GLOSSARY: Health Information Technology and Security Terms

By Staff Reporters

SPONSOR: http://www.HealthDictionarySeries.org

***

***

Much has been written and much has been opined on the topic of health information technology, electronic health records and medical security liability for physicians and healthcare providers in this textbook. But occasionally, we all still get lost in a wide array of acronyms, jargon and terms that are constantly changing in this ecosystem. And so, this brief glossary serves as a ready reference for those who want to know about these definitions in a quick and ready fashion.

Access control: The process of controlling the access of a user

Access security: To allow computer or healthcare network entry using ID / password / secure socket layer (SSL) encryption / biometrics, etc; unique identification and password assignments are usually made to medical staff members for access to medical information on a need-to-know basis, and only upon written authority of the owner of the data.

Access level authorization: Establishes a procedure to determine the computer or network access level granted to individuals working on or near protected health information, medical data or secure health data.

Accredited standards committee: Organization that helps develop American National Standards (ANS) for computer and health information technology; accredited by ANSI for the development of American National Standards; ASC X12N develops medical electronic business exchange controls like 835-Health Care Claim Payment/Advice and 837-Health Care Claim.

Accountability: The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity. This supports nonrepudiation, deterrence, fault isolation, intrusion detection and prevention, and after-action recovery and legal action.

Accounting: Creating an historical record of who was authenticated, at what time, and how long they accessed the computer system.

Administrative simplification: The use of electronic standard code sets for health information exchange; Title II, Subtitle F of HIPAA gives HHS the authority to mandate the use of standards for the electronic exchange of health care data; to specify what medical and administrative code sets should be used within those standards; to require the use of national identification systems for health care patients, providers, payers (or plans), and employers (or sponsors); and to specify the types of measures required to protect the security and privacy of personally identifiable health care and medical information.

Alternative backup sites: Off-site locations that are used for transferring computer operations in the event of an emergency.

American Health Information Management Association: A large trade association of health information and medical data management professionals.

American Medical Informatics Association: An organization that promotes the use of electronic medical management and healthcare informatics for clinical and administrative endeavors.

American Telemedicine Association: Established in 1993 as a leading resource and advocate promoting access to medical care for patients and health professionals via telecommunications technology; membership open to individuals, companies, and other organizations with an interest in promoting the deployment of telemedicine throughout the world.

Anti-virus software: A software package or subscription service used to thwart malicious computer or network attacks, such as: Symantec®, McAfee®, Trend Micro®, Panda Software®, Sunbelt Software®, Computer Associates®, AVG® or MS-FF ®, etc.

Anti-Worm: A software patch, fix; glitch repairer; do-gooder virus; slang term.  

ASC X12N: HIPAA transmission standards, specifications and implementation guides from the Washington Publishing Company; or the National Council of Prescription Drug Programs.

Assurance: Grounds for confidence that the other four security goals (integrity, availability, confidentiality, and accountability) have been adequately met by a specific implementation. “Adequately met” includes (1) functionality that performs correctly, (2) sufficient protection against unintentional errors (by users or software), and (3) sufficient resistance to intentional penetration or bypass.

Asymmetric cryptology: The use of two different but mathematically related electronic keys for secure health data and medical information storage, transmission and manipulation.

Asymmetric encryption: Encryption and decryption performed using two different keys, one of which is referred to as the public key and one of which is referred to as the private key; also known as public-key encryption.

Asymmetric key: A half of a key pair used in an asymmetric “public-key” encryption system with two important properties: (1) the key used for encryption is different from the one used for decryption, (2) neither key can feasibly be derived from the other.

Attack tree: An inverted tree diagram that provides a visual image of the attacks that may occur against an asset.

Audio teleconferencing: A multi-simultaneous dual voice communications between two parties at remote locations; two way communications between physician and patient at various locations.

Authentication: The process of verifying and confirming the identity of a user.

Availability: The security goal that generates the requirement for protection against – Intentional or accidental attempts to (1) perform unauthorized deletion of data or (2) otherwise cause a denial of service or data.

Back door: A means to access to a computer program that bypasses security mechanisms, sometimes installed by a programmer so that the program can be accessed for troubleshooting or other purposes.

Back door trojans or bots: Currently, the biggest threat to healthcare and all PC users worldwide according to the MSFT Corporation.® 

Bandwidth: The amount of information that can be carried over a communications link.

Bar coding systems: Final FDA ruling issued in February 2004 that required bar codes on most prescription and non-prescription medications used in hospitals and dispensed based on a physician’s order; the bar code must contain at least the National Drug Code (NDC) number, which specifically identifies the drug; although hospitals are not required at this time to have a bar code reading system on the wards, this ruling has heightened the priority of implementing hospital-wide systems for patient-drug matching using bar codes.

Baud: A unit of digital transmission that indicates the speed of information flow. The rate indicates the number of events able to be processed in one second and is expressed as bits per second (bps). The baud rate is the standard unit of measure for data transmission capability; typical older rates were 1200, 2400, 9600, and 14,400 baud; the signaling rate of a telephone line in the number of transitions made in a second; 1/300 sec = 300 baud.

Beta test: The secondary or final stress examination of newly developed computer hardware, software or peripheral devices; site, etc.

Bibliographic database: Indexed computer or printed source of citations of journal articles and other reports in the literature; typically include author, title, source, abstract, and/or related information; MEDLINE® and EMBASE®.

Bioinformatics: The application of medical and biological science to the health information management field.

Biological Information technology: Cross industry alliance of the Microsoft Corporation to enhance the ability to use and share digital health and biomedical data.

Biometric: Personal security identity characteristics, such as a signature, fingerprints, voice, iris or retinal scan, hand or foot vein geometry, facial characteristics, hair analysis, eye, blood vessel or DNA; uses the unique human characteristics of a person as a means of authenticating.

Biometric identification: Secure identification using biometrics that identifies a human from a measurement of a physical feature or repeatable action of the individual (for example, hand geometry, retinal scan, iris scan, fingerprint patterns, facial characteristics, DNA sequence characteristics, voice prints, and hand written signature).

Biopassword: Start-up healthcare IT security pioneer of keyboarding patterns to boost online security through neural network patterns.

Bluetooth® device: Machines, like cell phone with headset, transmitting across communications channels 1 to 14, over time.

Bluetooth® technology: Wireless mobile technology standard built into millions of mobile phones, headsets, portable computers, desktops and notebooks; named after Harold Bluetooth, a 10th century Viking king; healthcare telemetry and rural data transmissions; the Bluetooth Special Interest Group (BSIG) advocates measures aimed at pushing healthcare interoperability for wireless devices and other computers designed for use in the medical field; other wireless stands include: Wi-Fi, ZigBe®, IrDA and RFID.

Buffer: A temporary storage area.

Buffer overflow: A security breach that occurs when a computer program attempts to stuff more data into a temporary storage area than it can hold

Business continuity plan: A plan that outlines the procedures to follow after a business experiences an attack on its security.

California Database Security Breach Act: A state act that requires disclosure to California residents if a breach of personal information has or is believed to have occurred.

Certification authority: An independent third-party organization that assigns digital certificates.

Chain of custody: A process that documents everyone who has had contact with or direct possession of the evidence.

Chain of trust: Suggestion that each and every covered entity and business associate share responsibility and accountability for confidential PHI. 

Chain of trust agreement: Contract entered into by two business partners in which it is agreed to exchange data and that the first party will transmit information to the second party, where the data transmitted is agreed to be protected between the partners; sender and receiver depend upon each other to maintain the integrity and confidentiality of the transmitted information; multiple two-party contracts may be involved in moving information from the originator to the ultimate recipient; for example, a provider may contract with a clearing house to transmit claims to the clearing house; the clearing house, in turn, may contract with another clearing house or with a payer for the further transmittal of those same claims.

Children’s Online Privacy Protection Act: A federal act that requires operators of online services or Web sites directed at children under the age of 13 to obtain parental consent prior to the collection, use, disclosure, or display of a child’s personal information.

Cipher lock: A combination lock that uses buttons that must be pushed in the proper sequence in order to open the door.

Clearing house: HIPAA medical invoice, healthcare data transaction exchange and medical data implementation service center that that meets or exceeds Federally-mandated standardized Electronic Data Interchange (EDI) transaction requirements.

Clinger-Cohen Act: Public Law 104-106; Information Technology Management Reform Act (ITMRA) of 1996.

Clinical data: Protected Health Information (PHI) from patient, physician, laboratory, clinic, hospital and/or payer, etc; identifiable patient medical information.

Clinical data information systems: Automatic and securely connected system of integrated computers, central severs and the Internet that transmits Protected Health Information (PHI) from patient, physician, laboratory, clinic, hospital and/or payer, etc.

Clinical data repository: Electronic storehouse of encrypted patient medical information; clinical data storage.

Clinical informatics: The management of medical and clinical data; the use of computers, networks and IT for patient care and health administration.

Clinical information: All the related medical information about a patient; Protected Health Information (PHI) from patients, providers, laboratories, clinics, hospitals and/or payers or other stakeholders, etc.

Clinical information system:  A computer network systems that supports patient care; relating exclusively to the information regarding the care of a patient, rather than administrative data, this hospital-based information system is designed to collect and organize data.

Clinical regional health information system: Electronic entity committed to securely share private patient health information among entities like medical providers, clinics, laboratories, hospitals, outpatient centers, hospice and other healthcare facilities; Community Health Management Information Systems (CHMIS), Enterprise Information Networks (EINs), Regional Health Information Networks (RHINs) and Health Information Networks (HINs).

Cold site: An alternative backup site that provides the basic computing infrastructure, such as wiring and ventilation, but very little equipment.

Compact disc – read only memory (CD-ROM): A computer drive that can read CD-R and CD-RW discs.

Compact disc – recordable (CD-R): An optical disc that contains up to 650 megabytes of data and cannot be changed once recorded.

Compact disc – rewriteable (CD-RW): An optical disc that can be used to record data, erase it, and re-record again.

Computer security: A computer or network that is free from threats against it.

Computerized Physician Order Entry System: Automatic medical provider electronic medical chart ordering system that usually includes seven features: medication analysis, system order clarity, increased work efficiency, point of care utilization, benchmarking and performance tracking, on-line alerts and regulatory reporting.

Confidential health information: Protected Health Information (PHI) that is prohibited from free-use and secured from unauthorized dissemination or use; patient specific medical data.

Counter signature: The ability to prove the order of application of signatures; analogous to the normal business practice of signing a document which has already been signed by another party (ASTM E 1762 -95); part of a digital signature.

Covered entity: 42 CFR § 164.504(e)(2)(i)(B). Any of three broadly defined entities that deal with protected health information (PHI): providers, individuals or group health plans, and clearinghouses.

Cracker: A person who breaks into or otherwise violates the system security with a malicious intent.

Cryptography: The science of transforming information so that it is secure while it is being transmitted or stored.

Cyber-terrorism: Attacks by a terrorist group using computer technology and the Internet to cripple or disable a nation’s electronic infrastructure.

Data backup: The process of copying data to another media and storing it in a secure location.

Data encryption standard: An older health or medical data private key cryptology federal protocol for secure information exchange; replaced by AES.

Data interchange standard: X12 HIPAA health data transmission standard format.

Data interchange standard association: The organization that provides X12 HIPAA transmission standards and formats.

Deadbolt lock: A lock that extends a solid metal bar into the door frame for extra security.

Decision support system: Computer tools or applications to assist physicians in clinical decisions by providing evidence-based knowledge in the context of patient-specific data; examples include drug interaction alerts at the time medication is prescribed and reminders for specific guideline-based interventions during the care of patients with chronic disease; information should be presented in a patient-centric view of individual care and also in a population or aggregate view to support population management and quality improvement.

Decryption: Changing an encrypted message back to its original form.

Definition files: Files that contain updated antivirus information.

De-identified health information: Protected health information that is no longer individually identifiable health information; a covered entity may determine that health information is not individually identifiable health information only if: (1) a person with appropriate knowledge of and experience with generally accepted statistical and scientific principles and methods for rendering information not individually identifiable determines that the risk is very small that the information could be used, alone or in combination with other available information, to identify an individual, and documents the methods and results of the analysis; or (2) the following identifiers of the individual, relatives, employers or household members of the individual are removed.

Denial of service: The prevention of authorized access to resources or the delaying of time critical operations.

Designated record set: Contains medical and billing records and any other records that a physician and/or medical practice utilizes for making decisions about a patient;  a hospital, emerging healthcare organization, or other healthcare organization is to define which set of information comprises “protected health information” and which set does not; contains medical or mixed billing records, and any other information that a physician and/or medical practice utilizes for making decisions about a patient.  It is up to the hospital, EHO, or healthcare organization to define which set of information comprises “protected health information” and which does not though logically this should not differ from locale to locale.  The patient has the right to know who in the lengthy data chain has seen their PHI. This sets up an audit challenge for the medical organization, especially if the accountability is programmed, and other examiners view the document without cause.

Designated standard: HIPAA standard as assigned by the department of HHS

Device lock: A steel cable and a lock used to secure a notebook computer.

Digital certificate: A certificate that binds a specific person to a public key.

Digital imaging and communications in medicine: Technology broadband transmission imaging standards for X-rays, MRIs, CT and PET scans, etc; health IT standard transmissions platform aimed at enabling different computing platforms to share image data without compatibility problems; a set of protocols describing how radiology images are identified and formatted that is vendor-independent and developed by the American College of Radiology and the National Electronic Manufacturers Association. 

Digital radiology: Medical digital imaging applied to x-rays, CT, PET scans and related non-invasive and invasive technology; broadband intensive imaging telemedicine.

Digital rights management: The control and protection of digital intellectual property.

Digital signature: Encrypted electronic authorization with verification and security protection; private and public key infrastructure; based upon cryptographic methods of originator authentication, computed by using a set of rules and a set of parameters so that the identity of the signer and the integrity of medical or other data can be verified.

Digital signature standard: Encryption technology to ensure electronic medical data transmission integrity and authentication of both sender and receiver; date and time stamps; public and private key infrastructure.

Digital versatile disc – recordable (DVD-R): An optical disc technology that can record once up to 3.95 gigabytes of data on a single-sided disc and 7.9 GB on a double-sided disc.

Digital versatile disc – rewriteable (DVD-RAM): An optical disc technology that can record, erase, and re-record data and has a capacity of 2.6 GB (single side) or 5.2 GB (double side).

Digital versatile disc (DVD): A technology that permits large amounts of data to be stored on an optical disc.

Disaster recovery plan: A process to restore vital health and/or critical healthcare technology systems in the event of a medical practice, clinic, hospital or healthcare business interruption from human, technical or natural causes; focuses mainly on technology systems, encompassing critical hardware, operating and application software, and any tertiary elements required to support the operating environment; must support the process requirements to restore vital company data inside the defined business requirements; does not take into consideration the overall operating environment; an emergency mode operation plan is still necessary.

Disclosure: Release of PHI outside a covered entity or business agreement space, under HIPAA; the release, transfer, provision of access to or divulging of medical information outside the entity holding the information.

Disc – rewriteable (DVD-RW): An optical disc technology that allows data to be recorded, erased, and re-recorded.

Due care: Managers and their organizations have a duty to provide for information security to ensure that the type of control, the cost of control, and the deployment of control are appropriate for the system being managed.

e-health: Emerging field in the intersection of medical informatics, public health and business, referring to health services and information delivered or enhanced through the Internet and related technologies; characterizes not only a technical development, but also a state-of-mind, attitude, and a commitment for networked, global thinking, to improve health care worldwide by using information and communication technology.

Electronic data interchange: Inter healthcare organization computer-to-computer transmission of business or health information in a standard format; direct transmission from the originating application program to the receiving, or processing, application program; an EDI transmission consists only of business or health data, not any accompanying verbiage or free-form messages; a standard format is one that is approved by a national or international standards organization, as opposed to formats developed by health industry groups, medical practices, clinics or companies; the electronic transmission of secure medical and financial data in the healthcare industrial complex; X12 and similar variable-length formats for the electronic exchange of structured health data. The Centers for Medicare and Medicaid Services (CMS) regulates security and Electronic Data Interchange (EDI).

Electronic data interchange standards: The American National Standards Institute (ANSI) set of EDI standards known as the X12 standards. These standards have been developed by private sector standards development organizations (SDOs) and are maintained by the Accredited Standards Committee (ASC) X12. ANSI ASC X12N standards, Version 4010, were chosen for all of the transactions except retail pharmacy transactions, which continue to use the standard maintained by the National Council for Prescription Drug Programs (NCPDP) because it is already in widespread use. The NCPDP Telecommunications Standard Format Version 5.1 and equivalent NCPDP Batch Standard Version 1.0 have been adopted in this rule (health plans will be required to support one of these two NCPDP formats). The standards are designed to work across industry and company boundaries. Changes and updates to the standards are made by consensus, reflecting the needs of the entire base of standards users, rather than those of a single organization or business sector. Specifically, the following nine healthcare transactions were required to use X12N standard electronic claim formats by October 16, 2003.

Electronic health record: A real-time patient health record with access to evidence-based decision support tools that can be used to aid clinicians in decision-making; the EHR can automate and streamline a clinician’s workflow, ensuring that all clinical information is communicated; prevents delays in response that result in gaps in care; can also support the collection of data for uses other than clinical care, such as billing, quality management, outcome reporting, and public health disease surveillance and reporting; electronic medical record.

Electronic medication administrative record: Electrical file keeping computerized system for tracking clinical medication dispensation and use; integrated with TPAs, PBMs, robotic dispensing devices and CPOEs, etc.

Electronic medical (media) claims: Usually refers to a flat file format used to transmit or transport medical claims, such as the 192-byte UB-92 Institutional EMC format and the 320-byte Professional EMC-NSF.

Electronic prescribing: A type of computer technology whereby physicians use handheld or personal computer devices to review drug and formulary coverage and to transmit prescriptions to a printer or to a local pharmacy; e-prescribing software can be integrated into existing clinical information systems to allow physician access to patient-specific information to screen for drug interactions and allergies.

Electronic preventive services selector: A digital tool for primary care clinicians to use when recommending preventive services for their patients unveiled by the Department of Health and Human Services’ Agency for Healthcare Research and Quality (AHRQ), in November 2006;  designed for use on a personal digital assistant (PDA) or desktop computer to allow clinicians to access the latest recommendations from the AHRQ-sponsored U.S. Preventive Services Task Force; designed to serve as an aid to clinical decision-making at the point of care and contains 110 recommendations for specific populations covering 59 separate preventive services topics; a real time search function allows a clinician to input a patient’s age, gender, and selected behavioral risk factors, such as whether or not they smoke, in the appropriate fields, while the software cross-references the patient characteristics entered with the applicable Task Force recommendations and generates a report specifically tailored for that patient.

Electronic signature: Various date and time stamped electronic security verification systems, such as passwords, encryption, ID numbers, biometrics identifiers, etc; electrical transmission and authentication of real signatories; signatory attribute that is affixed to an electronic health document to bind it to a particular entity; an electronic signature process secures the user authentication (proof of claimed health identity, such as by biometrics (fingerprints, retinal scans, hand written signature verification, etc.), tokens or passwords) at the time the signature is generated; creates the logical manifestation of signature (including the possibility for multiple parties to sign a medical document and have the order of application recognized and proven) and supplies additional information such as time stamp and signature purpose specific to that user; and ensures the integrity of the signed document to enable transportability, interoperability, independent verifiability, and continuity of signature capability; verifying a signature on a document verifies the integrity of the document and associated attributes and verifies the identity of the signer; there are several technologies available for user authentication, including passwords, cryptography, and biometrics (ASTM 1762-95).

Encryption: Changing the original text to a secret message.

Gigabytes (GB): Billions of bytes of data.

Gramm-Leach-Bliley Act: A federal act that requires private data be protected by banks and financial institutions.

Hacker: A person who possesses advanced computer skills and is adept at exploring computers and networks in order to break into them.

HEALTH 1.0This is the dying healthcare system of yesterday and today. Information is communicated from doctors to patients. It is a basic B2C [business-to-consumer] website as the internet became one big encyclopedia by aggregating knowledge silos. Some doctors maintain websites, others do not. Nevertheless, Health 1.0 has a command and control hierarchy; doctors on top of the pyramid, patients on the bottom.

HEALTH 2.0:  According to Matthew Holt [personal communication] Healthcare 2.0 may be defined as: “The foundation of healthcare 2.0 is information exchange plus technology. It employs user-generated content, social networks and decision support tools to address the problems of inaccessible, fragmentary or unusable health care information. Healthcare 2.0 connects users to new kinds of information, fundamentally changing the consumer experience (e.g., buying insurance or deciding on/managing treatment), clinical decision-making (e.g., risk identification or use of best practices) and business processes (e.g., supply-chain management or business analytics)”.

And so, if Health 1.0 was a static book, Health 2.0 is a dynamic discussion

Example: The power of the internet is illustrated in the phenomenon of “crowd-sourcing.” In this context, the term means to harvest the reach of social networking [wisdom of crowds] to solve a problem. A knowledge seeker asks a question and participants respond.  For example, readers can participate on the www.MedicalExecutivePost.com or www.BusinessofMedicalPractice.com sites to improve the administration of any medical practice. And, www.PodiatryPrep.com is an example of how podiatrists connect for global board certification assistance.

***

***

HEALTH 2.0 Plus:The Dictionary of Health Insurance and Managed Care defines this emerging hybrid as a bridge uniting the philosophy of contemporary Health 2.0 with futuristic Health 3.0 technologies. Cisco System’s HealthPresence is one example developed in 2010, by Dr. T. Warner Hudson. Using the network as a platform, HealthPresence combines video, audio and information to create an environment similar to what patients experience when they visit their own doctor.

HEALTH 3.0: Soon, patients will not only be seeking information; but actionable intelligence – whether it is artificial or real. Patients will communicate almost as with another patient or doctor. The internet won’t just blindly do what we tell it to do – it will think and represent some amazing opportunities. For example, imagine your toilet running a SMAC 20 and then being instantly notified of the results by your smart phone? Or; use your iPhone to send pictures and streaming videos of conditions for a second opinion www.KnockingLive.com

Health information technology: The application of information processing involving both computer hardware and software that deals with the storage, retrieval, sharing, and use of health care information, medical data, and knowledge for communication and decision making.

Health information technology auditor: An expert who evaluate a health organization’s computer systems to ensure the proper safeguards are in place to protect and maintain the integrity of the firm’s data; While the position has existed since the mid-1960s, companies that previously employed just a handful of HIT auditors are now significantly adding to their ranks, sometimes doubling, tripling or quadrupling current staff levels; much current demand is due to the Sarbanes-Oxley Act and other legislation aimed at improving corporate governance in the wake of major accounting scandals earlier in the decade; publicly traded hospital systems require the expertise of HIT auditors to meet ongoing compliance requirements; the Gramm-Leach-Bliley Act and the Health Insurance Portability and Accountability Act (HIPAA), among other regulations, also are fueling the need for HIT auditors.  Health IT auditors must have a general understanding of accounting principles and the strategic vision to ensure a health organization’s HIT systems allow it to achieve its short- and long-term objectives. Many hospitals promote from within for this role. Health facilities who look outside the organization for these professionals usually seek candidates with experience, knowledge of healthcare of emerging technologies and issues, and increasingly, certifications such as the certified information systems auditor (CISA) designation.

Health information technology promotion act: Legislation to accelerate the adoption of interoperable electronic health records by ensuring uniform standards, championed by Rep. Nancy Johnson, R-Conn, (H.R. 4157) which would: codify the Office of the National Coordinator for Health Information Technology in statute and delineate its ongoing responsibilities; create exceptions to the fraud and abuse statutes to allow certain providers to fund health information technology equipment and services for other providers; and provide for a study of federal and state health privacy policies.

Health Insurance Portability and Accountability Act (HIPAA): A federal act that requires enterprises in the health sector to guard protected health information and implement policies and procedures to safeguard it.

Health level seven: An international community of healthcare subject matter experts and information technology physicians and scientists collaborating to create standards for the exchange, management and integration of protected electronic healthcare information; the Ann Arbor, Mich.-based Health Level Seven (HL7) standards developing organization has evolved Version 3 of its standard, which includes the Reference Information Model (RIM) and Data Type Specification (both ANSI standards); HL7 Version 3 is the only standard that specifically deals with creation of semantically interoperable healthcare information, essential to building the national infrastructure; HL7 promotes the use of standards within and among healthcare organizations to increase the effectiveness and efficiency of healthcare delivery for the benefit of all patient, payers, and third parties; uses an Open System Interconnection (OSI) and high level seven healthcare electronic communication protocol that is unique in the medical information management technology space and modeled after the International Standards Organization (ISO) and American National Standards Institute (ANSI); each has a particular healthcare domain such as pharmacy, medical devices, imaging or insurance (claims processing) transactions. Health Level Seven’s domain is clinical and administrative data.

Hot site: An alternative backup site that contains the same equipment as found in the organization’s actual IT center.

Human firewall: An employee who practices good security techniques to prevent any security attacks from passing through them.

Incident response team: An employee team charged with gathering and handling the digital evidence of an attack.

Individually identifiable health information: Medical information that is created or received by a covered entity; relates to the physical or mental health condition of an individual, provision of health care or the payment for the provision of health care; identifies the individual or there is reasonable belief that the information can be used to identify the individual.

Information security: A computer or network that is free from threats against it.

Integrity: The security goal that generates the requirement for protection against either intentional or accidental attempts to violate data integrity (the property that data has when it has not been altered in an unauthorized manner) or system integrity (the quality that a system has when it performs its intended function in an unimpaired manner, free from unauthorized manipulation).

Intellectual property: Works created by others such as books, music, plays, paintings, and photographs.

IT-related risk: The net mission impact considering (1) the probability that a particular threat-source will exercise (accidentally trigger or intentionally exploit) system vulnerability and (2) the resulting impact if this should occur. IT-related risks arise from legal liability or mission loss due to:

* Unauthorized (malicious or accidental) disclosure, modification, or destruction of information

* Unintentional errors and omissions

* IT disruptions due to natural or man-made disasters

* Failure to exercise due care and diligence in the implementation and operation of the IT system.

Key-in-knob lock: A basic lock that has the lock mechanism embedded in the knob or handle.

Keystroke logger: A type of hardware spyware that captures keystrokes as they are typed.

Logic bombs: A computer program that lies dormant until it is triggered by a specific event.

Lossless: To compress electronic digital data.

Malicious code: Programs that are intentionally created to break into secure computers or to create havoc after the computers are accessed.

Master patient index: Healthcare facility composite that links and assists in tracking patient, person, or member activity within an organization (or health enterprise) and across patient care settings; hardcopy or electronic identification of all patients treated in a facility or enterprise and lists the medical record or identification number associated with the name; can be maintained manually or as part of a computerized system; typically, those for healthcare facilities are retained permanently, while those for insurers, registries, or others may have different retention periods; a database of all the patients ever registered (within reason) at a facility; name, demographics, insurance, next of kin, spouse, etc.

Medically unbelievablE event: Implemented on Jan. 1, 2007, the CMS blockage of payments for medical services that make no sense based on “anatomic considerations” or medical reasonableness when the same patient, date of service, HCPCS code or provider is involved; unlike other National Correct Coding Initiative (NCCI) edits, MUEs can’t be overridden by a modifier because there will never be a scenario where the physician had a good reason to submit a claim for removing a second appendix from the same person; etc.

Megabytes (MB): Millions of bytes of storage.

Memory stick: USB flash or non-volatile storage device; Sony CompactFlash®, pen or mini-drive; flash card, smart media, slang terms.

Mesh: Medical Subject Headings, the controlled vocabulary of about 16,000 terms used for MEDLINE and certain other MEDLARS databases.

Minimum necessary: The amount of protected health information shared among internal or external parties determined to me the smallest amount needed to accomplish its purpose for Use or Disclosure; the amount of health information or medical data needed to accomplish a purpose varies by job title, CE or job classification.

Minimum necessary rule: HIPAA regulation that suggests any PHI used to identify a patient, such as a social security number, home address or phone number; divulge only essential elements for use in transferring information from patient record to anyone else that requires the information; especially important with financial information; changes the way software is written and vendor access is provided.  The “Minimum Necessary” Rule states the minimum use of PHI that can be used to identify a person, such as a social security number, home address or phone number. Only the essential elements are to be used in transferring information from the patient record to anyone else that needs this information.  This is especially important when financial information is being addressed.  Only the minimum codes necessary to determine the cost should be provided to the financial department.  No other information should be accessed by that department.  Many institutions have systems where a registration or accounting clerk can pull up as much information as a doctor or nurse, but this is now against HIPAA policy and subject to penalties.  The “minimum necessary” rule is also changing the way software is set up and vendor access is provided. 

Mirror site: A secondary location identical to the primary IT site that constantly receives a copy of data from the primary site.

National health information network: The technologies, standards, laws, policies, programs and practices that enable health information to be shared among health decision makers, including consumers and patients, to promote improvements in health and healthcare; vision for the NHII began more than a decade ago with publication of an Institute of Medicine report, The Computer-Based Patient Record. The path to a national network of healthcare information is through the successful establishment of Regional Health Information Organizations (RHIO).

National provider identifier: Originally was an eight-digit alphanumeric identifier. However, the healthcare industry widely criticized this format, claiming that major information systems incompatibilities would make it too expensive and difficult to implement. DHHS therefore revised its recommendation, instead specifying a 10-position numeric identifier with a check digit in the last position to help detect keying errors. The NPI carries no intelligence; in other words, its characters will not in themselves provide information about the provider. More recently, CMS announced that HIPAA-covered entities such as providers completing electronic transactions, healthcare clearinghouses, and large health plans, must use only the NPI to identify covered healthcare providers in standard transactions by May 23, 2007. Small health plans must use only the NPI by May 23, 2008. The proposal for a Standard Unique National Health Plan (Payer) Identifier was withdrawn on February, 2006. (According to CMS, “withdrawn” simply means that there is not a specific publication date at this time. Development of the rule has been delayed; however, when the exact date is determined, the rule will be put back on the agenda.)

Network: A group of interconnected computers.

Notebook safe: A special safe secured to a wall or the trunk of a car used for storing a notebook computer.

Operating system hardening: Steps that can be taken to make a personal computer operating system more secure.

Optical disc: A disc that uses laser technology to record data.

Password: A secret combination of words or numbers that authenticates or identifies the user.

Patch: A software update to correct a problem.

Patch management: Tools, utilities, and processes for keeping computers up to date with new software updates that are developed after a software product is released.

Pharmacy information system: Drug tracking and dispensation related health management information system for hospitals and healthcare organizations.

PhisHing: An attempt to fraudulent gather confidential information by masquerading as a trustworthy entity, person or business in an apparently official email, text message or website; carding or spoofing; video vishing; phish-tank; vish-tank; slang terms.

Physical security: The process of protecting the computer itself.

Port scanning: Sending a flood of information to all of the possible network connections on a computer.

Ports: The network connections on a computer.

Preset lock: A basic lock that has the lock mechanism embedded in the knob or handle.

Privacy: The quality or state of being hidden, encrypted, obscure, or undisclosed; especially medical data or PHI.

Privacy act: Federal legislature of 1974 which required giving patient some control over their PHI.

Privacy enhanced mail: Email message standard protocol for enhanced medical, health data or other security.

Privacy officer: A medical entity’s protected client information and security officer; required by each covered entity, to be responsible for “the development and implementation of the policies and procedures” necessary for compliance.

Privacy rule: The Federal privacy regulations promulgated under the Health Insurance Portability and Accountability Act (HIPAA) of 1996 that created national standards to protect medical records and other protected health information. The Office of Civil Rights (OCR) within the Department of Health and Human Services (DHHS) regulates the privacy rules.

Privacy standards: Any protocol to ensure the confidentiality of PHI.

Private key system: A means of cryptography where the same key is used to both encrypt and decrypt a message.

Public key system: A means of cryptography where two keys are used.

Records, medical: 20 U.S.C. 1232g(a)(4)(B)(iv), all:

* Psychotherapy notes recorded (in any medium) by a health care provider who is a mental health professional documenting or analyzing the contents of conversation during a private counseling session or a group, joint, or family counseling session and that are separated from the rest of the individual’s medical record; excludes medication prescription and monitoring, counseling session start and stop times, the modalities and frequencies of treatment furnished, results of clinical tests, and any summary of the following items: diagnosis, functional status, the treatment plan, symptoms, prognosis, and progress to date.

* Public health authority means an agency or authority of the United States, a State, a territory, a political subdivision of a State or territory, or an Indian tribe, or a person or entity acting under a grant of authority from or contract with such public agency, including the employees or agents of such public agency or its contractors or persons or entities to whom it has granted authority, that is responsible for public health matters as part of its official mandate.

* Required by law means a mandate contained in law that compels a covered entity to make a use or disclosure of protected health information and that is enforceable in a court of law; includes but is not limited to, court orders and court-ordered warrants; subpoenas or summons issued by a court, grand jury, a governmental or tribal inspector general, or an administrative body authorized to require the production of information; a civil or an authorized investigative demand; Medicare conditions of participation with respect to health care providers participating in the program; and statutes or regulations that require the production of information, including statutes or regulations that require such information if payment is sought under a government program providing public benefits.

Regional health information organization: A multi-stakeholder organization that enables the exchange and use of health information, in a secure manner, for the purpose of promoting the improvement of health quality, safety and efficiency; the U.S. Department of Health and Human Services see RHIOs as the building blocks for the national health information network (NHIN) that will provide universal access to electronic health records; other experts maintain that RHIOs will help eliminate some administrative costs associated with paper-based patient records, provide quick access to automated test results and offer a consolidated view of a patient’s history.

Risk assessment: The process of identifying the risks to system security and determining the probability of occurrence, the resulting impact, and additional safeguards that would mitigate this impact.

Risk management: The total process of identifying, controlling, and mitigating information system–related risks. It includes risk assessment; cost-benefit analysis; and the selection, implementation, test, and security evaluation of safeguards.  This overall system security review considers both effectiveness and efficiency, including impact on the mission and constraints due to policy, regulations, and laws.

Royalties: Payment to the owner or creator of intellectual property for their work.

Sarbanes-Oxley Act (Sarbox): A federal act that enforces reporting requirements and internal controls on electronic financial reporting systems.

Scanning: Locating a computer that can be broken into.

Script kiddies: Younger and less sophisticated users who break into a computer with malicious intent.

Secure virtual private network: Cryptographic tunneling protocols to provide the necessary health data confidentiality (preventing snooping), sender authentication (preventing identity spoofing), and message integrity (preventing message alteration) to achieve the medical privacy intended. When properly chosen, implemented, and used, such techniques can provide secure communications over unsecured networks.

Security: A set of healthcare information technology system characteristic and  mechanisms which span the system both logically and physically; electronic access control against unauthorized intervention, both friendly or malicious;  encompasses all of the safeguards in an information system, including hardware, software, personnel policies, information practice policies, disaster preparedness, and the oversight of all these areas; the purpose of health information security is to protect both the system and the information it contains from unauthorized access from without and from misuse from within; through various security measures, a health information system can shield confidential information from unauthorized access, disclosure and misuse, thus protecting privacy of the individuals who are the subjects of the stored data; security life cycle.

Security administration: The physical and electrical protection features of an IT health system needed to be managed in order to meet the needs of a specific installation and to account for changes in the healthcare entities operational environment.

Security compromise: Physical or electronic data, file, program or transmission error due to malicious miscreants or software interventions; health data confidentiality breach.

Security configuration: Measures, practices, and procedures for the safety of information systems that must be coordinated and integrated with each other and other methods, practices, and procedures of the organization established in order to credential safekeeping policy; provides written security plans, rules, procedures, and instructions concerning all components of a healthcare entity’s security; procedures must give instructions on how to report breaches and how those breaches are to be handled within the organization.

Security configuration management: The measurement of practices and procedures for the security of information systems that is coordinated and integrated with each other and other measures, practices and procedures of the organization so as to create a coherent system of health data security (NIST Pub 800-14).

Security domain: A set of subjects, their information objects, and a common security policy; foundation for IT security is the concept of security domains and enforcement of data and process flow restrictions within and between these domains.

Security goals: The five security goals are integrity, availability, confidentiality, accountability, and assurance.

Security information system: security is a system characteristic and a set of mechanisms that span the system both logically and physically.

Security policy: A formal written policy that outlines the importance of security to the organization and establishes how the security program is organized.

Share: An object that is shared with others over a computer network.

Signature files: Files that contain updated antivirus information.

Smart card: A device that contains a chip that stores the user’s private key, login information, and public key digital certificate.

Sniffing: Listening to the traffic on a computer network and then analyzing it.

Social engineering: Relying on trickery and deceit to break security and gain access to computers.

Spam: Unsolicited e-mail messages.

Spy: A person who has been hired to break into a computer and steal data.

Spyware: Hardware or software that “spies” on what the user is doing and captures that activity without their knowledge.

Stealth signal transmitter: Software installed on a notebook computer that sends a signal that can be traced.

Threat analysis: The examination of threat-sources against system vulnerabilities to determine the threats for a particular system in a particular operational environment.

Threat modeling: A process of constructing scenarios of the types of threats that assets face.

Threat: The potential for a threat-source to exercise (accidentally trigger or intentionally exploit) a specific vulnerability.

Threat-source: Either (1) intent and method targeted at the intentional exploitation of a vulnerability or (2) a situation and method that may accidentally trigger a vulnerability.

Token: A security device used to authenticate the user by having the appropriate permission (like a password) embedded into the device.

USA Patriot Act: A federal act designed to broaden the surveillance of law enforcement agencies to enhance the detection and suppression of terrorism.

Username: A unique identifier of a person used to access a computer system.

Virus: A program that secretly attaches itself to other programs and when executed causes harm to a computer.

Vulnerability: A flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach or a violation of the system’s security policy.

Vulnerability assessment: A process to determine what vulnerabilities exist in the current system against these attacks.

Vulnerability assessment managed services: Agencies that use scanning devices connected to probe an organization’s security to look for vulnerabilities.

War driving: A technique used to locate wireless local area networks (WLANs).

WiMax: A more powerful version of Wi-Fi that can provide wireless Internet access over wider geographic location such as a city; an acronym that stands for Worldwide Interoperability for Microwave Access, and is a certification mark for products that pass conformity and interoperability tests for the IEEE 802.16 standards. IEEE 802.16 is working group number 16 of IEEE 802, specializing in point-to-multipoint broadband wireless access.

Wireless hot spot: Specific geographic location in which an access point provides public wireless broadband network services; security is risky for PHI; hotspot.

Wireless local area networks: A computer network that uses radio waves instead of wires to connect computers.

Worm: A program that does not attach itself to other programs or need user intervention to execute.

EDUCATION: Books

ACKNOWLEDGEMENTS: To Richard J. Mata MD MS MI-CIS CMP[Hon]; Mackenzie H. Marcinko PhD of iMBA Inc., and Shahid N. Shah MS, Washington DC.

COMMENTS APPRECIATED

Refer, Like and Subscribe

***

***

Why Your Medical Internet Marketing Campaign Isn’t as Effective as It Used to Be

On the Crucial Online Presence

[By John Deutsch]

John DeutschA strong online presence is crucial to running a successful business, and healthcare is no exception.

However with constant change, especially in the past two years, many businesses are experiencing underperforming campaigns and struggling to figure out where to spend their marketing dollars. Should you invest heavily in pay-per-click (PPC) advertising, focus your efforts on search engine optimization (SEO) or hit the ground running with social media?

The answer is that you should never focus solely on one marketing channel, as it could take months or even years to recover when changes in the marketing industry occur – and they inevitably will occur. Another reason to diversify your efforts is that the success of some channels depends on the success of others – for example, social media influences your search rankings and display advertising heavily influences your brand recognition.

As a healthcare marketing company with over ten years of experience in internet marketing, we have seen the industry get flipped upside down more than once and have seen it affect organizations that have weak marketing campaigns with little to no diversification. A good mix of tactics is the best way to reach your target audience while allowing you to adapt quickly in the face of changes.

 cell

Three Elements Crucial to Any Marketing Campaign

Search marketing, direct marketing and social media are three components that healthcare organizations should incorporate for a healthy marketing campaign. Here’s what you need to know about these marketing elements, including the changes each channel has gone through in the last few years and what we could expect to see in the future.

  1. Search Marketing

Search marketing typically refers to PPC and SEO, the paid and unpaid efforts used to increase online visibility in search engine results. Early marketers were able to easily leverage SEO to gain top search engine rankings and also invest minimally in PPC for quick leads, but the search marketing landscape has changed significantly in the last three to four years, altering the online marketing game.

We might say it all started when Google modified its PageRank algorithm in 2011 and then again in 2012 (the update often referred to as “the death of SEO”), causing many organizations’ rankings to plummet. Marketers were forced to rethink their organic SEO efforts to stay in Google’s good graces. Instead of relying heavily on getting backlinks (even from low-quality websites) and stuffing content with keywords, the focus switched to creating quality content in order to get real clicks and page views.

Meanwhile, companies like Google started trying harder than ever to monetize their services. The highly saturated market contributed to driving advertising costs up – and beyond that, the actual efficacy of online ads went down. In some of our own campaigns, we have seen over 30% inflation in ad prices per year and a loss of efficacy (decreased traffic and leads) despite increasing ad spend to match inflation – and this isn’t just a result of market saturation. It also has to do with the fact that consumers are less and less receptive to online advertising due to the over publicizing of ads.

As a result of this, organizations have to constantly innovate so that their ads are seen among all the online advertising noise. This, in addition to rising ad prices means that a return on investment can be difficult to realize. Working with a true PPC expert who knows your industry well is the only way to make your budget go a long way.

The bottom line: SEO and PPC are still the number one ways to draw leads online, but they have both seen significant change in the past years and are likely to keep changing, so your marketing strategy should not depend on either channel alone.

  1. Direct Marketing

With SEO having lost some importance and PPC advertising requiring a skill set that many health organizations lack, we are seeing trends shifting towards a more direct form of marketing. This is evident by the number of lead generation companies that have cropped up in the last few years, such as Healthgrades and Vitals, which allow providers to attract more patients and referrals, often for a nominal fee. Similarly, in the medical software industry, SoftwareAdvice dominates the SEO/PPC channels.

Organizations are also increasingly employing alternative marketing channels like email newsletters and direct email marketing to reach out to clients and potential opportunities. This starts with a simply crafted email addressing a very specific issue to a specific audience. It is an extremely effective and budget-friendly tactic to diversify a marketing strategy.

  1. Social Media

Just like other marketing channels, social media is constantly evolving and also increasing in price. This is due, in large part, to major social media companies becoming publicly traded companies in recent years (i.e. Facebook in 2012 and Twitter in 2013), but also to market saturation.

According to a LinkedIn study, 81 percent of small- and medium-sized businesses are using social media and, of those, 94 percent do so for marketing purposes. While networks like Facebook and Twitter remain free to use, they have started trying to capitalize on their popularity by pushing paid advertisement, often to the point of risking the integrity of their sites.

Whereas prior to companies like Facebook and Twitter having gone public, a well-crafted social media post (text, video or image) could go “viral” naturally, we are now seeing this happen less and less, often requiring an initial advertising spend to get the ball rolling. Facebook is a good example of this. In December 2013, Facebook changed the algorithm that determines what stories and updates users see in their News Feeds. This resulted in business pages losing viewership of their posts, as Facebook decided that brands would have to “pay to play.”

Stethoscope on a laptop keyboard

Assessment

While we don’t recommend social media being the focal point of any healthcare organization’s marketing campaign, much less the only element, it is an integral component – and definitely one you should stay on top of if you want to remain competitive. Social media is also a major factor in Google’s algorithm for organic search engine rankings, so there is some added value to having a strong social media presence.

More:

About the Author

John is the President and CEO of Medical Web Experts, developer of Bridge Patient Portal, the leading 2014 ONC certified solution for patient engagement and improved practice profitability. A vital component in the exponential growth of numerous healthcare IT and Internet companies over the last ten years, John has benefited immensely from a unique mix of professional experiences, boasting a strong background in both marketing and technology.

Channel Surfing the ME-P Have you visited our other topic channels? Established to facilitate idea exchange and link our community together, the value of these topics is dependent upon your input. Please take a minute to visit. And, to prevent that annoying spam, we ask that you register. It is fast, free and secure.

Conclusion

Your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com

OUR OTHER PRINT BOOKS AND RELATED INFORMATION SOURCES:

Product DetailsProduct Details

SURVEY: Medical Work-Place Violence 2022

Global Healthcare Exchange

By Staff Reporters

***

***

5 Key Findings

 •  58% of Americans are worried about nurses and other clinicians being harmed while on hospital property.
 •  66% of Americans agree nurses and other front-line healthcare workers are more likely than those in other professions to be victims of workplace violence.
 •  57% say burn out from the past few years plays a role in contributing to healthcare labor shortages.
 •  88% believe that keeping track of every hospital visitor is essential to safety.
 •  82% of Americans believe that more state/federal action should be taken to keep healthcare workers safe.

Source: GHX, “82% of Americans believe that more state/federal action should be taken to keep healthcare workers safe,” April 7, 2022

***

COMMENTS APPRECIATED

Thank You

***

***

***

HEALTH INFORMATION TECHNOLOGY: Ransomware and Bankruptcy!

Bad things can happen in paperless practices, Doc

By Darrell Pruitt DDS

***

***

“Illinois Hospital First To Shut Down Completely After Ransomware Attack”

-By Karl Bode for Techdirt, Jun 16th 2023.

“Such attacks can have a chain reaction on already broken hospitals and health care systems. Health care workers are sometimes forced to resort to pen and paper for patient charts and prescriptions, increasing the risk of potentially fatal error. Delays in care can also prove fatal. And ransomware is only one of the problems that plague dated medical IT systems whose repair is being made increasingly costly and difficult by medical health care system manufacturers keen on monopolizing repair.”

Remember the MCNA (Managed Care of North America) data breach that was reported by Bill Toulas in Bleeping Computer on May 29th? There have been new developments.

LINK: https://www.bleepingcomputer.com/news/security/mcna-dental-data-breach-impacts-89-million-people-after-ransomware-attack/?fbclid=IwAR29pojexxoxDrrjIbcQqAAgnw17L5xqMXGxCnnDk_ZL0-kIv2PCniVaG0Y

“Patients of a Florida-based dental insurance provider brought a proposed class action lawsuit alleging negligence over a ransomware data breach that leaked the private information of more than 8.9 million people on the dark web, saying they face a lifetime risk of having their identities stolen.”

David Minsky for Law 360

[June 16th, 2023]

If you are still using paper records, don’t change now.

***

***

COMMENTS APPRECIATED

Thank You

***

VENTURE CAPITAL FUNDING: Digital Health Space

Investment Banking

SPONSOR: http://www.MarcinkoAssociates.com

***

***

Venture capital funding in the digital health space cooled a bit in 2022 following a red-hot 2021. Overall, digital health companies raised $15.3 billion last year, down from the $29.1 billion raised in 2021—but still above the $14.1 billion raised in 2020, according to Rock Health a seed fund that supports digital health startups.

MORE: https://marcinkoassociates.com/welcome-medical-colleagues/

Nevertheless, analysts predict VC investors and IBs will still put a good amount of money into digital health in 2024 and 2025, especially in alternative care, drug development, health information technology, artificial intelligence, EMRs and software that reduces physician workload.

CITE: https://www.r2library.com/Resource

Of course. an essential first part of attracting VC interest and IB money is the crafting and presentation of your formal business plan [“pitch”] ; as well as the needed technical and managerial experience. This is crucial for success and exactly where we can assist.

READ MORE: investment-banking

***

***

COMMENTS APPRECIATED

Thank You

***

ONC: Push-Back Against Health IT Blocking Dis-Incentives

By Staff Reporters

***

Certified Health Information Technology Reported by Clinicians for ...

***

DEFINITION: The Office of the National Coordinator for Health Information Technology (ONC) is a staff division of the Office of the Secretary, within the U.S. Department of Health and Human Services. ONC leads national health IT efforts, charged as the principal federal entity to coordinate nationwide efforts to implement and use the most advanced health information technology [HIT] and the electronic exchange of health information.

CITE: https://www.r2library.com/Resource

***

***

And so, hospitals and medical groups are now pushing back on ONC’s proposed information blocking disincentives, arguing that the financial penalties are “excessive,” “unfair” and will discourage participation in value-based care programs [VBC].

VBC: https://medicalexecutivepost.com/2023/08/14/value-based-care-guidelines-and-best-practices/

COMMENTS APPRECIATED

Thank You

***

***

VENTURE CAPITAL FUNDING: Digital Health Space

Investment Banking

SPONSOR: http://www.MarcinkoAssociates.com

***

***

Venture capital funding in the digital health space cooled a bit in 2022 following a red-hot 2021. Overall, digital health companies raised $15.3 billion last year, down from the $29.1 billion raised in 2021—but still above the $14.1 billion raised in 2020, according to Rock Health a seed fund that supports digital health startups.

MORE: https://marcinkoassociates.com/welcome-medical-colleagues/

Nevertheless, analysts predict VC investors and IBs will still put a good amount of money into digital health in 2024 and 2025, especially in alternative care, drug development, health information technology, artificial intelligence, EMRs and software that reduces physician workload.

CITE: https://www.r2library.com/Resource

Of course. an essential first part of attracting VC interest and IB money is the crafting and presentation of your formal business plan [“pitch”] ; as well as the needed technical and managerial experience. This is crucial for success and exactly where we can assist.

READ MORE: investment-banking

***

***

COMMENTS APPRECIATED

Thank You

***

FLORENCE 2.0: A.I. Advice for a A Healthier Lifestyle And Mental Health

WHO

By Staff Reporters

***

***

By 2030, the WHO projects that 15 million healthcare workers will be missing globally. 

Introducing Florence, the “world’s most extensive freely accessible AI health worker” is one way of tackling this issue. 

Florence is knowledgeable in key health topics, including mental health, nutrition and tobacco cessation, and provides information on COVID-19 vaccines. So, have a chat with her.

READ MORE: https://www.who.int/news/item/04-10-2022-who-and-partners-launch-world-s-most-extensive-freely-accessible-ai-health-worker?mc_cid=16b214db2e&mc_eid=40fee31c25

COMMENTS APPRECIATED

Thank You

***

***

DIGITAL HEALTH: 8 Ways to Impress Your Doctor

By Bertalan Meskó, MD PhD
The Medical Futurist

***

READ HERE: https://tinyurl.com/2hat4fun

COMMENTS APPRECIATED

Thank You

***

ORDER: https://www.amazon.com/Dictionary-Health-Information-Technology-Security/dp/0826149952/ref=sr_1_5?ie=UTF8&s=books&qid=1254413315&sr=1-5

***

PODCAST: Technology Adoption in Healthcare

The Technology Adoption Lifecycle Applied to Healthcare

By Eric Bricker MD

***

***

DHITS: https://www.amazon.com/Dictionary-Health-Information-Technology-Security/dp/0826149952/ref=sr_1_5?ie=UTF8&s=books&qid=1254413315&sr=1-5
***
COMMENTS APPRECIATED

Thank You

***

PODCAST: EMRs are a MESS!

By Eric Bricker MD

***

***

HIT: https://www.amazon.com/Dictionary-Health-Information-Technology-Security/dp/0826149952/ref=sr_1_5?ie=UTF8&s=books&qid=1254413315&sr=1-5

MORE: https://medicalexecutivepost.com/2022/03/28/emrs-laugh-or-cry/

COMMENTS APPRECIATED

Thank You

****

Dictionary of Health Information Technology and Security

ADVERTISEMENT

Whither the “Dictionary of Health Information Technology and Security?”

DHITS

A simple query that demands a cogent answer!

There is a myth that all stakeholders in the healthcare space understand the meaning of basic information technology jargon. In truth, the vernacular of contemporary medical information systems is unique, and often misused or misunderstood. It is sometimes altogether confounding.

Terms such as, “RSS”, “eHRs”, “DRAM”, “ROM”, “USB”, “PDA”, “NPI”, “CCHIT”, and “DNS” are common acronyms, but is their meaning AND functionality truly understood?

We appreciate the support of our sponsors. So, click-on on the links below and review all dictionary products.

Link: http://healthdictionaryseries.com/TechnologySecurity.aspx

HDS

 

 

 

Link: http://www.findbookprices.com/author/Hope_Hetico

Subscribe Now: Did you like this Medical Executive-Post, or find it helpful, interesting and informative? Want to get the latest ME-Ps delivered to your email box each morning? Just subscribe using the link below. You can unsubscribe at any time. Security is assured.

Link: http://feeds.feedburner.com/HealthcareFinancialsthePostForcxos

Sponsors Welcomed

And, credible sponsors and like-minded advertisers are always welcomed.

Link: https://healthcarefinancials.wordpress.com/2007/11/11/advertise

REPORT: Digital Health Technology

By Staff Reporters and MCOL

***

***

Digital Health Tech Report – 5 Key Findings

 •  48% of hospitals don’t have a strong digital health strategy.
 •  90% believe a strong digital health strategy is critical to improving outcomes, increasing productivity, and enhancing clinician satisfaction.
 •  55% receive more than 11 vendor calls and emails from digital health solution vendors per week.
 •  95% say it’s challenging to narrow down the list of digital health solutions to evaluate.
 •  25% are “very confident” that, after selecting a new digital health solution, it’s truly the best one for their unique needs.

Source: Panda Health, April 2022

***

***

***

SURVEY: Medical Imaging A.I. Adoption?

By MCOL

***

***

Medical Imaging A.I. Adoption Survey [3 Takeaways]

 •  When it comes to specific activities, 88% of respondents trust or are neutral about AI’s role in making appointments.
 •  Only 19% of respondents believed they received care supported by AI, while 24% did not know, and 58% believed they had not.
 •  60% think that AI will perform over half of radiology services in five years, with that number increasing to 75% of respondents in the next 20 years.

Source: Intelerad via HIT Consultant, “Patient Trust Not a Barrier to AI Medical Imaging Adoption,” May 31, 2022

***

COMMENTS APPRECIATED

Thank You

***

***

List of Healthcare IT Trade Associations

Advancing Medical Practice Success with Strategic Relationships

By Staff ReportersHDS

To be efficient in healthcare delivery today, doctors must partner and understand the resources and affiliations that are available to them. Here is a brief list of several healthcare trade associations and leading industry vendors submitted for your review.

AHIMA
The American Health Information Management Association (AHIMA) is the premier association of health information management professionals. AHIMA’s 51,000 members are dedicated to the effective management of personal health information needed to deliver quality healthcare to the public. Founded in 1928 to improve the quality of medical records, AHIMA is committed to advancing the health information management profession in an increasingly electronic and global environment through leadership in advocacy, education, certification, and lifelong learning.

EHRA
HIMSS EHRA is a trade association of Electronic Health Record (EHR) vendors that addresses national efforts to create interoperable EHRs in hospital and ambulatory care settings. HIMSS EHRA operates on the premise that the rapid, widespread adoption of EHRs will help improve the quality of patient care and the productivity of the healthcare system. The primary mission of the association is to provide a forum for the EHR vendor community relative to standards development, the EHR certification process, interoperability, performance and quality measures, and other EHR issues that may become the subject of increasing government, insurance and physician association initiatives and requests.

HIMSS
HIMSS (Healthcare Information and Management Systems Society) is the healthcare industry’s membership organization exclusively focused on providing leadership for the optimal use of healthcare information technology and management systems for the betterment of human health. Founded in 1961 with offices in Chicago, Washington D.C., and other locations across the country, HIMSS represents approximately 17,000 individual members and some 275 member corporations that employ more than 1 million people. HIMSS frames and leads healthcare public policy and industry practices through its advocacy, educational and professional development initiatives designed to promote information and management systems’ contributions to ensuring quality patient care.

HITSP
The Healthcare Information Technology Standards Panel serves as a cooperative partnership between the public and private sectors for achieving a widely accepted and useful set of standards specifically to enable and support widespread interoperability among healthcare software applications, as they will interact in a local, regional, and national health information network for the United States. Comprised of a wide range of stakeholders, the Panel will assist in the development of the U.S. Nationwide Health Information Network (NHIN) by addressing issues such as privacy and security within a shared healthcare information system. The Panel is sponsored by the American National Standards Institute (ANSI) in cooperation with strategic partners such as the Healthcare Information and Management Systems Society (HIMSS), the Advanced Technology Institute (ATI), and Booz Allen Hamilton. Funding for the Panel is being provided via the ONCHIT contract award from the U.S. Department of Health and Human Services.

HL7
Health Level Seven is an American National Standards Institute (ANSI)-accredited Standards Developing Organization (SDO) operating in the healthcare clinical and administrative data arena. It is a not-for-profit volunteer organization made up of providers, vendors, payers, consultants, government groups, and others who develop clinical and administrative data standards for healthcare. Health Level Seven develops specifications; the most widely used being a messaging standard that enables disparate healthcare applications to exchange keys sets of clinical and administrative data.

MSHUG
Microsoft Healthcare Users Group (MS-HUG) unified with the Healthcare Information and Management Systems Society (HIMSS) as part of the HIMSS Users Group Alliance Program in October 2003. The unification strengthens the commitment of HIMSS and MS-HUG to better serve their members and the industry through a shared strategic vision to provide leadership and healthcare information technology solutions that improve the delivery of patient care.

WEDI
The Workgroup for Electronic Data Interchange [WEDI’s] goal is to improve the quality of healthcare through effective and efficient information exchange and management. They aim to provide leadership and guidance to the healthcare industry on how to use and leverage the industry’s collective knowledge, expertise, and information resources to improve the quality, affordability, and availability of healthcare.

Assessment

As the health information technology industry evolves, we will continue to contribute our expertise to foster ideas that shape the future of healthcare by offering more examples similar to the above.

Conclusion

And so, your thoughts and comments on this Medical Executive-Post are appreciated. Who did we miss? Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, be sure to subscribe

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com

OUR OTHER PRINT BOOKS AND RELATED INFORMATION SOURCES:

Product DetailsProduct DetailsProduct Details

ANNOUNCING: A New Course In Digital Health

The Medical Futurist

By Dr. Bertalan Meskó MD PhD

***

I’m so happy and proud that I can finally share with you the biggest project The Medical Futurist has ever worked on: The Digital Health Course.

Today, we publicly launch the digital platform where you can learn about everything we and I personally find important about digital health. I mean EVERYTHING!

In this course I break down everything I’ve learned over the last 15 years about the future of healthcare and digital health, what changes are taking place now and over the next 5+ years, what impact they’ll have on you as a healthcare decision-maker, and exactly what you should be doing today to best position yourself or your company for this inevitable reality.

We designed this course to provide you with a complete overview of digital health, guide you through the technological aspects, and equip you to be able to predict and forecast what’s coming next.

From the basics and its definition, to why it’s a cultural transformation that is happening now, how it is a paradigm shift of care, how you can spot trends in it and forecast the near future.

***

***

As I guide you personally through the course, I have put my heart, brain and soul into the whole curriculum.

Sign up here > (free preview available)

***

***

***

TELE-HEALTH: Market Share of Outpatient Visits

By Staff Reporters

***

***

KFF: Share of Outpatient Visits by Telehealth, 2019-2021

 •  March 2019-Feb. 2020: 0% (Rounded, telehealth use was a negligible share prior to pandemic.)
 •  March-Aug. 2020: 13%
 •  Sept. 2020-Feb. 2021: 11%
 •  March-Aug. 2021: 8%

Source: KFF Health System Tracker, “Outpatient telehealth use soared early in the COVID-19 pandemic but has since receded,” February 10, 2022

***

COMMENTS APPRECIATED

Thank You

Subscribe to the Medical Executive-Post

***

***

ORACLE Buys CERNER Electronic Medical Records

By Staff Reporters

***

***

According to reporter Neal Freyman, Tech giant Oracle said it’s paying $28.3 billion to buy electronic medical records company Cerner, because anything that makes paperwork less excruciating seems like a savvy business play.

Oracle is known for being aggressive with acquisitions (it even rallied a group to try and buy TikTok last year), but Cerner is Oracle’s biggest purchase in its history. The deal is further evidence that health care is “on par with banking in terms of the importance to our future,” as cofounder Larry Ellison told analysts earlier this month.

  • In Cerner, Oracle will get the Klay Thompson of the electronic medical records market—a very influential player, but in second place behind Epic, which owns a 31% market share.

Bottom line: Big tech companies see a golden opportunity in bringing the health care industry to the cloud, given its size (health care spending accounts for almost 20% of US GDP), and its old-school record-keeping process. A Mayo Clinic study cited by Oracle showed that doctors and nurses spend an average of 1–2 hours on desk work for every hour they take to see patients.

***

EMR PODCAST: https://medicalexecutivepost.com/2021/08/29/podcast-on-electronic-medical-records/

***

COMMENTS APPRECIATED.

Thank You

Subscribe to the Medical Executive-Post

***

BUSINESS MEDICINE: https://www.amazon.com/Business-Medical-Practice-Transformational-Doctors/dp/0826105750/ref=sr_1_9?ie=UTF8&qid=1448163039&sr=8-9&keywords=david+marcinko

***

HIT: https://www.amazon.com/Dictionary-Health-Information-Technology-Security/dp/0826149952/ref=sr_1_5?ie=UTF8&s=books&qid=1254413315&sr=1-5

***
THANK YOU

***

Tele-Health Financial Expansion

BY HEALTH CAPITAL CONSULTANTS, LLC

****

Additional $20 Million Directed to Rural Telehealth Expansion

It has been well documented that the COVID-19 pandemic resulted in unprecedented increases in telemedicine utilization across the U.S. However, rural providers and patients, as evidenced by their lower rates of telemedicine usage during this time, have not been able to take advantage of the opportunities provided by telemedicine to the same extent as urban providers.

On August 18, 2021, the Health Resources and Services Administration (HRSA) of the Department of Health and Human Services (HHS) announced the latest attempt to ameliorate this issue – the distribution of nearly $20 million to 36 recipients for the purpose of strengthening telehealth services in rural and underserved communities and expanding innovation and quality. (Read more…)

CITE: https://www.r2library.com/Resource/Title/0826102549

***

YOUR COMMENTS ARE APPRECIATED.

Thank You

***

***

Dictionary of Health Information Technology and Security

LINK: https://www.amazon.com/Dictionary-Health-Information-Technology-Security/dp/0826149952/ref=sr_1_5?ie=UTF8&s=books&qid=1254413315&sr=1-5

Digital Health Update 2020-2021

Dear David,

For many companies, 2020 has been a devastating year due to the consequences of the COVID-19 pandemic. While the same can be said for the digital health sector, the pandemic has also paved a way to unexpected and extraordinary business opportunities in 2021.

digi health 1

Explore the top 5 business opportunities for digital health companies in 2021. Where is the money?

I am happy to share with you Ralf Jahns, MD of Research2Guidance latest opinion piece. If you have any questions or need more insights, facts or data to tailor the text and make it unique, please do not hesitate to contact me. I can arrange a short call with Mr. Jahns.

Thank you for your time.

Stay safe and healthy.

With warmest regards,
Stela Nikolova

Health Information Technology [EMR] Update

2014 to 2017

 

 

 

 

 

 

By D. Kellus Pruitt DDS

Three years ago

“When Patients Fear EHR – When patients believe paper medical records are safer and more private than electronic ones, their health can suffer. Many members of the public mistakenly believe electronic health records (ehrs) are less secure than paper files. Magnified by misinformation and political distortion of facts, an unnecessary fear has taken root in the minds of many consumers — often with serious consequences.” 

-Mansur Hasib

Cybersecurity Professional – Author and Speaker in commentary for informationweek, July 28, 2014

Http://www.informationweek.com/healthcare/electronic-health-records/when-patients-fear-ehr/a/d-id/1297519

This week 

“Doctors claim medical records system puts patient safety at risk – PROBLEMS with Queensland Health’s electronic medical record system are angering health workers, with fed-up senior doctors circulating a document slamming the technology and those in charge of it.”

-Kara Vickery and Janelle Miles – The Courier-Mail, July 25, 2017.

Http://www.couriermail.com.au/news/queensland/doctors-claim-medical-records-system-puts-patient-safety-at-risk/news-story/dc18cb388552eb4d179629c298a28408

“300,000 records breached in ransomware attack on Pennsylvania health system – The breach on Women’s Health Care Group of Pennsylvania was discovered in May, but hackers had unauthorized access to the system as early as January.”

-Jessica Davis – Health Care IT News, July 26, 2017

Http://www.healthcareitnews.com/news/300000-records-breached-ransomware-attack-pennsylvania-health-system

“HIPAA Data Breaches, Cyber Attacks Reported by 47% of Orgs – KPMG found that there was a 10 percentage point increase in reported HIPAA data breaches or cyber attacks from 2015 to 2017.”

-Elizabeth Snell – Health IT Security, July 27, 2017

Https://healthitsecurity.com/news/hipaa-data-breaches-cyber-attacks-reported-by-47-of-orgs

“Doctors frustrated that electronic records steal time from patients – Dr. Rebekah Gardner has to make a choice each time she sees a patient in her Rhode Island office: she can scroll computer screens and click boxes, or she can focus on the patient and take home the computer work.”

-Ronnie Cohen – Reuters, July 28, 2017

Http://www.reuters.com/article/us-health-records-electronics-iduskbn1ad2gt

“Plastic Surgery Associates data breach: Patients’ records, payment card details possibly compromised – The company said it discovered that some of its systems were infected with ransomware in February.”

-Hyacinth Mascarenhas – International Business Times, July 29, 2017

Http://www.ibtimes.co.uk/plastic-surgery-associates-data-breach-patients-records-payment-card-details-possibly-compromised-1632555

Conclusion

Your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, urls and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com

OUR OTHER PRINT BOOKS AND RELATED INFORMATION SOURCES:

Risk Management, Liability Insurance, and Asset Protection Strategies for Doctors and Advisors: Best Practices from Leading Consultants and Certified Medical Planners™

***

The Top Medical Specialties with the Biggest Potential in the Future

The Medical Futurist

[By Bertalan Meskó, MD PhD]

Some say technology will replace 80% of doctors in the future. I disagree.

Instead, technology will finally allow doctors to focus on what makes them good physicians: treating patients and innovating, while automation does the repetitive part of the work.

While every specialty will benefit from digital health, some will especially thrive due to these innovations.

Here, I enlisted the medical fields with the biggest potential for development in the future. Read more.

*** 

***

Conclusion

Your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, urls and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: marcinkoadvisors@msn.com

OUR OTHER PRINT BOOKS AND RELATED INFORMATION SOURCES:

Product DetailsProduct Details

*** 

 

Generational Attitudes Toward HIT

Join Our Mailing List

By http://www.MCOL.com

***

graphoid101916

***

MORE: foreword-mata-2

MORE: Glossary IT Terms

Conclusion

Your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com

OUR OTHER PRINT BOOKS AND RELATED INFORMATION SOURCES:

Product DetailsProduct DetailsProduct Details

***

The State of Health Information Technology

Join Our Mailing List

In Six Visuals

By Venture Scanner

The-State-of-Health-Technology

[Double-Click to Enlarge]

Conclusion

Your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com

OUR OTHER PRINT BOOKS AND RELATED INFORMATION SOURCES:

Product DetailsProduct DetailsProduct Details

http://www.HealthDictionarySeries.org

***

Top Five Technology Enabled Features for Health Plans

Join Our Mailing List

By http://www.MCOL.com

Sought by Consumers

***

ImageProxy

***

Conclusion

Your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com

OUR OTHER PRINT BOOKS AND RELATED INFORMATION SOURCES:

 Product DetailsProduct DetailsProduct Details

***

Top 40 Medical Technology Trends

Join Our Mailing List

Changing Technology Trends

Bertalan Meskó, MD, PhD

By Bertalan Meskó MD PhD

How The Top 40 Medical Technology Trends Changed In 3 Years

Free Guide And Infographic http://bit.ly/1XxSA3g

***

26a6e234-8f5a-4a9b-87fc-5ce6168c0d30-original

***

Conclusion

Your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com

OUR OTHER PRINT BOOKS AND RELATED INFORMATION SOURCES:

Product DetailsProduct DetailsProduct Details

***

The Economic Impact of UnHealthy Bio-Metrics

Join Our Mailing List

For 20102 – 2014

http://www.MCOL.com

***

ImageProxy

***

Conclusion

Your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com

OUR OTHER PRINT BOOKS AND RELATED INFORMATION SOURCES:

***

[HEALTH INSURANCE, MANAGED CARE, ECONOMICS, FINANCE AND HEALTH INFORMATION TECHNOLOGY COMPANION DICTIONARY SET]

      Product DetailsProduct DetailsProduct Details

[Mike Stahl PhD MBA] *** [Foreword Dr.Mata MD CIS] *** [Dr. Getzen PhD]

***

How Do Medical Students See Future Technologies?

Join Our Mailing List

Disruptive Technologies in Medicine

[By Dr. Bertalan Meskó]

Bert Mesko

Recently, I gave a talk to medical students about what kind of trends and technologies might shape the future and I was very curious what they think about these.

The Question

I asked them to give a score between 1 and 3 about how beneficial or advantageous those can be for society; and a score between 1 and 3 about how big threats they will pose to us.

They also gave a score between 1 and 10 about how much they look forward to using a technology in action. See the full size infographics here.

The Answer

So, I just wrote about how our Disruptive Technologies in Medicine university course prepares medical students for the coming waves of change. I also recently published an infographic related to new technologies in medicine.

***

ScreenShot2

***

Assessment

Preparing them for the future is a real challenge but I remain confident that we need to to that and it is still possible.

***

future

***

More:

***

FUTURISTIC MEDICAL INTERFACE

Interactive Touch Screen Application
***
This interactive touch screen presentation is an outstanding example for the importance of nice interfaces. With them you are able to show information in a whole new way and exploring data is an adventure every time!We created a vertical interactive touch screen presentation that was controlled by a mobile device. We only focused on the futuristic design and the beautiful interfaces . Our aim – the future is here and now!

Our touch screen presentations bring the future directly to your exhibition stand, shop, museum, hospital or even your tv show or movie! No prerendered elements!

It’s realtime!

LINK: https://www.behance.net/gallery/14374555/FUTURISTIC-MEDICAL-INTERFACE

***

Conclusion

Your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com

OUR OTHER PRINT BOOKS AND RELATED INFORMATION SOURCES:

Product DetailsProduct Details

Product Details

Health Data Breaches Multiplying

Join Our Mailing List

YET – Fines Remain Rare

By Charles Ornstein @charlesornstein

[ProPublica]

Federal health watchdogs say they are cracking down on organizations that don’t protect the privacy and security of patient records, but data suggests otherwise.

***

Fines Remain Rare Even As Health Data Breaches Multiply

***

data

***

Channel Surfing the ME-P

Have you visited our other topic channels? Established to facilitate idea exchange and link our community together, the value of these topics is dependent upon your input. Please take a minute to visit. And, to prevent that annoying spam, we ask that you register. It is fast, free and secure.

More:

Even More:

Conclusion

Your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com

OUR OTHER PRINT BOOKS AND RELATED INFORMATION SOURCES:

Product Details

Product DetailsProduct Details

On Healthcare Provider’s Use of Technology

Join Our Mailing List

Most Important Tool for Effective Communications in ACO

By http://www.MCOL.com

MD Technology

 

Assessment

Conclusion

Your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com

OUR OTHER PRINT BOOKS AND RELATED INFORMATION SOURCES:

Product DetailsProduct DetailsProduct Details

  Product Details

Common Daily Clinician Health Technologies

Join Our Mailing List

Most Commonly Provided to Support Daily Activities

www.MCOL.com

Health Technology

More:

Conclusion

Your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.

Link: http://feeds.feedburner.com/HealthcareFinancialsthePostForcxos

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com

OUR OTHER PRINT BOOKS AND RELATED INFORMATION SOURCES:

DICTIONARIES: http://www.springerpub.com/Search/marcinko
PHYSICIANS: www.MedicalBusinessAdvisors.com
PRACTICES: www.BusinessofMedicalPractice.com
HOSPITALS: http://www.crcpress.com/product/isbn/9781466558731
CLINICS: http://www.crcpress.com/product/isbn/9781439879900
BLOG: www.MedicalExecutivePost.com
FINANCE: Financial Planning for Physicians and Advisors
INSURANCE: Risk Management and Insurance Strategies for Physicians and Advisors

Product DetailsProduct Details

Product Details

The Percentage of Office-Based Doctors with EHRs

Join Our Mailing List

US 2001-2013

By www.MCOL.com

EHR

Conclusion

Your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.

Link: http://feeds.feedburner.com/HealthcareFinancialsthePostForcxos

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com

OUR OTHER PRINT BOOKS AND RELATED INFORMATION SOURCES:

DICTIONARIES: http://www.springerpub.com/Search/marcinko
PHYSICIANS: www.MedicalBusinessAdvisors.com
PRACTICES: www.BusinessofMedicalPractice.com
HOSPITALS: http://www.crcpress.com/product/isbn/9781466558731
CLINICS: http://www.crcpress.com/product/isbn/9781439879900
BLOG: www.MedicalExecutivePost.com
FINANCE: Financial Planning for Physicians and Advisors
INSURANCE: Risk Management and Insurance Strategies for Physicians and Advisors

Product DetailsProduct Details

Product Details

On Health Websites and “Apps”

Join Our Mailing List 

Not Just a Fad – Anymore

By Jennifer Tomasik, Carey Huntington and Fabian Poliak

http://www.CFAR.com

Jennifer Tomasik

Health Information Technology [HIT] may have arrived slowly into clinics and insurance companies, but the pace of innovation and adoption in consumer electronics today is astounding (and accelerating).

Devices are quickly penetrating every facet of our lives in the form of laptops, smartphones, tablets, and beyond. Thousands of health and wellness websites and software applications (“apps”) already exist, and we believe their role in healthcare will be increasingly a central one. Some are crucial elements of health organizations’ programming, such as the online platform that ShapeUp is built on: www.ShapeUp.com

Are they Effective?

Many are stand-alone tools without an organization or programming per se—i.e. apps for counting calories, monitoring glucose levels, or tracking sleep. But are websites and applications effective means of engaging individuals in their own health? And if so, what separates the good ones from the bad ones?

The Data

A 2009 meta-analysis of web-based smoking cessation programs found the pooled quit rate for participants to be 14.8% after follow-up conducted three months out, and 11.7% after six months out. [i] These figures are an improvement over the rate of people attempting to quit without any help or resources, as previously cited.

Internal Studies

From our own study of health websites and applications, we are beginning to see that high-quality digital resources share many of the same characteristics as great products and services do in the physical world. They create pull by engaging users via explicit reward structures. They enable teamwork and foster social accountability. Their content is interactive, informative, and often individualized. Their use is intuitive, convenient (e.g. accessible by web on a laptop or tablet and by smartphone “mobile apps”), and even effortless to the user (e.g. automatically collecting, synchronizing, and analyzing information).

Apps

Fragmentation

The fragmented world of websites and applications is not without its problems.

In today’s “app market,” the void that many websites and applications fill is not necessarily in the best interest of “health consumers,” and the quality of their products or services is often questionable. We see such issues as a reality of any market in its early stages.

Assessment

However, we are optimistic that greater consultation with medical professionals, greater investment and competition among health organizations, and improved regulation can help this new market mature into an indispensable virtual ecosystem of resources for health-seeking individuals.

More:

Conclusion

Your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.

Link: http://feeds.feedburner.com/HealthcareFinancialsthePostForcxos

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com

OUR OTHER PRINT BOOKS AND RELATED INFORMATION SOURCES:

DICTIONARIES: http://www.springerpub.com/Search/marcinko
PHYSICIANS: www.MedicalBusinessAdvisors.com
PRACTICES: www.BusinessofMedicalPractice.com
HOSPITALS: http://www.crcpress.com/product/isbn/9781466558731
CLINICS: http://www.crcpress.com/product/isbn/9781439879900
BLOG: www.MedicalExecutivePost.com
FINANCE: Financial Planning for Physicians and Advisors
INSURANCE: Risk Management and Insurance Strategies for Physicians and Advisors


[i] Myung SK, McDonnell DD, Kazinets G, Seo HG, Moskowitz JM. “Effects of Web- and computer-based smoking cessation programs: meta-analysis of randomized controlled trials.” Arch Intern Med 2009;169(10):929-37.

Product DetailsProduct Details

Product Details

The Danger of Used Health Information Technology

Join Our Mailing List

Remember to destroy that hard drive!

By D. Kellus Pruitt DDS

1-darrellpruittNEWS FLASH!

Affinity Health Plan to Pay $1.2 Million+ for HIPAA Violations -The HHS Office for Civil Rights on August 14 sent the industry a message on the importance of erasing protected health information on hardware being sold, recycled or returned,” by Joseph Goedert, HealthDataManagement.

http://www.healthdatamanagement.com/news/breach-notification-hipaa-privacy-security-affinity-46483-1.html

Talk about bad luck

A photocopier once leased by Affinity Health was purchased by CBS Evening News – which discovered that the copier’s hard drive contains 344,579 individuals’ unencrypted Protected Health Information.

The Response

In response to the federal investigation triggered by the CBS discovery, the Office of Civil Rights announced: “OCR’s investigation indicated that Affinity impermissibly disclosed the protected health information of these affected individuals when it returned multiple photocopiers to leasing agents without erasing the data contained on the copier hard drives.

Moreover ….

In addition, the investigation revealed that Affinity failed to incorporate the electronic protected information stored on photocopier hard drives in its analysis of risks and vulnerabilities as required by the Security Rule, and failed to implement policies and procedures when returning the photocopiers to its leasing agents.”

Assessment

Before disposing of used technology, remember to destroy the hard drive.

Conclusion

Your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.

Link: http://feeds.feedburner.com/HealthcareFinancialsthePostForcxos

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com

OUR OTHER PRINT BOOKS AND RELATED INFORMATION SOURCES:

DICTIONARIES: http://www.springerpub.com/Search/marcinko
PHYSICIANS: www.MedicalBusinessAdvisors.com
PRACTICES: www.BusinessofMedicalPractice.com
HOSPITALS: http://www.crcpress.com/product/isbn/9781466558731
CLINICS: http://www.crcpress.com/product/isbn/9781439879900
BLOG: www.MedicalExecutivePost.com
FINANCE: Financial Planning for Physicians and Advisors
INSURANCE: Risk Management and Insurance Strategies for Physicians and Advisors

Product DetailsProduct Details

Impact of Health Information Technology

Join Our Mailing List

An HIT Infographic

[By HIMSS Clinical Informatics Community]

Practicing clinicians have indicated strong support for the ability of health IT to overcome communication challenges among care providers. Considering that a series of Institute of Medicine reports on errors in healthcare have led to widespread recognition that siloed practices and inadequate communication are primary contributors to medical errors, continued endorsement for health IT will lead to better communication and enhanced quality of care.

The results come from the 2013 iHIT study conducted by HIMSS and HIMSS Analytics, released during HIMSS13, the organization’s annual conference and exhibition. The study was designed to explore the role of health IT from an inter-professional communication perspective. More than 500 clinician respondents working in a care delivery setting provided information on the value of health IT in support of quality care.

Read the Full Study & Final Report

HIMSS 2013 iHIT Study – Final Report
HIMSS 2013 iHIT Study – Executive Summary

 HIT

Assessment

According to the study, the health IT tools in place at the provider organizations of respondents support various clinical processes and provide improved access to the information needed to prepare for delivery of care. This includes having improved access to information needed on patients transferring to a clinician’s unit/caseload, ultimately resulting in enhanced levels of patient care.

Conclusion

Your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.

Link: http://feeds.feedburner.com/HealthcareFinancialsthePostForcxos

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com

OUR OTHER PRINT BOOKS AND RELATED INFORMATION SOURCES:

Product DetailsProduct Details

The Rise of Digital Doctors?

Join Our Mailing List

Physicians and the Use of Social Media

Conclusion

Your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.

Link: http://feeds.feedburner.com/HealthcareFinancialsthePostForcxos

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com

Our Other Print Books and Related Information Sources:

Health Dictionary Series: http://www.springerpub.com/Search/marcinko

Practice Management: http://www.springerpub.com/product/9780826105752

Physician Financial Planning: http://www.jbpub.com/catalog/0763745790

Medical Risk Management: http://www.jbpub.com/catalog/9780763733421

Hospitals: http://www.crcpress.com/product/isbn/9781439879900

Physician Advisors: www.CertifiedMedicalPlanner.org

Product DetailsProduct DetailsProduct Details

Product Details  Product Details

Product Details

The Cost of Technology Over The Decades

Join Our Mailing List 

Plunging – Yet, Why Hasn’t Medical Care Followed Suit?

We are grateful to live in this century. For example, movies of the 1980′s have been more than intriguing over the course of the past few months, but times were obviously hard back then. Cell phones weren’t nearly as mobile as they are now, cassette players reigned supreme, and we could talk until blue in the face about hair. Walkman’s and cellular phones with their twenty inch antennas set the pace for this ease of access society we lived in; price tags and all.

Paying for this convenience was quite a task just a few decades ago, as a cell phone cost $4,000+, an Atari was the same price as a Wii, and an Apple 2 ran close to $3,000. We’re still keeping in mind that these products were quite the advancement in their day and age, but footing the bill was not something we’d be interested in today.

Source: http://pinterest.com/pin/304638252/

Assessment

So, why hasn’t the cost of healthcare come down over the same period?

Conclusion

And so, your thoughts and comments on this ME-P are appreciated. Please review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.

Link: http://feeds.feedburner.com/HealthcareFinancialsthePostForcxos

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com

Our Other Print Books and Related Information Sources:

Health Dictionary Series: http://www.springerpub.com/Search/marcinko

Practice Management: http://www.springerpub.com/product/9780826105752

Physician Financial Planning: http://www.jbpub.com/catalog/0763745790

Medical Risk Management: http://www.jbpub.com/catalog/9780763733421

Healthcare Organizations: www.HealthcareFinancials.com

Physician Advisors: www.CertifiedMedicalPlanner.com

Subscribe Now: Did you like this Medical Executive-Post, or find it helpful, interesting and informative? Want to get the latest ME-Ps delivered to your email box each morning? Just subscribe using the link below. You can unsubscribe at any time. Security is assured.

Link: http://feeds.feedburner.com/HealthcareFinancialsthePostForcxos

Sponsors Welcomed: And, credible sponsors and like-minded advertisers are always welcomed.

Link: https://healthcarefinancials.wordpress.com/2007/11/11/advertise

   Product Details

Doctor – Is Your Mac Vulnerable to Viruses?

Not Just a PC Problem Anymore!

Join Our Mailing List 

We all know that PCs are more vulnerable to viruses, worms, trojans, malware, adware and other electronic miscreants, than are Macs. And, that some medical professionals absolutely love their iPads and Macs.

But doctor, are you leaving your Mac vulnerable to unwanted intrusions?

 

Source: MacKeeper

Conclusion

Your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.

Link: http://feeds.feedburner.com/HealthcareFinancialsthePostForcxos

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com

OUR OTHER PRINT BOOKS AND RELATED INFORMATION SOURCES:

DICTIONARIES: http://www.springerpub.com/Search/marcinko
PHYSICIANS: www.MedicalBusinessAdvisors.com
PRACTICES: www.BusinessofMedicalPractice.com
HOSPITALS: http://www.crcpress.com/product/isbn/9781466558731
CLINICS: http://www.crcpress.com/product/isbn/9781439879900
BLOG: www.MedicalExecutivePost.com
FINANCE: Financial Planning for Physicians and Advisors
INSURANCE: Risk Management and Insurance Strategies for Physicians and Advisors

Product Details

Update on Tablet Usage in the Health Care Industry

A Growing Trend?

By Cyndi Laurenti

Join Our Mailing List 

The rapidly evolving technological era has ushered a host of industries into the digital world, including the medical field. Health care professionals in private and public institutions and even masters and PhD programs are quickly learning the immense benefits of utilizing technology in their practices and this has specifically included the use of the tablet computer.

Convenience and Mobility

In addition to the convenience tablets offer in size and mobility, more and more production companies are creating interfaces and programs specifically geared towards the healthcare industry and the tablet computer makes them more accessible and dynamic than the traditional clipboard. This is crucial in an industry where time is of the essence and life-changing decisions are made from moment to moment. Having a tablet computer puts the latest resources and tools in doctors and other health care professionals’ hands so they can make decisions efficiently.

Brand Neutral?

Although Tablet computers tend to be associated with the most popular brands like the iPad by Apple, a recent survey of 178 doctors indicated that even though the healthcare industry wants a tablet, it may not necessarily want the iPad in particular which does not have all the applications they require.

A whole industry of tablets has been specifically designed to meet the medical field’s particular needs, one example being the motion computing tablet PC. The West Clinic in Memphis which was founded by Supportive Oncology Services (SOS) and which caters for over 10,000 patients found that the motion computing tablet computer enabled them not only to streamline information between patients and physicians, but that it also lead to an improved quality of care and life for their patients and increased efficiency for their caregivers.

Other Healthcare Early Adopters

Another facility that adapted the use of tablet computers is the Lancaster General Hospital in Lancaster, PA, which has been rated as one of the top 100 hospitals for its efficiency and quality of care. The doctors and nurses are currently using 170 tablet computers in 21 units for a variety of tasks. Jon White, M.D. called it a ‘productivity tool’ and it is utilized around the hospital for patient safety through an application that assigns drugs through a unique bar code which ensures the right patient is getting the right medication and dose. It is also used to access patient records from anywhere in the hospital, review patient orders or test results, and access a library of medical reference information.

A third facility that utilizes the tablet computer is St. Mary’s Medical Center, an acute care facility in Evanville, Indiana, that provides inpatient and outpatient care. The tablet computer has currently replaced their paper-based patient charts, and cut down nurses’ charting times significantly.

Assessment

There is little doubt that the tablet computer has and will continue to revolutionize the healthcare industry. Tremendous positive changes have been made like the streamlining of once time-consuming and arduous processes. This increased efficiency ultimately translates into quality care for patients and the continued advancement of the medical field.

Conclusion      

And so, your thoughts and comments on this ME-P are appreciated.  Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.

Link: http://feeds.feedburner.com/HealthcareFinancialsthePostForcxos

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com

Our Other Print Books and Related Information Sources:

Health Dictionary Series: http://www.springerpub.com/Search/marcinko

Practice Management: http://www.springerpub.com/product/9780826105752

Physician Financial Planning: http://www.jbpub.com/catalog/0763745790

Medical Risk Management: http://www.jbpub.com/catalog/9780763733421

Healthcare Organizations: www.HealthcareFinancials.com

Physician Advisors: www.CertifiedMedicalPlanner.com

Subscribe Now: Did you like this Medical Executive-Post, or find it helpful, interesting and informative? Want to get the latest ME-Ps delivered to your email box each morning? Just subscribe using the link below. You can unsubscribe at any time. Security is assured.

Link: http://feeds.feedburner.com/HealthcareFinancialsthePostForcxos

Sponsors Welcomed: And, credible sponsors and like-minded advertisers are always welcomed.

Link: https://healthcarefinancials.wordpress.com/2007/11/11/advertise

   Product Details

Hospitals Slowly Affiliating with RBACs

The Rise of Role-Based Access Controls

By Dr. David Edward Marcinko MBA CMP

Last month I visited the University of Pennsylvania in Philadelphia. Of course, I graduated from Temple University myself and worked as an admissions clerk in the ER, back in the day.

There I learned that some local hospitals are affiliating in role-based access control (RBAC) electronic networks by controlling which patients, medical providers or health plans have access based on the needs of patients, payors, physicians, or insurers. User, doctor, and patient rights and services are then grouped by name, and access to medical resources is restricted to only those authorized.

The technology was first pioneered and used in London hospitals several years ago.

Example:

For example, when an RBAC network system is used by a hospital, each individual that is allowed access to the hospital’s network would have a pre-defined role (doctor, nurse, lab technician, administrator, patient, etc.).

If someone is defined as having the role of doctor, for example, then that user can access only resources of the healthcare network that the role of doctor has been allowed access to (electronic medical records, for example).

If another user has access as a diabetic patient, then that user cannot access unapproved health services, like OB-GYN. Each user is assigned one or more roles, and each role is assigned one or more privileges for users in that role.

Assessment

Link: http://www.computerweekly.com/Articles/2007/10/19/227566/How-to-implement-role-based-access-control.htm

Conclusion

And so, your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.

Link: http://feeds.feedburner.com/HealthcareFinancialsthePostForcxos

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com

Our Other Print Books and Related Information Sources:

Health Dictionary Series: http://www.springerpub.com/Search/marcinko

Practice Management: http://www.springerpub.com/product/9780826105752

Physician Financial Planning: http://www.jbpub.com/catalog/0763745790

Medical Risk Management: http://www.jbpub.com/catalog/9780763733421

Healthcare Organizations: www.HealthcareFinancials.com

Physician Advisors: www.CertifiedMedicalPlanner.com

Subscribe Now: Did you like this Medical Executive-Post, or find it helpful, interesting and informative? Want to get the latest ME-Ps delivered to your email box each morning? Just subscribe using the link below. You can unsubscribe at any time. Security is assured.

Link: http://feeds.feedburner.com/HealthcareFinancialsthePostForcxos

Sponsors Welcomed: And, credible sponsors and like-minded advertisers are always welcomed.

Link: https://healthcarefinancials.wordpress.com/2007/11/11/advertise

Product DetailsProduct DetailsProduct Details       

Product Details  Product Details

   Product Details 

Is HI-TECH Dead?

Join Our Mailing List

You Decide!

[By D. Kellus Pruitt DDS]

Yesterday, Don Fluckinger, Features Writer for SearchhealthIT, posted “Blumenthal: Building national health network could take decades”

“When Dr. David Blumenthal was national health IT coordinator, he focused on 2015, the HITECH Act’s original target date for meeting meaningful use criteria. Now that he’s back in civilian life, he’s taking a longer view of the initiative to create a national health network triggered by the HITECH Act’s cash incentives to physicians and hospitals using electronic health record (EHR) systems.”

http://searchhealthit.techtarget.com/news/2240035845/Blumenthal-Building-national-health-network-could-take-decades

Even though Fluckinger assures us that post-ONC, Blumenthal is still a “HITECH Act champion,” I’m not so sure. Perhaps in spirit only!

A Multi-Decade Project?

Last week, Dr. Blumenthal was the keynote speaker at the Massachusetts annual health IT conference. According to Fluckinger, he told the audience that building a secure, national, interoperable health information system “was always going to be a multi-year, maybe even multi-decade project.” That’s not what I remember. I remember being told that if I didn’t purchase a network-ready EHR for my dental practice by 2014, I wouldn’t be paid by insurance companies.

What Happened?

So, what happened to President Bush’s 2004 Executive Order of “interoperability (even with dentists) by 2014”? Is it too soon to say that he failed? So who is going to tell the thousands of HIT stakeholders who have been attracted by the smell of stimulus billions? Blumenthal?

Assessment 

I can only imagine that now that Dr. Blumenthal left his job as head of the ONC for a new job as a health policy professor at Harvard School of Public Health, the openness of life outside government makes him uncomfortable with the lame talking points he once pushed as part of his job, without cracking a smile.

Conclusion

Your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com

OUR OTHER PRINT BOOKS AND RELATED INFORMATION SOURCES:

Product DetailsProduct DetailsProduct Details

Product Details  Product Details

   Product Details 

A Video Vision of Healthcare’s Future from Microsoft

By Staff Reporters

Medical Tourism and Health Information Technology in Malaysia

Join Our Mailing List

According to Dan Dunlop, over at The Healthcare Marketer, the following video promotes Malaysia as a preferred healthcare destination. It positions the country as a one stop destination for all medical and tourism related needs, bringing together related service providers on a single platform. Malaysia would like to be seen as being on the leading edge of technology.

Malaysia Healthcare

In fact, here’s what the Malaysia Healthcare website had to say about the video:

“With state of the art hospitals being built in Malaysia; it’s just a matter of time before we experience seamless healthcare delivery. Malaysia Healthcare patients use a portable Personal Health Record (PHR) called the iPHER that carries all their PHI which includes, medications, lab tests, diagnosis, immunizations, alternative procedures, digital images, dental records, ophthalmic care (lens and contact prescriptions) and DNA any where in the world with no need to access the Internet to view the information. Malaysia Healthcare currently uses this PHR to reduce medical errors and create continuity of care for all their patients and to provide seamless healthcare delivery.”

Assessment

This is an incredible video that demonstrates how Microsoft sees the future of healthcare and shows one vision for how technology will potentially improve our way of life!

***

ME-P medical malpractice education

***

More:

Link: http://www.youtube.com/watch?v=6aKNK7OTHKs&feature=player_embedded#at=235

Conclusion

Your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com

OUR OTHER PRINT BOOKS AND RELATED INFORMATION SOURCES:

Product DetailsProduct DetailsProduct Details

Product Details  Product Details

   Product Details 

Building a Modern Electronic Heath Data Warehouse

A Brief “How-to” Essay with Commentary

By Staff Reporters

Join Our Mailing List 

According to a Standish Group survey, more than 70% of Health Information Technology applications go over budget and time and medical data warehouse applications are no exception. However, if you adopt a process, an oriented development approach and implement a rigorous project management discipline, your increase the likelihood that your medical data warehouse will be effective.

Key Steps

This is a simplified list, but reveals some of the key steps needed to build a medical data warehouse.

  • Extracting data from the data sources – can be very challenging as data might reside on different systems and this forces you to prioritize what data you want and what role that plays in your patient relations management decision-making. This step involves moving data from the source (for example to your Web site) to a central location (e.g. your marketing data mart).
  • Transforming the data – a key activity after data extraction.  This is critical to have cleaner data and involves modification, enhancement or elimination of data based on the job instructions.
  • Loading the transformed data into a dimensional database.
  • Building reports for decision makers (e.g. this could be a report for your marketing management outlining the analysis of your latest patient acquisition campaign).

Assessment

The first 3 steps – Effective data extract, transform and load (ETL) processes represent the number one success factor for your medical data warehouse project and can absorb up to 70 percent of the time spent on a typical warehousing project.

Conclusion

Your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.

Link: http://feeds.feedburner.com/HealthcareFinancialsthePostForcxos

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com

OUR OTHER PRINT BOOKS AND RELATED INFORMATION SOURCES:

LEXICONS: http://www.springerpub.com/Search/marcinko
PHYSICIANS: www.MedicalBusinessAdvisors.com
PRACTICES: www.BusinessofMedicalPractice.com
HOSPITALS: http://www.crcpress.com/product/isbn/9781466558731
CLINICS: http://www.crcpress.com/product/isbn/9781439879900
ADVISORS: www.CertifiedMedicalPlanner.org
BLOG: www.MedicalExecutivePost.com

 

Product DetailsProduct DetailsProduct Details

Content Exchange and Vocabulary Standards for eMRs

Understanding Terms and Definitions

By Shahid N. Shah MS

As per the HHS rules, vocabulary standards are standardized nomenclatures and e-code sets used to describe clinical problems and procedures, medications, and allergies for eMRs. Some commons terms and definitions are listed below:

Terms and Definitions

  • ASTM’s CCR – for most of your basic patient summary exchange needs the CCR will meet your needs. If you’re moving from low or no interoperability today to some interoperable capabilities then CCR is your best starting place.
  • International Classification of Diseases, 9th Revision, Clinical Modifications (ICD-9- CM) or SNOMED CT® should populate a problem list. If you’re not familiar with both standards and are unsure where to start, go with ICD-9 for problem lists. SNOMED is not commonly supported in the broad EMR industry but ICD-9 support is quite common so start there.
  • Health Level Seven (HL7) Clinical Document Architecture (CDA) Release 2 (R2) Level 2 CCD – for more advanced patient summary exchange needs the HL7 CDA is recommended. If you’re already supporting CCR exchange and it’s not meeting your needs then HL7 CDA is the next logical place to go.
  • For patient summary exchanges, HHS expect the following fields to be populated: problem list; medication list; medication allergy list; procedures; vital signs; units of measure; lab orders and results; and, where appropriate, discharge summary.
  • ICD-9-CM [ACD-10] or American Medical Association (AMA) Current Procedural Terminology (CPT®) Fourth Edition (CPT–4) to populate information related to procedures. Both of these standards are support broadly by most existing vendors so going with either or both is good.
  • For medication lists, HHS requires the use of codes from a drug vocabulary the National Library of Medicine has identified as an RxNorm drug data source provider with a complete data set integrated within RxNorm.
  • For lab results, HHS requires the use of LOINC® to populate information in a patient summary record related to lab orders and results when LOINC® codes have been received from a laboratory and are retained and subsequently available in your EMR. HHS states that in instances where LOINC® codes have not been received from a laboratory, the use of any local or proprietary code is permitted. HHS does not require these local or proprietary codes to be converted to LOINC® codes in order to populate a patient summary record.
  • For the purposes of electronic prescribing, your vendor must be capable of using NCPDP SCRIPT 8.1 or NCPDP SCRIPT 8.1 and 10.6. With respect to a vocabulary standard, your vendor must use codes from a drug vocabulary currently integrated into the NLM’s RxNorm. For the purposes of performing a drug formulary check, your vendor must be capable of using NCPDP Formulary & Benefits Standard 1.0 adopted by HHS (73 FR 18918).
  • There are standards required for insurance data like eligibility checking and submissions of claims. ASC X12N and NCPDP standards (Versions 4010/4010A and 5010 and Versions 5.1 and D.0, respectively) should be used for these transactions. It’s important to realize that Version 4010 is being phased out in favor of Version 5010 so your vendors need to support both at this time and must be able to move exclusively to Version 5010 in the future.
  • For the purposes of electronically submitting calculated quality measures required by CMS or by States, your vendor must be capable of using the CMS PQRI 2008 Registry XML Specification. Going forward, HL7 Quality Reporting Document Architecture (QRDA) Implementation Guide based on HL7 CDA Release 2 may be allowed but for now focus on the CMS PQRI requirements until HHS provides more guidance in the future.
  • For the purposes of submitting lab results to public health agencies, your vendor must be capable of using HL7 2.5.1.
  • For the purposes of electronically submitting information to public health agencies for surveillance and reporting, your vendor must be capable of using HL7 2.3.1 or HL7 2.5.1 as a content exchange standard. At this time HHS not required adverse event reporting nor have they adopted a specific vocabulary standard for submitting information to public health agencies for surveillance and reporting.
  • For the purposes of electronically submitting information to immunization registries your vendor must be capable of using HL7 2.3.1 or HL7 2.5.1 as a content exchange standard and the CDC maintained HL7 standard code set CVX -Vaccines Administered18 as the vocabulary standard.

Assessment

www.BusinessofMedicalPractice.com

Conclusion

And so, your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.  

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com and http://www.springerpub.com/Search/marcinko

Get our Widget: Get this widget!

Our Other Print Books and Related Information Sources:

Health Dictionary Series: http://www.springerpub.com/Search/marcinko 

Practice Management: http://www.springerpub.com/product/9780826105752

Physician Financial Planning: http://www.jbpub.com/catalog/0763745790

Medical Risk Management: http://www.jbpub.com/catalog/9780763733421

Healthcare Organizations: www.HealthcareFinancials.com

Physician Advisors: www.CertifiedMedicalPlanner.com

Subscribe Now: Did you like this Medical Executive-Post, or find it helpful, interesting and informative? Want to get the latest ME-Ps delivered to your email box each morning? Just subscribe using the link below. You can unsubscribe at any time. Security is assured.

Link: http://feeds.feedburner.com/HealthcareFinancialsthePostForcxos

Sponsors Welcomed: And, credible sponsors and like-minded advertisers are always welcomed.

Link: https://healthcarefinancials.wordpress.com/2007/11/11/advertise

Product DetailsProduct DetailsProduct Details       

Understanding HIT Security Risks – The Ugly Truth!

Join Our Mailing List

On the Privacy and Security of Healthcare Records

Dr. Mata

[By Richard J. Mata, MD, CIS]

There is no privacy …  get over it.

Scott McNealy, Former Sun Microsystems CEO

Storing and transmitting health information in electronic form exposes it to risks that do not exist, or exist to a lesser extent, when the information is maintained in paper.  For example, although both paper-based and electronic systems need protection from fire, water, and wear and tear because of aging, electronic data is also vulnerable to hardware or software malfunctions that can make data inaccessible or become corrupt, and to non-secure policies that can make data vulnerable to illegal access.  In addition, cyber-crimes, and unauthorized intrusions originating both internally and externally, are increasing dramatically every year, costing companies millions of dollars.  Nonetheless, electronic medical records (EMRs) are usually considered more secure than paper patient charts because paper records lack an audit trail, papers are easily lost, and their contents can be illegible.

Take Care the Risks

Healthcare organizations must take the new risks seriously, however, because health information is a vital business asset, and protecting it preserves the value of this asset.  In addition, securing patients’ information protects their privacy and enhances the organization’s reputation for professionalism, patient well-being, and trustworthiness.  Hospitals, emerging healthcare organizations (EHOs), physicians, and healthcare entities long ago recognized the value of health information, and implemented security policies and procedures, but as they move more into the electronic arena, it is vital to revise and update policies and procedures to acknowledge the different risks inherent in the digital age.

Three Components of Security

The three classic components of information security are confidentiality, integrity, and availability.  Donn B. Parker, a pioneer in the field of computer information protection,[1] added possession, authenticity, and utility to the original three.  These six attributes of information that need to be protected by information security measures can be defined as follows:  

  • Confidentiality: The protection and ethics of guarding personal information — for example, being cognizant of verbal communication leaks beyond conversation with associated healthcare colleagues.
  • Possession: The ownership or control of information, as distinct from confidentiality — a database of protected health information (PHI) belongs to the patients.
  • Data integrity: The process of retaining the original intention of the definition of the data by an authorized user — this is achieved by preventing accidental or deliberate but unauthorized insertion, modification or destruction of data in a database.  Make frequent backups of data to compare with other versions for changes made.
  • Authenticity: The correct attribution of origin — such as the authorship of an e-mail message or the correct description of information such as a data field that is properly named.  Authenticity may require encryption.
  • Availability: The accessibility of a system resource in a timely manner — for example, the measurement of a system’s uptime.  Is the intranet available?
  • Utility: Usefulness; fitness for a particular use — for example, if data are encrypted and the decryption key is unavailable, the breach of security is in the lack of utility of the data (they are still confidential, possessed, integral, authentic and available).

Ethics

When these attributes are considered in the healthcare context, another factor comes into play: ethics.  According to Dr. J. A. Magnuson, professor of public health informatics at Oregon Health Science University’s Medical Informatics Program, privacy,[2] security, and ethics are inextricably intertwined, and all are critical to public health’s role as a trustee of the public’s data.  As public health becomes increasingly involved in Electronic Data Interchange (EDI;[3]), the information aspects of privacy, security, and ethics become ever more critical.  All doctors take an ethical oath to protect the patient, and the obligation to uphold this oath extends to health data management, even for employees who do not take an oath.

The fields of medicine and information technology (IT) each have separate and related ethical considerations.  Ethics may prohibit technology, for example, when using a specific application that would make a security breach likely.  However, ethics may also demand technology.  Suppose that a new surveillance application would improve public health — is it not ethically imperative to utilize it to save countless lives?  But suppose it also almost guarantees a security breach — what does the ethical position on use of the application become then?  That is an extreme example, though not completely unrealistic.

FISA

Varied Uses

Complicating the picture is the fact that IT in the healthcare arena has so many and varied uses.  For instance, office-, clinic-, and hospital-based medical enterprise resource planning (ERP) is based on the same back-end functions that a company requires, including manufacturing, logistics, distribution, inventory, shipping, invoicing, and accounting.  ERP software can also aid in the control of many business activities, like sales, delivery, billing, production, inventory management, quality management, and human resources management.  However, other applications particular to the medical setting include the following:

  • The EMR, which has the potential to replace medical charts in the future, is feasible.[4]
  • Healthcare application service providers (ASPs)[5] are available via Internet portals.
  • Custom software production may produce more solution-specific applications.
  • Medical speech recognition systems and implementation are replacing dictation systems.
  • Healthcare local area networks (LANs), wide area networks (WANs), voice-over Internet protocol (IP) networks, Web and ATM file servers are ubiquitous.
  • The use of barcodes to monitor pharmaceuticals is decreasing the chance of medication errors and warns providers of potential adverse reactions.
  • Telemedicine and real-time video conferencing are already a reality.
  • Biometrics will be used more often for data access.
  • Personal digital assistant (PDA) wireless connectivity, which relies on digital or broadband technology including satellites, and radio-wave communications are increasingly common.
  • The use of wireless technology in medical devices will be increasing.

No Healthcare Standardization

All of these applications offer advantages, but the security of these IT methods and devices is not yet fully standardized or familiar to health professionals; despite the CCHIT, Office of the National Coordinator for Health Information Technology, etc.  They all involve inherent security and privacy risks, and the prudent healthcare organization will want to ensure that these risks are identified and contained.  For instance, a single firewall or intrusion detection system (IDS) may not be enough.

The process must begin by conducting a security risk assessment — that is, doing a thorough assessment of current systems and data, and performing checks such as real-time intrusion testing, validation of data audit trails, firewall testing, and remediation when gaps or failed systems are exposed.  These activities are part of developing a healthcare security plan, including disaster recovery.

Privacy Officers

To ensure that the risk assessment is thorough, hospital network administrators and Privacy Officers should have a working knowledge of federal regulations and of the following security mechanisms:

  • vulnerability assessment;
  • security policy development;
  • risk management;
  • firewall assessment;
  • security application assessment;
  • network security assessment;
  • incident response and recovery assessment;
  • authentication and authorization systems;
  • security products;
  • firewall implementation;
  • public key infrastructure (PKI) design;
  • virtual private network (VPN) design and implementation
  • intrusion detection systems;
  • penetration testing;
  • security program implementation;
  • security policy assessment; and
  • security awareness training.

The federal government has recognized the importance of health information security by establishing regulatory guidance with its Health Insurance Portability and Accountability Act of 1996 (HIPAA).

The International Standards Organization

Join Our Mailing List 

IT system managers in healthcare settings are also familiar with the comprehensive security model offered by the International Standards Organization (ISO).  For instance, using ISO’s 17799 Code of Practice for Information Security Management, versions 2000, 2005, or 2010 information security is achieved by implementing a suitable set of controls to govern policies, processes, procedures, organizational structures and software and hardware functions.  The Code requires the IT manager to establish, implement, monitor, review, and where necessary, improve these controls to ensure that the specific security and business objectives of a healthcare organization are met.

Assessment

The work of the National Institute of Science and Technology (NIST) in developing innovative technology for the healthcare sector is also of interest to IT system managers.  For instance, research on a computer note-writing system that captures clinical data automatically and a data repository system that captures patient data and integrates it with clinical decision support and knowledge bases are two of the initiatives that have originated with NIST.  In addition, the organization publishes numerous Special Publications that provide guidance on how to establish and maintain IT security.

CASE MODEL: HIT Security

Conclusion

Your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com

OUR OTHER PRINT BOOKS AND RELATED INFORMATION SOURCES:

References:


[1]   Donn B. Parker developed the so-called Parkerian Hexad Principles, which discuss the attributes of information security.

[2]   Privacy generally refers to a ‘people’ context, a state of being free from unauthorized intrusion or invasion.  This concept is as applicable to medical records as it is to your own house.  Confidentiality is viewed more in the context of information, usually dealing with accessing and sharing information or data.

[3]   EDI involves electronic transmission methods, often utilizing networks or the Internet.[3]  The benefits of EDI include speed, data entry savings, and reduction of manual errors; the risks are legion.

[4]   Terms used in the field include electronic medical record (EMR), electronic patient record (EPR), electronic health record (EHR), computer-based patient record (CPR), etc.  These terms can be used interchangeably or generically, but some specific differences have been identified.  For example, an EPR has been defined as encapsulating a record of care provided by a single site, in contrast to an EHR, which provides a longitudinal record of a patient’s care carried out across different institutions and sectors.  However, such differentiations are not consistently observed.

[5]   An application service provider (ASP) is a business that provides computer-based services to customers over a network.

Buy from Amazon

The Pros and Cons of eMRs

Join Our Mailing List

Delving Deeper into the Historic Origins of Debate

Dr. Mata

[By Richard J. Mata MD, CIS, CMP™]

Buy from Amazon

According to Wager, Ornstein, and Jenkins, in 2005, the perceived advantages of an EHR system include the following:

  •  Quality of the patient records (legible, complete, organized) — 86%
  •  Better access to patient records (available, convenient, fast) — 86%
  •  Improved documentation for patient care purposes — 93%
  •  Improved documentation of preventive services — 82%
  •  Improved documentation for quality improvement activities — 82%

Items viewed as an advantage by fewer respondents include the following:

  •  Administrative cost savings — 38%
  •  Improved efficiency — 61%
  •  Security of patient records — 64%

Nothing directly was said about cost savings or increased medical care quality. These topics have become more contentious issues during the past few years.

The Gurley Opinion

According to HIT expert Lori Gurley, in 2006, of the American Academy of Medical Administrators:

“The EHR provides the essential infrastructure required to enable the adoption and effective use of new healthcare modalities and information management tools such as integrated care,  evidenced-based medicine, computer-based decision support, care planning and pathways, and outcomes analysis” (Schloefell et al).  Although the benefits that support implementation of an EHR are clear, there are still barriers too, therefore the concept is still not accepted. “However, this could also be said of almost every other area of positive change and improvement within healthcare systems […]” (Schloefell et al).  There must be more involvement by the government and the private sector “to make changes where possible to instigate, motivate, and provide incentives to accelerate the development of solutions to overcome the barriers” (Young).

THINK: ARRA and HITECH, today. Of course, there are obviously advantages and disadvantages to both the paper medical record and the EHR.

Multi-Factorial Issues

Many factors must be considered before any healthcare organization or medical practice should implement an EHR.  The organization must first obtain as much information as possible about this new concept, and then the information must be carefully reviewed and the pros and cons discussed. Only then should the organization make their decision about this very important issue.

“The [EHR] as a part of a Clinical Information System (CIS) is a powerful tool which ties together documentation of the patient visit (clinical information), coding (diagnosis, and treatment procedures), which then translates into more accurate billing processes, reduces reprocessing of medical claims, and that translates into increased customer satisfaction with a provider” (Koeller). Although the technology is available, progress towards an EHR has been slower than expected. “Widespread use of [EHRs] would serve both private-and public-sector objectives to transform healthcare delivery in the United States” […] EHRs would also “enhance the health of citizens and reduce the costs of care” (Dick, Steen, and Detmer).

The MRI Study

According to a 2005-07 survey by the Medical Records Institute, the following factors are driving the push towards EHR systems within medical organizations:

Motivating Factors 2005 Ambulatory
The need to improve clinical processes or workflow efficiency. 89.3% 91.2%
The need to improve quality of care. 85.0% 85.3%
The need to share patient record information among healthcare practitioners and professionals. 81.1% 66.9%
The need to reduce medical errors (improve patient safety). 76.1% 69.1%
The need to provide access to patient records at remote locations. 67.9% 65.4%
The need to improve clinical documentation to support appropriate billing service levels. 67.1% 76.5%
The need to improve clinical data capture. 64.6% 61.0%
The need to facilitate clinical decision support. 60.7% 50.7%
The requirement to contain or reduce healthcare delivery costs. 54.6% 61.8%
The need to establish a more efficient and effective information infrastructure as a competitive advantage. 53.6% 53.7%
The need to meet the requirements of legal, regulatory, or accreditation standards. 50.0% 44.1%
Other 5.7% 5.1%
Totals 280 136
Margin of Error +/- 5.8% +/- 8.4%

Now, compare this with the results of the 2007 survey that focused on the factors driving hospitals to expand their use of EHR.

Driving Factors in a Hospital 2007
Efficiency and convenience, e.g., better networking to the medical community and patients and remote access 57.8%
Satisfaction of physicians and clinician employees 42.2%
The need to survive and thrive in a much more competitive, interconnected world. 41.0%
Regulatory requirements of JCAHO or NCQA. 35.6%
Savings in the Medical Record Department and elsewhere, including transcription. 24.0%
Value-based purchasing/pay for performance 17.7%
Pressure from payer groups, such as Leapfrog Group 15.2%
Possibility of subsidized purchase of HER, e-prescribing systems, etc. by purchasers/payers/large health systems. 8.8%
Totals 329
Margin of Error +/- 5.4%

Assessment

How have these motivating and driving factors changed today; have they really changed in 2010?

Does this deeper dive reveal any other truths; political, social, business or economic? Is this historical review helpful in understanding the reluctance or eagerness for EMR acceptance, or not?

Join Our Mailing List 

Conclusion

Your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.

Link: http://feeds.feedburner.com/HealthcareFinancialsthePostForcxos

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com

OUR OTHER PRINT BOOKS AND RELATED INFORMATION SOURCES:

DICTIONARIES: http://www.springerpub.com/Search/marcinko
PHYSICIANS: www.MedicalBusinessAdvisors.com
PRACTICES: www.BusinessofMedicalPractice.com
HOSPITALS: http://www.crcpress.com/product/isbn/9781466558731
CLINICS: http://www.crcpress.com/product/isbn/9781439879900
BLOG: www.MedicalExecutivePost.com
FINANCE: Financial Planning for Physicians and Advisors
INSURANCE: Risk Management and Insurance Strategies for Physicians and Advisors

Product DetailsProduct DetailsProduct Details

Product Details  Product Details

   Product Details 

Defining Electronic Medical Record Systems

Join Our Mailing List

Does Linguistic Obfuscation Exacerbate our Use Ambivalence?

[By Dr. Richard J. Mata; CIS, CMP™]

[By Dr. David E. Marcinko; MBA, CMP™]

The 2003 Institute of Medicine (IOM) Patient Safety Report [1] described an EHR [2] as encompassing:

  • a longitudinal collection of electronic health information for and about persons;
  • [immediate] electronic access to person- and population-level information by authorized users;
  • provision of knowledge and decision-support systems [that enhance the quality, safety, and;
  • efficiency of patient care] with support for efficient processes for health care delivery.

The IOM Report

A 1997 IOM report, The Computer-Based Patient Record: An Essential Technology for Health Care, provides a more extensive definition:

A patient record system is a type of clinical information system, which is dedicated to collecting, storing, manipulating, and making available clinical information important to the delivery of patient care. The central focus of such systems is clinical data and not financial or billing information. Such systems may be limited in their scope to a single area of clinical information (e.g., dedicated to laboratory data), or they may be comprehensive and cover virtually every facet of clinical information pertinent to patient care (e.g., computer-based patient record systems).

The HIMSS Model

The EHR definitional model document developed by the Health Information and Management Systems Society (HIMSS, 2003) includes:

“a working definition of an EHR, attributes, key requirements to meet attributes, and measures or ‘evidence’ to assess the degree to which essential requirements have been met once EHR is implemented.”

 

The IOM Model

Another IOM report, Key Capabilities of an Electronic Health Record System [Tang, 2003], identifies a set of eight core care delivery functions that EHR systems should be capable of performing in order to promote greater safety, quality and efficiency in health care delivery:

8 Core Principles

Today, we realize that the eight core capabilities that Electronic Health [Medical] Records should possess are:

  1. — Health information and data. Having immediate access to key information – such as patients’ diagnoses, allergies, lab test results, and medications – would improve caregivers’ ability to make sound clinical decisions in a timely manner.
  2. — Result management. The ability for all providers participating in the care of a patient in multiple settings to quickly access new and past test results would increase patient safety and the effectiveness of care.
  3. — Order management. The ability to enter and store orders for prescriptions, tests, and other services in a computer-based system should enhance legibility, reduce duplication, and improve the speed with which orders are executed.
  4. — Decision support. Using reminders, prompts, and alerts, computerized decision-support systems would help improve compliance with best clinical practices, ensure regular screenings and other preventive practices, identify possible drug interactions, and facilitate diagnoses and treatments.
  5. — Electronic communication and connectivity. Efficient, secure, and readily accessible communication among providers and patients would improve the continuity of care, increase the timeliness of diagnoses and treatments, and reduce the frequency of adverse events.
  6. — Patient support. Tools that give patients access to their health records, provide interactive patient education, and help them carry out home monitoring and self-testing can improve control of chronic conditions, such as diabetes.
  7. — Administrative processes. Computerized administrative tools, such as scheduling systems, would greatly improve hospitals’ and clinics’ efficiency and provide more timely service to patients.
  8. — Reporting. Electronic data storage that employs uniform data standards will enable health care organizations to respond more quickly to federal, state, and private reporting requirements, including those that support patient safety and disease surveillance.” [3]

Assessment

With all the confusion surrounding terms like quality improvement and “meaningful use” which can mean major Federal dollars to the coffers of a medical practice, clinic or hospital; are we still confused about basic definitional terms?

And, does eMR linguistic obfuscation exacerbate our use ambivalence and encourage physician/dentist eMR avoidance?

Conclusion

Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, be sure to subscribe. It is fast, free and secure.

References:

[1]   See http://www.himss.org/content/files/PatientSafetyFinalReport8252003.pdf.

[2]   EHR (electronic health record) is often used interchangeably with EMR (electronic medical record).  In this discussion, EHR will be used consistently.

[3]   See http://www.iom.edu/.

Product DetailsProduct DetailsProduct Details