Working with Health IT Systems is available under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported license.

Size: px
Start display at page:

Download "Working with Health IT Systems is available under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported license."

Transcription

1 Working with Health IT Systems is available under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported license. Johns Hopkins University.

2 Welcome to Quality Improvement: Data Quality Improvement. This is Lecture a. We have discussed the impact of poor data quality on quality measurement. We have defined ten different attributes that are used to define data quality; we reviewed an example of each attribute in various clinical settings and highlighted key process recommendations to improve data quality. Let s summarize what we ve learned by reviewing common causes of insufficient data quality and review best practices that you can implement in your role to assure or improve the quality of health information. 1

3 The Objectives for Data Quality Improvement are to: Understand the different purposes of data. Discuss the impact of poor data quality on quality measurement. Identify ten attributes of data quality and key process recommendations. 2

4 In today s information age, data are increasingly driving healthcare decision making. Healthcare databases are filled with data that reflect clinical and clinically-related information. The data are usually collected through the routine processes and activities of patient care; however, its usefulness goes beyond the operational applications that generate the data. The documentation within the electronic health record is often used for quality improvement, payment, legal, research, and accreditation and licensing purposes. Quality aims such as eliminating duplicate or unnecessary tests, or screening and implementing preventive strategies for identified safety risks can be achieved by ensuring complete data collection and an effective health information exchange. Reimbursement can be enhanced by providing the appropriate prompts to substantiate medical necessity. Malpractice cases can often be more successfully defended if the content and quality of the record provides an accurate depiction of the events and jogs the memory of the provider. Research through public health and bio-surveillance agencies can be facilitated if the data collected meet identified definitions and standards for data quality. Last but not least, accreditation and licensing decisions often rest on whether or not the organization s documentation substantiates the standards set forth by the agency. Data are more precious than ever as their use and application expand. 3

5 It is important that a clear distinction is made regarding the use of data. When data are collected to improve care the collection characteristics are different than when it is collected to advance research and expand our knowledge. When the aim of the data collection is to improve care, you use observable data. Accept that there is a consistent bias and collect just enough data to make a decision regarding the outcome of the test in a small and sequential manner. When the aim is to acquire new knowledge, data are better collected blinded (when neither the researcher nor the subject are aware of the test being performed), attempt to eliminate biases when they exist and collect a wide variety of data points for a sample size determined through a power calculation. 4

6 National Quality Forum (NQF) joined with HL7, AHIMA and consulting firm Alschuler Associates to develop a draft standard called Health Quality Measure Format (HQMF). HQMF was developed in part to support, Meaningful Use, as described by the American Recovery and Reinvestment Act (ARRA). The main goal of this format is to standardize data to have consistency across vendors and regions and thus support the, Meaningful Use, of HIT technology. This standardization is accomplished through a number of domains such as document structure (e.g. sections), metadata (e.g. author, verifier), and definitions (e.g. numerator, initial patient population ). Although this standardization is an important first step, it does not enable full machine processing at this time. 5

7 As the previous scenario illustrates, many healthcare errors and adverse events occur as a result of poor data and information quality. Quality and safety issues can often be linked back to poor documentation, inaccurate data or insufficient communication between providers Operationally, poor-data quality leads to low satisfaction and increased cost. Even simple errors such as inaccurate/incorrect names, addresses, and insurance or benefit information can have a negative impact on the satisfaction of patients and staff alike. Patients have a right to expect that the details of their care are documented completely and correctly and that the quality and safety of their care is not compromised by inaccurate or ambiguous data. Operational costs can be increased because of unnecessary duplication of tests or procedures, inefficient care processes, or additional time and resources that must be directed toward detecting and correcting data problems. Strategically, poor data compromise individual and organizational decision making. Good decisions require an effective synthesis of multiple bits of datum that can be converted into meaningful information. Gaps in the data due to missing or incomplete detail or suspicious accuracy complicate the process of effective decision making. Teams can also get diverted by deliberating the quality of the data and never even get around to deliberating the decision at hand. Mistrust of data can spill over into mistrust of other team members and their motives. This can lead to duplicate-data collection resulting in further delays in analyses and ineffective decision-making. If decision making is hindered so is strategic planning, since it is a process that requires decision making. It requires thoughtful assessment of strengths, weaknesses, opportunities and threats and depends on high-quality internal and external data. Once developed and implemented, the plan must be evaluated to determine its effectiveness. If the reported results are of poor quality, knowing how to modify the strategic plan is made even more difficult. Data-quality problems have always persisted, sometimes to a larger degree in some data elements or processes than in others. In the past, the important data were edited or processes of data collection were corrected to ensure accuracy whenever the data were specifically identified as required for quality improvement or regulatory monitoring purposes. The other data elements were not deemed important for correction as these were assumed to be unnecessary. As we move into a new era of health information technology, we are finding new uses for the data and the accuracy and quality are increasingly important. For example, data within EHRs are increasingly used to detect errors. By applying queries, algorithms and decision rules, we can identify cases that represent potential adverse events. In order for these tools to be effective, the data contained in the EHR has to be completely and consistently entered by health care providers. Data-quality management must involve more than fixing problems after the data are entered; it involves preventing the issues from occurring. A fundamental shift to design with the end in mind requires the knowledge and skills of insightful clinical and IT professionals. The first step requires you to begin with quality data. 6

8 Technology is a critical tool in achieving high-quality data in an electronic health record and realizing the benefits of health information exchange. However, technology alone is not sufficient. It is imperative for organizations to hard-wire patient safety and quality of care measures into their electronic processes and systems. Because data quality will positively impact the efficiency, quality and safety of care it follows then that a robust and high quality EHR is required. Such an EHR then becomes an important adjunct to quality, and takes its place as an evidence-based decision-making tool. In 1998, the American Health Information Management Association s e-him workgroup developed the Data Quality Management (or DQM) Model for implementing an EHR documentation improvement process. The model was reviewed and adopted again in 2006 and includes continuous quality improvement in the domains of data application, collection, analysis and warehousing. In this model, the application is the purpose for which the data are collected. The collection includes the processes by which data elements are accumulated. Translating the data into a form that can be used for the designated purpose is part of the analysis phase. You may hear this referred to as transforming data into information. And, warehousing describes the processes and systems used to archive data and data journals. The model includes a number of data quality attributes that can be applied to each domain. The model is generic. It can be adapted to any care setting, used with any application, and can be used in any role that you, as an HIT professional, choose. 7

9 Data quality is a complex topic and it is affected by more than just the accuracy of the data. A review of the literature yields a number of terms that can be used to describe data quality attributes. The DQM model attributes include definition, accuracy, accessibility, comprehensiveness, consistency, currency, timeliness, granularity, precision, and relevancy. Each of these attributes will be described, and an example will be provided as well as key process issues that HIT professionals should consider for effective health information exchange. 8

10 We know and understand that data are often used for purposes other than that for which they were originally collected. It has been said that one man s junk is another man s treasure! Therefore, to support the multi-use of data that is collected, clear definitions for each data element should be provided so current and future users will know what the data mean. For example, does the word football mean the same thing to people all around the world? No and without a clear definition that lets the user know what type of football we are referring to errors in interpretation are likely. In addition, standard definitions are necessary in order to compare data with data stored in other databases, for example external registries or quality databases, or to compare data over time, such as trend data for quality purposes. Each element should have clear meaning and acceptable values. For example, in addition to clear definitions, a data dictionary should provide data type, length restrictions, and other rules including uniqueness, consecutiveness or calculated data and acceptable ranges. For example, should an EHR allow a temperature with 4 digits (without a decimal point) to be entered? Should numeric data be allowed where only text is expected? Inaccurate data can result from mistakes that are made when data are extracted, transformed or transferred to secondary data sources. Well documented data definitions and rules that govern accepted values can protect against inappropriate use of data. The federal Health IT legislation described earlier requires that, Meaningful Use, of health information technology includes electronic reporting of data on the quality of care. When the Centers for Medicare and Medicaid Services were preparing to announce their final rules for the meaningful use standards and finalizing the list of core quality measures, one hospital had examined their opportunities for outcome reporting through a nationally recognized database for quality reporting. They decided to participate in the National Health Safety Network (NHSN), a voluntary, secure internet-based surveillance system that is managed by the Division of Healthcare Quality Promotion at the Centers for Disease Control and Prevention. Exchange of data through NHSN requires adherence to the guidelines and procedures for data 9

11 collection that includes specific definitions for all variables collected and reported. 9

12 One of the most important functions you, as an HIT professional, can perform is to assist the team in the development of a thorough data dictionary. Let s discuss how the attribute of data definitions can be applied to the Data Quality Management Model domains of application, collection, analysis, and warehousing. Appropriate use of the data requires an understanding of the purpose and data definitions. The data collection process should guide the user to enter only acceptable values and minimize or eliminate any ambiguity. Meaningful analysis relies on clear understanding of the data and making appropriate relationships among the variables. Warehousing requires assigning responsibility for the ownership and maintenance of the data and documentation over time along with corresponding policies and procedures for data and information management. 10

13 Accuracy is a term used to refer to the extent that the data properly represent the real-life objects they are intended to represent. Accuracy implies that the value is valid and correct, and the person who the value is related to is properly assigned. Inaccuracy can result from deficiencies in other attributes that we will be discussing later on. A lack of precision or completeness can also influence the accuracy of the data and the answers to the questions you intend to find through the use of that data. Remember, inaccuracy can lead to an understanding of a valid real-world state, but NOT the one intended. Payment for care rendered is critical to the survival of any provider in all care settings. During the registration process, insurance information must be gathered and validated. You, as an HIT professional, can assist in improving the data quality in this process. By working with business office personnel, you can establish a process to develop and maintain a reference table with codes for all approved insurance providers. An automated process can be instituted to verify the accuracy of the insurance information by limiting entry to only those codes that are available in a drop down menu that is linked to the reference table. Entry of any other data would require a process of verification and pre-approval for any manual entries for this field of data. 11

14 A key process recommendation for you to enhance accuracy in the application of the Data Quality Management Model is to collaborate with users of the data to establish a policy or process to identify how data used in EHRs are generated and how data content will be determined and standardized. In an effort to improve data accuracy, you can prompt the users to think about purpose and application of the data and how choices in the data entry may be limited to improve the accuracy, maintain integrity and improve the reliability and validity of the data. Accuracy in data collection can be improved by educating and communicating data definitions to those who collect the data. For example, if the time of initiation and discontinuation is critical for payment, the staff need to know exact, not approximate, times that must be collected. You can also assist in accurate analysis of the data by ensuring that the algorithms, formulas and translation software are correct. For example, one of the alternate quality measures to demonstrate meaningful use of electronic health records is childhood immunization status. You would meet with the pediatric providers to discuss the purpose of this metric, the data elements that are collected, who will collect them, how the data will be applied to decisionmaking, and how the data will be transmitted to the immunization registry without losing data accuracy. Appropriate edits must be made to ensure accuracy prior to warehousing the data for future use. Exception and errors reports should be developed so that corrections to the data can be made. For example, some diagnoses or patient locations may be incorrect for the age or gender of the patient. Screening for these types of problems and making corrections will improve the accuracy. 12

15 Accessibility is the extent to which data is available or easily obtainable for use. But easily obtainable does not mean that unauthorized individuals should be able to gain entry into protected personal health information. Accessibility incorporates ease of gaining entry with the safeguards that are absolutely required to assure confidentiality and privacy of patient data. These safeguards should be built into the process and automatically deploy without any special effort by the user. The Health Insurance Portability and Accountability Act (HIPAA) includes rules, standards and guidelines to guide you in establishing the appropriate procedures for health data access. The burden of data collection can often derail safety, quality improvement, and research efforts. Often the data that are needed already exist someplace within the scope of the electronic health record. A typical example of data that are often needed, but shouldn t have to be collected again by clinicians, are the demographics of a selected population of patients, such as home care patients with known congestive heart failure, who will be included in a quality improvement or research study. However, the detail and the use of this data must be evaluated for the patient s protection under HIPAA and other regulations. You can guide the team to select the best, least-costly, and legally-appropriate way to access and collect the data that are needed. The amount and accessibility of the necessary data can be increased through system interfaces. 13

16 Inaccessibility of data can be a frustration to clinicians who need data to generate information about ways to improve care. However, a lack of data stewardship also has serious risks and consequences associated with unauthorized access or inappropriate use of health information. Proper observation of the domains in the Data Quality Management Model requires you to work with clinicians to define and agree on the types of data and the minimum amount of data that needs to be available to support the team in achieving its mission and objectives. The intended application or use of data, and the legal, regulatory and financial boundaries often determine which data should be accessible. Collection of accessible data should be assigned based on the expertise and scope of practice of team members; with registration staff collecting demographics, clinicians documenting physiologic findings such as symptoms or scale ratings, and coders assigning medical record coding. Data analyses should be supported by timely access to the required data. For example, if there is a recall on a lot of vaccines, care providers in a primary-care office need rapid access to vaccine administration data to be aware of potential patients to be alerted to the recall. Policies should define the process, restrictions and rights for retrieval of data from database systems and warehouses. The accountability and chain of trust within HIPAA should be delineated. Organizations should be specific in their internal policies and business associate contracts about what identifiable health data may be used and for what purpose, by both the business associate and its agents; also what HIPAA de-identified data may be used and to whom they are applied; the requirement that business associates have contracts with their agents that are equivalent to business associate contracts; and the use of HIPAA definitions for any deidentification of protected health information. Methods to regularly monitor and audit access to data should be in place. 14

17 Comprehensiveness is the ability of an information system to reflect every possible state in the real world. Intentional limitations of the data should be documented, and every effort to include all of the data elements that are required is made. It is understood, of course, that not every piece of data can be captured, but many projects have suffered from lack of deep forethought about what and how to measure. A high level of missing data will reduce the reliability and validity of your analysis. In order to minimize missing data, rules can be assigned to a data set to define mandatory elements that require a value, optional elements that may have a value assigned based on some set of conditions, or inapplicable attributes that may not have a value. Comprehensiveness is illustrated in the following scenario. In October 2008, the Center for Medicare and Medicaid Services began requiring hospitals that receive federal funding from Medicare and Medicaid to begin disclosing, never events. Never events are conditions that CMS defines as preventable, and serious in their consequences for patients, and that indicate a real problem in the safety and credibility of a healthcare facility. Included in this list of conditions are pressure ulcers or what is often referred to in layman terms as bed sores. CMS has stated that they will no longer reimburse hospitals for any costs associated with never events, and hospitals are prohibited from passing the costs onto patients. The ability to differentiate conditions that were present when the patient was admitted, versus those that were acquired during the hospital stay, requires a comprehensive assessment and documentation as a means to avoid potential penalty and quality concerns. Increasingly, clinicians are turning to HIT professionals to assist them in defining data elements and rules for their completion for clinical, financial and risk management needs. 15

18 Key process recommendations to apply the attribute of comprehensiveness within the context of the Data Quality Management Model is for you to seek clarity from the team about how the data will be used and how end-users can assist to ensure that complete data will be collected. Opportunities to create interfaces with other automated systems should be pursued when doing so can enhance the comprehensiveness and quality of the data collection. An example of this might be to link the skin assessment completed in the emergency department s electronic health record from one vendor to the skin assessment completed in inpatient electronic health records made by a different vendor. The goal is to make the collection of the necessary data elements as comprehensive and as seamless as possible across care-settings. Be alert to the multiple places that the same data element might be recorded and attempt to reduce the variation in data completeness. Whenever possible, provide structured response choices and reduce the number of free-text entries to facilitate complete data entry and extraction. You should recommend that all relevant data are collected and analyzed in concert. For example, in addition to assessing whether or not pressure ulcers were present on admission, the team may also want to know about risk factors to aid in a comprehensive assessment of the quality problem if a number of patients later develop ulcers. In warehousing data, be aware of and educate all data stakeholders of the data that are available to prevent redundancy and conflicting data collection. 16

19 This concludes Lecture a of Data Quality Improvement. In summary, data use for research purposes is collected under different conditions than that used for QI. Poor data quality contributes to error. The ten attributes of data quality are: Definition Accuracy Accessibility Comprehensiveness Consistency Currency Timeliness Granularity Precision Relevancy 17

20 No audio. End. 18

Working with Health IT Systems is available under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported license.

Working with Health IT Systems is available under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported license. Working with Health IT Systems is available under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported license. Johns Hopkins University. Welcome to Quality Improvement: Data Quality Improvement.

More information

Security and Privacy Governance Program Guidelines

Security and Privacy Governance Program Guidelines Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by

More information

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights Secure Messaging Mobile App Privacy Policy Privacy Policy Highlights For ease of review, Everbridge provides these Privacy Policy highlights, which cover certain aspects of our Privacy Policy. Please review

More information

Putting It All Together:

Putting It All Together: Putting It All Together: The Interplay of Privacy & Security Regina Verde, MS, MBA, CHC Chief Corporate Compliance & Privacy Officer University of Virginia Health System 2017 ISPRO Conference October 24,

More information

Certification Commission for Healthcare Information Technology. CCHIT A Catalyst for EHR Adoption

Certification Commission for Healthcare Information Technology. CCHIT A Catalyst for EHR Adoption Certification Commission for Healthcare Information Technology CCHIT A Catalyst for EHR Adoption Alisa Ray, Executive Director, CCHIT Sarah Corley, MD, Chief Medical Officer, NextGen Healthcare Systems;

More information

Certification for Meaningful Use Experiences and Observations from the Field June 2011

Certification for Meaningful Use Experiences and Observations from the Field June 2011 Certification for Meaningful Use Experiences and Observations from the Field June 2011 Principles for Certification to Support Meaningful Use Certification should promote EHR adoption by giving providers

More information

The Data Center is Dead Long Live the Virtual Data Center

The Data Center is Dead Long Live the Virtual Data Center The Data Center is Dead Long Live the Virtual Data Center Hector Rodriguez, MBA Microsoft WW Health Chief Industry Security Officer September 12, 2018 Enterprise Data Centers are Vanishing Enterprise data

More information

The Benefits of Strong Authentication for the Centers for Medicare and Medicaid Services

The Benefits of Strong Authentication for the Centers for Medicare and Medicaid Services The Benefits of Strong Authentication for the Centers for Medicare and Medicaid Services This document was developed by the Smart Card Alliance Health and Human Services Council in response to the GAO

More information

The HUMANE roadmaps towards future human-machine networks Oxford, UK 21 March 2017

The HUMANE roadmaps towards future human-machine networks Oxford, UK 21 March 2017 The HUMANE roadmaps towards future human-machine networks Oxford, UK 21 March 2017 Eva Jaho, ATC e.jaho@atc.gr 1 Outline HMNs Trends: How are HMNs evolving? The need for future-thinking and roadmaps of

More information

Conference for Food Protection. Standards for Accreditation of Food Protection Manager Certification Programs. Frequently Asked Questions

Conference for Food Protection. Standards for Accreditation of Food Protection Manager Certification Programs. Frequently Asked Questions Conference for Food Protection Standards for Accreditation of Food Protection Manager Certification Programs Frequently Asked Questions Q. What was the primary purpose for the Conference for Food Protection

More information

APF!submission!!draft!Mandatory!data!breach!notification! in!the!ehealth!record!system!guide.!

APF!submission!!draft!Mandatory!data!breach!notification! in!the!ehealth!record!system!guide.! enquiries@privacy.org.au http://www.privacy.org.au/ 28September2012 APFsubmission draftmandatorydatabreachnotification intheehealthrecordsystemguide. The Australian Privacy Foundation (APF) is the country's

More information

ConCert FAQ s Last revised December 2017

ConCert FAQ s Last revised December 2017 ConCert FAQ s Last revised December 2017 What is ConCert by HIMSS? ConCert by HIMSS is a comprehensive interoperability testing and certification program governed by HIMSS and built on the work of the

More information

CAN RESEARCH AND EVALUATION MOVE THE NEEDLE ON TELEHEALTH AND mhealth?

CAN RESEARCH AND EVALUATION MOVE THE NEEDLE ON TELEHEALTH AND mhealth? CAN RESEARCH AND EVALUATION MOVE THE NEEDLE ON TELEHEALTH AND mhealth? DESIGNING, CONDUCTING AND DISSEMINATING STUDIES THAT INCREASE UNDERSTANDING OF BENEFITS AND INCENTIVES ISPOR: May 2017 Declaration

More information

TEL2813/IS2820 Security Management

TEL2813/IS2820 Security Management TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management

More information

Compliance With HIPAA Privacy Rule Before Security & Enforcement Rules are Final: Challenges in Practice

Compliance With HIPAA Privacy Rule Before Security & Enforcement Rules are Final: Challenges in Practice Compliance With HIPAA Privacy Rule Before Security & Enforcement Rules are Final: Challenges in Practice National Audioconference Sponsored by the HIPAA Summit June 6, 2002 Chris Apgar, CISSP Data Security

More information

2015 HFMA What Healthcare Can Learn from the Banking Industry

2015 HFMA What Healthcare Can Learn from the Banking Industry 2015 HFMA What Healthcare Can Learn from the Banking Industry Agenda Introduction- Background and Experience Healthcare vs. Banking The Results OCR Audit Results Healthcare vs. Banking The Theories Practical

More information

April 25, Dear Secretary Sebelius,

April 25, Dear Secretary Sebelius, April 25, 2014 Department of Health and Human Services Office of the National Coordinator for Health Information Technology Attention: 2015 Edition EHR Standards and Certification Criteria Proposed Rule

More information

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use Click to edit Master title style Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use Andy Petrovich, MHSA, MPH M-CEITA / Altarum Institute June 21, 2016 6/21/2016 1 1 Disclaimer

More information

ANSI-CFP Accredited Food Protection Manager Certification Programs Education Outreach. Benefits of the ANSI-CFP Accredited Certification Programs

ANSI-CFP Accredited Food Protection Manager Certification Programs Education Outreach. Benefits of the ANSI-CFP Accredited Certification Programs ANSI-CFP Accredited Food Protection Manager Certification Programs Education Outreach Benefits of the ANSI-CFP Accredited Certification Programs ANSI-CFP Accredited Food Protection Manager Certification

More information

CRITERIA FOR CERTIFICATION BODY ACCREDITATION IN THE FIELD OF RISK BASED INSPECTION MANAGEMENT SYSTEMS

CRITERIA FOR CERTIFICATION BODY ACCREDITATION IN THE FIELD OF RISK BASED INSPECTION MANAGEMENT SYSTEMS CRITERIA FOR CERTIFICATION BODY ACCREDITATION IN THE FIELD OF RISK BASED INSPECTION MANAGEMENT SYSTEMS Approved By: Executive: Accreditation: Mpho Phaloane Revised By: RBI STC Working Group Members Date

More information

Website Privacy Policy

Website Privacy Policy Website Privacy Policy Village Emergency Center Privacy Policy Updated: 1/22/18. PLEASE READ THIS PRIVACY POLICY (Privacy Policy) CAREFULLY. By accessing and using this website, you agree to be bound by

More information

HIPAA Federal Security Rule H I P A A

HIPAA Federal Security Rule H I P A A H I P A A HIPAA Federal Security Rule nsurance ortability ccountability ct of 1996 HIPAA Introduction - What is HIPAA? HIPAA = The Health Insurance Portability and Accountability Act A Federal Law Created

More information

CCISO Blueprint v1. EC-Council

CCISO Blueprint v1. EC-Council CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified Management System Auditor www.pecb.com The objective of the PECB Certified Management System Auditor examination is to ensure that the candidates

More information

Federal-State Connections: Opportunities for Coordination and Collaboration

Federal-State Connections: Opportunities for Coordination and Collaboration Federal-State Connections: Opportunities for Coordination and Collaboration State Health Information Exchange Program October 23, 2012 Chris Muir Program Manager 1 ONC Overview Vision A health system that

More information

a publication of the health care compliance association MARCH 2018

a publication of the health care compliance association MARCH 2018 hcca-info.org Compliance TODAY a publication of the health care compliance association MARCH 2018 On improv and improving communication an interview with Alan Alda This article, published in Compliance

More information

Maryland Health Care Commission

Maryland Health Care Commission Special Review Maryland Health Care Commission Security Monitoring of Patient Information Maintained by the State-Designated Health Information Exchange September 2017 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT

More information

CMS and ehealth. Robert Tagalicod Director, Office of ehealth Standards and Services (OESS)

CMS and ehealth. Robert Tagalicod Director, Office of ehealth Standards and Services (OESS) CMS and ehealth Robert Tagalicod Director, Office of ehealth Standards and Services (OESS) Robert Anthony Deputy Director, Health IT Initiatives Group, OESS September 16, 2013 www.cms.gov/ehealth 2 ehealth

More information

CERT Symposium: Cyber Security Incident Management for Health Information Exchanges

CERT Symposium: Cyber Security Incident Management for Health Information Exchanges Pennsylvania ehealth Partnership Authority Pennsylvania s Journey for Health Information Exchange CERT Symposium: Cyber Security Incident Management for Health Information Exchanges June 26, 2013 Pittsburgh,

More information

WHO-ITU National ehealth Strategy Toolkit

WHO-ITU National ehealth Strategy Toolkit WHO-ITU National ehealth Strategy Toolkit Context and need for a National Strategy A landscape of isolated islands of small scale applications unable to effectively communicate and to share information

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 9001 Lead Auditor www.pecb.com The objective of the PECB Certified ISO 9001 Lead Auditor examination is to ensure that the candidate possesses

More information

PROCEDURE POLICY DEFINITIONS AD DATA GOVERNANCE PROCEDURE. Administration (AD) APPROVED: President and CEO

PROCEDURE POLICY DEFINITIONS AD DATA GOVERNANCE PROCEDURE. Administration (AD) APPROVED: President and CEO Section: Subject: Administration (AD) Data Governance AD.3.3.1 DATA GOVERNANCE PROCEDURE Legislation: Alberta Evidence Act (RSA 2000 ca-18); Copyright Act, R.S.C., 1985, c.c-42; Electronic Transactions

More information

From Integration to Interoperability: The Role of Public Health Systems in the Emerging World of Health Information Exchange

From Integration to Interoperability: The Role of Public Health Systems in the Emerging World of Health Information Exchange From Integration to Interoperability: The Role of Public Health Systems in the Emerging World of Health Information Exchange Noam H. Arzt, PhD American Public Health Association Annual Meeting Session

More information

The HITRUST CSF. A Revolutionary Way to Protect Electronic Health Information

The HITRUST CSF. A Revolutionary Way to Protect Electronic Health Information The HITRUST CSF A Revolutionary Way to Protect Electronic Health Information June 2015 The HITRUST CSF 2 Organizations in the healthcare industry are under immense pressure to improve quality, reduce complexity,

More information

The Role of Data Profiling In Health Analytics

The Role of Data Profiling In Health Analytics WHITE PAPER 10101000101010101010101010010000101001 10101000101101101000100000101010010010 The Role of Data Profiling In Health Analytics 101101010001010101010101010100100001010 101101010001011011010001000001010100100

More information

IQ Level 4 Award in Understanding the External Quality Assurance of Assessment Processes and Practice (QCF) Specification

IQ Level 4 Award in Understanding the External Quality Assurance of Assessment Processes and Practice (QCF) Specification IQ Level 4 Award in Understanding the External Quality Assurance of Assessment Processes and Practice (QCF) Specification Regulation No: 600/5528/5 Page 1 of 15 Contents Page Industry Qualifications...

More information

Security Management Models And Practices Feb 5, 2008

Security Management Models And Practices Feb 5, 2008 TEL2813/IS2820 Security Management Security Management Models And Practices Feb 5, 2008 Objectives Overview basic standards and best practices Overview of ISO 17799 Overview of NIST SP documents related

More information

A Pilot Implementation of DIRECT Messaging and Provider Directory Services in the Palomar Health District

A Pilot Implementation of DIRECT Messaging and Provider Directory Services in the Palomar Health District A Pilot Implementation of DIRECT Messaging and Provider Directory Services in the Palomar Health District Project Overview and Plan Sujansky & Associates, LLC 1. Project Objectives Figure 1. High-level

More information

Vaccine data collection tool Oct Functions, Indicators & Sub-Indicators

Vaccine data collection tool Oct Functions, Indicators & Sub-Indicators data collection tool Oct. 2011 A. National Regulatory System RS01: Legal framework for establishment of a regulatory system, mandate and enforcement power for each function RS01.01: Legislation or and

More information

Overview of the Multi-Payer Claims Database (MPCD)

Overview of the Multi-Payer Claims Database (MPCD) Overview of the Multi-Payer Claims Database (MPCD) Genesis of the MPCD The MPCD project is one of a number of initiatives related to comparative effectiveness research (CER) funded by the American Recovery

More information

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud A Checklist for Compliance in the Cloud 1 A Checklist for Compliance in the Cloud A Checklist for Compliance in the Cloud 1 With the industrialization of hacking and the enormous impact of security breaches,

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE EXAM PREPARATION GUIDE PECB Certified ISO/IEC 17025 Lead Auditor The objective of the PECB Certified ISO/IEC 17025 Lead Auditor examination is to ensure that the candidate possesses the needed expertise

More information

FDA & Medical Device Cybersecurity

FDA & Medical Device Cybersecurity FDA & Medical Device Cybersecurity Closing Keynote, February 19, 2017 Suzanne B. Schwartz, M.D., MBA Associate Director for Science & Strategic Partnerships Center for Devices and Radiological Health US

More information

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...

More information

Remote Access to a Healthcare Facility and the IT professional s obligations under HIPAA and the HITECH Act

Remote Access to a Healthcare Facility and the IT professional s obligations under HIPAA and the HITECH Act Remote Access to a Healthcare Facility and the IT professional s obligations under HIPAA and the HITECH Act Are your authentication, access, and audit paradigms up to date? Table of Contents Synopsis...1

More information

MAPIR User Guide for Eligible Hospitals. Medical Assistance Provider Incentive Repository (MAPIR): User Guide for Eligible Hospitals

MAPIR User Guide for Eligible Hospitals. Medical Assistance Provider Incentive Repository (MAPIR): User Guide for Eligible Hospitals Medical Assistance Provider Incentive Repository (MAPIR): User Guide for Eligible Hospitals Version: 1.0 Original Version Date: 02/23/2018 Last Revision Date: 02/23/2018 Table of Contents Table of Contents

More information

HIPAA Compliance Checklist

HIPAA Compliance Checklist HIPAA Compliance Checklist Hospitals, clinics, and any other health care providers that manage private health information today must adhere to strict policies for ensuring that data is secure at all times.

More information

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC Auditing and Monitoring for HIPAA Compliance HCCA COMPLIANCE INSTITUTE 2003 April, 2003 Presented by: Suzie Draper Sheryl Vacca, CHC 1 The Elements of Corporate Compliance Program There are seven key elements

More information

T11: Incident Response Clinic Kieran Norton, Deloitte & Touche

T11: Incident Response Clinic Kieran Norton, Deloitte & Touche T11: Incident Response Clinic Kieran Norton, Deloitte & Touche Incident Response Clinic Kieran Norton Senior Manager, Deloitte First Things First Who am I? Who are you? Together we will: Review the current

More information

Miami-Dade County Homeless Trust Homeless Management Information System (HMIS) Data Quality Standards. Miami-Dade County Continuum of Care (CoC)

Miami-Dade County Homeless Trust Homeless Management Information System (HMIS) Data Quality Standards. Miami-Dade County Continuum of Care (CoC) Miami-Dade County Homeless Trust Homeless Management Information System (HMIS) Data Quality Standards Miami-Dade County Continuum of Care (CoC) DRAFT April 2017 Miami-Dade County Homeless Trust Homeless

More information

The National Medical Device Information Sharing & Analysis Organization (MD-ISAO) Initiative Session 2, February 19, 2017 Moderator: Suzanne

The National Medical Device Information Sharing & Analysis Organization (MD-ISAO) Initiative Session 2, February 19, 2017 Moderator: Suzanne The National Medical Device Information Sharing & Analysis Organization (MD-ISAO) Initiative Session 2, February 19, 2017 Moderator: Suzanne Schwartz, Assoc. Dir., CDRH, FDA Denise Anderson, MBA, President,

More information

Therapy Provider Portal. User Guide

Therapy Provider Portal. User Guide Therapy Provider Portal User Guide Page 2 of 16 UCare User Guide V1.7 Table of Contents I. Introduction...3 About HSM Therapy Management... 4 Terms of Use... 4 Contact Information... 6 II. Using the Therapy

More information

The MovingLife Project

The MovingLife Project The MovingLife Project MObile ehealth for the VINdication of Global LIFEstyle change and disease management solutions Stakeholders Conference The MovingLife Roadmaps Brussels 18 April 2013 Alessio Gugliotta

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE EXAM PREPARATION GUIDE PECB Certified ISO 21500 Lead Project Manager The objective of the PECB Certified ISO 21500 Lead Project Manager examination is to ensure that the candidate has the knowledge and

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE EXAM PREPARATION GUIDE PECB Certified ISO 50001 Lead Auditor The objective of the PECB Certified ISO 50001 Lead Auditor examination is to ensure that the candidate has the knowledge and skills to plan

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 22000 Lead Auditor www.pecb.com The objective of the Certified ISO 22000 Lead Auditor examination is to ensure that the candidate has

More information

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use Click to edit Master title style Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use Andy Petrovich, MHSA, MPH M-CEITA / Altarum Institute October 1, 2014 10/1/2014 1 1 Who is

More information

Advanced Security Tester Course Outline

Advanced Security Tester Course Outline Advanced Security Tester Course Outline General Description This course provides test engineers with advanced skills in security test analysis, design, and execution. In a hands-on, interactive fashion,

More information

A SERVICE ORGANIZATION S GUIDE SOC 1, 2, & 3 REPORTS

A SERVICE ORGANIZATION S GUIDE SOC 1, 2, & 3 REPORTS A SERVICE ORGANIZATION S GUIDE SOC 1, 2, & 3 REPORTS Introduction If you re a growing service organization, whether a technology provider, financial services corporation, healthcare company, or professional

More information

Housecall Privacy Statement Statement Date: 01/01/2007. Most recent update 09/18/2009

Housecall Privacy Statement Statement Date: 01/01/2007. Most recent update 09/18/2009 Housecall Privacy Statement Statement Date: 01/01/2007. Most recent update 09/18/2009 Privacy Policy Intent: We recognize that privacy is an important issue, so we design and operate our services with

More information

When Recognition Matters WHITEPAPER ISO SUPPLY CHAIN SECURITY MANAGEMENT SYSTEMS.

When Recognition Matters WHITEPAPER ISO SUPPLY CHAIN SECURITY MANAGEMENT SYSTEMS. When Recognition Matters WHITEPAPER ISO 28000 SUPPLY CHAIN SECURITY MANAGEMENT SYSTEMS www.pecb.com CONTENT 3 4 4 4 4 5 6 6 7 7 7 8 9 10 11 12 Introduction An overview of ISO 28000:2007 Key clauses of

More information

Update from HIMSS National Privacy & Security. Lisa Gallagher, VP Technology Solutions November 14, 2013

Update from HIMSS National Privacy & Security. Lisa Gallagher, VP Technology Solutions November 14, 2013 Update from HIMSS National Privacy & Security Lisa Gallagher, VP Technology Solutions November 14, 2013 Agenda Update on HIMSS new Technology Solutions Department HIPAA Omnibus Rules Meaningful Use 2 P&S

More information

Data governance and data quality: is it on your agenda or lurking in the shadows?

Data governance and data quality: is it on your agenda or lurking in the shadows? Data governance and data quality: is it on your agenda or lurking in the shadows? Associate Professor Anne Young Director Planning, Quality and Reporting The University of Newcastle Context Data governance

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions ISO 15189 Accreditation Program cap.org Contents ISO and the International Organization for Standardization What does ISO stand for? (page 3) What is the International Organization

More information

Cybersecurity. Quality. security LED-Modul. basis. Comments by the electrical industry on the EU Cybersecurity Act. manufacturer s declaration

Cybersecurity. Quality. security LED-Modul. basis. Comments by the electrical industry on the EU Cybersecurity Act. manufacturer s declaration Statement Comments by the electrical industry on the EU Cybersecurity Act manufacturer s declaration industrial security Cybersecurity Quality basis security LED-Modul Statement P January 2018 German Electrical

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO/IEC 20000 Lead Auditor www.pecb.com The objective of the Certified ISO/IEC 20000 Lead Auditor examination is to ensure that the candidate

More information

Driving Global Resilience

Driving Global Resilience Driving Global Resilience Steve Mellish FBCI Chairman, The Business Continuity Institute Monday December 2nd, 2013 Business & IT Resilience Summit New Delhi, India Chairman of the Business Continuity Institute

More information

Citation for published version (APA): Jorritsma, W. (2016). Human-computer interaction in radiology [Groningen]: Rijksuniversiteit Groningen

Citation for published version (APA): Jorritsma, W. (2016). Human-computer interaction in radiology [Groningen]: Rijksuniversiteit Groningen University of Groningen Human-computer interaction in radiology Jorritsma, Wiard IMPORTANT NOTE: You are advised to consult the publisher's version (publisher's PDF) if you wish to cite from it. Please

More information

Healthcare Security Success Story

Healthcare Security Success Story Regional Forum on Cybersecurity in the Era of Emerging Technologies & the Second Meeting of the Successful Administrative Practices -2017 Cairo, Egypt 28-29 November 2017 Healthcare Security Success Story

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 14001 Lead Auditor www.pecb.com The objective of the PECB Certified ISO 14001 Lead Auditor examination is to ensure that the candidate

More information

HIPAA How to Comply with Limited Time & Resources. Jonathan Pantenburg, MHA, Senior Consultant August 17, 2017

HIPAA How to Comply with Limited Time & Resources. Jonathan Pantenburg, MHA, Senior Consultant August 17, 2017 HIPAA How to Comply with Limited Time & Resources Jonathan Pantenburg, MHA, Senior Consultant JPantenburg@Stroudwater.com August 17, 2017 Stroudwater Associates is a leading national healthcare consulting

More information

Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS

Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS Stephanie Poe, DNP, RN-BC CNIO, The Johns Hopkins Hospital and Health System Discussion Topics The Age of Acceleration Cyber

More information

ICAEW REPRESENTATION 68/16

ICAEW REPRESENTATION 68/16 ICAEW REPRESENTATION 68/16 Improving the Structure of the Code of Ethics for Professional Accountants - Phase 1 ICAEW welcomes the opportunity to comment on the Improving the Structure of the Code of Ethics

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE EXAM PREPARATION GUIDE PECB Certified ISO 39001 Lead Auditor The objective of the PECB Certified ISO 39001 Lead Auditor examination is to ensure that the candidate has the knowledge and skills to plan

More information

Health Information Exchange: Can There Be ONE National Model?

Health Information Exchange: Can There Be ONE National Model? Health Information Exchange: Can There Be ONE National Model? Session 56, February 20, 2017 John P. Kansky, President & CEO, Indiana Health Information Exchange Keith W. Kelley, Vice President of Solution

More information

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0 Cyber Security and Inside Threats: Turning Policies into Practices Presented by Ingrid Fredeen and Pamela Passman Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0 Presented By Ingrid Fredeen, J.D.

More information

Evaluating the Security of Your IT Network. Vulnerability Scanning & Network Map

Evaluating the Security of Your IT Network. Vulnerability Scanning & Network Map Click to edit Master title style Evaluating the Security of Your IT Network Vulnerability Scanning & Network Map Kyle Stafford / M-CEITA 5/12/2017 1 1 Disclaimer This presentation was current at the time

More information

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

HIPAA COMPLIANCE AND DATA PROTECTION Page 1 HIPAA COMPLIANCE AND DATA PROTECTION info@resultstechnology.com 877.435.8877 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and RESULTS Cloud

More information

Implementing an Audit Program for HIPAA Compliance

Implementing an Audit Program for HIPAA Compliance Implementing an Audit Program for HIPAA Compliance Mike Lynch Fifth National HIPAA Summit November 1, 2002 Seven Guiding Principles of HIPAA Rules Quality and Availability of Care Nothing in the proposed

More information

If you have any questions or concerns about this Privacy Policy, please Contact Us.

If you have any questions or concerns about this Privacy Policy, please Contact Us. Illuminate Education Your Privacy Rights Are Important To Us The privacy of students and their parents and guardians is important to Illuminate Education, Inc. ( Illuminate ) and the teachers, administrators,

More information

Standards Readiness Criteria. Tier 2

Standards Readiness Criteria. Tier 2 Document Number: HITSP 06 N 85 Date: June 1, 2006 Standards Readiness Criteria Tier 2 Version 1.0 May 12, 2006 HITSP Standards Harmonization Committee V 1.0 (5/12/2006) 1 Introduction...3 Background Information...3

More information

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief RSA Solution Brief Managing Risk Within Advanced Security Operations RSA Solution Brief How do you advance your security operations function? Increasingly sophisticated security threats and the growing

More information

HIPAA Security. 3 Security Standards: Physical Safeguards. Security Topics

HIPAA Security. 3 Security Standards: Physical Safeguards. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

Enhancing Security With SQL Server How to balance the risks and rewards of using big data

Enhancing Security With SQL Server How to balance the risks and rewards of using big data Enhancing Security With SQL Server 2016 How to balance the risks and rewards of using big data Data s security demands and business opportunities With big data comes both great reward and risk. Every company

More information

BORN Ontario s Data Quality Framework

BORN Ontario s Data Quality Framework BORN Ontario s Data Quality Framework At BORN Ontario we make Data Privacy and Data Quality our highest priority. We recognize that the quality of the data directly impacts use of the data. With addition

More information

Re: McAfee s comments in response to NIST s Solicitation for Comments on Draft 2 of Cybersecurity Framework Version 1.1

Re: McAfee s comments in response to NIST s Solicitation for Comments on Draft 2 of Cybersecurity Framework Version 1.1 January 19, 2018 VIA EMAIL: cyberframework@nist.gov Edwin Games National Institute of Standards and Technology 100 Bureau Drive, Mail Stop 8930 Gaithersburg, MD 20899 Re: McAfee s comments in response

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

Security and Privacy Breach Notification

Security and Privacy Breach Notification Security and Privacy Breach Notification Version Approval Date Owner 1.1 May 17, 2017 Privacy Officer 1. Purpose To ensure that the HealthShare Exchange of Southeastern Pennsylvania, Inc. (HSX) maintains

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 14001 Lead Implementer www.pecb.com The objective of the PECB Certified ISO 14001 Lead Implementer examination is to ensure that the candidate

More information

EBSCO Publishing Health Library Editorial Policy

EBSCO Publishing Health Library Editorial Policy EBSCO Publishing Health Library Editorial Policy Introduction EBSCO Publishing is a leader in publishing health and medical information on the Internet. While we make every effort to ensure that our content

More information

Virtua Health, Inc. is a 501 (c) (3) non-profit corporation located in Marlton, New Jersey ( Virtua ).

Virtua Health, Inc. is a 501 (c) (3) non-profit corporation located in Marlton, New Jersey ( Virtua ). myvirtua.org Terms of Use PLEASE READ THESE TERMS OF USE CAREFULLY Virtua Health, Inc. is a 501 (c) (3) non-profit corporation located in Marlton, New Jersey ( Virtua ). Virtua has partnered with a company

More information

GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI

GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI CONTENTS Overview Conceptual Definition Implementation of Strategic Risk Governance Success Factors Changing Internal Audit Roles

More information

North Carolina Health Information Exchange Authority. User Access Policy for NC HealthConnex

North Carolina Health Information Exchange Authority. User Access Policy for NC HealthConnex North Carolina Health Information Exchange Authority User Access Policy for NC HealthConnex North Carolina Health Information Exchange Authority User Access Policy for NC HealthConnex Introduction The

More information

All Aboard the HIPAA Omnibus An Auditor s Perspective

All Aboard the HIPAA Omnibus An Auditor s Perspective All Aboard the HIPAA Omnibus An Auditor s Perspective Rick Dakin CEO & Chief Security Strategist February 20, 2013 1 Agenda Healthcare Security Regulations A Look Back What is the final Omnibus Rule? Changes

More information

CISM Certified Information Security Manager

CISM Certified Information Security Manager CISM Certified Information Security Manager Firebrand Custom Designed Courseware Logistics Start Time Breaks End Time Fire escapes Instructor Introductions Introduction to Information Security Management

More information

DRS Policy Guide. Management of DRS operations is the responsibility of staff in Library Technology Services (LTS).

DRS Policy Guide. Management of DRS operations is the responsibility of staff in Library Technology Services (LTS). Harvard University Library Office for Information Systems DRS Policy Guide This Guide defines the policies associated with the Harvard Library Digital Repository Service (DRS) and is intended for Harvard

More information

The data quality trends report

The data quality trends report Report The 2015 email data quality trends report How organizations today are managing and using email Table of contents: Summary...1 Research methodology...1 Key findings...2 Email collection and database

More information

IT Security in a Meaningful Use Era C&SO HIMSS Meeting

IT Security in a Meaningful Use Era C&SO HIMSS Meeting CSOHIMSS 2011 Slide 1 October 21, 2011 October 21, 2011 IT Security in a Meaningful Use Era C&SO HIMSS Meeting Presented by: Mac McMillan CEO CynergisTek, Inc. Chair, HIMSS Privacy & Security Task Force

More information