Felita Daniel-sacagiu 

Felita Daniel-sacagiu 
Health information managers/professions are responsible for a wide range of roles in the healthcare environment and in a variety of different settings and job titles.  They often serve in bridge roles, connecting clinical, operational, and administrative functions. These professionals affect the quality of patient information and patient care at every touchpoint? in the healthcare delivery cycle.
Some of the typical/traditional roles include, but are not limited to:

Planning
Collecting and aggregating data
Analyzing and disseminating patient and aggregate clinical data
Project management

     I believe each role is vital to the functioning of an efficient and effective manager. No two records are the same.  Therefore, the manager must be detailed oriented and flexible in functioning between roles.
     According to the University of Wisconsin, HIM will be completely paperless in the very near future.  Future health information managers will need to be skilled in managing remote staff, including transcriptionist, scanners, indexers, data governance, usability and security of data.
Which one do I think will be the most challenging for you to implement and why? I have no experience in this field.  I think to learn all the complex rules, regulations and complex requirements would be challenging for me.
What steps could I take to address this challenge?  Continued research and education
Health Information 101. (n.d.). Retrieved from https://www.ahima.org/careers/healthinfo
Team, U. W. H. I. M. T. (2017, October 19). Health Information Manager Shares Joys, Challenges
      of HIM. Retrieved from https://himt.wisconsin.edu/experience-uw-himt/health-
  information-manager-leads-uw-health-him/

 

 Marivette Bedoya 
Health information management is a critical part of today’s healthcare delivery system and provides the maintenance of health records in healthcare facilities. The roles and responsibilities of health information management is becoming more and more important as the transition to electronic health records takes place. The role that I believe is most important is protecting all patient data with cybersecurity due to records being kept in an electronic system that is used at a nationwide level. The cybersecurity falls into the area of HIPPA. The HIPAA security rule is a large safeguard for electronic health records. The government states that the HIPAA security rule “establishes national standards to protect individuals’ electronic personal health information that is created, received, used or maintained by a covered entity” (Scholastica, 2017). 
To implement security and safety of patient information, I would set in place certain steps/rules. Those being to never share login credentials with anyone, no matter what authorization or clearance they may have, always log off your computer when you step away or stop using it, properly dispose of any printed information you do not need – do not leave sensitive patient records laying in plain sight, and do not open any suspicious emails or attachments. While some malware can spread between networks, many scams occur from email attachments. Be on the lookout for emails asking you to click on links, download files or provide personal or company data. Even if the source seems to be from your company, always double check.
References:
Scholastica, T. C. of S. (2017, September 11). How health information management roles are crucial to healthcare cybersecurity. Retrieved from http://www.css.edu/the-sentinel-blog/why-health-information-management-roles-are-crucial-to-healthcare-cybersecurity.html