Congratulations to Licking Memorial Hospital on achieving Stage 6 on the HIMSS EMR Adoption Model
Ed Gaudet
|
We were delighted this month to see yet another Imprivata customer achieve Stage 6 on the HIMSS EMR Adoption Model. Congratulations to Sallie Arnett and the team at Licking Memorial Hospital on becoming the 316th US hospital to be distinguished with Stage 6 status! I caught up with Sallie to ask her a few questions about the adoption process and how the EMR systems is being received among care providers at Licking Memorial.…
The Unintended Consequences of Meaningful Use – A CIO’s Perspective
Brian Mullins
|
Ed Ricks, the VP Information Services & CIO at Beaufort Memorial Hospital (an Imprivata customer), has started blogging for Computerworld on healthcare IT issues.…
Are you ready for Stage 2 Meaningful Use? The proposed ruling states hospitals must attest to 18 objectives, 16 core and 2 of 4 menu objectives and Stage 2 now begins in FFY 2014 (10/1/2013). By consolidating some objectives, introducing new ones and raising the threshold on some the bar is certainly raised. …
What a Difference a Year Makes: Onsite at VMworld 2011
Ed Gaudet
|
VMworld was markedly different from a healthcare IT point of view this year. I wrote a guest blog for HealthITExchange summarizing a few of my thoughts which you can find here. Were you at VMworld this year? What was your impression?…
Guest Post: The New Need for Auditing: Privacy and Breach Notification Mandates
Ali Pabrai
|
The HITECH Act, HIPAA, as well as mandates from State regulations (e.g. Massachusetts 201 CMR 17.00), are raising the minimal requirements that organizations such as healthcare-covered entities and business associates must implement to prevent unauthorized access. Further, the Connecticut Attorney General’s lawsuit against Health Net of Connecticut for failing to secure approximately 446,000 enrollees’ Protected Health Information (PHI), and to notify State authorities and enrollees of a security breach, is a reminder that breaches are not just a risk to information, but a risk to the organization.…
EMR Survey Finds Best Value Resides in Secondary Uses, but what about Data Security?
David Ting
|
I read a good article on FierceEMR recently surrounding a PricewaterhouseCoopers survey on electronic medical records (EMRs) that indicated that the secondary use of this information may be an organization’s greatest asset over the next five years. An overwhelming 76 percent of respondents agreed, and pointed to the abilities for mined data to decrease healthcare costs, predict public health trends and improve patient care. EMRs, with vendors such as Allscripts, NextGen and QuadraMed blazing the trail, have been a huge focal point of healthcare payers and providers, pharmaceutical companies and the general public with healthcare reform a primary platform of the Administration.…
Five Things to do in Identity Management this Summer
David Ting
|
Theoretically, as employees go on vacation during the summer months, there will be fewer demands on your IT team. Realistically, we know that’s not true and it seems like there is actually more to do. However, summer can provide the opportunity to step back and evaluate the state of your identity and authentication management infrastructure and policies. Here are five things that are easy to overlook throughout the year that you should consider doing this summer:…
ASIS 2008 in Atlanta: Where Physical/Logical Convergence Happens
Chip LeBlanc
|
I just came back from the ASIS 2008 Show in Atlanta and boy, do my feet hurt. Over 15,000 attendees, participation in 6 booths including our own, 3 days of constant conversation will do that to a person. This security show is the top venue for those wanting to be educated on the latest in security...from state of the art manhole covers to new IP video and access control systems.…
Having spent last week at the 2008 International MUSE (Medical Users Software Exchange) Conference in Grapevine Texas - the 25th annual gathering of clinical and technical users of Meditech software - I was delighted to see SSO is such a hot topic among this group. There were five customer presentations related to SSO and Strong Authentication, and all of them were filled to capacity.…
Study Finds Security and Privacy is Low Priority for Health Care Organizations
Dr. Barry Chaiken
|
The recent Ponemon Institute benchmark study on patient data privacy and security practices sheds some much-needed light on the practice of data protection within our nation’s hospitals. According to the study, today’s hospitals have little confidence in their ability to secure patient records, revealing just how vulnerable they are to data breaches – a concern for all patients. Highlighted are some of the key findings...…
Seven Habits of Highly-Effective Healthcare Security (without Sacrificing Clinician Workflow)
David Ting
|
Coming out of HIMSS 2010, it was clear that patient data security was a chief concern, but so was the need for improved clinician workflows. For all the requirements driven by new laws and the stimulus bill, what was overlooked was the impact of security in the real-world hospital environment from a user perspective. Forcing someone to change habits and daily routines is difficult, if not impossible, to do. Therefore, it is integral to the successful adoption of these security endeavors that they be paired with improving workflow. If change makes people’s lives easier, it’s easier for them to embrace. It doesn’t need to be an either/or argument.…
Observations from the 2009 Cerner Health Conference
Jon Hamdorf
|
I just left the annual Cerner Health Conference in Kansas City, where clinical and technical users of Cerner software gather to share ideas, best practices and technology solutions that are molding the future of healthcare.…