Devising a Sound mhealth Strategy

Size: px
Start display at page:

Download "Devising a Sound mhealth Strategy"

Transcription

1 Devising a Sound mhealth Strategy A Complimentary Webinar From healthsystemcio.com Sponsored by Vocera Your Line Will Be Silent Until Our Event Begins Please note, we begin at 1:15 ET Today Thank You!

2 Housekeeping Moderator Anthony Guerra, editor-in-chief, healthsystemcio.com Ask A Question We will be holding a Q&A session after the formal presentations. You may submit your questions at any time by clicking on the QA panel located in the lower right corner of your screen, type in your questions in the text field and hit send. Please keep the send to default as All Panelists. Download the Deck Go to Shortened URL at bottom of all slides View the Archive You will receive an when our archive recording is ready. Separate registration is required.

3 Agenda 45 Minutes 20 minutes: Chuck Podesta, SVP/CIO, Fletcher Allen Health Care 5 minutes: A Word from our Sponsor: Gautam "G" Shah, VP Product Management, Vocera 20 minutes: Q&A w/chuck Podesta

4 Devising a Sound mhealth Strategy

5 Chuck Podesta, SVP/CIO Fletcher Allen Healthcare Devising a Sound mhealth Strategy

6 Who We Are? 562 Bed Academic Medical Center in Burlington, VT. Vermont s only Academic Medical Center and Tertiary Care Center Serving over 1 Million people in VT and Northern New York Affiliated with University of Vermont College of Medicine & College of Nursing/Health Sciences 850 Credentialed Providers and 280 Residents 450 Employed Providers in University of Vermont Medical Group Affiliation with Central Vermont Medical Center to create Fletcher Allen Partners Affiliation with Champlain Valley Physicians Hospital and Elizabeth OneCare LLC (ACO) January 1, 2013 Adirondack LLC (ACO) January 1,

7 What is mhealth? mhealth (also written as m-health) is an abbreviation for mobile health, a term used for the practice of medicine and public health supported by mobile devices. The term is most commonly used in reference to using mobile communication devices, such as mobile phones, tablet computers and PDAs, for health services and information. mhealth applications include the use of mobile devices in collecting community and clinical health data, delivery of healthcare information to practitioners, researchers, and patients, real-time monitoring of patient vital signs, and direct provision of care (via mobile telemedicine) Wikipedia 7

8 Opportunities in mhealth Transitions of Care Wellness & Patient Engagement Provider Updates (alerts and access) Monitoring Fits with Population Health Management 8

9 Barriers in mhealth Infrastructure (Unified Communications) Integration of Information Patient and Provider Overload Privacy & Security Cost 9

10 Current Trends Real Time Location Services (RTLS) Bring Your Own Device (BYOD) Guest Access mhealth Application Development Sensors 10

11 mhealth Components Mobile System Access (EHRs, PACs) Yes this means we have to deal with BYOD Medical Devices Virtual Consultations Wearable Computing Remote Patient Monitoring (Sensors) 11

12 Fletcher Allen Environment Epic EHR Virtual Desktop Single Sign-on and Authentication Thin Clients Smart Phones & Tablets Mobile Device Management (MDM) 12

13 BYOD Necessity Mobile Device Management Single Management Console Enrollment of Device Enterprise Settings, Policies, Restrictions Terms of Use Analytics Device Commands (e.g. Swiping) 13

14 Three Rules To a Sound mhealth Strategy Rule 1 - Keep PHI Off Of Mobile Devices Rule 2 Make it Painless for Providers to Access EHRs and other Applications Rule 3 Encrypt, Encrypt, Encrypt 14

15 Rule 1 - Keep PHI Off Of Devices Move From Policy Based Controls to Technology Based Controls ($$$) Shut Off Auto Archiving VDI Keeps PHI in the Data Center Active Directory Group Policies Redirects Local Folders to Network Drives Implement a Managed Cloud-Based File Sharing Tool Box Enterprise OneDrive Citrix ShareFile 15

16 Rule 2 Make it Painless for Providers to Access the EHR Embrace BYOD The Ship Has Left the Dock Provide a Standard Experience Regardless of Device Type or Location Improve Authentication (enable multi-factor) 16

17 Rule 3 Encrypt, Encrypt, Encrypt Encrypt All Hard Drives That Can Walk Use FIPS (AES256) Encryption This is not the default in Windows BitLocker and Mac Filevault2 Implement Mobile Device Management (MDM) To Enforce Encryption 17

18 mhealth Policy Based Controls Securing the Device Remote Data Access Use of Personal Devices Types of Apps Approved for Use Brands Provider Education 18

19 Privacy & Security Technology Based Controls Anti-Virus/Malware Software Updates Firmware, OS and Applications MDM Secure Texting Device Swiping Encryption Security of the Cloud and Cloud Swiping 19

20 mhealth Strategy Development Perform a Risk Assessment Develop the Plan and Get Buy-in Include resource and technology costs Develop Policies Implement the Technologies Strict BAAs with Transparent Vendor Security Strategy 20

21 Devising a Sound mhealth Strategy Gautam "G" Shah, VP Product Management, Vocera

22 Vocera Vision and Value Proposition

23 The Vocera Communication System

24 The Vocera Communication System

25 Q&A Click on the Q&A panel located in the lower right corner of your screen, type in your questions in the text field and hit send. Please keep the send to default as All Panelists.

26 Thank You! You will receive an when our archive recording is ready. (Separate registration is required) Thank you Vocera! CHIME CHCIO Credits Attending our Webinars = 1 CEU Questions/Comments Anthony Guerra aguerra@healthsystemcio.com Go to to view our upcoming schedule and see the last 12 months of archived events.

Understanding Your Security Posture (And How to Improve It)

Understanding Your Security Posture (And How to Improve It) Understanding Your Security Posture (And How to Improve It) A Complimentary Webinar From healthsystemcio.com Your Line Will Be Silent Until Our Event Begins at 12:00 ET Thank You! Housekeeping Moderator

More information

Addressing Your Number 1 Security Risk: Data Privacy, Data Encryption

Addressing Your Number 1 Security Risk: Data Privacy, Data Encryption Addressing Your Number 1 Security Risk: Data Privacy, Data Encryption A Complimentary Webinar From healthsystemcio.com Sponsored by Proofpoint Your Line Will Be Silent Until Our Event Begins at 12:00 ET

More information

Thinking Outside the Box on Disaster Recovery

Thinking Outside the Box on Disaster Recovery Thinking Outside the Box on Disaster Recovery A Complimentary Webinar From healthsystemcio.com Sponsored by SunGard Your Line Will Be Silent Until Our Event Begins at 12:00 ET Thank You! Housekeeping Moderator

More information

Envisioning a Google Glass Future

Envisioning a Google Glass Future Envisioning a Google Glass Future A Complimentary Webinar From healthsystemcio.com Sponsored by Vocera Your Line Will Be Silent Until Our Event Begins at 12:00 ET Thank You! Housekeeping Moderator Anthony

More information

Privacy/Security Spotlight:

Privacy/Security Spotlight: Privacy/Security Spotlight: Network Security and Best Practices Regarding the Internet of Things in a Health System A Complimentary Webinar From healthsystemcio.com Sponsored by Proofpoint Your Line Will

More information

Job Aid: Citrix Receiver Upgrade

Job Aid: Citrix Receiver Upgrade January 3, 2018 Job Aid: Citrix Receiver Upgrade Overview We have upgraded the Citrix infrastructure that securely delivers your Citrix applications and desktops. While your applications and desktops are

More information

Vocera Secure Texting 2.1 FAQ

Vocera Secure Texting 2.1 FAQ General Description Q. What is Vocera Secure Texting? A. Vocera Secure Texting (VST) combines convenience with privacy by providing a secure, easy to use, HIPAA-compliant alternative to SMS as well as

More information

Faculty/Presenter Disclosure

Faculty/Presenter Disclosure Faculty/Presenter Disclosure Faculty: Cindy Convey and Tiffany Chui Fraser Health Authority Relationships with commercial interests: None 1 Disclosure of Commercial Support This program has received no

More information

Mobile: The New Oxygen for Events

Mobile: The New Oxygen for Events Mobile: The New Oxygen for Events Presented by Kevin Long Director of Marketing CrowdCompass Wednesday, March 6, 2013 Melissa Nielsen Manager of Print, Online and New Media Communications Society of Critical

More information

The Telemedicine Opportunity

The Telemedicine Opportunity The Telemedicine Opportunity Ranya Habash, MD Chief Medical Officer Everbridge Michael Matonis Senior Technical Sales Engineer Everbridge Agenda What is the future of telemedicine? Why telemedicine? Selecting

More information

Mobile Technology and Clinical Telemedicine a System Perspective. Dr Rob Williams Ontario Telemedicine Network April 28, 2012

Mobile Technology and Clinical Telemedicine a System Perspective. Dr Rob Williams Ontario Telemedicine Network April 28, 2012 Mobile Technology and Clinical Telemedicine a System Perspective Dr Rob Williams Ontario Telemedicine Network April 28, 2012 Overview About OTN Mobile devices supporting OTN s clinical services Considerations

More information

Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices

Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices Michal Zlesák Area Sales Manager Michal.zlesak@enterasys.com Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices A Siemens Enterprise Communications Company

More information

The Role of the CMIO in Advancing Cybersecurity

The Role of the CMIO in Advancing Cybersecurity The Role of the CMIO in Advancing Cybersecurity AMDIS 2017 Brian Clay, MD Chief Medical Information Officer, Inpatient and Hospital Affiliations UC San Diego Health Disclosures None University of California,

More information

IHE USA Announces New Plug-a-thons

IHE USA Announces New Plug-a-thons IHE USA Announces New Plug-a-thons IHE North American Connectathon 2018 January 15-19, 2018 John Donnelly, Plug-a-thon Program Manager Phone: 908-693-7162 Email: jtdonnelly@intepro.biz Thanks for joining

More information

We focus on creating deep relationships with both readers and advertisers.

We focus on creating deep relationships with both readers and advertisers. We focus on creating deep relationships with both readers and advertisers. John Lynn, Founder of HealthcareScene.com john@healthcarescene.com 702.514.0201 OVERVIEW Since 2005, the Healthcare Scene Network

More information

RHM Presentation. Maas 360 Mobile device management

RHM Presentation. Maas 360 Mobile device management RHM Presentation Maas 360 Mobile device management Strong adoption in the enterprise Manufacturing Financial Consumer Healthcare Public Others 2 Trusted by over 9,000 customers Recognized Industry Leadership

More information

The CIO s BYOD Toolbox: Top Trends for HIPAA Compliant mhealth

The CIO s BYOD Toolbox: Top Trends for HIPAA Compliant mhealth The CIO s BYOD Toolbox: Top Trends for HIPAA Compliant mhealth Sponsored by: CUSTOM MEDI A Executive Summary We are all connected. Look around you in any café, shop, or emergency department waiting room,

More information

Move beyond BYOD to Mobile Workspace with Cisco and Citrix

Move beyond BYOD to Mobile Workspace with Cisco and Citrix Move beyond BYOD to Mobile Workspace with Cisco and Citrix Delivering the Complete Mobile Experience Jonathan Gilad Solutions Manager, Enterprise Mobility Cisco Todd Terbeek Sr. Director, Strategic Alliances

More information

Solutions for Unified Critical Communications. Patient Care Coordination and Provider Collaboration with HIPAA Compliant Texting and Telemedicine

Solutions for Unified Critical Communications. Patient Care Coordination and Provider Collaboration with HIPAA Compliant Texting and Telemedicine Solutions for Unified Critical Communications Patient Care Coordination and Provider Collaboration with HIPAA Compliant Texting and Telemedicine Agenda + The patient perspective + The challenge and benefits

More information

HIPAA / HITECH Overview of Capabilities and Protected Health Information

HIPAA / HITECH Overview of Capabilities and Protected Health Information HIPAA / HITECH Overview of Capabilities and Protected Health Information August 2017 Rev 1.8.9 2017 DragonFly Athletics, LLC 2017, DragonFly Athletics, LLC. or its affiliates. All rights reserved. Notices

More information

BYOD Business year of decision!

BYOD Business year of decision! Bucharest, Romania April 24, 2013 BYOD Business year of decision! Cisco on Cisco Christoph Nienhaus IT Leader for EMEAR Central - DACH 2011 2012 Cisco and/or its affiliates. All rights reserved. Cisco

More information

BRING MAC TO THE ENTERPRISE WITH A MODERN APPROACH TO MANAGEMENT

BRING MAC TO THE ENTERPRISE WITH A MODERN APPROACH TO MANAGEMENT WHITE PAPER DECEMBER 2016 BRING MAC TO THE ENTERPRISE WITH A MODERN APPROACH TO MANAGEMENT Unified endpoint management brings together traditional client management with a modern enterprise mobility management

More information

MD-101: Modern Desktop Administrator Part 2

MD-101: Modern Desktop Administrator Part 2 Days: 5 Description: This five-day course is for Desktop Administrators that deploy, configure, secure, manage, and monitor devices and client applications in an enterprise environment. As desktops has

More information

Health IT Certification

Health IT Certification Health IT Certification Sam King MPH, MBA, FHIMSS, FHFMA, CPHIMS, CPHQ, CHFP Senior Director, Professional Development HIMSS May 11, 2016 Agenda Today s Healthcare Environment The Impact of Meaningful

More information

EHR SECURITY POLICIES & SECURITY SITE ASSESSMENT OVERVIEW WEBINAR. For Viewer Sites

EHR SECURITY POLICIES & SECURITY SITE ASSESSMENT OVERVIEW WEBINAR. For Viewer Sites EHR SECURITY POLICIES & SECURITY SITE ASSESSMENT OVERVIEW WEBINAR For Viewer Sites Agenda 1 Introduction and EHR Security Policies Background 2 EHR Security Policy Overview 3 EHR Security Policy Assessment

More information

Citrix ShareFile Share, store, sync, and secure data on any device, anywhere

Citrix ShareFile Share, store, sync, and secure data on any device, anywhere Citrix ShareFile Share, store, sync, and secure data on any device, anywhere Data Sheet ShareFile is a secure, enterprise data sync and sharing service with flexible storage options that allows IT to mobilize

More information

Acurian on. The Role of Technology in Patient Recruitment

Acurian on. The Role of Technology in Patient Recruitment Acurian on The Role of Technology in Patient Recruitment Wearables smartphones social networks the list of new technological tools available to patients and healthcare providers goes on and on. Many clinical

More information

Accessing the SIM PCMH Dashboard

Accessing the SIM PCMH Dashboard Accessing the SIM PCMH Dashboard Setting up Duo, Creating Your Level-2 Password, and Setting up Citrix Receiver to Log in to the Dashboard P R O C EDURAL GUID E Document File Name Accessing_the_SIM_Dashboard.docx

More information

CONFIGURING BASIC MACOS MANAGEMENT: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE

CONFIGURING BASIC MACOS MANAGEMENT: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE GUIDE FEBRUARY 2019 PRINTED 26 FEBRUARY 2019 CONFIGURING BASIC MACOS MANAGEMENT: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE Table of Contents Overview Introduction Purpose Audience

More information

How to Access Protected Health Information from Anywhere and Stay Compliant

How to Access Protected Health Information from Anywhere and Stay Compliant How to Access Protected Health Information from Anywhere and Stay Compliant Secure, HIPAA-compliant file sharing & data storage with mobile data access Safeguard protected health information (PHI), support

More information

Mobile Health: Concepts & Thoughts. Robert Napoli Chief Information Officer Planned Parenthood of the Great Northwest and the Hawaiian Islands

Mobile Health: Concepts & Thoughts. Robert Napoli Chief Information Officer Planned Parenthood of the Great Northwest and the Hawaiian Islands Mobile Health: Concepts & Thoughts Robert Napoli Chief Information Officer Planned Parenthood of the Great Northwest and the Hawaiian Islands OVERVIEW a. What is Mobile Health? b. Mobile Health Today Industry

More information

ABACUS Live Question & Answer Session

ABACUS Live Question & Answer Session ABACUS Live Question & Answer Session Tuesday October 27, 2015 0800-0900 Wednesday October 28, 2015 1400-1500 For entry into the webinar, log into: Altarum Adobe Connect. Enter as a guest with your full

More information

& ealthcare. The dawn of 5G technology is here. Are you prepared for change?

& ealthcare. The dawn of 5G technology is here. Are you prepared for change? & ealthcare The dawn of 5G technology is here Are you prepared for change? Healthcare is poised to experience significant benefits from Unleash the full potential for your business 5G, the fifth generation

More information

Choosing a Mobile Event App: How to Find the Best for Your Meetings &

Choosing a Mobile Event App: How to Find the Best for Your Meetings & Choosing a Mobile Event App: How to Find the Best for Your Meetings & Conferences Wednesday, November 8 th, 2017 Presented by Brooke Gracey Senior Mobile Events App Strategist CrowdCompass by Cvent Moderated

More information

HIPAA Compliance Strategies for IPAs and Medical Groups

HIPAA Compliance Strategies for IPAs and Medical Groups HIPAA Compliance Strategies for IPAs and Medical Groups A. John Blair, III, MD Chairman and Chief Executive Officer Taconic IPA, Inc. Fishkill, NY Background Practicing Physician 15 years Revenue Reductions

More information

Shaping the Cloud for the Healthcare Industry

Shaping the Cloud for the Healthcare Industry Shaping the Cloud for the Healthcare Industry Louis Caschera Chief Information Officer CareTech Solutions www.caretech.com > 877.700.8324 Information technology (IT) is used by healthcare providers as

More information

Standard text messaging (mobile devices) Secure text messaging (mobile devices) Paging Instant messaging (Google Hangouts, Skype, etc.

Standard text messaging (mobile devices) Secure text messaging (mobile devices) Paging  Instant messaging (Google Hangouts, Skype, etc. 1 Adam Nichol Information Security Officer/Systems Analyst Hospital Sisters Health System 920.431.3034 Adam.Nichol@hshs.org Holly Schlenvogt, MSH, CPM Privacy and Security Consultant / Owner HRT Consulting,

More information

mhealth SECURITY: STATS AND SOLUTIONS

mhealth SECURITY: STATS AND SOLUTIONS mhealth SECURITY: STATS AND SOLUTIONS www.eset.com WHAT IS mhealth? mhealth (also written as m-health) is an abbreviation for mobile health, a term used for the practice of medicine and public health supported

More information

ForeScout Extended Module for VMware AirWatch MDM

ForeScout Extended Module for VMware AirWatch MDM ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5

More information

ForeScout Extended Module for MaaS360

ForeScout Extended Module for MaaS360 Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

XenApp, XenDesktop and XenMobile Integration

XenApp, XenDesktop and XenMobile Integration XA, XD and XM Integration XenApp, XenDesktop and XenMobile Integration for a Comprehensive Mobility and Digital Workspace Solution Citrix.com 1 Desktop and application virtualization have enhanced mobility

More information

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme UEM2205BE Get Up to Speed on Innovations in the Mobile Ecosystem: ios, macos, Android, and Chrome OS VMworld 2017 Content: Not for publication Sascha Warno #Vmworld #UEM2205BE Disclaimer This presentation

More information

Securing Health Data in a BYOD World

Securing Health Data in a BYOD World Business White Paper Securing Health Data in a BYOD World Five strategies to minimize risk Page 2 of 9 Securing Health Data in a BYOD World Table of Contents Page 2 Introduction Page 3 BYOD Adoption Drivers

More information

Citrix XenMobile and Windows 10

Citrix XenMobile and Windows 10 White Paper Citrix XenMobile and Windows 10 Citrix XenMobile and Windows 10 With version 10, Windows has moved the once desktop operating system firmly into the era of the mobility and the cloud. Windows

More information

Phil Schwan Technical

Phil Schwan Technical Phil Schwan Technical Architect pschwan@projectleadership.net @philschwan Today s challenges Users Devices Apps Data Users expect to be able to work in any location and have access to all their work resources.

More information

Access and Setup Guide

Access and Setup Guide ss Access and Setup Guide Creating an Account with Duo and Setting up Citrix Workspace/Receiver to Log in to the Interactive Reporting Site BCBSM PGIP INTERACTI VE REPORTING Contents Introduction... 2

More information

Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia

Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia F5 EMEA Webinar Listopad 2014 Andrzej Kroczek Field Systems Engineer Today s Network and App Access: So Many Variables! LOCATIONS USERS DEVICES

More information

Beyond Your Device. Control, Connect, Experience. BT GS Analyst and consultant call 2 July 2013

Beyond Your Device. Control, Connect, Experience. BT GS Analyst and consultant call 2 July 2013 Beyond Your Device Control, Connect, Experience BT GS Analyst and consultant call 2 July 2013 Agenda Welcome & situation in the market Neil Sutton, Vice President Portfolio Our solution Connect Jayne Smith,

More information

AMCs and. Does the new law apply to my organization?

AMCs and. Does the new law apply to my organization? AMCs and Does the new law apply to my organization? Panelists: David Holtzman VP Compliance Strategies, CynergisTek Karen Pagliaro-Meyer Chief Privacy Officer, Columbia University Medical Center Lynn Rohland

More information

2017 Inpatient Telemedicine Study

2017 Inpatient Telemedicine Study 2017 Inpatient Telemedicine Study www.himssanalytics.com Enabling better health through information technology. Telemedicine Study Introduction The concept of telemedicine - meaning the transfer of medical

More information

Identity Management as a Service

Identity Management as a Service Identity Management as a Service The Challenge Today s technological landscape is one of permanent change. While connections to digital services and mobile devices grow, securing the data generated by

More information

The Device Has Left the Building

The Device Has Left the Building The Device Has Left the Building Mobile Security Made Easy With Managed PKI Christian Brindley Principal Systems Engineer, Symantec Identity and Information Protection Agenda 1 2 3 Mobile Trends and Use

More information

Case Study. Medical Information Records, LLC. Medical Software Company Relies on Azure to Improve Scalability, Cut Costs & Ensure Compliance

Case Study. Medical Information Records, LLC. Medical Software Company Relies on Azure to Improve Scalability, Cut Costs & Ensure Compliance Case Study Medical Information Records, LLC Medical Information Records, LLC Medical Software Company Relies on Azure to Improve Scalability, Cut Costs & Ensure Compliance Overview Industry: Healthcare

More information

The Customer Relationship:

The Customer Relationship: View the Replay on YouTube The Customer Relationship: Behind the Scenes with Managed Privacy Services September 10 th 2015 Executive Series Webinar Today s Speakers Ann Marie Harvey Privacy Manager Baptist

More information

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems... Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...3 Improve Processes...4 Innovation...4 IT Planning & Alignment

More information

Deploying VMware Workspace ONE Intelligent Hub. October 2018 VMware Workspace ONE

Deploying VMware Workspace ONE Intelligent Hub. October 2018 VMware Workspace ONE Deploying VMware Workspace ONE Intelligent Hub October 2018 VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

Mobile Device Policy. Augusta University Medical Center Policy Library. Policy Owner: Information Technology Support and Services

Mobile Device Policy. Augusta University Medical Center Policy Library. Policy Owner: Information Technology Support and Services Augusta University Medical Center Policy Library Mobile Device Policy Policy Owner: Information Technology Support and Services POLICY STATEMENT Augusta University Medical Center (AUMC) discourages the

More information

User Manual. phr.mtbc.com

User Manual. phr.mtbc.com User Manual Table of Contents Introduction Appointments Appointment History Claims History CCDA Report Demographics Health History Lab Reports Online Payment Secure Messages Health Recommendation Patient

More information

A HOSPITAL S HEALTH STARTS WITH ITS NETWORK INFRASTRUCTURE

A HOSPITAL S HEALTH STARTS WITH ITS NETWORK INFRASTRUCTURE A HOSPITAL S HEALTH STARTS WITH ITS NETWORK INFRASTRUCTURE As the push toward personalized healthcare grows increasingly reliant on mobile devices and apps, clinics and hospitals are being forced to examine

More information

Safeguard protected health information with ShareFile

Safeguard protected health information with ShareFile Safeguard protected health information with ShareFile This enterprise file sync and sharing solution supports HIPAA compliance, boosts security and mobilizes data access ShareFile helps healthcare providers

More information

CYBERSECURITY IN THE POST ACUTE ARENA AGENDA

CYBERSECURITY IN THE POST ACUTE ARENA AGENDA CYBERSECURITY IN THE POST ACUTE ARENA AGENDA 2 Introductions 3 Assessing Your Organization 4 Prioritizing Your Review 5 206 Benchmarks and Breaches 6 Compliance 0 & Cybersecurity 0 7 Common Threats & Vulnerabilities

More information

MaaS360 Secure Productivity Suite

MaaS360 Secure Productivity Suite MaaS360 Secure Productivity Suite Frequently Asked Questions (FAQs) What is MaaS360 Secure Productivity Suite? MaaS360 Secure Productivity Suite integrates a set of comprehensive mobile security and productivity

More information

Windows ierīces Enterprise infrastruktūrā. Aris Dzērvāns Microsoft

Windows ierīces Enterprise infrastruktūrā. Aris Dzērvāns Microsoft Windows ierīces Enterprise infrastruktūrā Aris Dzērvāns Microsoft Windows 8.1 Update the vision for everyone Designed for the way you live and work Brings together all you do On great devices Always business

More information

Mobile Technology meets HIPAA Compliance. Tuesday, May 2, 2017 MT HIMSS Conference

Mobile Technology meets HIPAA Compliance. Tuesday, May 2, 2017 MT HIMSS Conference Mobile Technology meets HIPAA Compliance Tuesday, May 2, 2017 MT HIMSS Conference Susan Clarke, HCISPP (ISC) 2 certified Healthcare Information Security and Privacy Practitioner. 15+ years of Healthcare

More information

Program Benefits. Professional Certification Eligibility. Networking. Industry Exposure. Access to PAHCOM Tools and Resources.

Program Benefits. Professional Certification Eligibility. Networking. Industry Exposure. Access to PAHCOM Tools and Resources. Introduction The Academic Credentialing Program (ACP) is modeled after historically successful programs in the accounting, legal, and medical professions wherein specific educational curricula are mastered

More information

DigitalPersona for Healthcare Organizations

DigitalPersona for Healthcare Organizations DigitalPersona for Healthcare Organizations RAPID, SECURE AUTHENTICATION FOR MEDICAL PROVIDERS AND STAFF Secure Access to Electronic Health Records Streamline Clinical Workflow Reduce Cybersecurity Costs

More information

ForeScout Extended Module for MobileIron

ForeScout Extended Module for MobileIron Version 1.8 Table of Contents About MobileIron Integration... 4 Additional MobileIron Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

How Microsoft s Enterprise Mobility Suite Provides helps with those challenges

How Microsoft s Enterprise Mobility Suite Provides helps with those challenges 2 Agenda Enterprise challenges for mobility How Microsoft s Enterprise Mobility Suite Provides helps with those challenges Hybrid identity With Azure Active Directory and Azure Active Directory Premium

More information

How Parallels RAS Enhances Microsoft RDS. White Paper Parallels Remote Application Server

How Parallels RAS Enhances Microsoft RDS. White Paper Parallels Remote Application Server How Parallels RAS Enhances Microsoft RDS White Paper Parallels Remote Application Server Table of Contents Introduction... 3 Overview of Microsoft Remote Desktop Services... 3 Microsoft RDS Pain Points...

More information

Expanding Sleep Care Through Telemedicine

Expanding Sleep Care Through Telemedicine Expanding Sleep Care Through Telemedicine Luke Roling Telehealth Project Manager Sleep Center Management Services Conflict of Interest Disclosures for Speakers 1. I do not have any relationships with any

More information

Health Link Frequently Asked Questions

Health Link Frequently Asked Questions Health Link Frequently Asked Questions We hope that you find our Health Link patient portal easy to use. If you have any questions or comments, please contact Health Link Support by email at healthlink@hvhs.org

More information

PKI is Alive and Well: The Symantec Managed PKI Service

PKI is Alive and Well: The Symantec Managed PKI Service PKI is Alive and Well: The Symantec Managed PKI Service Marty Jost Product Marketing, User Authentication Lance Handorf Technical Enablement, PKI Solutions 1 Agenda 1 2 3 PKI Background: Problems and Solutions

More information

Student Guide to Neehr Perfect Go!

Student Guide to Neehr Perfect Go! Student Guide to Neehr Perfect Go! I. Introduction... 1 II. Quick Facts... 1 III. Creating your Account... 1 IV. Applying Your Subscription... 4 V. Logging in to Neehr Perfect... 6 VI. Activities... 6

More information

Enterprise EHR Server Fundamentals

Enterprise EHR Server Fundamentals Enterprise EHR Server Fundamentals October 3, 2012 Embrace the new world of healthcare Your phone has been automatically muted. Please use the Q&A panel to ask questions during the presentation! Overview

More information

M HEALTH SHARING INDUSTRIAL VISION AND EXPERIENCE. Dr Beatrice Falise Mirat COCIR Business and Innovation Committee ehealth Member Orange Healthcare

M HEALTH SHARING INDUSTRIAL VISION AND EXPERIENCE. Dr Beatrice Falise Mirat COCIR Business and Innovation Committee ehealth Member Orange Healthcare M HEALTH SHARING INDUSTRIAL VISION AND EXPERIENCE Dr Beatrice Falise Mirat COCIR Business and Innovation Committee ehealth Member Orange Healthcare M HEALTH : A REALITY Definition: Mobile health (m health)

More information

Mobilize with Enterprise Security and a Productive User Experience

Mobilize  with Enterprise Security and a Productive User Experience Mobilize Email with Citrix XenMobile Mobilize Email with Enterprise Security and a Productive User Experience People need to be able to work with email productively wherever they go. Citrix.com 1 Email

More information

CLEARPASS EXCHANGE. Open third party integration for endpoint controls, policy and threat prevention SOLUTION OVERVIEW MAKE BETTER-INFORMED DECISIONS

CLEARPASS EXCHANGE. Open third party integration for endpoint controls, policy and threat prevention SOLUTION OVERVIEW MAKE BETTER-INFORMED DECISIONS Open third party integration for endpoint controls, policy and threat prevention While billions of Wi-Fi enabled smartphones and tablets connect to enterprise networks, it s a major challenge to ensure

More information

Securing Today s Mobile Workforce

Securing Today s Mobile Workforce WHITE PAPER Securing Today s Mobile Workforce Secure and Manage Mobile Devices and Users with Total Defense Mobile Security Table of Contents Executive Summary..................................................................................

More information

Qualifying Alternative Payment Model Participants (QPs) Methodology Fact Sheet

Qualifying Alternative Payment Model Participants (QPs) Methodology Fact Sheet Qualifying Alternative Payment Model Participants (QPs) Methodology Fact Sheet Overview This methodology fact sheet describes the process and methodology that the Centers for Medicare & Medicaid Services

More information

Apple OS Deployment Guide for the Enterprise

Apple OS Deployment Guide for the Enterprise Apple OS Deployment Guide for the Enterprise So your organization is about to deploy Mac, iphone, ipad and/or Apple TV to your users and you re not sure where to start? That s where the Apple management

More information

2013, Healthcare Intelligence Network

2013, Healthcare Intelligence Network Note: This is an authorized excerpt from 2013 Healthcare Benchmarks: Mobile Health. To download the entire report, go to http://store.hin.com/product.asp?itemid=4586 or call 888-446-3530. 2013, Healthcare

More information

905M 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves

905M 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in use for work and home globally by 2017 Before Now 32% of

More information

CORE Voluntary Certification: Certification from the Testing Vendor s Perspective. February 18, :00 3:00pm ET

CORE Voluntary Certification: Certification from the Testing Vendor s Perspective. February 18, :00 3:00pm ET CORE Voluntary Certification: Certification from the Testing Vendor s Perspective February 18, 2015 2:00 3:00pm ET Participating in Today s Session Download a copy of today s presentation on the CAQH.org

More information

Bring Your Own Device (BYOD) Initiative Enable Clinical Transformation by Gregg Malkary, Managing Director, SPYGLASS Consulting Group

Bring Your Own Device (BYOD) Initiative Enable Clinical Transformation by Gregg Malkary, Managing Director, SPYGLASS Consulting Group Bring Your Own Device (BYOD) Initiative Enable Clinical Transformation by Gregg Malkary, Managing Director, SPYGLASS Consulting Group A SPYGLASS CONSULTING GROUP HEALTHCARE STUDY WHITE PAPER Bring Your

More information

Don t Be the Next Headline! PHI and Cyber Security in Outsourced Services.

Don t Be the Next Headline! PHI and Cyber Security in Outsourced Services. Don t Be the Next Headline! PHI and Cyber Security in Outsourced Services. June 2017 Melanie Duerr Fazzi Associates Partner, Director of Coding Operations Jami Fisher Fazzi Associates Chief Information

More information

Managing Windows 8.1 Devices with XenMobile

Managing Windows 8.1 Devices with XenMobile Managing Windows 8.1 Devices with XenMobile Mobile Device Management for Windows 8.1 Devices The Bring Your Own Device Challenge With the advent of the bring your own device (BYOD) trend, employees expect

More information

Using the Secure MyApps Environment

Using the Secure MyApps Environment Be the Difference. Using the Secure MyApps Environment Accessing UH Applications from Non-UH Devices This Job Aid is intended for UH employees who would like to remotely connect to UH applications, especially

More information

NRG Oncology and VisionTree Optimal Care (VTOC) Frequently Asked Questions

NRG Oncology and VisionTree Optimal Care (VTOC) Frequently Asked Questions NRG Oncology and VisionTree Optimal Care (VTOC) Frequently Asked Questions Overview VisionTree Optimal Care (VTOC) v4.1 is a secure, encrypted cloud-based platform to collect/report patient reported outcomes

More information

UKCC CompTIA Webinar: Upskilling your Partners to sell your Solutions Leveraging the CompTIA Playbooks

UKCC CompTIA Webinar: Upskilling your Partners to sell your Solutions Leveraging the CompTIA Playbooks UKCC CompTIA Webinar: Upskilling your Partners to sell your Solutions Leveraging the CompTIA Playbooks @CompTIA_UK Housekeeping Login and connect to the audio when logging in: Find audio information under

More information

Using the Secure MyApps Environment

Using the Secure MyApps Environment Be the Difference. Using the Secure MyApps Environment Accessing UH Applications from Non-UH Devices This Job Aid is intended for UH employees who would like to remotely connect to UH applications, especially

More information

The Data Center is Dead Long Live the Virtual Data Center

The Data Center is Dead Long Live the Virtual Data Center The Data Center is Dead Long Live the Virtual Data Center Hector Rodriguez, MBA Microsoft WW Health Chief Industry Security Officer September 12, 2018 Enterprise Data Centers are Vanishing Enterprise data

More information

BYOD: BRING YOUR OWN DEVICE.

BYOD: BRING YOUR OWN DEVICE. white paper BYOD: BRING YOUR OWN DEVICE. On-BOaRDING and Securing DEVICES IN YOUR Corporate NetWORk PrepaRING YOUR NetWORk to MEEt DEVICE DEMaND The proliferation of smartphones and tablets brings increased

More information

Consumerization: What It Means to IT Operations

Consumerization: What It Means to IT Operations Consumerization: What It Means to IT Operations Scott Hardie, Sr Princ Systems Engineer Justin Ware, Technical Director, Intuitive Consumerization: What It Means to IT Operations 1 Agenda 1 Consumerization

More information

How Windows 10 marks the end of Roaming Profiles

How Windows 10 marks the end of Roaming Profiles How Windows 10 marks the end of Roaming Profiles About me Microsoft Community Star (HK and TW) Microsoft Most Valued Professional (MVP) MCT, MCP, MCP+I, MCITP, MCTS, MCDST, MCSA, MCSE, MCSE+I, MCDBA, MCAD,

More information

User-to-Data-Center Access Control Using TrustSec Design Guide

User-to-Data-Center Access Control Using TrustSec Design Guide CISCO VALIDATED DESIGN User-to-Data-Center Access Control Using TrustSec Design Guide October 2015 REFERENCE NETWORK ARCHITECTURE Table of Contents About This Document... 1 Cisco TrustSec Overview... 2

More information

ARS QUESTION #1. Agenda. Tina Bonwell RN, BSN ACC Data Coordinator Heartland Regional Medical Center St. Joseph, Missouri

ARS QUESTION #1. Agenda. Tina Bonwell RN, BSN ACC Data Coordinator Heartland Regional Medical Center St. Joseph, Missouri Tina Bonwell RN, BSN ACC Data Coordinator Heartland Regional Medical Center St. Joseph, Missouri ARS QUESTION #1 How would you rate your NCDR website navigation experience? 1. No experience 2. Minimal-

More information

Building for mhealth at scale in the developing world. Peter Benjamin mhealth Alliance

Building for mhealth at scale in the developing world. Peter Benjamin mhealth Alliance Building for mhealth at scale in the developing world Peter Benjamin mhealth Alliance Is mhealth its own field? mhealth [Page created July 2, 2008] From Wikipedia, the free encyclopedia mhealth (also

More information

Reducing Operational Costs and Combating Ransomware with McAfee SIEM and Integrated Security

Reducing Operational Costs and Combating Ransomware with McAfee SIEM and Integrated Security Reducing Operational Costs and Combating Ransomware with McAfee SIEM and Integrated Security Healthcare provider manages threats with ease Atrius Health Customer Profile Large regional healthcare provider

More information

Healthcare IT A Monitoring Primer

Healthcare IT A Monitoring Primer Healthcare IT A Monitoring Primer Published: February 2019 PAGE 1 OF 13 Contents Introduction... 3 The Healthcare IT Environment.... 4 Traditional IT... 4 Healthcare Systems.... 4 Healthcare Data Format

More information

White paper. Usage Trends for Flash Storage with Epic

White paper. Usage Trends for Flash Storage with Epic White paper Usage Trends for Flash Storage with Epic 1. Introduction This white paper presents: The benefits of an all-flash data center on a single, unified operating system How to reduce the time that

More information