Legacy Archiving How many lights do you leave on? September 14 th, 2015

Size: px
Start display at page:

Download "Legacy Archiving How many lights do you leave on? September 14 th, 2015"

Transcription

1 Legacy Archiving How many lights do you leave on? September 14 th,

2 Introductions Wendy Laposata, Himforma(cs Tom Chase, Cone Health 2

3 About Cone Health More than 100 loca=ons 6 hospitals, 3 ambulatory care centers, 3 outpa=ent surgery centers, 4 urgent care centers, over 95 physician prac=ces 1,300 physicians 11,000 employees 1,273 beds Primary Service Area Cone Health 3

4 Objectives 1) Outline the major business objec=ves for implemen=ng a data reten=on program 2) Describe the Legacy Archive Framework 3) Describe the specific ac=vi=es that have led to an improved applica=on porqolio. 4

5 Legacy Archiving I. Why? Outline the major business objectives for implementing a data retention program. 5

6 Legacy Archive Background Create a framework focused on legacy por9olio efforts to either decommission or archive legacy applica(ons that are no longer needed for opera(onal purposes. The house- wide EHR implementa(on typically drives this effort. Archive (retain to access) Legal data reten=on =me requirements exist for the data within the applica=on. Internal recommenda=ons require us to keep the data. Decommission (permanently destroy) Legal reten=on requirements have been met, the data is no longer needed. The data does not have legal requirements to retain. I. Why? 6

7 Objectives Reduce Costs Applica=on maintenance, hardware and resource costs over mul=ple applica=ons likely exist as opera=onal expenses that can be reduced. Efforts to con=nue keeping the lights on get expensive! Meet Legal Reten1on Requirements State and federal reten=on requirements are likely in place that could lead to fines if your organiza=on is non- compliant. Audits are also a key reason to ensure access to legacy data. Release of Informa=on (HIM) Minimize Security Risks Minimizing loca=ons of data as soon as it is no longer required for opera=onal purposes helps minimize the risk of security breaches. Hardwire Enterprise Process Implement data reten=on standards for enterprise processes to ensure steps to decommission are consistent throughout the organiza=on. I. Why? 7

8 Retention Requirements There are mul=ple sources that can be leveraged to generate standard policy and procedure. Per AHIMA, there is no single standardized record reten=on schedule that organiza=ons and providers must follow. Instead, a variety of reten=on requirements must be reviewed to create a compliant reten=on program. I. Why? 8

9 Retention Requirement Resources I. Why? 9

10 Retention Requirement Resources I. Why? Source: hcp:// 10

11 Legacy Archiving II. What? Describe the framework that leveraged. 11

12 Data Retention Governance Establish Project Governance and Ongoing Support Structure Descrip=on: Develop the management framework within which Data Reten=on and Legacy Applica=on related decisions are made and support is provided on an ongoing basis. This provides hospitals with a structured approach to conduct ini=al Legacy Applica=on remedia=on ac=vi=es as well as future data reten=on efforts. Benefits: Provides a logical and repeatable decision- making framework. Iden=fies who in the organiza=on is responsible for overall and day- to- day Data Reten=on decisions and ac=vi=es. Helps IT provide more consistent response and support related to Legacy Applica=ons. II. What? 12

13 Data Retention Governance Finance Opera=ons Informa=on Services HIM Risk Legal Purpose Group Decision Efforts Vendor Strategy Priori=za=on of applica=ons Ensure policy and standards are followed Legacy applica=on related decisions (Who owns the data?) Applica=on valida=on oversight Organiza=on & Regula=on Awareness II. What? 13

14 Governance & Support Establish Ongoing Governance and Support Structure Oversight Data Reten=on Steering CommiJee Project Management Communica=on Policy & Procedure Business Sponsor Data Reten=on Program Management Exis=ng Forums Legacy Applica=on Vendor Applica=on SME Valida=on Users Applica=on Users (Training) IT Security DBA Data Reten=on Vendor II. What? 14 App Support

15 Vendor Strategy & Approach Single Vendor Mul1ple Vendors Enterprise Portal for all legacy applica=ons ( one stop ) Limited training Loss of intellectual property over =me Ease of use/support Higher return on investment Lower Opera=onal Costs Disparate Solu=ons Technical Support Impacts Higher administra=ve costs II. What? 15

16 Cone Health Archiving Summary Cone s Experience MediQuant was selected as the archiving vendor One applica=on GE/IDX Centricity Business, Ac=ve A/R 7 month project dura=on Hosted remotely ~.25 FTE =me commitment for internal IT Analyst ~.5 FTE Program Management, strategy, applica=on porqolio, future archive planning II. What? 16

17 Cone GE/IDX Timeline Nov 2014 Dec 2014 Jan 2015 Feb 2015 March 2015 Sample Extract Provided Sample Extract Loaded Sample Extract Validated Staging Period (View Only) Final Extract Provided GE/IDX Centricity Business (Physician) BAR PA & GE Centricity (Hospital) HPA PA Final Extract Loaded Final Extract Validated Go- Live 17

18 IT Analyst Role IT Department Coordina1on Liaison between end users, vendor, PM, IT department, contractors Network & security teams, Ac=ve Directory Archiving Applica1on SME Assist with valida=on Determine end user roles and security Fulfill report requests for users User administra=on up front and on- going Interim end user support Transi=on to business unit resource aner stabiliza=on is complete II. What? 18

19 Legacy Archiving III. How? Describe the speci;ic activities that have led to an improved application portfolio. 19

20 Prioritization Drivers Business opera=onal needs and =ming impacts Return on Investment Vendor Maintenance & Contractual requirements Impacts (cancella=on/no=ce requirements) Vendor applica=on confidence level Sonware not supported factors, sonware stability Infrastructure Concerns III. How? 20

21 Examples of Data Sources Op=cal Drives Applica=ons that will require formal archiving Unsupported Applica=ons Paper Charts Data PorNolio Unsupported Servers e.g. Win Server 2003 III. How? 21

22 Legacy Portfolio Components A well documented legacy applica(on por9olio is vital to the success of the program. Data Element Examples Applica=on Site Current Maintenance Vendor Fees (Annual) Addi=onal Annual Costs (Hardware, Staffing) Vendor Contract Requirements (Cancela=on) Type of Data (PM, EMR, Images) Data Timeframe Data Popula=on Reten=on Requirements Accounts Receivable Status (if PM) Technical Considera=ons Opera=onal Considera=ons Contact(s) Applica=on Name Clinic A, geographic loca=on $XX,XXX $X,XXX Descrip=on/Example 90 day no=ce prior to annual renewal PM & EMR Feb 2007 through Fall 2011 e.g. Adult, Minor, Ob/Gyn 7 years (from 2011) $XX remaining balance ac=vely being collected Hardware is unstable, not connected to the network, storage space is limited, physically located in the clinic Clinic site will move into new building over the next 6 months, prefer not to move the system due to stability issues. Primary contact name for informa=on provided. III. How? 22

23 Vendor Storage Terminology Tier Examples Interac=ve/Dynamic: Ac=ve A/R and bad debt, pos=ng payments/adjustments/account and line items, claims update, field level edi=ng, Agency exports/imports Sta=c: Data records viewed on demand either on screen or through report genera=on Vault: Full implementa=on, Front End GUI developed Straight to Vault: No GUI, validate & vault III. How? 23

24 Some Lessons Learned Enterprise Governance is an absolute must- have. There are lots of decisions! Commence archiving projects ASAP, while SMEs are s=ll available. All stakeholders need to be at the table to define requirements. Gathering requirements from legacy applica=on end- users is cri=cal. There are a small number of healthcare specific archiving vendors in this space currently, more entering the market every month. No one vendor is going to have all of the skills necessary to convert all your disparate applica=ons, there will be some ramp- up on some applica=ons. Incumbent vendors may provide archiving services. Watch out for proprietary and encrypted databases. Keep watching your converted legacy applica=ons, you may be able to vault or turn them off at some point post- conversion. Strong Project Management is required. III. How? 24

25 Questions & Open Discussion Wendy Laposata Himforma=cs Tom Chase Cone Health 25

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define

More information

IT Change Management Process Training

IT Change Management Process Training IT Change Management Process Training Before you begin: This course was prepared for all IT professionals with the goal of promo9ng awareness of the process. Those taking this course will have varied knowledge

More information

Case Study. The SACM Journey at the Ontario Government

Case Study. The SACM Journey at the Ontario Government Case Study The SACM Journey at the Ontario Government Agenda Today s Objec=ves The Need for SACM Our SACM Journey Scope and Governance Process Ac=vi=es Key Process Roles Training and Measurement Lessons

More information

FTC Data Security Standard

FTC Data Security Standard FTC Data Security Standard The FTC takes the posi6on (Being tested now in li6ga6on) that Sec6on 5 of the FTC Act requires Reasonable Security under the circumstances: that companies have reasonable controls

More information

Council Monitoring & Assessment Program Development

Council Monitoring & Assessment Program Development Council Monitoring & Assessment Program Development Steve Giordano & Mark Monaco, Na9onal Oceanic & Atmospheric Administra9on Greg Steyer & Mike Lee, U.S. Geological Survey Alyssa Dausman & Jessica Henkel,

More information

PROJECT PORTFOLIO SUITE

PROJECT PORTFOLIO SUITE ServiceNow So1ware Development manages Scrum or waterfall development efforts and defines the tasks required for developing and maintaining so[ware throughout the lifecycle, from incep4on to deployment.

More information

CSER & emerge Consor.a EHR Working Group Collabora.on on Display and Storage of Gene.c Informa.on in Electronic Health Records

CSER & emerge Consor.a EHR Working Group Collabora.on on Display and Storage of Gene.c Informa.on in Electronic Health Records electronic Medical Records and Genomics CSER & emerge Consor.a EHR Working Group Collabora.on on Display and Storage of Gene.c Informa.on in Electronic Health Records Brian Shirts, MD, PhD University of

More information

Phone Systems Buyer s Guide

Phone Systems Buyer s Guide Phone Systems Buyer s Guide Contents How Cri(cal is Communica(on to Your Business? 3 Fundamental Issues 4 Phone Systems Basic Features 6 Features for Users with Advanced Needs 10 Key Ques(ons for All Buyers

More information

Online Enrollment Op>ons - Sales Training. 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1

Online Enrollment Op>ons - Sales Training. 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1 Online Enrollment Op>ons - Sales Training 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1 Agenda Understand Why This is Important Enrollment Op>ons Available EDI Blues Enroll

More information

Business Analysis Standardization A Strategic Mandate. John E. Parker CVO, Enfocus Solu7ons Inc.

Business Analysis Standardization A Strategic Mandate. John E. Parker CVO, Enfocus Solu7ons Inc. Business Analysis Standardization A Strategic Mandate John E. Parker CVO, Enfocus Solu7ons Inc. Agenda What is Business Analysis? Why Business Analysis is Important? Why Standardization of Business Analysis

More information

Shannon Rykaceski Director of Opera4ons CCFHCC

Shannon Rykaceski Director of Opera4ons CCFHCC Shannon Rykaceski Director of Opera4ons CCFHCC PRESENTER BIO Shannon Salicce Rykaceski Director of Opera4ons for the Catholic Chari4es Free Health Care Center (CCFHCC), located in PiCsburgh, PA. Prior

More information

HIPAA Breaches, Security Risk Analysis, and Audits

HIPAA Breaches, Security Risk Analysis, and Audits HIPAA Breaches, Security Risk Analysis, and Audits Derrick Hill Senior Health IT Advisor Kentucky REC What cons?tutes PHI? HIPAA provides a list of 18 iden?fiers that cons?tute PHI. Any one of these iden?fiers

More information

An Introduc+on to CloudPrime

An Introduc+on to CloudPrime TM An Introduc+on to CloudPrime Secure messaging pla/orm to protect pa2ent privacy and uphold HIPAA/HITECH regula2on Mari Tangredi, CloudPrime 1 CloudPrime Company Overview! Headquartered in San Francisco,

More information

Informa.on Systems in Organiza.ons

Informa.on Systems in Organiza.ons Informa.on Systems in Organiza.ons MIS 2101 Week 7 / Chapter 7 Enhancing Business Processes Using Enterprise Informa.on Systems Photo: Objet Mathema+que by Man Ray, 1934 Chapter 7 Learning Objec.ves Core

More information

San Jacinto College Banner & Enterprise Applica5on Review Task Force Report. November 01, 2011 FINAL

San Jacinto College Banner & Enterprise Applica5on Review Task Force Report. November 01, 2011 FINAL San Jacinto College Banner & Enterprise Applica5on Review Task Force Report November 01, 2011 FINAL 1 Content Review goal and approach 3 Barriers to effec5ve use of Banner: Consultant observa5ons 10 Consultant

More information

Project Management Introduc1on

Project Management Introduc1on Project Management Introduc1on Session 1 Part I Introduc1on By Amal Le Collen, PMP Dr. Lauren1u Neamtu, PMP Session outline 1. PART I: Introduc1on 1. The Purpose of the PMBOK Guide 2. What is a project?

More information

Top Practices in Health IT Compliance. Data Breach & Leading Program Prac3ces

Top Practices in Health IT Compliance. Data Breach & Leading Program Prac3ces Top Practices in Health IT Compliance Data Breach & Leading Program Prac3ces Overview Introduc3on to ID Experts & Secure Digital Solu3ons Healthcare Data Breach Trends & Drivers Data Incident Management

More information

Managed Services. An essen/al set of tools for today's businesses

Managed Services. An essen/al set of tools for today's businesses Managed Services An essen/al set of tools for today's businesses Manage your enterprise better with a holis/c solu/on to all your IT worries only at Infolob What are Managed Services? By far the most cu/ng

More information

PES Has The Sustainable Solu2on For Chronic Care Management

PES Has The Sustainable Solu2on For Chronic Care Management PES Has The Sustainable Solu2on For Chronic Care Management Empowering pa2ents to lead the management of their chronic diseases through a proven and effec2ve model of collabora2on with clinicians and caregivers.

More information

Breakout A: From Paper to EMR- Preparing for the Transi;on

Breakout A: From Paper to EMR- Preparing for the Transi;on Quality Counts! Breakout A: From Paper to EMR- Preparing for the Transi;on The Maine Regional Extension Center Forum Breakout Objec

More information

Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework

Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework Steven Hunt Enterprise IT Governance Strategist NASA Ames Research Center Michael

More information

Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko

Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning MIS5206 Week 8 In the News Readings In Class Case Study BCP/DRP Test Taking Tip Quiz In the News Discuss items

More information

Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional.

Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional. Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional. 163 Stormont Street New Concord, OH 43762 614-286-7895

More information

Disaster Recovery Planning and Implementa6on. Chris Russel Director, IT Infrastructure and ISO Compu6ng and Network Services York University

Disaster Recovery Planning and Implementa6on. Chris Russel Director, IT Infrastructure and ISO Compu6ng and Network Services York University Disaster Recovery Planning and Implementa6on Chris Russel Director, IT Infrastructure and ISO Compu6ng and Network Services York University Agenda Background for York s I.T. Disaster Recovery Planning

More information

Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts. October 3, 2013

Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts. October 3, 2013 Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts October 3, 2013 Agenda 1. Introductions 2. Higher Ed Industry Trends 3. Technology Trends in Higher Ed

More information

Syndromic Surveillance BioSense Onboarding in Arizona

Syndromic Surveillance BioSense Onboarding in Arizona Syndromic Surveillance BioSense Onboarding in Arizona Sara Imholte, Stanley Kotey, Manoj Shaw & Krystal Collier Electronic Disease Surveillance Program April 1, 2015 Introduc*ons Background Onboarding

More information

Privileged Administra0on Best Prac0ces :: September 1, 2015

Privileged Administra0on Best Prac0ces :: September 1, 2015 Privileged Administra0on Best Prac0ces :: September 1, 2015 Discussion Contents Privileged Access and Administra1on Best Prac1ces 1) Overview of Capabili0es Defini0on of Need 2) Preparing your PxM Program

More information

Bank of America Security by Design. Derrick Barksdale Jason Gillam

Bank of America Security by Design. Derrick Barksdale Jason Gillam Bank of America Security by Design Derrick Barksdale Jason Gillam Costs of Correcting Defects 2 Bank of America The Three P s Product Design and build security into our product People Cultivate a security

More information

Graduate Systems Engineering Programs: Report on Outcomes and Objec:ves

Graduate Systems Engineering Programs: Report on Outcomes and Objec:ves Graduate Systems Engineering Programs: Report on Outcomes and Objec:ves Alice Squires, alice.squires@stevens.edu Tim Ferris, David Olwell, Nicole Hutchison, Rick Adcock, John BrackeL, Mary VanLeer, Tom

More information

Big Data. The Big Picture. Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas

Big Data. The Big Picture. Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas Big Data The Big Picture Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas What is Big Data? Big Data gets its name because that s what it is data that

More information

Configura)on Management Process and Environment MACS Review 1 February 5th, 2010 Roland Moser

Configura)on Management Process and Environment MACS Review 1 February 5th, 2010 Roland Moser Configura)on Management Process and Environment MACS Review 1 February 5th, 2010 Roland Moser R. Gutleber 1 Goals Configura)on Management (CM) is the implementa)on and the execu)on of processes and procedures

More information

Mobility in the Modern Factory. Discussion of Mobile Adop7on for the Factories of the Future

Mobility in the Modern Factory. Discussion of Mobile Adop7on for the Factories of the Future Mobility in the Modern Factory Discussion of Mobile Adop7on for the Factories of the Future Talking Points History Lesson The Reasons for Going Mobile Mobile Infrastructure Mobile Device Security BYOD

More information

Exchange of experience from a SuccessFactors LMS Implementa9on

Exchange of experience from a SuccessFactors LMS Implementa9on Exchange of experience from a SuccessFactors LMS Implementa9on Seen from a user perspective Hanne Vasshus Ask Competency Management Cau9onary Statement The following presenta9on includes forward- looking

More information

Performance Management. Ch. 8 The Strategy Implementa9on Mechanism. Chiara Demar9ni UNIVERSITY OF PAVIA. mariachiara.demar9ni@unipv.

Performance Management. Ch. 8 The Strategy Implementa9on Mechanism. Chiara Demar9ni UNIVERSITY OF PAVIA. mariachiara.demar9ni@unipv. UNIVERSITY OF PAVIA! Performance Management Ch. 8 The Strategy Implementa9on Mechanism Chiara Demar9ni mariachiara.demar9ni@unipv.it Master in Interna+onal Business and Economics! Defini9on Strategy implementa9on

More information

Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies

Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step Arbela Technologies Why Upgrade? What to do? How to do it? Tools and templates Agenda Sure Step 2012 Ax2012 Upgrade specific steps Checklist

More information

Managing Social Media as Official Records

Managing Social Media as Official Records Managing Social Media as Official Records Archives & Records: Ensuring Access COSA, NAGARA, SAA Joint Annual Mee?ng August 10-16, 2014 Washington, D.C. Geof Huth, Director of Government Records Services,

More information

Project Por)olio Management

Project Por)olio Management Project Por)olio Management Important markers for IT intensive businesses Rest assured with Infolob s project management methodologies What is Project Por)olio Management? Project Por)olio Management (PPM)

More information

Data Warehousing. Yeow Wei Choong Anne Laurent

Data Warehousing. Yeow Wei Choong Anne Laurent Data Warehousing Yeow Wei Choong Anne Laurent Databases Databases are developed on the IDEA that DATA is one of the cri>cal materials of the Informa>on Age Informa>on, which is created by data, becomes

More information

Saving Time and Money with Web Based Benefits Administra9on and Consolidated Billing

Saving Time and Money with Web Based Benefits Administra9on and Consolidated Billing Saving Time and Money with Web Based Benefits Administra9on and Consolidated Billing Compliancy Group Webinar 11/11/14 NOTICE: Proprietary and Confiden)al. This material is proprietary to Benera)on, LLC.

More information

Migrating to Hosted Telephony. Your ultimate guide to migrating from on premise to hosted telephony. www.ucandc.com

Migrating to Hosted Telephony. Your ultimate guide to migrating from on premise to hosted telephony. www.ucandc.com Migrating to Hosted Telephony Your ultimate guide to migrating from on premise to hosted telephony Intro What is covered in this guide? A professional and reliable business telephone system is a central

More information

Retaining and Preserving the Scholarly Record: An Update on the Eastern Academic Scholars Trust

Retaining and Preserving the Scholarly Record: An Update on the Eastern Academic Scholars Trust Retaining and Preserving the Scholarly Record: An Update on the Eastern Academic Scholars Trust Susan Stearns, Execu?ve Director Boston Library Consor?um sstearns@blc.org From NERD to EAST Ini?al planning

More information

Financing to Scale Blended Learning

Financing to Scale Blended Learning Financing to Scale Blended Learning Overview October 2015 Financing to Scale Blended Learning Finance is one of the key elements for implemen;ng scalable and sustainable high- quality blended learning.

More information

IMPACT OF THE NEW ICD- 10 CODING SYSTEM ON THE MEDICAL BILLING AND PAYMENT PROCESS

IMPACT OF THE NEW ICD- 10 CODING SYSTEM ON THE MEDICAL BILLING AND PAYMENT PROCESS IMPACT OF THE NEW ICD- 10 CODING SYSTEM ON THE MEDICAL BILLING AND PAYMENT PROCESS ICD- 10 Acronym Interna(onal Classifica(on of Diseases Tenth Revision ICD- 10 Basic Facts Replaces ICD- 9 Five digit coding

More information

Establishing Effec/ve Data Governance

Establishing Effec/ve Data Governance Establishing Effec/ve Data Governance Data Quality Council Much of what I say is taken from 2 publica/ons put out by the na/onal Center for Educa/on Sta/s/cs and Na/onal Forum on Educa/on Sta/s/cs Forum

More information

PCI VERSION 2.0 AND RISK MANAGEMENT. Doug Landoll, CISSP, CISA, QSA, MBA Practice Director Risk and Compliance Management

PCI VERSION 2.0 AND RISK MANAGEMENT. Doug Landoll, CISSP, CISA, QSA, MBA Practice Director Risk and Compliance Management PCI VERSION 2.0 AND RISK MANAGEMENT Doug Landoll, CISSP, CISA, QSA, MBA Practice Director Risk and Compliance Management Objec&ve: Protect cardholder data (CHD) wherever it resides Applica&on: All card

More information

B2B Offerings. Helping businesses op2mize. Infolob s amazing b2b offerings helps your company achieve maximum produc2vity

B2B Offerings. Helping businesses op2mize. Infolob s amazing b2b offerings helps your company achieve maximum produc2vity B2B Offerings Helping businesses op2mize Infolob s amazing b2b offerings helps your company achieve maximum produc2vity What is B2B? B2B is shorthand for the sales prac4ce called business- to- business

More information

ICD- 10: Learning for a Successful Transi:on Part 2. Objec.ves for the Webinars. ICD- 10 Webinar Topics

ICD- 10: Learning for a Successful Transi:on Part 2. Objec.ves for the Webinars. ICD- 10 Webinar Topics ICD- 10: Learning for a Successful Transi:on Helene Fearon, PT, FAPTA Rhea Cohn, PT, DPT August 21, 2015 Practice Management Expertise for the Rehabilitation Professional DOCUMENTATION / CODING / BILLING

More information

MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term

MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT How to Drive Adop.on, Efficiency, and ROI for the Long Term What We Will Cover Today Presenta(on Agenda! Who We Are! Our History! Par7al

More information

Covered En**es Should Periodically Audit Third Party Vendors/Business Associates Why, What, & How?

Covered En**es Should Periodically Audit Third Party Vendors/Business Associates Why, What, & How? Covered En**es Should Periodically Audit Third Party Vendors/Business Associates Why, What, & How? March 27 th 12 pm EDT Moderator: Gerry Blass Panelists: Mac McMillan, Francois Bodhuin, Lou Dignam Webinar

More information

Range of Organiza7onal Approaches

Range of Organiza7onal Approaches Status of Design and Implementa7on Plan for UH System and Mānoa Organiza7onal Changes and Consolida7ons to Improve the Efficiency and Effec7veness of Support Services Presenta7on to UH Board of Regents

More information

Private Cloud Website Solu2on

Private Cloud Website Solu2on Private Cloud Website Solu2on Who We Are 2 HighPoint Solu1ons is a premier provider of specialized Management and IT services dedicated to the Life Sciences and Healthcare industries. Since 2000, our business

More information

Vision of Interoperability Jamie Ferguson, Stan Huff, Cris Ross

Vision of Interoperability Jamie Ferguson, Stan Huff, Cris Ross Vision of Interoperability Jamie Ferguson, Stan Huff, Cris Ross Evolu&on of Interoperability As HIE evolves, the interoperability framework standards advance for reliable exchange and data integra=on across

More information

Business Analysis Center of Excellence The Cornerstone of Business Transformation

Business Analysis Center of Excellence The Cornerstone of Business Transformation February 20, 2013 Business Analysis Center of Excellence The Cornerstone of Business Transformation John E. Parker, CEO Enfocus Solutions Inc. www.enfocussolutions.com 0 John E. Parker (Introduc3on) President

More information

DEFINING COMPONENTS OF NATIONAL REDD+ FINANCIAL PLANNING

DEFINING COMPONENTS OF NATIONAL REDD+ FINANCIAL PLANNING DEFINING COMPONENTS OF NATIONAL REDD+ FINANCIAL PLANNING WORKSHOP ON BUILDING MULTI- SOURCE REDD+ FINANCING STRATEGIES Antigua, Guatemala July 17 and 18, 2014 Objec'ves of REDD+ Financial Planning Financial

More information

Capitalize on your carbon management solu4on investment

Capitalize on your carbon management solu4on investment Capitalize on your carbon management solu4on investment Best prac4ce guide for implemen4ng carbon management so9ware Carbon Disclosure Project +44 (0) 20 7970 5660 info@cdproject.net www.cdproject.net

More information

DTCC Data Quality Survey Industry Report

DTCC Data Quality Survey Industry Report DTCC Data Quality Survey Industry Report November 2013 element 22 unlocking the power of your data Contents 1. Introduction 3 2. Approach and participants 4 3. Summary findings 5 4. Findings by topic 6

More information

2015-16 ITS Strategic Plan Enabling an Unbounded University

2015-16 ITS Strategic Plan Enabling an Unbounded University 2015-16 ITS Strategic Plan Enabling an Unbounded University Update: July 31, 2015 IniAaAve: Agility Through Technology Vision Mission Enable Unbounded Learning Support student success through the innovaave

More information

IBM Enterprise Content Management Solu5ons Informa(on Lifecycle Governance

IBM Enterprise Content Management Solu5ons Informa(on Lifecycle Governance IBM Enterprise Content Management Solu5ons Informa(on Lifecycle Governance Mohan Natraj Content Collec(on & Archiving Informa(on Lifecycle Governance Enterprise Content Management 2011 IBM Corporation

More information

Help Framework. Ticket Management Ticket Resolu/on Communica/ons. Ticket Assignment Follow up Customer - communica/on System updates Delay management

Help Framework. Ticket Management Ticket Resolu/on Communica/ons. Ticket Assignment Follow up Customer - communica/on System updates Delay management Help for JD Edwards Our Help Framework Ticket qualifica/on Ticket crea/on Ticket Rou/ng Closures L1 issues Resolu/on KG SOPs Co- ordinate Ticket Assignment Follow up Customer - communica/on System updates

More information

Connec(ng to the NC Educa(on Cloud

Connec(ng to the NC Educa(on Cloud NC Educa)on Cloud Connec(ng to the NC Educa(on Cloud May 2012 Update! http://cloud.fi.ncsu.edu! Dave Furiness, MCNC! Phil Emer, Friday Institute! 1 First Things First Year one was about planning we are

More information

Financial Opera,ons Track: ROI vs. ROCE (Return on Customer Experience) Speaker: Robert Lane, Strategic Sourcing Manager, Premier Health Partners

Financial Opera,ons Track: ROI vs. ROCE (Return on Customer Experience) Speaker: Robert Lane, Strategic Sourcing Manager, Premier Health Partners Financial Opera,ons Track: ROI vs. ROCE (Return on Customer Experience) Speaker: Robert Lane, Strategic Sourcing Manager, Premier Health Partners INTEGRATION: Merging internal and external excellence into

More information

Poten&al Impact of FDA Regula&on of EMRs. October 27, 2010

Poten&al Impact of FDA Regula&on of EMRs. October 27, 2010 Poten&al Impact of FDA Regula&on of EMRs October 27, 2010 Agenda The case for regula&ng Impact on manufacturers Impact on providers Recommenda&ons and best prac&ces 2 A Medical Device Is an instrument,

More information

Discovering Computers Fundamentals, 2010 Edition. Living in a Digital World

Discovering Computers Fundamentals, 2010 Edition. Living in a Digital World Discovering Computers Fundamentals, 2010 Edition Living in a Digital World Objec&ves Overview Discuss the importance of project management, feasibility assessment, documenta8on, and data and informa8on

More information

Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework

Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework Don t screw with my chain, dude! Jon Boyens Computer Security Division IT Laboratory November

More information

Selling Hosted MS Exchange 2010 & SharePoint

Selling Hosted MS Exchange 2010 & SharePoint Selling Hosted MS Exchange 2010 & SharePoint Presenters: David Kidd, Senior Manager, Product Management Verio Tim Shields, President and Owner Shields Technologies Moderator: Janine Soika, Channel Market

More information

Discovering the New Frontier of Syndromic Surveillance: A Meaningful Use Dialogue on Ambulatory EHR Technology. Corey Spears McKesson Corpora/on

Discovering the New Frontier of Syndromic Surveillance: A Meaningful Use Dialogue on Ambulatory EHR Technology. Corey Spears McKesson Corpora/on Discovering the New Frontier of Syndromic Surveillance: A Meaningful Use Dialogue on Ambulatory EHR Technology Corey Spears McKesson Corpora/on Definitional Outpa/ent Pa/ent visit from start to end is

More information

Agenda. What Data Science Can Learn from Training in Biomedical Informa8cs: The OHSU Experience

Agenda. What Data Science Can Learn from Training in Biomedical Informa8cs: The OHSU Experience What Data Science Can Learn from Training in Biomedical Informa8cs: The OHSU Experience William Hersh, MD, FACP, FACMI Professor and Chair Department of Medical Informa8cs & Clinical Epidemiology Oregon

More information

Disrup've Innova'ons Track

Disrup've Innova'ons Track Disrup've Innova'ons Track Product Disrup-ons: Medical Device Cybersecurity Presenter: Adam Brand, Associate Director, Pro-vi- V. 1.1 FACULTY DISCLOSURE The faculty reported the following financial relationships

More information

Top 5 Ways to Improve Your Billing & Collec=ons

Top 5 Ways to Improve Your Billing & Collec=ons Top 5 Ways to Improve Your Billing & Collec=ons Presenters: Jillian Longpre Vice President Franco Rizzolo, DC CEO Brought to you by: Industry leading Educa1on Cer1fied Partner Program Please ask ques1ons

More information

Health Informa - A Key Components of Data Analytics

Health Informa - A Key Components of Data Analytics Data Analytics and Stewardship: Key Components in Managing Health Information " Mervat Abdelhak Pittsburgh, PA, USA! Angelika Handel Erlangen-Nuremberg, Germany! Candace Gibson London, Ontario, Canada!

More information

SUMMIT. November 2010

SUMMIT. November 2010 SUMMIT November 2010 Why Summit? Comprehensive Summit provides a unified approach to IT enterprise management following a prescriptive, ITIL based framework Rapid Deployment Summit is developed for and

More information

Kaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars

Kaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars Kaseya Fundamentals Workshop DAY THREE Developed by Kaseya University Powered by IT Scholars Kaseya Version 6.5 Last updated March, 2014 Day Two Overview Day Two Lab Review Patch Management Configura;on

More information

A R o a d t o y o u r C l o u d. Professional Service. C R M a n d C l o u d C o n s u l t i n g

A R o a d t o y o u r C l o u d. Professional Service. C R M a n d C l o u d C o n s u l t i n g RM-C A R o a d t o y o u r C l o u d Professional Service C R M a n d C l o u d C o n s u l t i n g CRM-C Highlights! A Unique Cloud CRM Consulting service firm! Specializing in cloud CRM and Office Collaboration

More information

Achieving Global Cyber Security Through Collaboration

Achieving Global Cyber Security Through Collaboration Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department November 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda

More information

The Pros and Cons of Organiza2on

The Pros and Cons of Organiza2on Remain Independent or Align? A Guide To Manage Through This Cri2cal Decision Sponsored By: TRG Healthcare October 12, 2010 1 Welcome Remain Independent or Align? A Guide To Manage Through This Cri=cal

More information

Fixed Scope Offering (FSO) for Oracle SRM

Fixed Scope Offering (FSO) for Oracle SRM Fixed Scope Offering (FSO) for Oracle SRM Agenda iapps Introduc.on Execu.ve Summary Business Objec.ves Solu.on Proposal Scope - Business Process Scope Applica.on Implementa.on Methodology Time Frames Team,

More information

VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov

VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov VoIP Security How to prevent eavesdropping on VoIP conversa8ons Dmitry Dessiatnikov DISCLAIMER All informa8on in this presenta8on is provided for informa8on purposes only and in no event shall Security

More information

Retail Pharmacy Clinical Services: Influence of ACOs & Healthcare Financing Models

Retail Pharmacy Clinical Services: Influence of ACOs & Healthcare Financing Models Retail Pharmacy Clinical Services: Influence of ACOs & Healthcare Financing Models Tim Kosty, R.Ph., MBA President Pharmacy Healthcare Solu

More information

SOURCE, SELECT, MANAGE: THE CWM ATHLETE S TRIATHLON GUIDE SIG San Francisco Bay Symposium November 12, 2014. Matt Katz, VP Strategic Solutions

SOURCE, SELECT, MANAGE: THE CWM ATHLETE S TRIATHLON GUIDE SIG San Francisco Bay Symposium November 12, 2014. Matt Katz, VP Strategic Solutions SOURCE, SELECT, MANAGE: THE CWM ATHLETE S TRIATHLON GUIDE SIG San Francisco Bay Symposium November 12, 2014 Matt Katz, VP Strategic Solutions WELCOME! It s another beaueful day in the Bay Area! 2 OPTIONAL:

More information

Application of Supply Chain Concepts to the Analysis Process

Application of Supply Chain Concepts to the Analysis Process Application of Supply Chain Concepts to the Analysis Process Rob Handfield, PhD Bank of America University Distinguished Professor of Supply Chain Management Executive Director, Supply Chain Resource Cooperative

More information

Computer Security Incident Handling Detec6on and Analysis

Computer Security Incident Handling Detec6on and Analysis Computer Security Incident Handling Detec6on and Analysis Jeff Roth, CISSP- ISSEP, CISA, CGEIT Senior IT Security Consultant 1 Coalfire Confiden+al Agenda 2 SECURITY INCIDENT CONTEXT TERMINOLOGY DETECTION

More information

VENDOR MANAGEMENT Presented By:

VENDOR MANAGEMENT Presented By: VENDOR MANAGEMENT EXAMINER EXPECTATIONS FOR ASSESSING & MANAGING 3RD PARTY RISK Presented By: Tom Hinkel, VP of Compliance Services Safe Systems, Inc. Agenda Blurred Lines: Defini/on of vendor Recent regulatory

More information

Realm of Big Data Ini0a0ves

Realm of Big Data Ini0a0ves Realm of Big Data Ini0a0ves Kamlesh Mhashilkar Head - Analy0cs, Big Data and Informa0on Management (ABIM) Prac0ce TCS Digital Enterprise Copyright 2013 Tata Consultancy Services Limited 1 Realm of Big

More information

Reali9es of Being PCI Compliant

Reali9es of Being PCI Compliant Reali9es of Being PCI Compliant Miguel (Mike) O. Villegas CISA, CISSP, GSEC, CEH, QSA, PA- QSA, ASV Vice President- K3DES LLC Professional Strategies S23 CRISC CGEIT CISM CISA Abstract PCI DSS compliance

More information

Community and Economic Development: Collaborative Leadership To Promote Regional Workforce Development

Community and Economic Development: Collaborative Leadership To Promote Regional Workforce Development Community and Economic Development: Collaborative Leadership To Promote Regional Workforce Development Presented By: Todd Greene Vice President ATLANTA SKYLINE Photo by Chuck Koehler, Creative Commons

More information

Panorama Consulting Group. PERFECT Fit ERP Selection Framework

Panorama Consulting Group. PERFECT Fit ERP Selection Framework Panorama Consulting Group PERFECT Fit ERP Selection Framework 1 Goals of the meeting Meeting Goals and Agenda Help Panorama better understand the Client Address questions about Panorama s ERP selection

More information

UAB Cyber Security Ini1a1ve

UAB Cyber Security Ini1a1ve UAB Cyber Security Ini1a1ve Purpose of the Cyber Security Ini1a1ve? To provide a secure Compu1ng Environment Individual Mechanisms Single Source for Inventory and Asset Management Current Repor1ng Environment

More information

San Francisco Chapter. Presented by Mike O. Villegas, CISA, CISSP

San Francisco Chapter. Presented by Mike O. Villegas, CISA, CISSP Presented by Mike O. Villegas, CISA, CISSP Agenda Information Security (IS) Vision at Newegg.com Typical Issues at Most Organizations Information Security Governance Four Inter-related CoBIT Domains ISO

More information

HIPAA Privacy Policy (Revised Feb. 4, 2015)

HIPAA Privacy Policy (Revised Feb. 4, 2015) Valley Bone & Joint Clinic HIPAA Privacy Policy (Revised Feb. 4, 2015) 1. PURPOSE Valley Bone & Joint Clinic is commi2ed to protec6ng the rights of our pa6ents. In compliance with the Health Insurance

More information

CompTIA A+ Partner Update October 21, 2015

CompTIA A+ Partner Update October 21, 2015 CompTIA A+ Partner Update October 21, 2015 Agenda Cer;fica;on Update Industry & Job Role Changes Cer;fica;on Changes Posi;oning & Compe;;ve Comparisons Key Dates Marke;ng and Promo;ons 2 WHY CHANGE IT

More information

Update on the Cloud Demonstration Project

Update on the Cloud Demonstration Project Update on the Cloud Demonstration Project Khalil Yazdi and Steven Wallace Spring Member Meeting April 19, 2011 Project Par4cipants BACKGROUND Eleven Universi1es: Caltech, Carnegie Mellon, George Mason,

More information

Support from the CMS Innova2on Center for Rural ACOs

Support from the CMS Innova2on Center for Rural ACOs Support from the CMS Innova2on Center for Rural ACOs Hoangmai Pham, MD, MPH Director, Seamless Care Models Group CMS Innova

More information

Hadoop- Based Data Explora1on for the Healthcare Safety- Net Technical & Sociocultural Challenges to Big Data Usability

Hadoop- Based Data Explora1on for the Healthcare Safety- Net Technical & Sociocultural Challenges to Big Data Usability Hadoop- Based Data Explora1on for the Healthcare Safety- Net Technical & Sociocultural Challenges to Big Data Usability David Hartzband, D.Sc. Research Affiliate, SSRC, MIT & Director, Technology Research

More information

Cloud Compu)ng in Educa)on and Research

Cloud Compu)ng in Educa)on and Research Cloud Compu)ng in Educa)on and Research Dr. Wajdi Loua) Sfax University, Tunisia ESPRIT - December 2014 04/12/14 1 Outline Challenges in Educa)on and Research SaaS, PaaS and IaaS for Educa)on and Research

More information

THE STATE OF IT RECOVERY FOR SMBS: A SURVEY OF IT PROFESSIONALS

THE STATE OF IT RECOVERY FOR SMBS: A SURVEY OF IT PROFESSIONALS Introduction Unscheduled downtime can have dramatic impacts on business results. Outages are detrimental to any business, regardless of its size. With increasingly complex and critical IT environments,

More information

10 Steps to Preparedness

10 Steps to Preparedness 10 Steps to Preparedness Key Take- Aways Review basics of disaster recovery and con2nuity of opera2ons. Understand what you can do to prepare your pool and its members for an unplanned interrup2on. Ini2ate

More information

Welcome! Accelera'ng Pa'ent- Centered Outcomes Research and Methodological Research. Andrea Heckert, PhD, MPH Program Officer, Science

Welcome! Accelera'ng Pa'ent- Centered Outcomes Research and Methodological Research. Andrea Heckert, PhD, MPH Program Officer, Science Accelera'ng Pa'ent- Centered Outcomes Research and Methodological Research Emily Evans, PhD, MPH Program Officer, Science Andrea Heckert, PhD, MPH Program Officer, Science June 22, 2015 Welcome! Emily

More information

So#ware quality assurance - introduc4on. Dr Ana Magazinius

So#ware quality assurance - introduc4on. Dr Ana Magazinius So#ware quality assurance - introduc4on Dr Ana Magazinius 1 What is quality? 2 What is a good quality car? 2 and 2 2 minutes 3 characteris4cs 3 What is quality? 4 What is quality? How good or bad something

More information

Pu?ng B2B Research to the Legal Test

Pu?ng B2B Research to the Legal Test With the global leader in sampling and data services Pu?ng B2B Research to the Legal Test Ashlin Quirk, SSI General Counsel 2014 Survey Sampling Interna6onal 1 2014 Survey Sampling Interna6onal Se?ng the

More information

How To Protect Virtualized Data From Security Threats

How To Protect Virtualized Data From Security Threats S24 Virtualiza.on Security from the Auditor Perspec.ve Rob Clyde, CEO, Adap.ve Compu.ng; former CTO, Symantec David Lu, Senior Product Manager, Trend Micro Hemma Prafullchandra, CTO/SVP Products, HyTrust

More information