The search found 4249 results.
Wait times across all types of healthcare settings averaged nearly 19 minutes in 2017, according to a Vitals2 study. Practitioners with the longest wait times were emergency physicians (24.75 minutes on average) and general practitioners (22 minutes). Offices with shorter-than-average wait times tend to have more satisfied patients. The Vitals2 study found physicians with five-star ratings had average wait times of less than 13 minutes, while those with 22-minute wait times received only three stars on average.
Last month, Kristi Roose from Mahaska Health Partnership joined me for a live webinar that discussed deploying SSO and Strong Authentication, and the steps you can take to get to Meaningful Use faster. If you missed the webinar, you won't want to miss this -- we've gone ahead and transcribed our answers from the Q&A session.
Question 1: How long did it take to roll a unit out to all the departments and how long did it take to see acceptance to the change?
Answer: We approached these rollouts one unit at a time, and the time frame depended on the number of users. Usually it took about 1-2 weeks per unit to make sure that everyone was comfortable with the product. Once the unit was rolled out acceptance was immediate; customers were grateful for the product and relieved to be able to access data more easily. It was a relief for their workflow.
The National Association of Healthcare Access Management (NAHAM) annual conference is the premier patient access educational event, providing the latest information on a variety of topics critical to the important role of patient access services in healthcare. Elevating Patient Access, the NAHAM 44th Annual Conference in Denver May 3-6, 2018, promises to be an exciting event for industry professionals involved in the many aspects of patient identity and access management (IAM).
A couple of weeks ago I moderated a Healthcare IT News webinar session that examined how hospitals today make patient data easily and securely accessible throughout the clinical workflow. I was joined by Dr. Zafar Chaudry, CIO of Liverpool Women’s NHS Foundation Trust & Alder Hey Children’s NHS Foundation trust and Dr. Lawrence Losey, Pediatrician, Chief of Pediatrics and Chief Medical Information Officer (CMIO) for Parkview Adventist Medical Center. The session addressed the clinical workflow, process and technology behind providing fast, secure access to patient data, touching on all the areas within a hospital where a workstation sits and from anywhere a clinician may need access.
The HIMSS Virtual Conference occurred this week, covering myriad of topics ranging from Electronic Health Records (EHRs), impact of the HITECH Act, workflow optimization as well as privacy and security in the cloud for healthcare systems.
One presentation that readers of this blog may find useful was that from Box Butte General Hospital on Nov. 4 at 9:00am CT (you can register on the site for access; HIMSS members can already access it online). Here’s a brief synopsis from the session description highlighting what was covered in the presentation...
Many agencies that I’ve spoken to are not aware of the Advanced Authentication requirements of the FBI CJIS Security Policy 5.6.2.2 and are therefore not aware that they may be in breach of this requirement. This video will quickly enable you to find out whether you may be in breach and how Imprivata can put you back in compliance.
As an evangelist for Imprivata’s positive patient identification solution, patient access is always on my mind. But recently, I was able to not only see our product in action, but also to meet the patient access representatives who use it.With the NAHAM Patient Access conference coming up soon, it seemed like the perfect time to talk about that visit and highlight the patient access team.
This week I was part of Network World's second annual real-life scary security stories podcast, a panel hosted by Keith Shaw that told the tales of some frightful security happenings over the past year. There were some amazing examples of breaches of data, corporate espionage and simple access and authentication mis-steps, of which I added a few anecdotes from actual conversations I've had over the past year. [to protect the innocent, actual names were not used]
In the healthcare industry, particularly in emergency situations, providers must be able to swiftly attend to their patients by accessing vital applications and devices. Unfortunately, the task of logging into multiple care systems means less face time with the patient. At the same time, healthcare providers must ensure that their network and patient data are kept safe.
Originally published by Just Associates
This is the first of three blogs focused on patient identity management best practices, which is the subject of a white paper series by patient matching experts with Just Associates. To access the series, click here.