Use Cases for Argonaut Project. Version 1.1
|
|
|
- Chad Chambers
- 10 years ago
- Views:
Transcription
1 Page 1 Use Cases for Argonaut Project Version 1.1 July 31, 2015
2 Page 2 Revision History Date Version Number Summary of Changes 7/31/15 V 1.1 Modifications to use case 5, responsive to needs for clarification and constraints. Simplified UML diagram.
3 Page 3 Introduction The Argonaut Project seeks to rapidly develop a first- generation FHIR- based API and Core Data Services specification, along with a Security Implementation Guide, that together will facilitate expanded sharing of electronic health information. Our goal is to enable interested vendors and providers to develop and implement a focused but complete FHIR API specification, and accompanying security implementation, beginning in the spring of We recognize that the these specifications will introduce a new architectural pattern and style for accessing data and services, as well as new, more flexible and open, methods for authorizing access to health information. Therefore, we are proposing use cases that are simple, yet functional, and that address both real security risks and trust risks associated with potential discomfort with these new ways of doing things, as both of these can impede vendor and provider adoption. We propose the following four functional use cases, as described below: 1. Patient uses provider- approved web application to access health data 2. Patient uses provider- approved mobile app to access health data 3. Clinician uses provider- approved web application to access health data 4. Clinician uses provider- approved mobile app to access health data In addition, we have defined as a near future use case: 5. Clinician in organization A uses EHR A to access patient data in EHR B, operated by organization B Definitions EHR System: We use EHR in a broad context inclusive of any system that holds and controls individually identifiable health information. Each EHR system has the capability to mediate app requests for access and to authorize access to FHIR resources. Provider Organization: We use the term provider organization to refer to any organization that holds individually identifiable health information. Provider Approved: By the term provider- approved we mean that the primary data holder has developed, selected, or otherwise approved a named application as acceptable for enabling a user to access protected resources. The means by which that approval is accomplished are outside the scope of these use cases. Mobile Application: By the term mobile application we include all applications that are hosted in environments that are incapable of providing assured protection of secrets. This includes applications that are downloaded and installed on mobile devices (e.g., ios, Android) as well as rich web applications implemented within browsers. Mobile applications essentially are applications hosted in any environment that lacks hardware segmentation of memory for isolating and protecting critical and sensitive code.
4 Page 4 Web Application: By the term web application we mean an application that is hosted on a trusted web server and that is accessed through a user s web browser. A web application may be launched from a portal or EHR, or may be accessed directly through its URL. A web application is capable of protecting a secret assigned to it to for use in authenticating its own identity. Use Case 1: Patient uses a provider- approved web application to access health data Introduction In this use case, the provider organization offers patients a web- based application that enables the patient to query for, retrieve, view, use, and locally persist discrete clinical data elements or clinical summary documents. The use case provides the application programmatic access to all of the discrete data elements included in the Common MU Data Set. For example, an application might enable a patient to view a single lab result, or to request and retrieve a Clinical Summary document, or to identify relevant clinical trials from a national database. The data request may be a selectable function within the application (e.g., show me my visit summary), or the application may need to request data as input to a user- selectable function (e.g., chart my blood glucose levels over the past 3 months). Once the requested data or documents are retrieved, the application can work with them (e.g. by displaying to the patient, or using as the input to another function, or persisting for future use). Actors Provider organization that holds EHR data, provides a patient portal account, and approves web- based applications capable of accessing those data Patient uses her browser to run the application that accesses her healthcare records to perform some useful task (e.g. visualization, interpretation, communication) Application requests, and (on approval) accesses EHR data on the patient's behalf Authorization server server used by EHR system to authenticate the clinician and to authorize the application to access EHR data on behalf of the clinician, in accordance with legal and institutional policies Resource server server used by EHR system to hold and retrieve EHR data as authorized Pre- conditions (outside scope of this use case) The provider has developed, selected, or otherwise approved a web- based software application that uses structured EHR data to help patients perform some valuable function (e.g. data visualization, interpretation, or communication). The provider has registered the application with the authorization server and has issued to the application credentials to enable it to authenticate its own identity. Provider organization operates in compliance with HIPAA Privacy and Security Rules.
5 Page 5 The application functions in accordance with the provider organization s privacy and security policy (e.g., runs on a trusted server, enables data persistence only in accordance with policy). The provider has identity- proofed the patient and has issued credentials (e.g., userid, password) for use in authenticating that identity. Provider holds the patient s health data. Post- conditions The patient has run the application on her own EHR record, or else the patient has been given a reason why the request has not been fulfilled. The provider systems have recorded the access (audit is outside the scope of this use case). Basic Flow 1. Patient opens web browser and launches the application. (The workflow from which the application is launched is outside the scope of this use case.) 2. Patient selects an application option that requires that data be retrieved from the patient s EHR. 3. Application requests access to the desired data. 4. Authorization server authenticates the application s identity. 5. Authorization server authenticates the patient s identity. 6. Authorization server authorizes the application to retrieve the requested data within a limited period of time. 7. Application queries Resource Server for data elements 8. Resource Server returns the requested and authorized data elements, or indicates that the requested data are unavailable. 9. Application works with the retrieved data as requested by the patient, potentially persisting it for future use. 10. This use case ends when the patient logs out of the application, or the application server otherwise terminates the patient s session. Alternative Flow This flow is identical to the Basic Flow except that the application sends a request for a Clinical Summary document instead of querying for and retrieving discrete data elements.
6 Page 6 UML Diagram for Use Case 1 Use Case 2: Patient uses provider- approved mobile app to access health data Introduction In this use case, the provider organization offers patients a mobile app that enables the patient to query for, retrieve, view, use, and persist discrete clinical data elements or clinical summary documents. The use case provides the app programmatic access to all of the discrete data elements included in the Common MU Data Set. For example, the app might help a patient view the result of a recent lab test, or to request and retrieve a Clinical Summary document, or to identify relevant clinical trials from a national database. The data request may itself be a selectable function within the app (e.g., show me my lab result from last week), or the app may request data as input to a user- selectable function (e.g.,
7 Page 7 chart my blood glucose levels over the past 3 months). Once the requested data are retrieved, the patient is able to view the data or document, use the data as input to another function, or persist the data for future use, such as charting and presenting longitudinal data. Depending upon the app s architecture, as approved by the provider organization, the data may be persisted only on the mobile device or within the app s cloud- based server. Actors Provider organization that holds the EHR data and offers patients a mobile app for accessing those data Patient downloads and installs the mobile app and uses it to access her data and perform some useful functions (e.g. visualization, interpretation communication) Mobile app requests, and (on approval) accesses EHR data on the patient's behalf. App server (optional) cloud- based server the app uses to persist data Authorization server server used by EHR system to authenticate the clinician and to authorize the application to access EHR data on behalf of the clinician, in accordance with legal and institutional policies Resource server server used by EHR system to hold and retrieve EHR data as authorized Pre- conditions (outside scope of this use case) The provider has developed or selected a mobile app that uses structured EHR data to help patients perform some valuable function (e.g. data visualization, interpretation, or communication). The approved app may or may not be associated with a cloud- based server, but if the app enables storing data in a cloud environment, the cloud server is included in the approved software. The provider has registered the app with the authorization server. Provider organization operates in compliance with HIPAA Privacy and Security Rules. The app operates in accordance with the provider s privacy and security policy (e.g., enables data persistence only in accordance with policy). The provider has identity- proofed the patient and has issued credentials (e.g., userid, password) for use in authenticating that identity. Provider holds the patient s health data. Post- conditions The patient has run the app to access her own record, or else the patient has been given a reason why the request has not been fulfilled. The provider systems have recorded the access (audit is outside the scope of this use case). Basic Flow 1. Patient opens the app. (The workflow from which the application is launched is outside the scope of this use case.) 2. Patient selects an app option that requires that data be retrieved from the patient s record held by the EHR system s resource server. 3. App requests access to the desired data.
8 Page 8 4. Authorization server authenticates the patient s identity. 5. Authorization server asks patient to authorize the app to access the data. 6. Patient authorizes the app. 7. Authorization server authorizes the app to retrieve the requested data within a limited period of time. 8. App queries resource server for discrete data elements. 9. Resource server returns requested and authorized data elements, or indicates that the requested data are unavailable. 10. App uses the retrieved data as needed, potentially persisting it for future use to the mobile device or to a cloud- based server. 11. App may persist data for future use. 12. This use case ends when the patient no longer is using the app, or when the mobile device is shut down. Alternative Flow This flow is identical to the Basic Flow except that the app sends a request for a Clinical Summary document instead of querying for and retrieving discrete data elements. UML Diagram for Use Case 2
9 Page 9 Use Case 3: Clinician uses provider- approved web application to access health data Introduction In this use case, the provider organization offers its clinicians a web- based application that enables the clinician to query for, retrieve, view, use, and locally persist discrete data elements and clinical summary documents. The use case provides the application programmatic access to all of the discrete data elements included in the Common MU Data Set. For example, an application might enable a clinician to view a single lab result for a named patient, or to request and retrieve a Transition of Care or Clinical Summary document for a named patient. The data request may be a selectable function within the application (e.g., show me John Doe s Clinical Summary), or the application may need to request data as input to a user- selectable function (e.g., chart glucose blood levels for John Doe over the past 3 months). Once the requested data or documents are retrieved, the application can work with them (e.g., by displaying to the clinician, or using as the input to another function, or persisting for future use). Actors Provider organization that holds the EHR data, provides an EHR account, and approves web- based applications capable of accessing patients data Clinician uses her browser to run the application that accesses patient data to perform some useful task (e.g., visualization, interpretation, communication) Application requests, and (on approval) accesses EHR data on the clinician s behalf Authorization server server used by EHR system to authenticate the clinician and to authorize the application to access EHR data on behalf of the clinician, in accordance with legal and institutional policies Resource server server used by EHR system to hold and retrieve EHR data as authorized Pre- conditions (outside the scope of this use case) The provider has developed, selected, or otherwise approved a web- based software application that uses structured EHR data to help clinicians perform some valuable function (e.g. data visualization, interpretation, or communication). The provider has registered the application with the authorization server and has issued to the application credentials to enable it to authenticate its own identity. Provider organization operates in compliance with HIPAA Privacy and Security Rules. The application functions in accordance with the provider organization s privacy and security policy (e.g., runs on a trusted server, enables data persistence only in accordance with policy). The provider has identity- proofed the clinician and has issued credentials (e.g., userid, password) for use in authenticating that identity and clinician role. Provider holds the named patient s EHR data.
10 Page 10 Post- conditions The clinician has run the application and accessed patient data, or else the clinician has been given a reason why the request has not been fulfilled. The provider systems have recorded the access (audit is outside the scope of this use case). Basic Flow 1. Clinician opens web browser and launches the application. (The workflow from which the appl is launched is outside the scope of this use case.) 2. Clinician selects an application option that requires that data be retrieved from a named patient s EHR. 3. Application requests access to the desired data. 4. Authorization server authenticates the application s identity. 5. Authorization server authenticates the clinician s identity and role. 6. Authorization server authorizes the application to retrieve the requested data within a limited period of time. 7. Application queries EHR system for data elements 8. Resource server returns the requested and authorized data elements, or indicates that the requested data are unavailable. 9. Application works with retrieved data in web browser. 10. Application may persist data for future use. 11. This use case ends when the clinician logs out of the application, or the application server otherwise terminates the clinician s session. Alternative Flow This flow is identical to the Basic Flow except that the application sends a request for a Transition of Care or Clinical Summary document instead of querying for and retrieving discrete data elements.
11 Page 11 UML Diagram for Use Case 3 Use Case 4: Clinician uses provider- approved mobile app to access health data Introduction In this use case, the provider organization offers clinicians a mobile app that enables the clinician to query for, retrieve, view, use, and persist discrete data elements or a document containing a summary of a named patient s EHR data. The use case provides the app programmatic access to all of the discrete data elements included in the Common MU Data set. For example, the app might help a clinician view the result of a patient s recent lab test, or to request and retrieve a Clinical Summary or Transition of Care document. The data request may itself be a selectable function within the application (e.g., show me John Doe s Clinical Summary), or the application may need to request data as input to a user- selectable function (e.g., chart glucose blood levels for John Doe over the past 3 months). Once the requested data are retrieved, the clinician is able to view the data or document, use the
12 Page 12 data as input to another function, or persist the data for future use, such as charting and presenting longitudinal data. Depending upon the app s architecture, as approved by the provider organization, the data may be persisted only on the mobile device or within the app s cloud- based server. Actors Provider organization that holds the EHR data and offers clinicians a mobile app for accessing patients EHR data Clinician uses a mobile app to select options for retrieving, viewing, manipulating, and saving data Mobile app queries for and retrieves data, as requested and authorized App server cloud- based server the app uses to persist data Authorization server server used by EHR system to authenticate the clinician and to authorize the application to access EHR data on behalf of the clinician, in accordance with legal and institutional policies Resource server server used by EHR system to hold and retrieve EHR data as authorized Pre- conditions (outside the scope of this use case) The provider has developed or selected a mobile app that enables clinicians to query for, retrieve, view, and persist data elements and summary documents for named patients. The approved app may or may not be associated with a cloud- based server, but if the app enables storing data in a cloud environment, the cloud server is included in the approved software. The provider has registered the app with the authorization server and has issued to the app credentials to enable it to authenticate its own identity. Provider organization operates in compliance with HIPAA Privacy and Security Rules. The app operates in accordance with the provider s privacy and security policy (e.g., enables data persistence only in accordance with policy). The provider has identity- proofed the clinician and has issued credentials (e.g., userid, password) for use in authenticating that identity and clinician role. Provider holds the named patient s EHR data. Post- conditions The clinician has found, viewed, and possibly downloaded the requested data; else the clinician has been given a reason why the request has not been fulfilled. The provider system has recorded the access (audit is outside the scope of this use case). Basic Flow 1. Clinician opens the app. (The workflow from which the app is launched is outside the scope of this use case.) 2. Clinician selects an app option that requires that data be retrieved from a named patient s EHR. 3. App requests access to the desired data.
13 Page Authorization server authenticates the clinician s identity and role. 5. Authorization server asks clinician to authorize the app to access the data. 6. Clinician authorizes the app. 7. Authorization server authorizes the app to retrieve the requested data within a limited period of time. 8. App queries resource server for discrete data elements 9. Resource server returns the requested and authorized data elements, or indicates that the requested data are unavailable. 10. App works with retrieved data. 11. App may persist data for future use. 12. This use case ends when the clinician no longer is using the app, or when the mobile device is shut down. Alternative Flow This flow is identical to the Basic Flow except that the app sends a request for a Transition of Care or Clinical Summary document instead of querying for and retrieving discrete data elements. UML Diagram for Use Case 4
14 Page 14 Use Case 5 (future: Provider using EHR A access patient record held in EHR B Introduction In this use case, the clinician uses an EHR application (EHR A) that allows the clinician to query for, retrieve, view, use, and locally persist discrete clinical data elements or clinical summary documents held in EHR B for treatment purposes. The use case provides the application programmatic access to all of the discrete data elements included in the Common MU Data Set. For example, an application in EHR A might enable the clinician to view a single lab result, or to request and retrieve a Clinical Summary document, or to graph blood pressure results over time using data from EHR B. Once the requested data or documents are retrieved, EHR A can work with them (e.g. by displaying to the clinician, or using as the input to another function, or persisting for future use). Actors Clinician authorized clinical user of EHR A Provider A - the organization with which clinician is associated EHR A clinical system that Provider A has implemented to enable users to access and use resources held by Provider A and its trusted partners Provider B - the organization that has authority over EHR B EHR B clinical system that Provider B has implemented to enable users to access and use resources held by Provider B and its trusted partners Pre- conditions (outside scope of this use case) The Clinician has authenticated herself to EHR A, which is capable of fulfilling the functions described in this document. EHR A is capable of protecting secrets, including a credential used to authenticate its own identity and tokens used to access resources. EHR B is capable of fulfilling the functions described in this document Provider B has agreed to trust Provider A s EHR system and clinicians to access Provider B s clinical records for certain treatment purposes.. Both Provider A and Provider B hold trustworthy proof of organizational identity. Provider B trusts Provider A to perform essential security and authentication functions (e.g., to authenticate Clinician) and trusts the data use request claims made by Provider A. EHR B holds the patient information required by the Clinician. EHR A and EHR B can link patient identity to the patient whose data are being requested. Providers A and B operate in compliance with HIPAA Privacy and Security Rules. Patient is a competent adult, and patient data contains no sensitive information requiring special protections (e.g., SAMHSA protected Part 2 data, HIV status, etc.)
15 Page 15 Post- conditions The Clinician using EHR A has accessed the patient record in EHR B, or else the Clinician has been given a reason why the request has not been fulfilled. EHR A and EHR B have recorded the access (audit and accounting of disclosures are outside the scope of this use case). Basic Flow 1. Clinician uses EHR A. (The workflow from which the EHR A is launched is outside the scope of this use case.) 2. Clinician selects an EHR option that requires that data be retrieved from EHR B for HIPAA- defined treatment purposes. 3. EHR A assures that the Clinician s request is consistent with Provider A s institutional policies and trust agreement with Provider B. 4. Upon approval, EHR A establishes a secure link with EHR B. 5. EHR A requests access to the desired patient s data in EHR B on behalf of the authenticated Clinician 6. EHR B authorizes EHR A to retrieve the requested data, on behalf of the Clinician, within a limited period of time. 7. EHR A queries EHR B for the required data elements. 8. EHR B returns the resources, as requested and authorized, or indicates that the requested data are unavailable. 9. EHR A works with the retrieved data as requested by the Clinician, potentially persisting the data for future use. 10. This use case ends when the Clinician completes the use of EHR A functions working with the requested patient s data. Alternative Flow This flow is identical to the Basic Flow except that EHR A sends a request for a Clinical Summary document instead of querying for and retrieving discrete data elements.
16 Page 16 UML Diagram for Use Case 5
Administering Jive Mobile Apps
Administering Jive Mobile Apps Contents 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios... 3 Native Apps and Push Notifications...4 Custom App Wrapping for ios... 5 Native
CASE STUDY. Enhancing the Patient Experience Harris Mobile Patient Engagement Platform
CASE STUDY Enhancing the Patient Experience Harris Mobile Patient Engagement Platform As a patient, when health issues start cropping up, you sit up and take notice. You get proactive about researching,
Adobe Digital Publishing Security FAQ
Adobe Digital Publishing Suite Security FAQ Adobe Digital Publishing Security FAQ Table of contents DPS Security Overview Network Service Topology Folio ProducerService Network Diagram Fulfillment Server
Security Considerations
Concord Fax Security Considerations For over 15 years, Concord s enterprise fax solutions have helped many banks, healthcare professionals, pharmaceutical companies, and legal professionals securely deliver
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Mobile App Activation Before you can activate the mobile app you must download it. You can have up to
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication This document serves as a How To reference guide for employees to execute the following MFA tasks: 1.
Physician Champions David C. Kibbe, MD, & Daniel Mongiardo, MD FAQ Responses
Physician Champions David C. Kibbe, MD, & Daniel Mongiardo, MD FAQ Responses DR. KIBBE S RESPONSES What is health information exchange? How can health information exchange help my practice? Can I comply
PrinterOn Print Management Overview
PrinterOn Print Management Overview Table of Contents 1. PrinterOn and Print Management Overview... 4 1.1. Combined PrinterOn and Print Management Capabilities... 5 1.1.1. Comprehensive Workflow Tracking
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
My Stuff Everywhere Your Content On Any Screen
Technical Brief Bob Lund, Distinguished Technologist, CableLabs September, 2014 My Stuff Everywhere Your Content On Any Screen The My Stuff Everywhere Concept The My Stuff Everywhere (MSE) concept is simple
Summer 2013 Cloud Initiative. Release Bulletin
Summer 2013 Cloud Initiative In this bulletin... July 2013 Summer 2013 Cloud Initiative 1 Getting started with the new Cloud... 2 Cloud Enhancements 3 How To Save Files 7 How to Set Up ipad Access 9 How
Building Secure Applications. James Tedrick
Building Secure Applications James Tedrick What We re Covering Today: Accessing ArcGIS Resources ArcGIS Web App Topics covered: Using Token endpoints Using OAuth/SAML User login App login Portal ArcGIS
MaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software
Version 3.2 Release Note. V3.2 Release Note
Version 3.2 Release Note V3.2 Release Note Welcome to v3.2 of RM Unify We are pleased to detail the release of RM Unify v3.2. This release brings with it Chromebook single sign-on, allowing users with
Patient-Centric Secure-and-Privacy-Preserving Service-Oriented Architecture for Health Information Integration and Exchange
Patient-Centric Secure-and-Privacy-Preserving Service-Oriented Architecture for Health Information Integration and Exchange Mahmoud Awad and Larry Kerschberg Center for Health Information Technology George
MaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2014 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software described
CA Service Desk Manager - Mobile Enabler 2.0
This Document is aimed at providing information about the (CA SDM) Mobile Enabler and mobile capabilities that is typically not available in the product documentation. This is a living document and will
The Recipe for Sarbanes-Oxley Compliance using Microsoft s SharePoint 2010 platform
The Recipe for Sarbanes-Oxley Compliance using Microsoft s SharePoint 2010 platform Technical Discussion David Churchill CEO DraftPoint Inc. The information contained in this document represents the current
HIPAA Compliance Guide
HIPAA Compliance Guide Important Terms Covered Entities (CAs) The HIPAA Privacy Rule refers to three specific groups as covered entities, including health plans, healthcare clearinghouses, and health care
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
ios Education Deployment Overview
ios Education Deployment Overview ipad brings an amazing set of tools to the classroom. Teachers can easily customize lessons with interactive textbooks, rich media, and online courses. And students stay
Image Enabled EMR / EHR
Image Enabled EMR / EHR A strategic approach to EMR integration and interoperability for diagnostic imaging and related reports The Challenge: In healthcare, imaging is routinely used as a tool for patient
HIPAA COMPLIANCE AND DATA PROTECTION. [email protected] +39 030 201.08.25 Page 1
HIPAA COMPLIANCE AND DATA PROTECTION [email protected] +39 030 201.08.25 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and EagleHeaps
OAuth 2.0 Developers Guide. Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900
OAuth 2.0 Developers Guide Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900 Table of Contents Contents TABLE OF CONTENTS... 2 ABOUT THIS DOCUMENT... 3 GETTING STARTED... 4
HIPAA Compliance Guide
HIPAA Compliance Guide Important Terms Covered Entities (CAs) The HIPAA Privacy Rule refers to three specific groups as covered entities, including health plans, healthcare clearinghouses, and health care
Workday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
VASCO: Compliant Digital Identity Protection for Healthcare
VASCO: Compliant Digital Identity Protection for Healthcare Compliant Digital Identity Protection for Healthcare The proliferation of digital patient information and a surge in government regulations are
PrinterOn Mobile Applications for ios and Android
PrinterOn Mobile Applications for ios and Android Table of Contents 1. Key Features & Functionality... 4 1.1. Printer Discovery... 4 1.1.1. Location-Based Search... 4 1.1.2. Keyword Search... 5 1.1.3.
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Type of Personal Data We Collect and How We Use It
Philips Lumify App Privacy Notice This Privacy Notice was last changed on September 1, 2015. Philips Electronics North America Corporation ("Philips") strongly believes in protecting the privacy of the
TrustedX - PKI Authentication. Whitepaper
TrustedX - PKI Authentication Whitepaper CONTENTS Introduction... 3 1... 4 Use Scenarios... 5 Operation... 5 Architecture and Integration... 6 SAML and OAuth 7 RESTful Web Services 8 Monitoring and Auditing...
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015 Integration Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 93.
Egnyte Cloud File Server. White Paper
Egnyte Cloud File Server White Paper Revised July, 2013 Egnyte Cloud File Server Introduction Egnyte Cloud File Server (CFS) is the software as a service layer that powers online file sharing and storage
Middleware- Driven Mobile Applications
Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary
OneLogin Integration User Guide
OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...
FollowMyHealth Universal Health Record Patient Access v2.2.1 User Guide
Allscripts Software FollowMyHealth Universal Health Record Patient Access v2.2.1 User Guide Copyright 2014 Allscripts Healthcare, LLC and/or its affiliates. All Rights Reserved. www.allscripts.com Published
SQL in the Cloud: Is it Game Changing? V P P r o f e s s i o n a l S e r v i c e s
SQL in the Cloud: Is it Game Changing? Kevin Carter V P P r o f e s s i o n a l S e r v i c e s AGENDA Azure SQL Power BI Azure SQL History Lesson Exchange in the Cloud 50 million 10% 15% Estimated total
Developing Microsoft SharePoint Server 2013 Core Solutions
Course 20488B: Developing Microsoft SharePoint Server 2013 Core Solutions Course Details Course Outline Module 1: SharePoint as a Developer Platform This module examines different approaches that can be
SYSPRO App Store: Registration Guide
SYSPRO App Store: Registration Guide SYSPRO App Store Registration Guide 2 Table of Contents What is the SYSPRO App Store?... 3 The SYSPRO App Store URL... 3 Who can use it?... 3 Register as a customer...
Getting Started with the iscan Online Data Breach Risk Intelligence Platform
Getting Started with the iscan Online Data Breach Risk Intelligence Platform 2 Table of Contents Overview... 3 Data Breach Risk Intelligence... 3 Data Breach Prevention Lifecycle Defined... 3 Choosing
Software Requirements. Specification. Day Health Manager. for. Version 1.1. Prepared by 4yourhealth 2/10/2015
Software Requirements Specification. for Day Health Manager Version 1.1 Prepared by 4yourhealth Senior Project 2015 2/10/2015 Table of Contents Table of Contents Revision History Introduction Purpose Document
KHIN Patient Portal RFP Questions and Responses
The system must achieve certification as a modular EMR for 170.314(e)(1) prior to July 2013. If our system is certified for this requirement as part of a certified EHR solution, will you also require separate
Advanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
1 Overview 1 1.1 Configuration on MACH Web Portal 1
API Guide Version 2 Table of Content 1 Overview 1 1.1 Configuration on MACH Web Portal 1 1.2 Other Pre-requisites 1 1.2.1 Apple Push SSL Certificate 1 1.2.2 Android GCM Key 2 1.2.3 Enabling Push Notification
Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper
Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones
Managing Privacy and Security Challenges of Patient EHR Portals
Managing Privacy and Security Challenges of Patient EHR Portals Jacki Monson, JD, CHC Adam H. Greene, JD, MPH DISCLAIMER: The views and opinions expressed in this presentation are those of the author and
nexus Hybrid Access Gateway
Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
Establishing two-factor authentication with Cyberoam UTM appliances and HOTPin authentication server from Celestix Networks
Establishing two-factor authentication with Cyberoam UTM appliances and HOTPin authentication server from Celestix Networks Contact Information www.celestix.com Celestix Networks USA Celestix Networks
Threat Modeling Cloud Applications
Threat Modeling Cloud Applications What You Don t Know Will Hurt You Scott Matsumoto Principal Consultant [email protected] Software Confidence. Achieved. www.cigital.com [email protected] +1.703.404.9293
AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION BETWEEN WAKE FOREST UNIVERSITY BAPTIST MEDICAL CENTER AND
AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION BETWEEN WAKE FOREST UNIVERSITY BAPTIST MEDICAL CENTER AND THIS AGREEMENT for Access to Protected Health Information ( PHI ) ( Agreement ) is entered
Getting Started Guide for Developing tibbr Apps
Getting Started Guide for Developing tibbr Apps TABLE OF CONTENTS Understanding the tibbr Marketplace... 2 Integrating Apps With tibbr... 2 Developing Apps for tibbr... 2 First Steps... 3 Tutorial 1: Registering
McAfee Cloud Single Sign On
Setup Guide Revision B McAfee Cloud Single Sign On COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
Remote Access End User Reference Guide for SHC Portal Access
Remote Access End User Reference Guide for SHC Portal Access Version 2.0 6/7/2012 This remote access end user reference guide provides an overview of how to install Citrix receiver, which is a required
Technical. Overview. ~ a ~ irods version 4.x
Technical Overview ~ a ~ irods version 4.x The integrated Ru e-oriented DATA System irods is open-source, data management software that lets users: access, manage, and share data across any type or number
UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab
UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management
Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive
Cloud Security Through Threat Modeling Robert M. Zigweid Director of Services for IOActive 1 Key Points Introduction Threat Model Primer Assessing Threats Mitigating Threats Sample Threat Model Exercise
Establishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks
Establishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks Contact Information www.celestix.com Celestix Networks USA Celestix Networks EMEA
Learn More Cloud Extender Requirements Cheat Sheet
Learn More Cloud Extender Requirements Cheat Sheet Overview This document defines all requirements to ensure a successful installation of the MaaS360 Cloud Extender to enable use of ActiveSync Manager
PrinterOn Mobile App for ios and Android
PrinterOn Mobile App for ios and Android User Guide Version 3.4 Contents Chapter 1: Getting started... 4 Features of the PrinterOn Mobile App... 4 Support for PrinterOn Secure Release Anywhere printer
December 2015 702P00860. Xerox App Studio 3.0 Information Assurance Disclosure
December 2015 702P00860 Xerox App Studio 3.0 Information Assurance Disclosure 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design and ConnectKey are trademarks of Xerox Corporation
Universal Health Record Patient Access v2.2.4 User Guide
Allscripts FollowMyHealth Universal Health Record Patient Access v2.2.4 User Guide Copyright 2015 Allscripts Healthcare, LLC and/or its affiliates. All Rights Reserved. www.allscripts.com Published Date:
ManageEngine Desktop Central. Mobile Device Management User Guide
ManageEngine Desktop Central Mobile Device Management User Guide Contents 1 Mobile Device Management... 2 1.1 Supported Devices... 2 1.2 What Management Operations you can Perform?... 2 2 Setting Up MDM...
Installation Guide. Qlik Sense 1.1 Copyright 1993-2015 QlikTech International AB. All rights reserved.
Installation Guide Qlik Sense 1.1 Copyright 1993-2015 QlikTech International AB. All rights reserved. Copyright 1993-2015 QlikTech International AB. All rights reserved. Qlik, QlikTech, Qlik Sense, QlikView,
Self Service Portal and 2FA User Guide
Self Service Portal and 2FA User Guide Accessing Symantec Self Service Portal Self Service Portal (SSP) is a web-based application which you can use to register, test, reset, or remove Symantec VIP credentials.
An Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
HotSpot Enterprise Mobile Printing Solution. Security Whitepaper
HotSpot Enterprise Mobile Printing Solution Security Whitepaper August, 2012 2012, Ricoh Americas Corporation. All rights reserved. Ricoh and the Ricoh logo are registered trademarks of Ricoh Company,
HIPAA COMPLIANCE AND
INTRONIS CLOUD BACKUP & RECOVERY HIPAA COMPLIANCE AND DATA PROTECTION CONTENTS Introduction 3 The HIPAA Security Rule 4 The HIPAA Omnibus Rule 6 HIPAA Compliance and Intronis Cloud Backup and Recovery
... Introduction... 17. ... Acknowledgments... 19
... Introduction... 17... Acknowledgments... 19 PART I... Getting Started... 21 1... Introduction to Mobile App Development... 23 1.1... The Mobile Market and SAP... 23 1.1.1... Growth of Smart Devices...
Solution Requirements and Process Flow
CHAPTER 2 Scope The Cisco Virtual Expert Management solution is a powerful, flexible communication solution that addresses a variety of technical, business, and associated service preferences. Deployment
zevent Mobile Application
zevent Mobile Application Dr. Qais Noorshams, IBM DE [email protected] 15. 18. September @ Zeit für z - z/os Kundentag und GSE z/os Guide in Böblingen The zevent Mobile Application And what about critical
1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
Virtual Cabinet Document Portal User Guide
Virtual Cabinet Document Portal User Guide Contents / Introduction Introduction... 2 What to expect when publishing a document... 3 Having difficulty? Troubleshooting guide.... 7 The Virtual Cabinet Document
A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher
A Nemaris Company Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher 306 East 15 th Street Suite 1R, New York, New York 10003 Application Name Surgimap Vendor Nemaris Inc. Version
Cloud Elements ecommerce Hub Provisioning Guide API Version 2.0 BETA
Cloud Elements ecommerce Hub Provisioning Guide API Version 2.0 BETA Page 1 Introduction The ecommerce Hub provides a uniform API to allow applications to use various endpoints such as Shopify. The following
Manual for Android 1.5
Manual for Android 1.5 1 Table of Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 3 2. Installation... 4 3. Basic functionality... 5 3.1. Setting up Boxcryptor
Healthcare Compliance Solutions
Privacy Compliance Healthcare Compliance Solutions Trust and privacy are essential for building meaningful human relationships. Let Protected Trust be your Safe Harbor The U.S. Department of Health and
APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION
APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION Response Code: Offeror should place the appropriate letter designation in the Availability column according
Authorized. User Agreement
Authorized User Agreement CareAccord Health Information Exchange (HIE) Table of Contents Authorized User Agreement... 3 CareAccord Health Information Exchange (HIE) Polices and Procedures... 5 SECTION
Setting the World on FHIR
Setting the World on FHIR W. Ed Hammond. Ph.D., FACMI, FAIMBE, FIMIA, FHL7 Director, Duke Center for Health Informatics Director, Applied Informatics Research, DHTS Director of Academic Affairs, MMCi Program
Dave Haseman, Ross. Hightower. Mobile Development for SAP* ^>. Galileo Press. Bonn. Boston
Dave Haseman, Ross Hightower Mobile Development for SAP* -a ^>. Galileo Press # Bonn Boston Introduction 17 Acknowledgments 19 PART I Getting Started 1.1 The Mobile Market and SAP 23 1.1.1 Growth of Smart
Creating unique customer experiences
Creating unique customer experiences Company Introduction N NETinfo is a company specializing in the development and supply of e Banking and Mobile Financial Services (MFS) Solutions to the Banking and
MaaS360 Cloud Extender
MaaS360 Cloud Extender Installation Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software described
HIPAA for HIT and EHRs. Latest on Meaningful Use and EHR Certification: For Privacy and Security Professionals
HIPAA for HIT and EHRs Latest on Meaningful Use and EHR Certification: For Privacy and Security Professionals Donald Bechtel, CHP Siemens Health Services Patient Privacy Officer Fair Information Practices
