| §170.315(a)(1): Computerized provider order entry (CPOE) – medications |
Allows providers to electronically create, record, and transmit medication prescriptions with improved accuracy and patient access. |
Included |
| §170.315(a)(4): Drug-drug, drug-allergy interaction checks for CPOE |
Checks for potential adverse drug-drug or drug-allergy interactions when providers electronically prescribe medications. |
Included |
§170.315(b)(10): Electronic Health Information export Learn more -> |
Enables authorized users with specific admin permissions to securely perform a standardized export of a single patient's medical record. |
Included |
| §170.315(d)(1): Authentication, access control, authorization |
Ensures only authorized users can access EHR systems and data through secure credentials and defined set of permissions per their user type. |
Included |
| §170.315(d)(2): Auditable events and tamper-resistance |
Captures highly granular system activity logs, including user-facing activity history displays, and safeguards them from unauthorized alteration to maintain data integrity. |
Included |
| §170.315(d)(3): Audit report(s) |
Generates reports that document detailed system activity, facilitating general practice oversight as well as clinical review and security investigations. |
Included |
| §170.315(d)(4): Amendments |
Allows patients and providers to request, document, and manage updates, changes, and/or corrections to health records. |
Included |
| §170.315(d)(5): Automatic access time-out |
Protects system security by automatically logging authorized users out after a period of inactivity. |
Included |
| §170.315(d)(6): Emergency access |
Enables authorized users to obtain necessary access during urgent or emergency situations without compromising security. |
Included |
| §170.315(d)(7): End-user device encryption |
Requires encryption of data stored on end-user devices to prevent unauthorized disclosure. |
Included |
| §170.315(d)(8): Integrity |
Ensures electronic health information is protected from improper alteration or destruction. |
Included |
| §170.315(d)(9): Trusted connection |
Establishes secure communication channels and connection points to protect data in transit from unauthorized access. |
Included |
| §170.315(d)(12): Encrypt authentication credentials |
Encrypts authorized user credentials to secure authentication and protect against unauthorized access. |
Included |
§170.315(d)(13): Multi-factor authentication Learn more -> |
Enhance EHR security beyond a single username and password by supporting multi-factor authentication for authorized user login access to EHR. |
Included |
| §170.315(e)(3): Patient health information capture |
Supports the electronic capture of patient health data shared by the patient or their authorized caregiver, and review within the EHR by authorized users. |
Included |
| §170.315(g)(3): Safety-enhanced design |
Implements safety-oriented, user-centered design processes to minimize errors and improve patient safety. |
Included |
| §170.315(g)(4): Quality management system |
Applies a systematic Quality Management System (QMS)-based approach to for iterative agile development, testing, and improvement of the Develo EHR. |
Included |
| §170.315(g)(5): Accessibility-centered design |
Implements accessibility-oriented , user-centered design processes to accommodate authorized users with disabilities, with EHR capabilities adhering to Web Content Accessibility Guidelines (WCAG) accessibility standards. |
Included |