A Multi-Source Information System via the Internet for End-Stage Renal Disease: Scalability and Data Quality

Size: px
Start display at page:

Download "A Multi-Source Information System via the Internet for End-Stage Renal Disease: Scalability and Data Quality"

Transcription

1 994 A Multi-Source Information System via the Internet for End-Stage Renal Disease: Scalability and Data Quality Mohamed Ben Saïd a, Loic Le Mignot a, Claude Mugnier a, Jean Baptiste Richard a, Christine Le Bihan-Benjamin a, Jean-Philippe Jais a, Didier Guillon b, Ana Simonet b, Michel Simonet b, Paul Landais a a Université Paris-Descartes ; Faculté de Médecine ; Assistance Publique-Hôpitaux de Paris ; EA222 ; Service de Biostatistique et d Informatique Médicale, Hôpital Necker,149 rue de Sèvres Cedex 15 Paris - France b Université J. Fourier, TIMC-IMAG, Grenoble, France Abstract A Multi-Source Information System (MSIS), has been designed for the Renal Epidemiology and Information Network (REIN) dedicated to End-Stage Renal Disease (ESRD). MSIS aims at providing reliable follow-up data for ESRD patients. It is based on an n-tier architecture, made out of a universal client, a dynamic Web server connected to a production database and to a data warehouse. MSIS is operational since 2002 and progressively deployed in 9 regions in France. It includes 11,500 patients. MSIS facilitates documenting medical events which occur during the course of ESRD patient health care and provides means to control the quality of each patient s record and reconstruct the patient trajectory of care. Consolidated data are made available to a data warehouse and to a geographic information system for analysis and data representation in support of public-health decision making. Keywords: Scalability; Data quality; Dynamic Web server; n-tier architecture; Multi-Source Information System; Internet; End-Stage Renal Disease. 1. Introduction The lack of coordinated information about patients suffering from end-stage renal disease (ESRD) led a large panel of health care providers, decision makers, researchers and institution representatives to initiate the Renal Epidemiology and Information Network (REIN) [1]. REIN is organized, at national and regional levels, around a network of professionals involved in ESRD health care. A Multi-Source Information System (MSIS) [2] dedicated to collect continuous and exhaustive records of all ESRD cases and their clinical follow-up, was developed by Necker Hospital at University Paris-Descartes. MSIS collates in a standardized representation a minimal patient record elaborated by health professionals [3]. Progressive deployment in the regions since year 2002 allowed testing the MSIS performance, acceptance among users, workload impact and maintenance cost effectiveness. MSIS is operational via the Internet, in eight regions plus one virtual region devoted to follow paediatric cases.

2 995 Scalability remains a major issue in the design of the information system, especially during implementation and deployment phases. It remains a major issue as the system grows [4]. In a general definition, scalability is an overlap between structural scalability and load scalability [5]: Structural scalability is the ability of a system to expand to a chosen dimension without major modifications to its architecture. A system is thought of as being structurally scalable if its implementation or standards do not impede the growth of the number of objects it encompasses, or at least will not do so within a chosen time frame. Load scalability is the ability of a system to perform gracefully as the offered traffic increases. A system is said to have load scalability if it has the ability to function gracefully, without undue delay and without unproductive resource consumption or resource contention at light, moderate, heavy loads while making good use of available resources [5]. In a previous paper [3], seek of scalability was one of the MSIS aims. It influenced MSIS design, architecture and implementation. In the present paper we will focus on the efficiency of the technological choices made to support the organizational network of professionals at the regional level to build a reliable and methodological longitudinal resource of information for a nationwide cohort of ESRD patients. 2. Material and Methods Organizational support REIN national committee for guidance and follow-up involves several organizations: Société de Néphrologie, Société francophone de dialyse, INSERM, Paris Descartes University and Grenoble J. Fourier University, Agence de la Biomédecine, Caisse Nationale d Assurance Maladie des Travailleurs Salariés (CNAMTS), Direction de l Hospitalisation et de l Organisation des Soins (DHOS), Institut de Veille Sanitaire (InVS) and representatives of patients associations. Regional committees involve nephrologists, decision makers, public health insurers, epidemiologists and patients associations. Each region elects a nephrologist as program coordinator. In each region, a public health and epidemiology department supports the professionals and decision makers by providing resources and expertise for methodology and epidemiology studies. A clinical research assistant performs the quality control at least once every year for every patient record. Architecture and technical support Architecture MSIS is based on an n-tier architecture interfaced with a light-weighted universal client. MSIS uses a secure connection via the Internet. The client connects to the middle tier that is in relation with several databases: an identification database, a production database, a data warehouse and a geographical information system (Figure 1). Security Authorized users validate a certificate issued by MSIS system to exchange SSL encrypted messages. Client messages are analyzed by the firewall [6], which proceeds at the networking level. The firewall translates public IP addresses into local ones in order to filter IP addresses and TCP port accesses. Allowed messages are sent to the proxy [7]: a software component that rewrites public URL addresses and controls their validity and access-authorization. The proxy makes access-control decisions, to and from the production zone. It communicates with the production zone through the firewall. Outgoing messages to the client follow a reverse path (Figure 2).

3 996 Figure 1: MSIS n-tier architecture. Universal light weighted clients connect from 8 administrative regions plus a pediatrics virtual region: Limousin (L), Languedoc-Roussillon (LR), Champagne- Ardenne (CA), Provence-Alpes-Côte d Azur (PACA), Centre (C), Ile-de-France (IDF), Basse- Normandie (BN), Midi-Pyrénées (MP). The middleware uses free software (Linux, Apache, Tomcat JSP/Servlet container, and Java programming language). It is organized into a dynamic web server tier, interfaced with the web client tier and into a business logic tier, interacting with the databases in the information system tier. An intrusion detection system audits all the devices and analyzes connections according to an updated list of threats. Deployment At the client side, MSIS relies on existing local Internet networking facilities and on a widely spread computer configuration in medical settings: Pentium III processor computer or equivalent, 128 Megabytes of random access memory (RAM), 1024x768 pixels screen resolution, Acrobat Reader 4, a web browser allowing 128 character SSL encryption (Internet Explorer 6.0, Netscape 7.0, Safari 2.0, Mozilla FireFox 1.0). Maintenance and evolutions are made centrally which reduce deployment costs and delays. Use of the system in the regions The patient record is organized into three parts: a medical history, aetiology of ESRD and comorbidity at start of replacement therapy, a recent medical observation with information about access to the care facilities and to the national kidney-graft waiting list, an update of the actual renal dialysis method and context of treatment. Admission, discharge and transfer event information are documented and updated annually on the anniversary of first ESRD treatment. A decease record file, including standard medical codification of the decease is documented when necessary. The coordinating nephrologists and the clinical research assistant relay local trainings and are the main interlocutors in daily use of the system. They also provide an exhaustive representation of dialysis units and request authorizations and profiles for the nephrologists in the region. MSIS access codes are delivered individually to the users. Exhaustiveness control Monitoring tools in MSIS provide means to control exhaustiveness on a monthly basis and on an annual basis for patients follow-up update. The demand of care requires information about patients living in a neighbouring region and treated in the region of interest.

4 997 Figure 2: MSIS security system organization. Incoming and outgoing traffic passes through the firewall. Controls are made at the networking level. The proxy rewrites URL addresses and controls URL access-authorizations to and from the production zone. An intrusion detection listener audits the traffic. Nephrologists of the neighbouring region are given an access MSIS in order to complete the missing information. Quality control More than ten mandatory information items are requested to create a patient record in the MSIS production database. Randomized study focused on the quality of information stored using MSIS in comparison with the information in the patient s hospital record. Appropriate correlation coefficients or kappa coefficients are calculated for quantitative and qualitative variables, respectively. The clinical research assistant with the support of the epidemiological department realizes this work. MSIS functionalities MSIS provides tools permitting users at the dialysis unit level, to access to reporting lists of descriptive statistics. At the region level, specific quality control functions are available to the coordinating nephrologists and to the clinical research assistant: they consist of recapitulative regional information and reminders for annual follow-up as well as a data extraction module. This latter is organized to facilitate answering questions in relation with the project: better knowledge of the demand of ESRD care and matching the offer of care to the demand. The demand of care is derived from the set of data of patients living in the region, whether or not treated in the region. The offer of ESRD care concerns the patients treated in the region during a period of time, whether or not residing in the region. Identification server A patient identification server is implemented to provide unique identifier for every patient in the system and to prevent from creating duplicates by detecting existing close spelling patient names. The patient unique identifier allows the link between the two kinds of information. The identification server algorithm focused on strings comparison between the user entry information and the information stored in MSIS database. The method is derived from Needleman and Wunsch (N&W) algorithm [8] searching for similarities in strings. A value of an acceptable distance between two strings is assigned. If the minimal computed distance is equal or lower than an acceptable distance, the information entered is considered as having a match in the system. The identification server complies with the French law about privacy. Necessary agreements of the Commission Nationale Informatique et Libertés (CNIL) were obtained.

5 998 CNIL recommends separate transit over the network of explicit nominative data and of medical data. MSIS interface was adapted consequently: two separate requests-response processes connect to the identification server and to the production database. The results are displayed simultaneously on the same screen, the patient full name and identification information in one frame and the medical information in another frame. Since the identification server implementation in April 2004, workload generated by the management of duplicates, dropped significantly and the data quality of the system improved consequently. Data consolidation and periodic feed of the data warehouse The quality control process performed by the clinical research assistant provides consolidated information, which are then exported to the data warehouse. A geographical information system uses this information to generate dynamically graphical representations of the demand and offer of care. It is an aid for public health decision-making. 3. Results As of May 24 th 2005, patient records, 898 transplantations and 2295 ESRD patient decease cases are documented in the production database. The active file includes 8227 patients who undergo dialysis (detailed information are presented in table 1). According to the national survey of prevalent ESRD dialyzed patients in June 2003 [9], MSIS active file includes 26 % of the nation wide ESRD dialyzed patients. MSIS and the organizational support MSIS access codes were provided to more than 300 nephrologists and 50 codes to their collaborators. Ten clinical research assistants and nine physicians perform the quality control at the regional level. Eight university departments of medical informatics, and/or of epidemiology and/or of public health insure the patient data quality control using MSIS. Table 1: MSIS deployment in the regions Region Date of inclusion Population Number of cases in the active file Limousin Jan 22nd Languedoc-Roussillon Jun 2 nd ,405 Champagne-Ardenne Jan 1st Centre Jan 1st ,306 Provence-Alpes-Côte-d Azur Jan 1st ,060 Ile-de-France Nov 1st Midi-Pyrénées Feb 1st Basse Normandie Feb 1st Pediatrics virtual region Jan 1st 2004 N/A 114 As longitudinal data accumulate, annual follow-up of the ESRD cohort are progressively and systematically taking place in the regions. 4. Discussion: scalability issues Adding components fits within the n-tier architecture either as a database server, business logic or technologies such as XML data processing. Only few environmental changes occurred during last 3 years: migration to Java 1.4, to Tomcat 5.0 and to MySQL 4.0. A reinforcement of the system security was an addition to MSIS rather than a rebuilt. Few changes of the data structure were necessary. This was the case when transactions were introduced into the system or when responding to the nephrologists demand of adding new

6 999 items in the patient record. The data conceptual model remained unaffected. The implementation of the identification server fitted within an n-tier modular architecture. Additional feed-back functionalities, focused on information retrieval and quality control. Scalability issues evolve with the system use. While MSIS online use for three years and progressive deployment in the regions confirmed choices made at the design and implementation phases, new workload is identified and needs to be addressed. It points to the need of further resources to support the efforts of the clinical research assistants in guaranteeing quality of the patient information entered in the system. MSIS showed a major stability and good performance in extending its use to new regions. 5. Conclusion MSIS proved its usability and support to nephrologists and health care decision makers to follow a cohort of ESRD patients and to provide reliable longitudinal information for epidemiology and public health decision-making in the context of ESRD. 6. Acknowledgments This research was funded by a grant from STIC-Santé-Inserm 2002, n A02126ds, by Paris- Descartes University and by Assistance Publique-Hôpitaux de Paris. This work was also supported by grants provided by the Caisse Nationale d Assurance Maladie des Travailleurs Salariés, the Institut de Veille Sanitaire and the Agence de la Biomédecine. The nephrologists in charge of the ESRD units of Limousin, Languedoc-Roussillon, Champagne Ardenne, Provence-Alpes-Côte-d Azur, Centre, Ile-de-France, Basse- Normandie, Midi-Pyrénées and the pediatricians are especially acknowledged for their fruitful cooperation and comments. JP Necker and X Ferreira are acknowledged for their skilful help. 7. References [1] Landais P. L insuffisance rénale terminale en France : offre de soins et prévention. Presse Med.2002; 31: [2] Landais P, Simonet A, Guillon D, Jacquelinet C, Ben Saïd M, Mugnier C, Simonet M. SIMS@REIN:Un Système d Information Multi-Sources pour l Insuffisance Rénale Terminale. CR Biol 2002;325: [3] Ben Said M, Simonet A, Guillon D, Jacquelinet C, Gaspoz F, Dufour E, Mugnier C, Jais JP, Simonet M, Landais P. A dynamic Web application within an n-tier architecture: a Multi-Source Information System for end-stage renal disease. Stud Health Technol Inform. 2003;95: [4] Arlitt M, Krishnamurthy D, Rolia J. Characterizing the Scalability of a Large Web-based Shopping System. ACM Transactions on Internet Technology, Vol. 1, No. 1, August 2001, Pages [5] Bondi AB Characteristics of Scalability and Their Impact On Performance. Proceedings of the second international workshop on Software and performance. WOSP 2000, Ontario, Canada - ACM X/00/09. [6] Al-Tawil K, Al-Katham IA. Evaluation and Testing of Internet Firewalls. Int. J. Network Mgmt. 1999; 9: [7] Burnside M, Clarke D, Mills T, Maywah A, Devadas S, Rivest R. Proxy-Based Security in Networked Mobile Devices. Proceedings of the 2002 ACM symposium on Applied computing - Madrid, Spain : [8] Le Mignot L, Mugnier C, Ben Saïd M, Jais JP, Le Bihan C, Richard JB, Taupin P, Landais P. Avoiding Doubles in Distributed Nominative Medical Databases: Optimization of the Needleman and Wunsch Algorithm. MIE 2005 (in press) [9] (document published on January 8 th 2004 and observed on May 23rd 2005) or (document published on January 15 th 2004 and observed on May 23rd 2005) Address for correspondence Pr Paul Landais, Service de Biostatistique et d Informatique Médicale, Hôpital Necker-Enfants Malades, 149, rue de Sèvres, Paris cedex 15 - France. landais@necker.fr

An XML Schema for Automated Data Integration in a Multi-Source Information System Dedicated to End-Stage Renal Disease

An XML Schema for Automated Data Integration in a Multi-Source Information System Dedicated to End-Stage Renal Disease Medical Informatics in a United and Healthy Europe K.-P. Adlassnig et al. (Eds.) IOS Press, 2009 2009 European Federation for Medical Informatics. All rights reserved. doi:10.3233/978-1-60750-044-5-215

More information

Avoiding Doubles in Distributed Nominative Medical Databases: Optimization of the Needleman and Wunsch Algorithm

Avoiding Doubles in Distributed Nominative Medical Databases: Optimization of the Needleman and Wunsch Algorithm 83 Avoiding Doubles in Distributed Nominative Medical Databases: Optimization of the Needleman and Wunsch Algorithm Loïc Le Mignot, Claude Mugnier, Mohamed Ben Saïd, Jean-Philippe Jais, Jean- Baptiste

More information

Formalizing Mappings to Optimize Automated Schema Alignment: Application to Rare Diseases

Formalizing Mappings to Optimize Automated Schema Alignment: Application to Rare Diseases e-health For Continuity of Care C. Lovis et al. (Eds.) 2014 European Federation for Medical Informatics and IOS Press. This article is published online with Open Access by IOS Press and distributed under

More information

Mediaocean Aura Technical Overview

Mediaocean Aura Technical Overview Mediaocean Aura Technical Overview January 2017 Samir Sadikhov +61 (2) 9879 8200 apac_operations@mediaocean.com Contents INTRODUCTION... 2 APPLICATION ARCHITECTURE OVERVIEW... 3 DATA LAYER...3 APPLICATION

More information

Security and Privacy Governance Program Guidelines

Security and Privacy Governance Program Guidelines Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by

More information

Completing the CMS-2728 Form

Completing the CMS-2728 Form Completing the CMS-2728 Form Goal: Learn to complete a CMS-2728 Form for new ESRD patients in CROWNWeb. Estimated Time: 25 to 35 minutes PDF: Download a screen reader compatible version of this presentation

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO 17090-1 Second edition 2013-05-01 Health informatics Public key infrastructure Part 1: Overview of digital certificate services Informatique de santé Infrastructure de clé publique

More information

CLIQ Remote - System description and requirements

CLIQ Remote - System description and requirements CLIQ Remote - System description and requirements 1. Introduction CLIQ Remote - Access at a distance CLIQ Remote is an electromechanical lock system with an additional level of security and flexibility,

More information

Chapter 35 ehealth Saskatchewan Sharing Patient Data 1.0 MAIN POINTS

Chapter 35 ehealth Saskatchewan Sharing Patient Data 1.0 MAIN POINTS ehealth Saskatchewan Sharing Patient Data 1.0 MAIN POINTS Since 1997, Saskatchewan has been developing a provincial electronic health records system for patients (called the provincial EHR) to allow for

More information

Therapy Provider Portal. User Guide

Therapy Provider Portal. User Guide Therapy Provider Portal User Guide Page 2 of 16 UCare User Guide V1.7 Table of Contents I. Introduction...3 About HSM Therapy Management... 4 Terms of Use... 4 Contact Information... 6 II. Using the Therapy

More information

Cloud Services. Infrastructure-as-a-Service

Cloud Services. Infrastructure-as-a-Service Cloud Services Infrastructure-as-a-Service Accelerate your IT and business transformation with our networkcentric, highly secure private and public cloud services - all backed-up by a 99.999% availability

More information

EXAMPLE 2-JOINT PRIVACY AND SECURITY CHECKLIST

EXAMPLE 2-JOINT PRIVACY AND SECURITY CHECKLIST Purpose: The purpose of this Checklist is to evaluate your proposal to use or disclose Protected Health Information ( PHI ) for the purpose indicated below and allow the University Privacy Office and Office

More information

Transfer of Physiological Signals: Application for Patients with Chronic Diseases in their Home

Transfer of Physiological Signals: Application for Patients with Chronic Diseases in their Home International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 4, Issue 7 (December 2014) PP: 20-27 Transfer of Physiological Signals: Application for Patients with Chronic

More information

Steffanie Hall, RHIA HIM Director/Privacy Officer 1201 West 12 th Emporia, Kansas ext

Steffanie Hall, RHIA HIM Director/Privacy Officer 1201 West 12 th Emporia, Kansas ext JOINT NOTICE OF PRIVACY PRACTICES NEWMAN REGIONAL HEALTH, NEWMAN REGIONAL HEALTH MEDICAL PARTNERS, HOSPICE, NEWMAN PHYSICAL THERAPY, COMMUNITY WELLNESS AND MEMBERS OF THE NEWMAN REGIONAL HEALTH ORGANIZED

More information

Networking for a dynamic infrastructure: getting it right.

Networking for a dynamic infrastructure: getting it right. IBM Global Technology Services Networking for a dynamic infrastructure: getting it right. A guide for realizing the full potential of virtualization June 2009 Executive summary June 2009 Networking for

More information

DRAFT Privacy Statement (19 July 2017)

DRAFT Privacy Statement (19 July 2017) DRAFT Privacy Statement (19 July 2017) European Reference Networks for Rare, Low Prevalence and Rare Diseases Clinical Patient Management System (CPMS) 1. What is the ERN Clinical Patient Management System?

More information

Security and Patient Privacy Handling Key features & responsibilities

Security and Patient Privacy Handling Key features & responsibilities Trusted information systems for health professionals The integrated solution for the electronic management of clinical trials From the design of the electronic Case Report Forms to database lock Security

More information

Future is Effortless

Future is Effortless AQUATM Radiology is a machine Quality Assurance management solution that standardizes, streamlines and automates QA procedures throughout rediology department and across multiple sites. AQUATM Radiology

More information

Networks - Technical specifications of the current networks features used vs. those available in new networks.

Networks - Technical specifications of the current networks features used vs. those available in new networks. APPENDIX V TECHNICAL EVALUATION GUIDELINES Where applicable, the following guidelines will be applied in evaluating the system proposed by a service provider: TABLE 1: HIGH LEVEL COMPONENTS Description

More information

European Platform on Rare Diseases Registration

European Platform on Rare Diseases Registration The European Commission s science and knowledge service Joint Research Centre European Platform on Rare Diseases Registration Simona Martin Agnieszka Kinsner-Ovaskainen Monica Lanzoni Andri Papadopoulou

More information

A Knowledge Model Driven Solution for Web-Based Telemedicine Applications

A Knowledge Model Driven Solution for Web-Based Telemedicine Applications Medical Informatics in a United and Healthy Europe K.-P. Adlassnig et al. (Eds.) IOS Press, 2009 2009 European Federation for Medical Informatics. All rights reserved. doi:10.3233/978-1-60750-044-5-443

More information

Meeting researchers needs in mining web archives: the experience of the National Library of France

Meeting researchers needs in mining web archives: the experience of the National Library of France Meeting researchers needs in mining web archives: the experience of the National Library of France Sara Aubry, IT Department Peter Stirling, Legal Deposit Department Bibliothèque nationale de France LIBER

More information

Version 5. Quick Reference. Guide Option Industrial Way, Redwood City, CA / /

Version 5. Quick Reference. Guide Option Industrial Way, Redwood City, CA / / Version 5 Quick Reference Guide 800.800.5655 Option 1 1400 Industrial Way, Redwood City, CA 94063 / 800.800.5655 / www.aclab.com www.labcheck5.com SYSTEM REQUIREMENTS LabCheck 5 is a web-based application

More information

Identifying and Preventing Conditions for Web Privacy Leakage

Identifying and Preventing Conditions for Web Privacy Leakage Identifying and Preventing Conditions for Web Privacy Leakage Craig E. Wills Computer Science Department Worcester Polytechnic Institute Worcester, MA 01609 1 Position Statement Beyond tracking and proposals

More information

Dooblo SurveyToGo: Security Overview

Dooblo SurveyToGo: Security Overview Dooblo SurveyToGo: Security Overview November, 2013 Written by: Dooblo Page 1 of 11 1 Table of Contents 1 INTRODUCTION... 3 1.1 OVERVIEW... 3 1.2 PURPOSE... 3 2 PHYSICAL DATA CENTER SECURITY... 4 2.1 OVERVIEW...

More information

User Guide. French Language Services (FLS) Annual Report Non-Identified Agencies

User Guide. French Language Services (FLS) Annual Report Non-Identified Agencies User Guide French Language Services (FLS) Annual Report 2012-2013 Non-Identified Agencies TABLE OF CONTENT General information Page 2 Main menu Page 3 Step 1 - Provider Details Page 4 Step 2 - FLS Data

More information

ACCREDITATION COMMISSION FOR CONFORMITY ASSESSMENT BODIES

ACCREDITATION COMMISSION FOR CONFORMITY ASSESSMENT BODIES ACCREDITATION COMMISSION FOR CONFORMITY ASSESSMENT BODIES ACCREDITATION SCHEME MANUAL Document Title: Document Number: Various Accreditation Schemes ACCAB-ASM-7.0 CONTROLLED COPY Revision Number Revision

More information

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo.

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo. Diageo Third Party Hosting Standard 1. Purpose This document is for technical staff involved in the provision of externally hosted solutions for Diageo. This document defines the requirements that third

More information

AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE

AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE Table of Contents Dedicated Geo-Redundant Data Center Infrastructure 02 SSAE 16 / SAS 70 and SOC2 Audits 03 Logical Access Security 03 Dedicated

More information

Data Partnerships to Improve Health Frequently Asked Questions. Glossary...9

Data Partnerships to Improve Health Frequently Asked Questions. Glossary...9 FAQ s Data Partnerships to Improve Health Frequently Asked Questions BENEFITS OF PARTICIPATING... 1 USING THE NETWORK.... 2 SECURING THE DATA AND NETWORK.... 3 PROTECTING PRIVACY.... 4 CREATING METADATA...

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Signature Repository A Signature Repository provides a group of signatures for use by network security tools such

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

TTerm Connect Installation Guide

TTerm Connect Installation Guide Host Connectivity. Any Host, Any Device. TTerm Connect Installation Guide What is TTerm Connect? TTerm Connect is Turbosoft s web based terminal emulator. Built on common web technologies such as HTML5,

More information

Report of the Working Group on mhealth Assessment Guidelines February 2016 March 2017

Report of the Working Group on mhealth Assessment Guidelines February 2016 March 2017 Report of the Working Group on mhealth Assessment Guidelines February 2016 March 2017 1 1 INTRODUCTION 3 2 SUMMARY OF THE PROCESS 3 2.1 WORKING GROUP ACTIVITIES 3 2.2 STAKEHOLDER CONSULTATIONS 5 3 STAKEHOLDERS'

More information

Ministry of Government and Consumer Services. ServiceOntario. Figure 1: Summary Status of Actions Recommended in June 2016 Committee Report

Ministry of Government and Consumer Services. ServiceOntario. Figure 1: Summary Status of Actions Recommended in June 2016 Committee Report Chapter 3 Section 3.06 Ministry of Government and Consumer Services ServiceOntario Standing Committee on Public Accounts Follow-Up on Section 4.09, 2015 Annual Report In March 2016, the Committee held

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Host Intrusion The Host Intrusion employs a response to a perceived incident of interference on a host-based system

More information

Migrating a Business-Critical Application to Windows Azure

Migrating a Business-Critical Application to Windows Azure Situation Microsoft IT wanted to replace TS Licensing Manager, an application responsible for critical business processes. TS Licensing Manager was hosted entirely in Microsoft corporate data centers,

More information

WHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS

WHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS July 2018 WHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS JUST WHAT THE DOCTOR ORDERED... PROTECT PATIENT DATA, CLINICAL RESEARCH AND CRITICAL INFRASTRUCTURE HEALTHCARE S KEY TO DEFEATING IOT CYBERATTACKS

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Port Security Port Security helps to control access to logical and physical ports, protocols, and services. This

More information

Maimonides Medical Center s Quest for Operational Continuity Via Real-Time Data Accessibility

Maimonides Medical Center s Quest for Operational Continuity Via Real-Time Data Accessibility Maimonides Medical Center is a non-profit, non-sectarian hospital located in Borough Park, in the New York City borough of Brooklyn, in the U.S. state of New York. Maimonides is both a treatment facility

More information

WHITEPAPER. Security overview. podio.com

WHITEPAPER. Security overview. podio.com WHITEPAPER Security overview Podio security White Paper 2 Podio, a cloud service brought to you by Citrix, provides a secure collaborative work platform for team and project management. Podio features

More information

Strategic and operational threat analysis at Europol's EC3

Strategic and operational threat analysis at Europol's EC3 Strategic and operational threat analysis at Europol's EC3 Dr. Philipp Amann, MSc Senior Strategic Analyst Team Leader Strategy & Development ENISA Workshop on EU Threat Landscape Europol Unclassified

More information

ESET Remote Administrator 6. Version 6.0 Product Details

ESET Remote Administrator 6. Version 6.0 Product Details ESET Remote Administrator 6 Version 6.0 Product Details ESET Remote Administrator 6.0 is a successor to ESET Remote Administrator V5.x, however represents a major step forward, completely new generation

More information

UBC - Advanced Research Computing Version 0.9 REDCap Terms of Use

UBC - Advanced Research Computing Version 0.9 REDCap Terms of Use UBC - Advanced Research Computing 2018-11-05 Version 0.9 REDCap Terms of Use Version 0.9.0 REDCap Terms of Use 1. Introduction 1.1 Purpose This document explains the terms of use for the REDCap instance

More information

Appriss Health Information Solutions. NARxCheck/Gateway Overview June 2016 Provided by Clay Rogers

Appriss Health Information Solutions. NARxCheck/Gateway Overview June 2016 Provided by Clay Rogers Appriss Health Information Solutions NARxCheck/Gateway Overview June 2016 Provided by Clay Rogers Multi-Layered Solution 2 PMP InterConnect: A Nationwide PMP Data Sharing Platform In 2011 Appriss launched

More information

CPRD Aurum Frequently asked questions (FAQs)

CPRD Aurum Frequently asked questions (FAQs) CPRD Aurum Frequently asked questions (FAQs) Version 1.0 Date: 6 December 2017 Author: Helen Booth and Daniel Dedman, CPRD, UK Documentation Control Sheet During the course of the project it may be necessary

More information

Systematic Security Checking on OSGi Bundles for Remote Healthcare System

Systematic Security Checking on OSGi Bundles for Remote Healthcare System , pp.1-5 http://dx.doi.org/10.14257/astl.2015.116.01 Systematic Security Checking on OSGi Bundles for Remote Healthcare System Jinsoo Hwang 1, Kichang Kim 2 1 Department of Statistics, Inha University,

More information

Case Study. Medical Information Records, LLC. Medical Software Company Relies on Azure to Improve Scalability, Cut Costs & Ensure Compliance

Case Study. Medical Information Records, LLC. Medical Software Company Relies on Azure to Improve Scalability, Cut Costs & Ensure Compliance Case Study Medical Information Records, LLC Medical Information Records, LLC Medical Software Company Relies on Azure to Improve Scalability, Cut Costs & Ensure Compliance Overview Industry: Healthcare

More information

Strengthening Surveillance: The TB Surveillance Checklist of Standards and Benchmarks Rationale and Development

Strengthening Surveillance: The TB Surveillance Checklist of Standards and Benchmarks Rationale and Development Strengthening Surveillance: The TB Surveillance Checklist of Standards and Benchmarks Rationale and Development Emily Bloss, PhD Division of Tuberculosis Elimination Centers for Disease Control and Prevention

More information

Minnesota CAREWare. The Basics

Minnesota CAREWare. The Basics Minnesota CAREWare The Basics Updated June 2014 Index Technical Assistance/Help... 1 What is CAREWare?... 2 Overview of CAREWare... 2 How CAREWare Data Will Be Used... 2 Safeguarding Client Confidentiality...

More information

Solution Overview Vectored Event Grid Architecture for Real-Time Intelligent Event Management

Solution Overview Vectored Event Grid Architecture for Real-Time Intelligent Event Management Solution Overview Vectored Event Grid Architecture for Real-Time Intelligent Event Management Copyright Nuvon, Inc. 2007, All Rights Reserved. Introduction The need to improve the quality and accessibility

More information

Recognition by the SPS Agreement of the World Trade Organization as international points of reference:

Recognition by the SPS Agreement of the World Trade Organization as international points of reference: Workshop for OIE National Focal Points for Veterinary Products Johannesburg, South Africa, 23-26 26 November 2010 OIE Reference Laboratories and Collaborating Centres Dr Elisabeth Erlacher-Vindel, Deputy

More information

Designing a System Engineering Environment in a structured way

Designing a System Engineering Environment in a structured way Designing a System Engineering Environment in a structured way Anna Todino Ivo Viglietti Bruno Tranchero Leonardo-Finmeccanica Aircraft Division Torino, Italy Copyright held by the authors. Rubén de Juan

More information

SCRIPT: MA Enrollment Long Form

SCRIPT: MA Enrollment Long Form SCRIPT: MA Enrollment Long Form (Purpose: This script is to be used for Medicare Advantage plan telephone enrollment for new enrollments only. Telephone enrollment may be offered: 1. If the telephone call

More information

GLOBAL PKI TRENDS STUDY

GLOBAL PKI TRENDS STUDY 2018 GLOBAL PKI TRENDS STUDY Sponsored by Thales esecurity Independently conducted by Ponemon Institute LLC SEPTEMBER 2018 EXECUTIVE SUMMARY #2018GlobalPKI Mi Ponemon Institute is pleased to present the

More information

Health Information Exchange - A Critical Assessment: How Does it Work in the US and What Has Been Achieved?

Health Information Exchange - A Critical Assessment: How Does it Work in the US and What Has Been Achieved? Health Information Exchange - A Critical Assessment: How Does it Work in the US and What Has Been Achieved? Use cases, best practice and examples for successful implementations 1 Agenda Overview of The

More information

The Analysis and Proposed Modifications to ISO/IEC Software Engineering Software Quality Requirements and Evaluation Quality Requirements

The Analysis and Proposed Modifications to ISO/IEC Software Engineering Software Quality Requirements and Evaluation Quality Requirements Journal of Software Engineering and Applications, 2016, 9, 112-127 Published Online April 2016 in SciRes. http://www.scirp.org/journal/jsea http://dx.doi.org/10.4236/jsea.2016.94010 The Analysis and Proposed

More information

Understand & Prepare for EU GDPR Requirements

Understand & Prepare for EU GDPR Requirements Understand & Prepare for EU GDPR Requirements The information landscape has changed significantly since the European Union (EU) introduced its Data Protection Directive in 1995 1 aimed at protecting the

More information

Critical Incident System (CIS): User Guide for Long-Term Care Homes Staff

Critical Incident System (CIS): User Guide for Long-Term Care Homes Staff Critical Incident System (CIS): User Guide for Long-Term Care Homes Staff Table of Contents Search Field Definitions... 3 Section One: Introducing the CIS Application... 4 Contacts... 4 Section Two: Signing

More information

EBHC International Library The Project

EBHC International Library The Project 4 th International Conference of Evidence-Based Health Care Teachers & Developers Better Evidence for Better Health Care Taormina (Italy), 31 st October - 4 th November, 2007 EBHC International Library

More information

RelayHealth Legal Notices

RelayHealth Legal Notices Page 1 of 7 RelayHealth Legal Notices PRIVACY POLICY Revised August 2010 This policy only applies to those RelayHealth services for which you also must accept RelayHealth s Terms of Use. RelayHealth respects

More information

A Firewall Architecture to Enhance Performance of Enterprise Network

A Firewall Architecture to Enhance Performance of Enterprise Network A Firewall Architecture to Enhance Performance of Enterprise Network Hailu Tegenaw HiLCoE, Computer Science Programme, Ethiopia Commercial Bank of Ethiopia, Ethiopia hailutegenaw@yahoo.com Mesfin Kifle

More information

Defense Health Agency Protected Health Information Management Tool (PHIMT)

Defense Health Agency Protected Health Information Management Tool (PHIMT) Defense Health Agency Protected Health Information Management Tool (PHIMT) Training Reference: Regular User Guide Version 3.0 March 2011 Any data herein that may be construed as personal information is

More information

HIPAA Federal Security Rule H I P A A

HIPAA Federal Security Rule H I P A A H I P A A HIPAA Federal Security Rule nsurance ortability ccountability ct of 1996 HIPAA Introduction - What is HIPAA? HIPAA = The Health Insurance Portability and Accountability Act A Federal Law Created

More information

Internal Audit Report DATA CENTER LOGICAL SECURITY

Internal Audit Report DATA CENTER LOGICAL SECURITY Internal Audit Report DATA CENTER LOGICAL SECURITY Report No. SC 12 06 June 2012 David Lane Principal IT Auditor Jim Dougherty Principal Auditor Approved Barry Long, Director Internal Audit & Advisory

More information

ACCREDITATION COMMISSION FOR CONFORMITY ASSESSMENT BODIES

ACCREDITATION COMMISSION FOR CONFORMITY ASSESSMENT BODIES ACCREDITATION COMMISSION FOR CONFORMITY ASSESSMENT BODIES ACCREDITATION SCHEME MANUAL Document Title: Document Number: Various Accreditation Schemes ACCAB-ASM-7.0 CONTROLLED COPY Revision Number Revision

More information

ehealth in Southwestern Ontario

ehealth in Southwestern Ontario ehealth in Southwestern Ontario Adding Value to the Healthcare System November 2, 2016 Prepared by: Michael Barrett, CEO, South West LHIN at the request of Ed Clark Page 1 Table of Contents Table of Contents

More information

(60 min) California State Updates

(60 min) California State Updates (60 min) California State Updates Presenters: 30 min Speranza Avram, CEO, CalHIPSO: EHR status & uptake in CA 20 min David A. Minch, President & COO, HealthShare Bay Area: HIE status 10 min Questions 1

More information

Defense Health Agency Protected Health Information Management Tool (PHIMT)

Defense Health Agency Protected Health Information Management Tool (PHIMT) Defense Health Agency Protected Health Information Management Tool (PHIMT) Training Reference: Privacy Specialist User Guide Version 3.0 March 2011 Any data herein that may be construed as personal information

More information

CPRD Aurum Frequently asked questions (FAQs)

CPRD Aurum Frequently asked questions (FAQs) CPRD Aurum Frequently asked questions (FAQs) Version 2.0 Date: 10 th April 2019 Authors: Helen Booth, Daniel Dedman, Achim Wolf (CPRD, UK) 1 Documentation Control Sheet During the course of the project

More information

Technical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed.

Technical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed. Technical Overview Technical Overview Standards based Architecture Scalable Secure Entirely Web Based Browser Independent Document Format independent LDAP integration Distributed Architecture Multiple

More information

System Requirements. v7.5. May 10, For the most recent version of this document, visit kcura's Documentation Site.

System Requirements. v7.5. May 10, For the most recent version of this document, visit kcura's Documentation Site. System Requirements v7.5 May 10, 2013 For the most recent version of this document, visit kcura's Documentation Site. Table of Contents 1 System requirements overview 3 1.1 Scalable infrastructure example

More information

Leveraging public health s experience with information standards and health improvement

Leveraging public health s experience with information standards and health improvement Leveraging public health s experience with information standards and health improvement Claire Broome, M.D. Centers for Disease Control and Prevention (CDC) June 24, 2004 Connecting Communities for Better

More information

March 2019 Town Hall. With CROWNWeb Outreach, Communication, and Training (OCT) March 28, PM to 3PM ET

March 2019 Town Hall. With CROWNWeb Outreach, Communication, and Training (OCT) March 28, PM to 3PM ET March 2019 Town Hall With CROWNWeb Outreach, Communication, and Training (OCT) March 28, 2019 2PM to 3PM ET Submitting Questions Type questions in the Q&A section, located in the top right corner of your

More information

Networking for a smarter data center: Getting it right

Networking for a smarter data center: Getting it right IBM Global Technology Services October 2011 Networking for a smarter data center: Getting it right Planning the network needed for a dynamic infrastructure 2 Networking for a smarter data center: Getting

More information

The M Data Extractor (MDE) White Paper

The M Data Extractor (MDE) White Paper S R S Point. Click. Extract. That s it. The M Data Extractor (MDE) White Paper www.mde.srs-inc.com Copyright. Strategic Reporting Systems, Inc. All rights reserved. The MDE White Paper Page 2 Executive

More information

enicq 6 Installation Guide

enicq 6 Installation Guide Vermont Oxford Network enicq 6 Documentation enicq 6 Installation Guide Release 1.4 Published January 2018 2018 Vermont Oxford Network. All Rights Reserved. enicq 6 Installation Guide Introduction Welcome

More information

Document valide au 21/08/2015. Welcome Booklet

Document valide au 21/08/2015. Welcome Booklet Welcome Booklet Welcome to Bipea! You have chosen to join our Proficiency Testing Programs. We thank you for your trust! We hope that our Proficiency Testing Schemes will fully meet your needs and requirements.

More information

The Data Center is Dead Long Live the Virtual Data Center

The Data Center is Dead Long Live the Virtual Data Center The Data Center is Dead Long Live the Virtual Data Center Hector Rodriguez, MBA Microsoft WW Health Chief Industry Security Officer September 12, 2018 Enterprise Data Centers are Vanishing Enterprise data

More information

Standards: Implementation, Certification and Testing Work group Friday, May 8, :00 Pm-1:30 Pm ET.

Standards: Implementation, Certification and Testing Work group Friday, May 8, :00 Pm-1:30 Pm ET. Standards: Implementation, Certification and Testing Work group Friday, May 8, 2015. 12:00 Pm-1:30 Pm ET. Agenda Complete Work group Comments- Group 1 Review Group 2 Comments. 2015 Edition Certification

More information

2017_Privacy and Information Security_English_Content

2017_Privacy and Information Security_English_Content 2017_Privacy and Information Security_English_Content 2.3 Staff includes all permanent or temporary, full-time, part-time, casual or contract employees, trainees and volunteers, including but not limited

More information

User Manual/Guide for Direct Using encompass 3.0. Prepared By: Arête Healthcare Services, LLC

User Manual/Guide for Direct Using encompass 3.0. Prepared By: Arête Healthcare Services, LLC User Manual/Guide for Direct Using encompass 3.0 Prepared By: Arête Healthcare Services, LLC Document Version: V1.0 10/02/2015 Contents Direct Overview... 3 What is Direct?... 3 Who uses Direct?... 3 Why

More information

EXAMPLE 3-JOINT PRIVACY AND SECURITY CHECKLIST

EXAMPLE 3-JOINT PRIVACY AND SECURITY CHECKLIST Purpose: The purpose of this Checklist is to evaluate your proposal to use or disclose Protected Health Information ( PHI ) for the purpose indicated below and allow the University Privacy Office and Office

More information

GoToMyPC Corporate Product Guide

GoToMyPC Corporate Product Guide GoToMyPC Corporate Product Guide 072402 Contents Product Overview...1 How It Works...1 Target Audiences/Product Uses...2 Primary Selling Points...3 Software Features and Benefits...4 Administration Center

More information

Terms of Use for access of INSERM s computing resources and Internet services

Terms of Use for access of INSERM s computing resources and Internet services Terms of Use for access of INSERM s computing resources and Internet services This document is provided as a translation of the original document, which is written in French. In case of a discrepancy between

More information

Public Safety Communications Evolution

Public Safety Communications Evolution Public Safety Communications Evolution November 2011 CURRENT TRANSITION DESIRED EVOLUTION Indefinite Time Frame Long Term Land Mobile Radio Networks Mission Critical Voice Mission Critical Data Public

More information

Optimization of Firewall Rules

Optimization of Firewall Rules Optimization of Firewall Rules Tihomir Katić Predrag Pale Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia tihomir.katic@fer.hr predrag.pale@fer.hr

More information

Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E November 2017

Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E November 2017 Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E87635-01 November 2017 Copyright 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation

More information

This section of the release notes is reserved for notable changes and new features since the prior version.

This section of the release notes is reserved for notable changes and new features since the prior version. Release Notes Browsium Proton 4.0 Product Version: 4.0.0 Release Notes Updated: 9 August 2016 About this Release This document lists new features and known issues as of the release date. If you discover

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Risk Monitoring Risk Monitoring assesses the effectiveness of the risk decisions that are made by the Enterprise.

More information

HIPAA Case Study. Long Term Care (LTC) Industry. October 26, Presented by: James Pfeiffer Brian Zoeller

HIPAA Case Study. Long Term Care (LTC) Industry. October 26, Presented by: James Pfeiffer Brian Zoeller HIPAA Case Study Long Term Care (LTC) Industry October 26, 2001 Presented by: James Pfeiffer Brian Zoeller Overview LTC Industry Characteristics LTC HIPAA Compliance Issues Kindred Healthcare s HIPAA Compliance

More information

Empowering Citizens through phealth

Empowering Citizens through phealth phealth 2009 The 6-th 6 International Workshop on Wearable Micro and Nano Technologies for personalised Health Oslo June 25 th 2009 Empowering Citizens through phealth The EU Agenda Roberto Giampieretti

More information

April Appendix 3. IA System Security. Sida 1 (8)

April Appendix 3. IA System Security. Sida 1 (8) IA System Security Sida 1 (8) Table of Contents 1 Introduction... 3 2 Regulatory documents... 3 3 Organisation... 3 4 Personnel security... 3 5 Asset management... 4 6 Access control... 4 6.1 Within AFA

More information

User Guide. French Language Services (FLS) Annual Report Identified Agencies SE LHIN

User Guide. French Language Services (FLS) Annual Report Identified Agencies SE LHIN User Guide French Language Services (FLS) Annual Report 2012-2013 Identified Agencies SE LHIN TABLE OF CONTENT General information Page 2 Main menu Page 3 Step 1 - Provider Details Page 4 Step 2 - FLS

More information

Monarch General Capabilities Overview EMPOWERING ENABLING CONNECTING

Monarch General Capabilities Overview EMPOWERING ENABLING CONNECTING Monarch General Capabilities Overview EMPOWERING ENABLING CONNECTING Executive Summary Monarch is a data translation, interface engine and routing solution for enterprise and system owners. Whether your

More information

Oracle Hospitality Cruise Fine Dining System Security Guide Release E

Oracle Hospitality Cruise Fine Dining System Security Guide Release E Oracle Hospitality Cruise Fine Dining System Security Guide Release 9.0.2.29 E99054-01 August 2018 Copyright 2015, 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation

More information

High Reliability Intranets for Document Management

High Reliability Intranets for Document Management High Reliability Intranets for Document Management Simon Cleary and Andrew Jennings CSE,RMIT simon.cleary@rmit.edu.au, ajennings@rmit.edu.au Introduction The dramatic growth of IP based applications has

More information

This section of the release notes is reserved for notable changes and new features since the prior version.

This section of the release notes is reserved for notable changes and new features since the prior version. Release Notes Browsium Proton 4.1 Product Version: 4.1.0 Release Notes Updated: 15 October 2016 About this Release This document lists new features and known issues as of the release date. If you discover

More information

Patient Information Security

Patient Information Security Patient Information Security An overview of practice and procedure UK CAB Meeting 13th April 2012 Nathan Lea Senior Research Associate CHIME, UCL Overview - Questions that have been asked What happens

More information

Qlik Sense Enterprise architecture and scalability

Qlik Sense Enterprise architecture and scalability White Paper Qlik Sense Enterprise architecture and scalability June, 2017 qlik.com Platform Qlik Sense is an analytics platform powered by an associative, in-memory analytics engine. Based on users selections,

More information