Connecting and Protecting the Last
|
|
- Allen Williamson
- 8 years ago
- Views:
Transcription
1 Connecting and Protecting the Last Mile Corporate Presentation March 2013
2 Important Cautions The Private Securities Litigation Reform Act of 1995 provides a safe harbor for forward-looking statements. Certain information included in this document (as well as information included in oral statements or other written statements made or to be made by the company) contains statements that are forward-looking, such as statements relating to anticipated future revenues of the company and success of current product offerings. Such forward-looking information involves important risks and uncertainties that could significantly affect anticipated results in the future and, accordingly, such results may differ materially from those expressed in any forward-looking statements made by or on behalf of the company. For a description of additional risks and uncertainties, please refer to the company s filings with the Securities and Exchange Commission and with the Canadian Securities Administrators in the EDGAR filing system. The information contained in this presentation and its attachments contains privileged, confidential and protected from disclosure. Please ensure that you do not forward, disseminate, distribute or copy this presentation and its attachments Diversinet Corp., All rights reserved. Diversinet Corp., the Diversinet Logos, MobiSecure and all other products or service names are trademarks of Diversinet Corp. Diversinet products are covered by patents and other patent applications. 2
3 Diversinet Key Stats Headquarters Toronto, Ont. Sales Office Irving, Texas Stock Tickers OTCQB:DVNTF; TSXV:DIV Stock Price (3/4/2013) $ Week Low/High $ $0.26 Avg. Daily Vol. (3 mo.) 11,600 Basic/Fully Diluted Shares (mrq) 43.2M Public Float, est. 27.2M Institutional Holdings¹ 24% Insider Holdings 28% Revenue (ttm) $1.5M EPS (ttm) $(0.07) Cash ($0.07 cash/share) $3.2M Monthly Burn Rate $380K+ Debt (mrq) $0.00 Total Assets (mrq) $3.7M Total Liabilities (mrq) $0.6M Fiscal Year End Dec 31 Market Cap $2.2M Price/Tangible Book (mrq) 0.5x Sources: Capital IQ & Yahoo! Finance. Sources: Capital IQ & Yahoo! Finance. ¹As of 2/22/12, 5/29/12, 9/30/2012 & non-filers 3
4 Who We Are Diversinet is a mobile technology company with an award winning, enterprise level secure and HIPAA compliant mobile application platform. With MobiSecure with FIPS certification, We are a leader in mobile health security We are able to create a secure way to store and share PHI and communicate using consumer mobile devices for multiple purposes. We can create/configure / maintain interoperable mobile applets across multiple mobile platforms to allow rapid innovation at a time where healthcare is attempting to determine how to personalize engagement and change patient behaviors/improve adherence/improve outcomes. 4
5 Why Are We in Business? Chronic diseases account for 80% of $3 trillion spent on U.S. healthcare and much of it is due to lack of patient/consumer engagement and gaps in care coordination Consumer mobile devices will be a critical vehicle for engaging consumers and patients. However, our understanding and ability to activate patients/consumer is emerging, and it will require significant experimentation/innovation with an enterprise approach We have a solution that allows our customers/partners to innovate and develop mobile engagement solutions to determine how to activate patients and improve outcomes/costs while securing the communication and the data on the mobile devices 5
6 Experienced Team New CEO, Dr. Hon Pak In February 2012, Dr. Pak was appointed CEO and to the board of directors Dr. Pak is a past ATA president & recently retired CIO of the U.S. Army Medical Department, Office of the Surgeon General New Chairman, Bret Jorgensen In July 2012, Bret Jorgensen was appointed to the board of directors and chairman Jorgensen brings 20+ years of experience as a healthcare entrepreneur and corporate transformation executive to Diversinet Jorgensen was most recently the CEO of MDVIP, a personalized healthcare company 6
7 What Do We Do? Enterprise level mhealth software platform (scalable, secure, etc) with FIPS certification MobiSecure provides a secure way to store and share PHI data on consumer mobile phone and other medical devices MobiPublisher allows our clients/partners to create/configure / maintain interoperable mobile applets ( Rx adherence, Preventive Screening, etc) to allow rapid innovation on a core MobiHealth Wallet that allows to store, share PHR and health profile/preferences Provide a security module (MobiSecure) to be used on an existing mobile/web application Authentication Provisioning Encryption We have growing # of solutions to include MobiSurvey and MobiMessenger that allow clients to meet targeted needs 7
8 The Problem: Unsustainable Healthcare Costs 80% of all healthcare spending is for treatment of chronic disease Chronic diseases account for 80% of $3 trillion spent on healthcare Changes in behavior could reduce chronic disease morbidity by 80% 30-59% of patients with chronic diseases do not adhere to prescribed medications By 2015, 41% of American adults are projected to be obese 8
9 Mobility Will Change Health and Healthcare There are 5.9 billion mobile subscribers (that's 87% of the world population). Mobile devices allows providers to connect providers and patients 81% of patients want online access to schedule appointments and fill out forms 78% will go online to access medical histories and share data with their physician 59% of patients will switch to a physician with a greater online presence Source Intuit Health Care Check-up Survey 2010 Source: 1) Intuit Health Care Check-up Survey
10 mhealth Will Be a Strategic Investment mhealth extends the ability of the entire healthcare sector to extend their solutions securely through mobility Disease Management Companies Medical Devices Companies Patient Health Record Companies Health Information Exchange Electronic Medical Record Mobility Telehealth Companies Health Plans/ Payers Healthcare Organizations Mobility Activation Empowerment Engagement 10
11 Rate of Adoption Mobile Health Adoption Trends HITECH 2010 Affordable Care Act Passed Loyalty Offerings HITECH Stage 1 HITECH Stage 2 ACO Year 1: Quality reporting ACO Year 2: Quality payment Strategic Initiatives 11
12 How We Do It? Our Solution 12
13 Standard Interfaces(WSI & CCD) Enterprise Mobile Platform TARGET OUTCOMES: Reduced Readmission, Improved Adherence & Compliance, Quality Improvement, Cost Reduction. mobihealth Wallet mphr+ Profile & Preferences Biometrics Configurable Applets Download PHR data Share data securely Secure Messaging Health Profile Care Goals Preferences Determinants of Health Weight BP Pulse Glucose Others Other Applet Other Applet Applet DATA SOURCES: EHR HIE Blue Button Medical Devices Configuration Manager Secure Messenger Mobile Content Manager Analytic Portal CONTENT: Care Pathways, Care Plans, Patient Education MobiPublisher Mobisecure (Provisioning and Security) Secure - Write Once Deliver Across All Mobile Platforms 13
14 Patient Centered Engagement 14
15 Successful mhealth = Integrated Platform + Eco System Client Solutions Enabling Outcomes 15
16 mhealth Market Growth and Drivers PricewaterhouseCoopers and mobile operator industry association GSMA expect global mobile health revenues to hit $23 billion by 2017, with the biggest markets in Europe and the Asia-Pacific region Revenues from remote patient monitoring services that use mobile networks will rise to $1.9 billion globally by The wireless home health market looks to $4.4 billion by 2013, according to Parks (U.S. market alone) 1 The Patient-Provider mhealth apps for care is expected to grow 270% per year to reach $1.1 billion by 2017 ² Multiple mhealth Market Drivers: Cost savings & Improved treatment 4 Federal mandates & tax incentives (HITECH, Meaningful Use)³ Health regulatory/privacy requirements 4 Remote monitoring & med reminders Increased Smartphone use by doctors & users Sources: 1) mhealth predictions: $1.9B, $4.4B, $4.6B? By: Brian Dolan Apr 14, ) mhealth Adoption for Patient Engagement Chilmark Research May ) ScienceDaily, May 1, ) Emrandhipaa.com, Details of Obama s EMR Stimulus Package 16
17 Growing Security Risk for Mobile Health Frequency of patient data losses at healthcare organizations increased by 32% in 2011 compared to 2010, with 49% of respondents citing lost or stolen computing devices such as laptops, tablets, and smartphones. At the same time, 81% of Healthcare Providers use mobile devices to store or transmit data yet 50% do nothing to protect the data. 1 Data breaches in U.S. hospitals create a potential economic burden of $6 billion dollars annually forcing IT departments to focus heavily on preventing security breaches before they occur and bridge the divide between mobility and security. 1 Security is perceived to be among the top i barrier issues in implementation. The HIT Policy Committee, which advises HHS, voted Sept. 6 to accept recommendations from its Privacy and Security Tiger Team to require multi-factor authentication in certain cases involving remote access to patient information for Stage 3 of the HITECH Act electronic health record incentive program. The authentication would have to meet NIST Level of Assurance 3 standards. Level 3 includes the use of soft OTP tokens Stage 3 is slated to begin in 2015, and rules are in the early discussion stages at the Department of Health and Human Services Source: 1) Second Annual Benchmark Study on Patient Privacy & Data Security Ponemon Institute, December
18 Our Core Security Model mobisecure Strong Authentication & Encryption mobisecure Clients mobisecure Servers Pin # Client Access Data Destroyed After Failed Attempts Data is Encrypted Client Bound to Mobile OTP Generated on Every Session Bi-Lateral Authentication Mobile Authenticates To The Server SSL Pipe Encrypted Data Exchange Server Authenticates To The Device Dual Data Encryption Data Encrypted In Storage Tamper Proof Audit Logs Crypto libraries are FIPS validated 18
19 Our Target Markets Direct Payers/Insurers Providers Pharma Government Channel BPO (Healthcare) Medical Devices HIT Companies Development Partners 19
20 Our Healthcare Customers and Partners Care Coordination / Case Management Real Time PHR / Provider Patient Communication Integration & Extension of Existing Mobile Apps Univ of Nebraska (CATT) Medical Decision Support System Initial Platform Testing 20
21 Diversinet Key Takeaways Multi-billion dollar global market: fast-growing, easily addressable Care coordination & patient engagement: foundational to the success of healthcare reform Mobility in healthcare is critical for patient engagement and care coordination. (Last mile for patient activation) Our MobiSecure Platform, along with the experience required to support clients and partners, allows us to successfully navigate this challenging landscape and rapidly mobilize care coordination and patient engagement. Marquee customers and pilot programs driving sales ramp up
Consumer Engagement with Health Information Technology Summary of NeHC Survey Results
Consumer Engagement with Health Information Technology Summary of NeHC Survey Results Background In June 2012, National ehealth Collaborative (NeHC) distributed a survey on consumer engagement with health
More informationRSA SECURE WEB ACCESS FOR HEALTHCARE ENVIRONMENTS
RSA SECURE WEB ACCESS FOR HEALTHCARE ENVIRONMENTS Security solutions for patient and provider access AT A GLANCE Healthcare organizations of all sizes are responding to the demands of patients, physicians,
More informationIdentity: The Key to the Future of Healthcare
Identity: The Key to the Future of Healthcare Chief Medical Officer Anakam Identity Services July 14, 2011 Why is Health Information Technology Critical? Avoids medical errors. Up to 98,000 avoidable hospital
More informationVASCO: Compliant Digital Identity Protection for Healthcare
VASCO: Compliant Digital Identity Protection for Healthcare Compliant Digital Identity Protection for Healthcare The proliferation of digital patient information and a surge in government regulations are
More informationGreenway Marketplace. Hear from Intuit Health and Ringadoc October 22, 2013
Greenway Marketplace Hear from Intuit Health and Ringadoc October 22, 2013 Safe Harbor Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation contains forward-looking
More informationHIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services
HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services How MSPs can profit from selling HIPAA security services Managed Service Providers (MSP) can use the Health Insurance Portability
More informationHealth Information Technology (IT) Simplified
Health Information Technology (IT) Simplified A glossary of all things Health IT Accountable Care Organizations (ACO) - A group of health care providers who give coordinated care, chronic disease management,
More informationOCR/HHS HIPAA/HITECH Audit Preparation
OCR/HHS HIPAA/HITECH Audit Preparation 1 Who are we EHR 2.0 Mission: To assist healthcare organizations develop and implement practices to secure IT systems and comply with HIPAA/HITECH regulations. Education
More informationMOBILE HEALTH AND SECURITY
MOBILE HEALTH AND SECURITY Ten Questions You Should Ask Before Implementing An mhealth Solution By: Mary J. Cronin MedHealthWorld Feb 21, 2011 About the Author Mary J. Cronin, Ph.D. is a Professor of Information
More information3 rd Annual HIMSS Analytics Mobile Survey. February 26, 2014. www.himssanalytics.org
3 rd Annual HIMSS Analytics Mobile Survey February 26, 2014 www.himssanalytics.org 2013 HIMSS Analytics Mobile Technology Survey Final Report February 26, 2014 For the first time in 2011, HIMSS explored
More informationAre You Ready for an OCR Audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. What would you do? Session Objectives
Are You Ready for an OCR Audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS What would you do? Your organization received a certified letter sent from the Office for Civil Rights (OCR)
More informationEmpowering Nurses & Building Trust Through Health IT
Empowering Nurses & Building Trust Through Health IT Helen Caton-Peters, MSN, RN Health Information Privacy & Security Specialist Office of the National Coordinator for Health Information Technology 2
More informationMeaningful Use and Security Risk Analysis
Meaningful Use and Security Risk Analysis Meeting the Measure Security in Transition Executive Summary Is your organization adopting Meaningful Use, either to gain incentive payouts or to avoid penalties?
More informationTurning Patient Portals into Major EHR Assets Edward Fotsch, M.D. Douglas Gentile, M.D.
Turning Patient Portals into Major EHR Assets Edward Fotsch, M.D. Douglas Gentile, M.D. DISCLAIMER: The views and opinions expressed in this presentation are those of the author and do not necessarily
More informationData Breach, Electronic Health Records and Healthcare Reform
Data Breach, Electronic Health Records and Healthcare Reform (This presentation is for informational purposes only and it is not intended, and should not be relied upon, as legal advice.) Overview of HIPAA
More informationHIPAA COMPLIANCE AND DATA PROTECTION. sales@eaglenetworks.it +39 030 201.08.25 Page 1
HIPAA COMPLIANCE AND DATA PROTECTION sales@eaglenetworks.it +39 030 201.08.25 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and EagleHeaps
More informationToday and Tomorrow. Copyright 2011 Allscripts Healthcare Solutions, Inc.
Market Today and Tomorrow Copyright 2011 Allscripts Healthcare Solutions, Inc. Markets Evolve We Must Evolve PM Business Systems EHR Clinical Systems What s Next? Connectivity Analytics No one Care Coordination
More informationHIPAA Requirements and Mobile Apps
HIPAA Requirements and Mobile Apps OCR/NIST 2013 Annual Conference Adam H. Greene, JD, MPH Partner, Washington, DC Use of Smartphones and Tablets Is Growing 2 How Info Sec Sees Smartphones Easily Lost,
More informationNavigating Meaningful Use Stage 2
Navigating Meaningful Use Stage 2 Follow Justin Barnes @HITAdvisor Ask Questions & Follow Today s Conversation #askhit Justin T. Barnes VP, Greenway Medical Technologies Chairman Emeritus, EHR Association
More information3/30/2011. HITECH and Meaningful Use: What it means for patients & families. HITECH and Meaningful Use
HITECH and Meaningful Use: What it means for patients & families Gena Cook CEO, Navigating Cancer Five Major Goals of HITECH Improvements through a transformed delivery system 1 Improve the quality, safety
More informationHow To Use Isalus Officeemr
We know doctors. isalus. isalus gave me exactly what I needed: an EMR solution that was physicianfriendly, customizable and easy to implement, without a big cash outlay or ongoing maintenance headaches.
More informationHIPAA Omnibus Compliance How A Data Loss Prevention Solution Can Help
HIPAA Omnibus Compliance How A Data Loss Prevention Solution Can Help The Health Information Portability and Accountability Act (HIPAA) Omnibus Rule which will begin to be enforced September 23, 2013,
More informationDatto Compliance 101 1
Datto Compliance 101 1 Overview Overview This document provides a general overview of the Health Insurance Portability and Accounting Act (HIPAA) compliance requirements for Managed Service Providers (MSPs)
More informationThe Patient Portal Ecosystem: Engaging Patients while Protecting Privacy and Security
The Patient Portal Ecosystem: Engaging Patients while Protecting Privacy and Security NCHICA 11th Academic Medical Center Security & Privacy Conference, June 22-24, 2015 Panel Leader: Panelists: Amy Leopard,
More informationSecuring Patient Portals. What You Need to Know to Comply With HIPAA Omnibus and Meaningful Use
Securing Patient Portals What You Need to Know to Comply With HIPAA Omnibus and Meaningful Use September 2013 Table of Contents Abstract... 3 The Carrot and the Stick: Incentives and Penalties for Securing
More informationHow to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization
How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization Alertsec offers Cloud Managed - Policy Controlled - Security Modules for Ensuring Compliance at the Endpoints Contents
More informationehealth and Health Information Exchange in Minnesota
ehealth and Health Information Exchange in Minnesota Connecting Minnesota Providers at the Point of Care Lisa Moon, RN Director Privacy Security and HIE Oversight Program Office of Health Information Technology
More informationSomansa Data Security and Regulatory Compliance for Healthcare
Somansa White Paper Somansa Data Security and Regulatory Compliance for Healthcare How Somansa can protect ephi- electronic patient health information and meet the requirements for healthcare compliances,
More informationData Analytics: The Next Wave in Health IT. Big Data Conference June 17, 2014. Robert Wah, MD. Global Chief Medical Officer CSC
Data Analytics: The Next Wave in Health IT Big Data Conference June 17, 2014 Robert Wah, MD Global Chief Medical Officer CSC 1 Building a New Health Care System Healthcare is an industry in transition.
More informationDirect Secure Messaging: Improving the Secure and Interoperable Exchange of Health Information
Direct Secure Messaging: Improving the Secure and Interoperable Exchange of Health Information Within the healthcare industry, the exchange of protected health information (PHI) is governed by regulations
More informationRaymond James' 31st Annual Institutional Investors Conference
Raymond James' 31st Annual Institutional Investors Conference Philip M. Pead, President and Chief Executive Officer Chris E. Perkins, Executive Vice President and Chief Financial Officer 0 Disclosure Statements
More informationEGUIDE BRIDGING THE GAP BETWEEN HEALTHCARE & HIPAA COMPLIANT CLOUD TECHNOLOGY
Bridging The Gap Between Healthcare & Hipaa Compliant Cloud Technology and outsource computing resources to external entities, would provide substantial relief to healthcare service providers. Data stored
More information2/9/2012. 2012 HIPAA Privacy and Security Audit Readiness. Table of contents
2012 HIPAA Privacy and Security Audit Readiness Mark M. Johnson National HIPAA Services Director Table of contents Page Background 2 Regulatory Background and HITECH Impacts 3 Office of Civil Rights (OCR)
More informationRevenue Cycle Management + Value-Based Medicine
Revenue Cycle Management + Value-Based Medicine Presented by: Justin T. Barnes, VP of Industry & Government Affairs Bryan Koch, VP of Revenue Cycle Solutions Safe harbor Safe harbor statement under the
More informationHIPAA COMPLIANCE AND
INTRONIS CLOUD BACKUP & RECOVERY HIPAA COMPLIANCE AND DATA PROTECTION CONTENTS Introduction 3 The HIPAA Security Rule 4 The HIPAA Omnibus Rule 6 HIPAA Compliance and Intronis Cloud Backup and Recovery
More informationMobile Computing in Healthcare: Privacy and Security Considerations and Available Resources
Mobile Computing in Healthcare: Privacy and Security Considerations and Available Resources HOA Mobility Conference Sept 27, 2012 Speaker Lisa A. Gallagher, BSEE, CISM, CPHIMS Senior Director, Privacy
More informationOECD Paris 26 October 2011
OECD Paris 26 October 2011 Verizon's Network 2020 Vision Paul Callaghan Vice President Global Strategic Services 2011 Verizon. All Rights Reserved. PROPRIETARY STATEMENT This document and any attached
More informationHIPAA for HIT and EHRs. Latest on Meaningful Use and EHR Certification: For Privacy and Security Professionals
HIPAA for HIT and EHRs Latest on Meaningful Use and EHR Certification: For Privacy and Security Professionals Donald Bechtel, CHP Siemens Health Services Patient Privacy Officer Fair Information Practices
More informationWhat s New with HIPAA? Policy and Enforcement Update
What s New with HIPAA? Policy and Enforcement Update HHS Office for Civil Rights New Initiatives Precision Medicine Initiative (PMI), including Access Guidance Cybersecurity Developer portal NICS Final
More informationArt Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches
Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches Speakers Phillip Long CEO at Business Information Solutions Art Gross President & CEO of HIPAA
More informationEnsuring HIPAA Compliance with eztechdirect Online Backup and Archiving Services
Ensuring HIPAA Compliance with eztechdirect Online Backup and Archiving Services Introduction Patient privacy continues to be a chief topic of concern as technology continues to evolve. Now that the majority
More informationWISHIN Pulse Statement on Privacy, Security and HIPAA Compliance
WISHIN Pulse Statement on Privacy, Security and HIPAA Compliance SEC-STM-072014 07/2014 Contents Patient Choice... 2 Security Protections... 2 Participation Agreement... 2 Controls... 3 Break the Glass...
More informationHIPAA Compliance Guide
HIPAA Compliance Guide Important Terms Covered Entities (CAs) The HIPAA Privacy Rule refers to three specific groups as covered entities, including health plans, healthcare clearinghouses, and health care
More informationHealthcare Technology Trends
Healthcare Technology Trends Complex System With Various Stakeholders 2 Source: IBM Care Coordination U.S. Healthcare System At A Glance: What Is Driving The Cost Of Healthcare? Aging Population Chronic
More informationThe Road to Robust Use of HIT: Navigating Meaningful Use and Beyond. by Jennifer McAnally, tnrec Director
The Road to Robust Use of HIT: Navigating Meaningful Use and Beyond by Jennifer McAnally, tnrec Director Presentation Objectives Participants will be able to: Verbalize the role Regional Extension Centers
More informationHITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?
HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? Introduction This material is designed to answer some of the commonly asked questions by business associates and other organizations
More informationAgenda. Government s Role in Promoting EMR Technology. EMR Trends in Health Care. What We Hear as Reasons to Not Implement and EMR
Agenda A 360-Degree Approach to EMR Implementation Environmental Overview Information on the HITECH Stimulus Opportunities Hospitals, Physicians and Interoperability Preparing for an EMR Implementation
More informationStructuring Your ACO Business Model To Achieve Success in a Post Acute Continuum. 2011 Annual Summit of the Executive Operators Forum
Structuring Your ACO Business Model To Achieve Success in a Post Acute Continuum 2011 Annual Summit of the Executive Operators Forum Healthcare Reform and What it Means to You Loren Claypool CIO, Extendicare
More informationRedefining IT for federal healthcare agencies
Redefining IT for federal healthcare agencies Redefining IT for federal healthcare agencies Virtualization solutions for clinicians and patients: Anytime, anywhere, on any device Executive summary These
More informationThe Total Telehealth Solution
The Total Telehealth Solution Overview of Telehealth Module 1 Overview of Telehealth/Telemedicine Telemedicine began over 40 years ago. Formally defined; telemedicine is the use of medical information,
More informationThe Impact of HIPAA and HITECH
The Health Insurance Portability & Accountability Act (HIPAA), enacted 8/21/96, was created to protect the use, storage and transmission of patients healthcare information. This protects all forms of patients
More informationDell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations
Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations Inside ü Tips for deploying or expanding BYOD programs while remaining
More informationHOW TO ACCELERATE ADOPTION OF ELECTRONIC HEALTH RECORDS
HOW TO ACCELERATE ADOPTION OF ELECTRONIC HEALTH RECORDS Build a thoughtful IT strategy that includes the EHR to enable growth Leverage virtualization and cloud computing to reduce cost and increase IT
More informationMaintaining the Privacy of Health Information in Michigan s Electronic Health Information Exchange Network. Draft Privacy Whitepaper
CHARTERED BY THE MICHIGAN HEALTH INFORMATION NETWORK SHARED SERVICES MIHIN OPERATIONS ADVISORY COMMITTEE (MOAC) PRIVACY WORKING GROUP (PWG) Maintaining the Privacy of Health Information in Michigan s Electronic
More informationIntelligent Vendor Risk Management
Intelligent Vendor Risk Management Cliff Baker, Managing Partner, Meditology Services LeeAnn Foltz, JD Compliance Resource Consultant, WoltersKluwer Law & Business Agenda Why it s Needed Regulatory Breach
More informationHealthcare Delivery. Transforming. through Mobility Solutions. A Solution White Paper - version 1.0
Transforming Healthcare Delivery through Mobility Solutions A Solution White Paper - version 1.0 HTC Global Services HTC Towers, No. 41, GST Road, Guindy, Chennai - 600 032, India. Ph: +91 44 4345 3500
More informationEvolving to an ACO: Better Patient Outcomes and Lower Expenditures
Sponsored By: Evolving to an ACO: Better Patient Outcomes and Lower Expenditures Tom Deas, Jr., MD Board Member, North Texas Specialty Physicians (NTSP) Chief Medical Officer, Sandlot, LLC Presenter Thomas
More informationCreating the Improved Standard in Healthcare Sterile Reprocessing
Creating the Improved Standard in Healthcare Sterile Reprocessing Corporate Presentation May 2016 Important Cautions Regarding Forward Looking Statements and Other Disclosures The statements in this presentation
More informationReady for an OCR Audit? Will you pass or fail an OCR security audit? Tom Walsh, CISSP
Ready for an OCR Audit? Will you pass or fail an OCR security audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS What would you do? You receive a phone call from your CEO. They just received
More informationHealth Care - Meaningful Use of HITECH
Planning for the Stimulus - Achieving Meaningful Use of Healthcare IT John D. Halamka MD CIO, Harvard Medical School and Beth Israel Deaconess Medical Center My Definition of Meaningful Use Processes and
More informationAchieving meaningful use of healthcare information technology
IBM Software Information Management Achieving meaningful use of healthcare information technology A patient registry is key to adoption of EHR 2 Achieving meaningful use of healthcare information technology
More informationDisclosure of Conflict of Interest
Challenging the Status Quo of Telehealth in Policy, Technology, & Clinical Care H. Stephen Lieber President and Chief Executive Officer HIMSS Disclosure of Conflict of Interest No Conflict of Interest
More informationEHR Glossary of Terms
EHR Glossary of Terms American Recovery and Reinvestment Act of 2009 (ARRA): budget bill enacted by Congress and signed by President Obama on February 17, 2009 that was designed to provide an economic
More informationSuccessful Strategies for Implementing SaaS/Cloud Solutions in Healthcare
Successful Strategies for Implementing SaaS/Cloud Solutions in Healthcare WHITEPAPER Executive Summary As healthcare organizations struggle with competing priorities such as HITECH/ARRA, Meaningful option
More informationDecrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use
Click to edit Master title style Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use Andy Petrovich, MHSA, MPH M-CEITA / Altarum Institute April 8, 2015 4/8/2015 1 1 Who is M-CEITA?
More informationSecure HIPAA Compliant Cloud Computing
BUSINESS WHITE PAPER Secure HIPAA Compliant Cloud Computing Step-by-step guide for achieving HIPAA compliance and safeguarding your PHI in a cloud computing environment Step-by-Step Guide for Choosing
More informationMeaningful Use Gap Analysis and Planning Engineering a Hit!
Meaningful Use Gap Analysis and Planning Engineering a Hit! Cheyenne Thomas Inland Northwest Health Services/Information Resource Management INHS/IRM Introduction Meet the Band INHS/IRM Collaborative Delivery
More informationTrust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits
HIPAA Breaches, Security Risk Analysis, and Audits Derrick Hill Senior Health IT Advisor Kentucky REC Why Does Privacy and Security Matter? Trust Who Must Comply with HIPAA Rules? Covered Entities (CE)
More informationTHE ROLE OF HEALTH INFORMATION TECHNOLOGY IN PATIENT-CENTERED CARE COLLABORATION. 2012 Louisiana HIPAA & EHR Conference Presenter: Chris Williams
THE ROLE OF HEALTH INFORMATION TECHNOLOGY IN PATIENT-CENTERED CARE COLLABORATION 2012 Louisiana HIPAA & EHR Conference Presenter: Chris Williams Agenda Overview Impact of HIT on Patient-Centered Care (PCC)
More informationHIPAA and the HITECH Act Privacy and Security of Health Information in 2009
HIPAA and the HITECH Act Privacy and Security of Health Information in 2009 What is HIPAA? Health Insurance Portability & Accountability Act of 1996 Effective April 13, 2003 Federal Law HIPAA Purpose:
More informationDecember 2014. Federal Employees Health Benefits (FEHB) Program Report on Health Information Technology (HIT) and Transparency
December 2014 Federal Employees Health Benefits (FEHB) Program Report on Health Information Technology (HIT) and Transparency I. Background Federal Employees Health Benefits (FEHB) Program Report on Health
More informationCA Technologies Healthcare security solutions:
CA Technologies Healthcare security solutions: Protecting your organization, patients, and information agility made possible Healthcare industry imperatives Security, Privacy, and Compliance HITECH/HIPAA
More informationSecurity Considerations
Concord Fax Security Considerations For over 15 years, Concord s enterprise fax solutions have helped many banks, healthcare professionals, pharmaceutical companies, and legal professionals securely deliver
More informationNorth Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP
Mobile Device Management Risky Business in Healthcare North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP Agenda HIPAA/HITECH & Mobile Devices Breaches Federal
More informationHIPAA Compliance Guide
HIPAA Compliance Guide Important Terms Covered Entities (CAs) The HIPAA Privacy Rule refers to three specific groups as covered entities, including health plans, healthcare clearinghouses, and health care
More informationLeveraging Data Management to Empower Patients
CDW HEALTHCARE WE GET IT Leveraging Data Management to Empower Patients I.T. SOLUTIONS DATA MANAGEMENT: ACCESS, OPTIMIZATION, SECURITY PATIENT INFORMATION AND PORTALS CLOUD ADOPTION, STRATEGY AND SECURITY
More informationA CIO Survey of HIT Adoption Trends
An Optum Institute for Sustainable Health Issue Brief A CIO Survey of HIT Adoption Trends Summary As we enter 2012, hospitals have made impressive gains in the uptake of electronic medical records, participation
More informationStraight from the Source: HHS Tools for Avoiding Some of the Biggest HIPAA Mistakes
Watch the Replay Straight from the Source: HHS Tools for Avoiding Some of the Biggest HIPAA Mistakes FairWarning Executive Webinar Series May 20, 2014 #AnytimeAudit Today s Panel Laura E. Rosas, JD, MPH
More informationPrivacy and Confidentiality of Behavioral Health Data in EHRs
Privacy and Confidentiality of Behavioral Health Data in EHRs Maureen Boyle, PhD Lead Public Health Advisor, Health Information Technology Center for Substance Abuse Treatment Substance Abuse and Mental
More informationA PRACTICAL GUIDE TO USING ENCRYPTION FOR REDUCING HIPAA DATA BREACH RISK
A PRACTICAL GUIDE TO USING ENCRYPTION FOR REDUCING HIPAA DATA BREACH RISK Chris Apgar Andy Nieto 2015 OVERVIEW How to get started assessing your risk What your options are how to protect PHI What s the
More informationEnsuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services
Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services Introduction Patient privacy has become a major topic of concern over the past several years. With the majority of
More informationOpportunities for Medicaid to Invest in HIT. Shannah Koss, Principal Koss on Care LLC
Opportunities for Medicaid to Invest in HIT Shannah Koss, Principal Koss on Care LLC Topics Key HIT components in the ARRA What is happening in state Medicaid programs today? Challenges and opportunities
More informationMobile Computing in Healthcare: Privacy and Security Considerations and Available Resources
Mobile Computing in Healthcare: Privacy and Security Considerations and Available Resources NIST/OCR Conference June 6, 2012 Speaker Lisa A. Gallagher, BSEE, CISM, CPHIMS Senior Director, Privacy and Security
More informationHIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing
HIPAA Omnibus Rule Practice Impact Kristen Heffernan MicroMD Director of Prod Mgt and Marketing 1 HIPAA Omnibus Rule Agenda History of the Rule HIPAA Stats Rule Overview Use of Personal Health Information
More informationDIVURGENT S ACORM FRAMEWORK
white paper DIVURGENT S ACORM FRAMEWORK The Right IT Infrastructure for ACOs written by David Shiple CMS Is Driving ACO IT Planning After reading the final rule for Medicare Accountable Care Organizations
More informationThe recently enacted Health Information Technology for Economic
Investments in Health Information Technology Driven by HITECH Act Marcy Wilder, Donna A. Boswell, and BarBara Bennett The authors review provisions of the new stimulus package that authorize billions of
More informationCHIS, Inc. Privacy General Guidelines
CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified
More informationHealthcare Compliance Solutions
Healthcare Compliance Solutions Let Protected Trust be your Safe Harbor In the Health Information Technology for Economic and Clinical Health Act of 2009 (HITECH), the U.S. Department of Health and Human
More informationHealth Informatics. Jean Johnson, PhD, RN, FAAN Dean and Professor George Washington University
Health Informatics Jean Johnson, PhD, RN, FAAN Dean and Professor George Washington University This program generously funded by the Robert Wood Johnson Foundation Health Informatics Use information and
More informationHealthcare to Go: Securing Mobile Healthcare Data
Healthcare to Go: Securing Mobile Healthcare Data Lee Kim, Esq. SANS Mobile Device Security Summit 2013 May 30, 2013 Copyright 2013 Lee Kim 1 Why Information Security is Essential for Healthcare Safeguard
More informationClinical Workflow Solutions EXTENSION HealthAlert
Clinical Workflow Solutions EXTENSION HealthAlert NEC Corporation of America necam.com EXTENSION s suite of solutions unites the various clinical information systems in a medical environment to deliver
More informationCAN CLOUD COMPUTING HELP FIX HEALTH CARE?
By Scott Donahue Vice President TripleTree, LLC August / September 2010 Clound and Health Care Table of Contents CAN CLOUD COMPUTING HELP FIX HEALTH CARE? 13 ew topics have dominated the political news
More informationThe Do s and Don ts of Medical Device integration
Advances in Wireless Technologies for Healthcare The Do s and Don ts of Medical Device integration Shahid N. Shah, CEO Visit Dräger and Shahid at HIMSS 2012 Dräger Booth on the main floor: Booth #5734
More informationEthics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015
Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015 Katherine M. Layman Cozen O Connor 1900 Market Street Philadelphia, PA 19103 (215) 665-2746
More informationEnsuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services
Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services 1 Contents 3 Introduction 5 The HIPAA Security Rule 7 HIPAA Compliance & AcclaimVault Backup 8 AcclaimVault Security and
More informationU.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC)
U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC) Security Risk Assessment (SRA) Tool User Guide Version Date: March 2014
More informationPatient Controlled Health Records Standards and Technical Track
Patient Controlled Health Records Standards and Technical Track Keith W. Boone Lead Interoperability System Designer - GE Healthcare Co-chair IHE Patient Care Coordination TC Member IHE IT Infrastructure
More informationFour-step plan for HIPAA-compliant electronic communications. A road map for secure clinical communications
Four-step plan for HIPAA-compliant electronic communications A road map for secure clinical communications September 2014 Contents 1. Perform a formal risk analysis 3 2. Develop a risk management strategy
More information