Working with Health IT Systems is available under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported license.

Size: px
Start display at page:

Download "Working with Health IT Systems is available under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported license."

Transcription

1 Working with Health IT Systems is available under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported license. Johns Hopkins University.

2 Welcome to Quality Improvement: Data Quality Improvement. This is Lecture c. 1

3 The Objectives for Data Quality Improvement are to: Discuss common causes of data insufficiency. Describe how Health Information Technology (HIT) design can enhance quality. 2

4 A case study of data quality in medical registries published by Arts, De Keizer, and Scheffer, in 2002, offers a good summary of many of the data quality issues previously presented in this module. In this article, they discuss common causes of insufficient data quality as either systematic or random. The systematic causes (or what is statistically referred to as Type I errors) are those that can be attributed to some bias or flaw in the measurement process that is not due to chance. Systematic causes, if not corrected, will cause repeated flaws or errors with a predictable pattern or a high degree of uncertainty. Some frequent systematic causes of insufficient data quality are: Unclear or ambiguous definitions Incomplete or unsuitable format Violations in the collection, processing or analysis Poor design in the tools or forms for data entry And a lack of quality auditing or control processes. 3

5 Random causes occur with less predictability and can include Inaccurate transcription or typing (as in free-text entries), Sheer data overload and the possibility of ambiguity or selection of irrelevant data, Inattention or poor understanding on the part of the individual completing the entry, analysis, or data warehousing procedures. 4

6 The team examined planned and systematic procedures that take place before, during and after the data collection to identify causes of insufficient data quality. As an HIT professional, you will be in the best position to consider what can be done to prevent, detect, and facilitate improvement efforts. You will seek to create the best possible quality through the design of the application, the data collection process and subsequent reports or analyses. You will implement activities to detect potential or real flaws that can pose threats to data quality and you will take corrective actions to improve data quality. 5

7 Let s recap what some of those activities include under each of the three areas. Identify the required data elements for the task. A data dictionary with standard definitions and data formats will be essential to promoting data quality. Seek terminology harmonization with accepted standards and avoid local naming conventions or glossaries. Data capture and completeness will improve when the required data location is limited to fewer locations within the EHR. Optimizing the use of structured data fields over free-text will reduce the likelihood of missing data and improve data retrieval. While data extraction programs, such as natural language processing programs can be used to extract data, these programs work best when the variables are narrowly and consistently defined. Standard guidelines for data collection, analysis, and storage should also be documented and should note clear inclusion and exclusion criteria. 6

8 Privacy and security policies should govern the controlled access of the data, and responsibility and accountability for data management must be delineated and observed. Attention must be paid to how clinical workflow and system design can affect data quality. The placement and design of structured data should facilitate the work of the clinician. Excessive navigation and requiring multiple "clicks" will decrease documentation compliance and promote the unintended use of free-text, or lead to missing or inaccurate data. The clinical specificity and number of option choices for structured data, if designed correctly, can facilitate data quality. Synonym and acronym recognition should be used wisely. It can speed data entry, but can also lead to inappropriate entries if the wrong choice is selected. Recognition and correction of data flaws requires a thoughtful monitoring plan. Priority data elements, such as those used for quality measurement, should be identified and targeted for monitoring and improvement as indicated. These data should be reviewed for data granularity, precision, currency, timeliness, completion, and accuracy. Data documentation quality can be improved through staff training and education. Content can include system use, screen navigation, use of references such as the data dictionary and collection guidelines and placement and completion of priority data elements. Standard content and delivery methods should be identified to minimize localized work-arounds. A plan for ongoing education of new users and new content or upgrades should be identified to prevent deterioration in the data quality due to lack of knowledge. 7

9 Automatic domain or consistency checks, such as out-of-range data or inconsistencies between two data fields, at data entry, extraction or transfer can detect potential flaws or errors. Data errors, such as incorrect patient location, which can be undetectable through programming checks, can still occur. Manual processes for auditing or data checking should be developed. Regular review of data collection protocols and report logic should be conducted with care to correct sources of ambiguity or a lack of currency with other changes in data definitions or catalog updates. Review of priority data items, such as frequency analysis or cross tabulations, can be conducted to detect flaws or unacceptable deviations in the data. 8

10 Users will continue to assume that quality is present in the absence of data to inform them otherwise. Regular reports about data quality should be made available to them. Once inaccuracies or flaws in the data are known, corrections and edits to the data must be made. Documentation and correction of the flaws or errors is essential and may provide justification for future design modification. As discussed in the beginning of this module, data are often shared across multiple interfaces and often used for applications other than the originally intended purpose. Systematic study of the source of error and inadequacies should be conducted so current and future corrections can be made across all applicable systems. 9

11 HIT solutions offer a number of opportunities to improve the quality of data. Standardization of terminology has multiple effects in the improvement of data quality. In their study, Thede et al, described some of the benefits of standardization in the nursing field as including: better communication among healthcare providers, improved patient care enhanced data collection to evaluate outcomes greater adherence to standards of care and facilitation of assessment of competency. Some advantages can be assigned to the use of standardized terminology by other professionals. Another significant aspect of the improvement of data quality relies on the use of structured data fields. Structured data fields are fields that contain information that has a pre-defined data model. This allows this data to fit into relational tables thus permitting the easy extraction into reports. The use of structured data fields is somewhat challenging, particularly for clinicians. During their training and their previous experience with paper charts clinicians have used a narrative form to document the ailments of their patients. This story telling format is difficult to translate into the more dry structured data format and requires some retraining for all clinicians. However, in the current EMRs there are areas where clinicians can document in free text or story telling format and yet preserve the integrity of the structured data fields establishing a balance that preserves data quality and the needs for narrative documentation. Structured data fields can be accomplished through pick lists, check buttons or radio buttons. Finally, there is another format of data capture based on voice recognition that will enable the user to capture more comprehensive data. However the majority of this data capture albeit comprehensive happens in a free text format. 10

12 Finally, there are options that although not currently in wide use can enhance the quality of data collected through an HIT solution. The use of natural-language processing machines capable of learning can eventually prove a valuable tool to enhance quality of data. The use of biometric tools that enter the measurements directly into the EHR can be an additional tool for data quality improvement. 11

13 This concludes Lecture c of Data Quality Improvement. Clinical data are increasingly used to drive healthcare decisions. The data that are captured to document patient care are also used for billing, risk management, accreditation, quality, and health care research. Poor data quality can threaten patient safety and quality; decrease satisfaction; increase cost; and compromise strategic planning. Data quality is a complex, multi-dimensional concept and a number of attributes should be considered at all phases of HIT development and use. An HIT professional who is aware of the common systematic and/or random causes of data insufficiency can skillfully employ best practices in the areas of prevention, detection, and quality improvement to enhance the overall quality and usefulness of healthcare data. 12

14 No audio. 13

Working with Health IT Systems is available under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported license.

Working with Health IT Systems is available under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported license. Working with Health IT Systems is available under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported license. Johns Hopkins University. Welcome to Quality Improvement: Data Quality Improvement.

More information

Meaningful Use or Meltdown: Is Your Electronic Health Record System Secure?

Meaningful Use or Meltdown: Is Your Electronic Health Record System Secure? SESSION ID: PDAC-R03 Meaningful Use or Meltdown: Is Your Electronic Health Record System Secure? Gib Sorebo Chief Cybersecurity Strategist Leidos @gibsorebo High Cost of Healthcare Data Breaches Source:

More information

Standards: Implementation, Certification and Testing Work group Friday, May 8, :00 Pm-1:30 Pm ET.

Standards: Implementation, Certification and Testing Work group Friday, May 8, :00 Pm-1:30 Pm ET. Standards: Implementation, Certification and Testing Work group Friday, May 8, 2015. 12:00 Pm-1:30 Pm ET. Agenda Complete Work group Comments- Group 1 Review Group 2 Comments. 2015 Edition Certification

More information

Data governance and data quality: is it on your agenda or lurking in the shadows?

Data governance and data quality: is it on your agenda or lurking in the shadows? Data governance and data quality: is it on your agenda or lurking in the shadows? Associate Professor Anne Young Director Planning, Quality and Reporting The University of Newcastle Context Data governance

More information

APF!submission!!draft!Mandatory!data!breach!notification! in!the!ehealth!record!system!guide.!

APF!submission!!draft!Mandatory!data!breach!notification! in!the!ehealth!record!system!guide.! enquiries@privacy.org.au http://www.privacy.org.au/ 28September2012 APFsubmission draftmandatorydatabreachnotification intheehealthrecordsystemguide. The Australian Privacy Foundation (APF) is the country's

More information

the Translation & Localization Industry

the Translation & Localization Industry the Translation & Localization Industry Industry Standards and What to Look For 2018 Copyright. CyraCom. All Rights Reserved. 1 When choosing a translation and localization provider, clients are able to

More information

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use Click to edit Master title style Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use Andy Petrovich, MHSA, MPH M-CEITA / Altarum Institute October 1, 2014 10/1/2014 1 1 Who is

More information

Security and Privacy Governance Program Guidelines

Security and Privacy Governance Program Guidelines Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by

More information

REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009

REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009 APPENDIX 1 REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009 Auditor General s Office Jeffrey Griffiths, C.A., C.F.E. Auditor General City of Toronto

More information

Searching the Cochrane Library

Searching the Cochrane Library Searching the Cochrane Library To book your place on the course contact the library team: www.epsom-sthelier.nhs.uk/lis E: hirsonlibrary@esth.nhs.uk T: 020 8296 2430 Learning objectives At the end of this

More information

The Data Center is Dead Long Live the Virtual Data Center

The Data Center is Dead Long Live the Virtual Data Center The Data Center is Dead Long Live the Virtual Data Center Hector Rodriguez, MBA Microsoft WW Health Chief Industry Security Officer September 12, 2018 Enterprise Data Centers are Vanishing Enterprise data

More information

Privacy Impact Assessment

Privacy Impact Assessment Automatic Number Plate Recognition (ANPR) Deployments Review Of ANPR infrastructure February 2018 Contents 1. Overview.. 3 2. Identifying the need for a (PIA).. 3 3. Screening Questions.. 4 4. Provisions

More information

Use Cases for Argonaut Project -- DRAFT Page

Use Cases for Argonaut Project -- DRAFT Page Use Cases for Argonaut Project -- DRAFT Page 1 Use Cases for Argonaut Project DRAFT V0.3 March 03, 2015 Use Cases for Argonaut Project -- DRAFT Page 2 Introduction The Argonaut Project seeks to rapidly

More information

What is Usability? What is the Current State? Role and Activities of NIST in Usability Reactions from Stakeholders What s Next?

What is Usability? What is the Current State? Role and Activities of NIST in Usability Reactions from Stakeholders What s Next? What is Usability? What is the Current State? Role and Activities of NIST in Usability Reactions from Stakeholders What s Next? Usability is "the extent to which a product can be used by specified users

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

Media & Design Elements Rubric (Gonzales) Page 1 of 6

Media & Design Elements Rubric (Gonzales) Page 1 of 6 Media & Design Elements Rubric (Gonzales) Page 1 of 6 Media & Design Elements Rubric Gonzales, Center for Teaching, Learning and Scholarship, Samford University www.samford.edu/ctls/portfolio_assessment_rubrics.doc

More information

The Windstream Enterprise Advantage for Healthcare

The Windstream Enterprise Advantage for Healthcare The Windstream Enterprise Advantage for Healthcare Creating personalized healthcare experiences with secure and reliable cloud-optimized IT communications so you can focus on providing a connected, interoperable

More information

Name of Department: Semester: Instructor Name Office Hours. Telephone Class Meeting Days/Times Location

Name of Department: Semester: Instructor Name Office Hours.  Telephone Class Meeting Days/Times Location Name of Department: Semester: Instructor Name Office Hours E-mail Telephone Class Meeting Days/Times Location Health Careers Summer 2016 Roseanna McGinn, RHIT SCC 222, UNM-Valencia Campus By appointment

More information

DEFINITIONS AND REFERENCES

DEFINITIONS AND REFERENCES DEFINITIONS AND REFERENCES Definitions: Insider. Cleared contractor personnel with authorized access to any Government or contractor resource, including personnel, facilities, information, equipment, networks,

More information

Board Assurance Framework and Corporate Risk Register Report

Board Assurance Framework and Corporate Risk Register Report Trust Board Meeting in Public: Wednesday 9 th November 20 Title Board Assurance Framework and Corporate Risk Register Report Status History For discussion The full BAF and CRR was reported to the: Audit

More information

Matt Quinn.

Matt Quinn. Matt Quinn matt.quinn@nist.gov Roles of AHRQ and NIST What s at Stake Current State of Usability in Certified EHRs Projects to Support Improved Usability Moving Forward June 7 NIST Workshop Questions NIST's

More information

TEL2813/IS2820 Security Management

TEL2813/IS2820 Security Management TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management

More information

Policy Statement: 1. Intro of what ehealth is in relation to pharmaceutical care / pharmacy practice and the means which are used 2.

Policy Statement: 1. Intro of what ehealth is in relation to pharmaceutical care / pharmacy practice and the means which are used 2. Policy Statement: 1. Intro of what ehealth is in relation to pharmaceutical care / pharmacy practice and the means which are used 2. Documentation of medication use of patients to improve use (safe, rational

More information

Audits Why bother?! Caroline Lester Senior Health Protection Nurse PHE Health Protection Team

Audits Why bother?! Caroline Lester Senior Health Protection Nurse PHE Health Protection Team Audits Why bother?! Caroline Lester Senior Health Protection Nurse PHE Health Protection Team Contents Why do clinical audit? What is clinical audit? Types of clinical audit What to do with the audit?

More information

Open Source Software Quality Certification

Open Source Software Quality Certification Open Source Software Quality Certification The Emerging ANSI Standard Wes Turner Director, Open Source Operations OSEHRA Mike Henderson Director, Open Source Product Management OSEHRA Wednesday, September

More information

Criteria to Participate as an ACE Authorized Test Provider

Criteria to Participate as an ACE Authorized Test Provider Criteria to Participate as an ACE Authorized Test Provider Overview of the Authorized Test Provider Program Organizations with ACE credit-recommendation sometimes distribute or sell their courseware to

More information

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use Click to edit Master title style Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use Andy Petrovich, MHSA, MPH M-CEITA / Altarum Institute June 21, 2016 6/21/2016 1 1 Disclaimer

More information

NATIONAL COMMISSION ON FORENSIC SCIENCE

NATIONAL COMMISSION ON FORENSIC SCIENCE NATIONAL COMMISSION ON FORENSIC SCIENCE Recommendation for the Accreditation of Digital and Multimedia Forensic Science Service Providers 1 Subcommittee Date of Current Version 25/02/16 Accreditation and

More information

Business Impacts of Poor Data Quality: Building the Business Case

Business Impacts of Poor Data Quality: Building the Business Case Business Impacts of Poor Data Quality: Building the Business Case David Loshin Knowledge Integrity, Inc. 1 Data Quality Challenges 2 Addressing the Problem To effectively ultimately address data quality,

More information

THE NATIONAL CME/CPD FRAMEWORK FOR HEALTHCARE PRACTITIONERS

THE NATIONAL CME/CPD FRAMEWORK FOR HEALTHCARE PRACTITIONERS THE NATIONAL CME/CPD FRAMEWORK FOR HEALTHCARE PRACTITIONERS Accreditation and Health Profession Education Department Qatar Council for Healthcare Practitioners (QCHP) DISCLOSURE The presenters have no

More information

Working with Health IT Systems is available under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported license.

Working with Health IT Systems is available under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported license. Working with Health IT Systems is available under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported license. Johns Hopkins University. Welcome to the Fundamentals of Health Workflow

More information

Criterion 4 Exemplary 3 Very Good 2 Good 1 Substandard Comprehensive/ Web 2.0 tool cannot be used any content area and has

Criterion 4 Exemplary 3 Very Good 2 Good 1 Substandard Comprehensive/ Web 2.0 tool cannot be used any content area and has Criterion 4 Exemplary 3 Very Good 2 Good 1 Substandard Comprehensive/ Web 2.0 tool can be used in Web 2.0 tool can be used in Web 2.0 tool can be used in Web 2.0 tool cannot be used any content area and

More information

Putting It All Together:

Putting It All Together: Putting It All Together: The Interplay of Privacy & Security Regina Verde, MS, MBA, CHC Chief Corporate Compliance & Privacy Officer University of Virginia Health System 2017 ISPRO Conference October 24,

More information

Agile Accessibility. Presenters: Ensuring accessibility throughout the Agile development process

Agile Accessibility. Presenters: Ensuring accessibility throughout the Agile development process Agile Accessibility Ensuring accessibility throughout the Agile development process Presenters: Andrew Nielson, CSM, PMP, MPA Ann Marie Davis, CSM, PMP, M. Ed. Cammie Truesdell, M. Ed. Overview What is

More information

Sample Exam Privacy & Data Protection Foundation

Sample Exam Privacy & Data Protection Foundation Sample Exam Sample Exam Privacy & Data Protection Foundation SECO-Institute issues the official Business Continuity courseware to accredited training centres where students are trained by accredited instructors.

More information

Critical HIPAA Privacy & Security Crossover Areas

Critical HIPAA Privacy & Security Crossover Areas Critical HIPAA Privacy & Security Crossover Areas Presented by HIPAA Solutions, LC Peter MacKoul, JD Senior Privacy SME Ken Hughes Senior Security SME HIPAA Solutions, LC 2016 1 Critical HIPAA Privacy

More information

Update from HIMSS National Privacy & Security. Lisa Gallagher, VP Technology Solutions November 14, 2013

Update from HIMSS National Privacy & Security. Lisa Gallagher, VP Technology Solutions November 14, 2013 Update from HIMSS National Privacy & Security Lisa Gallagher, VP Technology Solutions November 14, 2013 Agenda Update on HIMSS new Technology Solutions Department HIPAA Omnibus Rules Meaningful Use 2 P&S

More information

Meeting the Meaningful Use Security and Privacy Measure

Meeting the Meaningful Use Security and Privacy Measure Meeting the Meaningful Use Security and Privacy Measure Meeting the MU Security Measure a risk analysis Complete a risk management assessment Implement an Employee Training Program and Employee Sanction

More information

LICS Certification Scheme

LICS Certification Scheme LICS Certification Scheme LICS Certified Community Interpreting Service Provider Language Industry Certification System Release date: V1.0, 2009-08-15 Austrian Standards plus GmbH, Heinestrasse 38, A-1020

More information

Foundation. Become a ITIL Foundation Certified Professional from our exclusive 2 full day. conducted by authorized faculties from APMG.

Foundation. Become a ITIL Foundation Certified Professional from our exclusive 2 full day. conducted by authorized faculties from APMG. Certified ITIL Foundation Become a ITIL Foundation Certified Professional from our exclusive 2 full day training Certified program conducted by authorized faculties from APMG. Exclusive Classroom Training

More information

The Clinical Data Repository Provides CPR's Foundation

The Clinical Data Repository Provides CPR's Foundation Tutorials, T.Handler,M.D.,W.Rishel Research Note 6 November 2003 The Clinical Data Repository Provides CPR's Foundation The core of any computer-based patient record system is a permanent data store. The

More information

Driving Global Resilience

Driving Global Resilience Driving Global Resilience Steve Mellish FBCI Chairman, The Business Continuity Institute Monday December 2nd, 2013 Business & IT Resilience Summit New Delhi, India Chairman of the Business Continuity Institute

More information

1. Introduction and Overview

1. Introduction and Overview 1. Introduction and Overview Thank you for volunteering to be an Alliance Usability Tester! This Survey Monkey addresses basic principles of usability as demonstrated in evidence based research on usability

More information

PULSE TAKING THE PHYSICIAN S

PULSE TAKING THE PHYSICIAN S TAKING THE PHYSICIAN S PULSE TACKLING CYBER THREATS IN HEALTHCARE Accenture and the American Medical Association (AMA) surveyed U.S. physicians regarding their experiences and attitudes toward cybersecurity.

More information

THE USE OF PARTNERED USABILITY TESTING TO HELP TO IDENTIFY GAPS IN ONLINE WORK FLOW

THE USE OF PARTNERED USABILITY TESTING TO HELP TO IDENTIFY GAPS IN ONLINE WORK FLOW THE USE OF PARTNERED USABILITY TESTING TO HELP TO IDENTIFY GAPS IN ONLINE WORK FLOW Dianne Davis Fishbone Interactive Gordon Tait Department of Surgery, University of Toronto Cindy Bruce-Barrett Strategic

More information

Digital Healthcare. Yordan Iliev Director R&D Healthcare. Regional Cybersecurity Forum, November 2016, Grand Hotel Sofia, Bulgaria

Digital Healthcare. Yordan Iliev Director R&D Healthcare. Regional Cybersecurity Forum, November 2016, Grand Hotel Sofia, Bulgaria Digital Healthcare Yordan Iliev Director R&D Healthcare Regional Cybersecurity Forum, 29-30 November 2016, Grand Hotel Sofia, Bulgaria AGENDA Introduction Security challenges in healthcare IT Change ahead

More information

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110 Purpose Virginia State University (VSU) uses information to perform the business services and functions necessary to fulfill its mission. VSU information is contained in many different mediums including

More information

What is the Northern Ireland ehealth and Care strategy?

What is the Northern Ireland ehealth and Care strategy? What is the Northern Ireland ehealth and Care strategy? The regional ehealth and Care strategy provides a framework and plan for regional coordination and collaboration to further develop ehealth in Northern

More information

When Recognition Matters WHITEPAPER ISO SUPPLY CHAIN SECURITY MANAGEMENT SYSTEMS.

When Recognition Matters WHITEPAPER ISO SUPPLY CHAIN SECURITY MANAGEMENT SYSTEMS. When Recognition Matters WHITEPAPER ISO 28000 SUPPLY CHAIN SECURITY MANAGEMENT SYSTEMS www.pecb.com CONTENT 3 4 4 4 4 5 6 6 7 7 7 8 9 10 11 12 Introduction An overview of ISO 28000:2007 Key clauses of

More information

Introduction to The Cochrane Library

Introduction to The Cochrane Library Introduction to The Cochrane Library What is The Cochrane Library? A collection of databases that include high quality, independent, reliable evidence from Cochrane and other systematic reviews, clinical

More information

Automated Firewall Change Management Securing change management workflow to ensure continuous compliance and reduce risk

Automated Firewall Change Management Securing change management workflow to ensure continuous compliance and reduce risk Automated Firewall Change Management Securing change management workflow to ensure continuous compliance and reduce risk Skybox Security Whitepaper January 2015 Executive Summary Firewall management has

More information

LNE/G-MED North America, Inc

LNE/G-MED North America, Inc LNE/G-MED North America, Inc Medical Device Usability: Highlights of European Regulations and the Latest Standards Do not distribute or reproduce without permission 1 Sara Jafari, Ph.D., Medical Device

More information

Step-by-Step Instructions for Pre-Work

Step-by-Step Instructions for Pre-Work Step-by-Step Instructions for Pre-Work We recommend that you schedule 20-25 hours to complete your pre-work assignment. Please track your hours. We will ask you to record them on your pre-work evaluation

More information

The National Medical Device Information Sharing & Analysis Organization (MD-ISAO) Initiative Session 2, February 19, 2017 Moderator: Suzanne

The National Medical Device Information Sharing & Analysis Organization (MD-ISAO) Initiative Session 2, February 19, 2017 Moderator: Suzanne The National Medical Device Information Sharing & Analysis Organization (MD-ISAO) Initiative Session 2, February 19, 2017 Moderator: Suzanne Schwartz, Assoc. Dir., CDRH, FDA Denise Anderson, MBA, President,

More information

DATABASE MANAGEMENT SYSTEMS

DATABASE MANAGEMENT SYSTEMS CHAPTER DATABASE MANAGEMENT SYSTEMS This chapter reintroduces the term database in a more technical sense than it has been used up to now. Data is one of the most valuable assets held by most organizations.

More information

Cybersecurity: Incident Response Short

Cybersecurity: Incident Response Short Cybersecurity: Incident Response Short August 2017 Center for Development of Security Excellence Contents Lesson 1: Incident Response 1-1 Introduction 1-1 Incident Definition 1-1 Incident Response Capability

More information

Medical Device Vulnerability Management

Medical Device Vulnerability Management Medical Device Vulnerability Management MDISS / NH-ISAC Process Draft Dale Nordenberg, MD June 2015 Market-based public health: collaborative acceleration Objectives Define a trusted and repeatable process

More information

Therapy Provider Portal. User Guide

Therapy Provider Portal. User Guide Therapy Provider Portal User Guide Page 2 of 16 UCare User Guide V1.7 Table of Contents I. Introduction...3 About HSM Therapy Management... 4 Terms of Use... 4 Contact Information... 6 II. Using the Therapy

More information

Financial Planning Institute of Southern Africa SETTING THE STANDARD. Continuous Professional Development (Cpd) Policy

Financial Planning Institute of Southern Africa SETTING THE STANDARD. Continuous Professional Development (Cpd) Policy FPI FPI Financial Planning Institute of Southern Africa SETTING THE STANDARD Continuous Professional Development (Cpd) Policy Table of Contents Definitions 3-4 Introduction 4 Primary Responsibility 5 Mandatory

More information

Objectives of the Security Policy Project for the University of Cyprus

Objectives of the Security Policy Project for the University of Cyprus Objectives of the Security Policy Project for the University of Cyprus 1. Introduction 1.1. Objective The University of Cyprus intends to upgrade its Internet/Intranet security architecture. The University

More information

ITG. Information Security Management System Manual

ITG. Information Security Management System Manual ITG Information Security Management System Manual This manual describes the ITG Information Security Management system and must be followed closely in order to ensure compliance with the ISO 27001:2005

More information

Buros Center for Testing. Standards for Accreditation of Testing Programs

Buros Center for Testing. Standards for Accreditation of Testing Programs Buros Center for Testing Standards for Accreditation of Testing Programs Improving the Science and Practice of Testing www.buros.org Copyright 2017 The Board of Regents of the University of Nebraska and

More information

Terms & Conditions. Privacy, Health & Copyright Policy

Terms & Conditions. Privacy, Health & Copyright Policy 1. PRIVACY Introduction Terms & Conditions Privacy, Health & Copyright Policy When you access our internet web site you agree to these terms and conditions. Bupa Wellness Pty Ltd ABN 67 145 612 951 ("Bupa

More information

4.2.2 Usability. 4 Medical software from the idea to the finished product. Figure 4.3 Verification/validation of the usability, SW = software

4.2.2 Usability. 4 Medical software from the idea to the finished product. Figure 4.3 Verification/validation of the usability, SW = software 4.2.2 Usability Intended purpose, Market Validation Usability Usability Risk analysis and measures Specification of the overall system SW SW architecture/ of SW SW design Software design & integration

More information

EuroRec Functional Statements Repository. EHR-QTN Workshop Vilnius, January 26, 2011 Dr. Jos Devlies, Belgium

EuroRec Functional Statements Repository. EHR-QTN Workshop Vilnius, January 26, 2011 Dr. Jos Devlies, Belgium EuroRec Functional Statements Repository EHR-QTN Workshop Vilnius, January 26, 2011 Dr. Jos Devlies, Belgium Health IT has a great potential To increase efficiency of care by Reducing useless and duplicated

More information

How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq.

How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq. How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq. Word Count: 2,268 Physician practices have lived with the reality of HIPAA for over twenty years. In that time, it has likely

More information

Canadian Technology Accreditation Criteria (CTAC) COMPUTER SYSTEMS TECHNOLOGY - TECHNICIAN Technology Accreditation Canada (TAC)

Canadian Technology Accreditation Criteria (CTAC) COMPUTER SYSTEMS TECHNOLOGY - TECHNICIAN Technology Accreditation Canada (TAC) Canadian Technology Accreditation Criteria (CTAC) COMPUTER SYSTEMS TECHNOLOGY - TECHNICIAN Technology Accreditation Canada (TAC) Preamble These CTAC are applicable to programs having titles involving Computer

More information

Metadata Framework for Resource Discovery

Metadata Framework for Resource Discovery Submitted by: Metadata Strategy Catalytic Initiative 2006-05-01 Page 1 Section 1 Metadata Framework for Resource Discovery Overview We must find new ways to organize and describe our extraordinary information

More information

Security Audit What Why

Security Audit What Why What A systematic, measurable technical assessment of how the organization's security policy is employed at a specific site Physical configuration, environment, software, information handling processes,

More information

POSTGRADUATE CERTIFICATE IN LEARNING & TEACHING - REGULATIONS

POSTGRADUATE CERTIFICATE IN LEARNING & TEACHING - REGULATIONS POSTGRADUATE CERTIFICATE IN LEARNING & TEACHING - REGULATIONS 1. The Postgraduate Certificate in Learning and Teaching (CILT) henceforth the Course - comprises two modules: an Introductory Certificate

More information

Getting Security Right: The CISO of the Future

Getting Security Right: The CISO of the Future Getting Security Right: The CISO of the Future Presented by: Mac McMillan CEO, CynergisTek CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com

More information

The below Summary of Rule Changes and the Additional Guidance 2016 Reporting Period is informational for all clients.

The below Summary of Rule Changes and the Additional Guidance 2016 Reporting Period is informational for all clients. Meaningful Use Notice: Health Information Exchange February 10, 2016 Dear Centricity Practice Solution and Centricity EMR Customers: This is a Meaningful Use notice regarding the Health Information Exchange

More information

Horizon Health Care, Inc.

Horizon Health Care, Inc. Customer Success Story Horizon Health Care, Inc. Comprehensive Security Risk Analysis Helps FQHC Achieve Meaningful Use and Safeguard PHI. Page 2 of 6 Horizon Health Care, Inc. Comprehensive Security Risk

More information

Telehealth Workforce Offers Unique Competencies & Opportunities #245, February 23, 2017 Jay Weems, Vice-President, Operations, Avera ecare

Telehealth Workforce Offers Unique Competencies & Opportunities #245, February 23, 2017 Jay Weems, Vice-President, Operations, Avera ecare Telehealth Workforce Offers Unique Competencies & Opportunities #245, February 23, 2017 Jay Weems, Vice-President, Operations, Avera ecare 1 Speaker Introduction Jay Weems Vice-President, Operations Avera

More information

Network Security and Cryptography. December Sample Exam Marking Scheme

Network Security and Cryptography. December Sample Exam Marking Scheme Network Security and Cryptography December 2015 Sample Exam Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers

More information

A Working Paper of the EastWest Institute Breakthrough Group. Increasing the Global Availability and Use of Secure ICT Products and Services

A Working Paper of the EastWest Institute Breakthrough Group. Increasing the Global Availability and Use of Secure ICT Products and Services A Working Paper of the EastWest Institute Breakthrough Group Increasing the Global Availability and Use of Secure ICT Products and Services August 5, 2015 The EastWest Institute (EWI) is leading a Global

More information

Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs)

Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs) Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs) Florida Hospital Association Welcome! John Wilgis Director, Emergency Management Services Florida Hospital Association

More information

Safety-enhanced Design EDIS 2014 R (a)(1) Computerized Provider Order Entry

Safety-enhanced Design EDIS 2014 R (a)(1) Computerized Provider Order Entry 170.314(a)(1) - Computerized Provider Order Entry Safety-enhanced Design EDIS 2014 R1 170.314(a)(1) Computerized Provider Order Entry Report content based on NISTR 7742, Customized Common Industry Format

More information

PAKISTAN HOW TO SPEED UP THE INTRODUCTION OF EHEALTH SERVICES IN DEVELOPING COUNTRIES

PAKISTAN HOW TO SPEED UP THE INTRODUCTION OF EHEALTH SERVICES IN DEVELOPING COUNTRIES HOW TO SPEED UP THE INTRODUCTION OF EHEALTH SERVICES IN DEVELOPING COUNTRIES V. Androuchko¹, Asif Zafar Malik² ¹International University in Geneva, Switzerland ² Rawalpindi Medical College, Pakistan 1

More information

Implementation of INFCIRC 901: Promoting Certification, Quality Management and Sustainability of Nuclear Security Training

Implementation of INFCIRC 901: Promoting Certification, Quality Management and Sustainability of Nuclear Security Training Implementation of INFCIRC 901: Promoting Certification, Quality Management and Sustainability of Nuclear Security Training Rhonda Evans Head, WINS Academy Presentation to the IAEA International Conference

More information

Cyber Security Program

Cyber Security Program Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by

More information

HOW TO WRITE USER STORIES (AND WHAT YOU SHOULD NOT DO) Stuart Ashman, QA Director at Mio Global Bob Cook, Senior Product Development Manager, Sophos

HOW TO WRITE USER STORIES (AND WHAT YOU SHOULD NOT DO) Stuart Ashman, QA Director at Mio Global Bob Cook, Senior Product Development Manager, Sophos HOW TO WRITE USER STORIES (AND WHAT YOU SHOULD NOT DO) Stuart Ashman, QA Director at Mio Global Bob Cook, Senior Product Development Manager, Sophos Welcome This presentation will discuss Writing user

More information

ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And

ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. Content 261311 - Analyst Programmer... 2 135111 - Chief

More information

The Role of Data Profiling In Health Analytics

The Role of Data Profiling In Health Analytics WHITE PAPER 10101000101010101010101010010000101001 10101000101101101000100000101010010010 The Role of Data Profiling In Health Analytics 101101010001010101010101010100100001010 101101010001011011010001000001010100100

More information

Test Data Management for Security and Compliance

Test Data Management for Security and Compliance White Paper Test Data Management for Security and Compliance Reducing Risk in the Era of Big Data WHITE PAPER This document contains Confidential, Proprietary and Trade Secret Information ( Confidential

More information

Standard Glossary of Terms used in Software Testing. Version 3.2. Foundation Extension - Usability Terms

Standard Glossary of Terms used in Software Testing. Version 3.2. Foundation Extension - Usability Terms Standard Glossary of Terms used in Software Testing Version 3.2 Foundation Extension - Usability Terms International Software Testing Qualifications Board Copyright Notice This document may be copied in

More information

Citation for published version (APA): Jorritsma, W. (2016). Human-computer interaction in radiology [Groningen]: Rijksuniversiteit Groningen

Citation for published version (APA): Jorritsma, W. (2016). Human-computer interaction in radiology [Groningen]: Rijksuniversiteit Groningen University of Groningen Human-computer interaction in radiology Jorritsma, Wiard IMPORTANT NOTE: You are advised to consult the publisher's version (publisher's PDF) if you wish to cite from it. Please

More information

TRAINING COURSE CERTIFICATION (TCC) COURSE REQUIREMENTS

TRAINING COURSE CERTIFICATION (TCC) COURSE REQUIREMENTS TRAINING COURSE CERTIFICATION (TCC) COURSE REQUIREMENTS Quality Management System (QMS) Internal Auditor Training Course Exemplar Global International Training Certification Programs Exemplar Global, Inc.

More information

Discover the Wealth of Content Available in Online Coding Tools

Discover the Wealth of Content Available in Online Coding Tools Discover the Wealth of Content Available in Online Coding Tools Whether it s CMS, the AMA, AHA, ASA or a number of any other coding organizations, finding coding content has never been easier. Ryan Devey,

More information

Enabling efficiency through Data Governance: a phased approach

Enabling efficiency through Data Governance: a phased approach Enabling efficiency through Data Governance: a phased approach Transform your process efficiency, decision-making, and customer engagement by improving data accuracy An Experian white paper Enabling efficiency

More information

How the European Commission is supporting innovation in mobile health technologies Nordic Mobile Healthcare Technology Congress 2015

How the European Commission is supporting innovation in mobile health technologies Nordic Mobile Healthcare Technology Congress 2015 How the European Commission is supporting innovation in mobile health technologies Nordic Mobile Healthcare Technology Congress 2015 Claudia Prettner, Unit for Health and Well-Being, DG CONNECT Table of

More information

Security and Privacy Breach Notification

Security and Privacy Breach Notification Security and Privacy Breach Notification Version Approval Date Owner 1.1 May 17, 2017 Privacy Officer 1. Purpose To ensure that the HealthShare Exchange of Southeastern Pennsylvania, Inc. (HSX) maintains

More information

USABILITY IN HEALTHCARE IT: DATA COLLECTION AND ANALYSIS APPROACHES

USABILITY IN HEALTHCARE IT: DATA COLLECTION AND ANALYSIS APPROACHES USABILITY IN HEALTHCARE IT: DATA COLLECTION AND ANALYSIS APPROACHES Andre Kushniruk, PhD, School of Health Information Science, University of Victoria Usability in Healthcare IT Usability -Measures of

More information

a publication of the health care compliance association MARCH 2018

a publication of the health care compliance association MARCH 2018 hcca-info.org Compliance TODAY a publication of the health care compliance association MARCH 2018 On improv and improving communication an interview with Alan Alda This article, published in Compliance

More information

8 COMMON HIPAA COMPLIANCE ERRORS TO AVOID

8 COMMON HIPAA COMPLIANCE ERRORS TO AVOID Billing & Reimbursement Revenue Cycle Management 8 COMMON HIPAA COMPLIANCE ERRORS TO AVOID Billing and Reimbursement for Physician Offices, Ambulatory Surgery Centers and Hospitals Billings & Reimbursements

More information

Advanced searching. You can save valuable time by planning your search properly. 1. What information do I need?

Advanced searching. You can save valuable time by planning your search properly. 1. What information do I need? Advanced searching You can save valuable time by planning your search properly. 1. Identify your information needs 2. Identify your keywords and subject headings to construct your search 3. Identify appropriate

More information

IT & Healthcare. Services. Systems

IT & Healthcare. Services. Systems IT & Healthcare Services Systems 1986 Year Established 3,000+ Customers in More than 70 Countries MAINTAIN Hypertec Systems offers a wide array of IT maintenance services to both maximize the availability

More information

Isaca EXAM - CISM. Certified Information Security Manager. Buy Full Product.

Isaca EXAM - CISM. Certified Information Security Manager. Buy Full Product. Isaca EXAM - CISM Certified Information Security Manager Buy Full Product http://www.examskey.com/cism.html Examskey Isaca CISM exam demo product is here for you to test the quality of the product. This

More information

Designated Cyber Security Protection Solution for Medical Devices

Designated Cyber Security Protection Solution for Medical Devices Designated Cyber Security Protection Solution for Medical s The Challenge Types of Cyber Attacks Against In recent years, cyber threats have become Medical s increasingly sophisticated in terms of attack

More information

How do I sign up for a Practice Fusion EHR subscription plan with a promotional code?

How do I sign up for a Practice Fusion EHR subscription plan with a promotional code? How do I sign up for a Practice Fusion EHR subscription plan with a promotional code? In order to continue delivering easy-to-use, intuitive health IT solutions that support practices like yours all across

More information