Legacy Archiving How many lights do you leave on? September 14 th, 2015
|
|
- David Murphy
- 8 years ago
- Views:
Transcription
1 Legacy Archiving How many lights do you leave on? September 14 th,
2 Introductions Wendy Laposata, Himforma(cs Tom Chase, Cone Health 2
3 About Cone Health More than 100 loca=ons 6 hospitals, 3 ambulatory care centers, 3 outpa=ent surgery centers, 4 urgent care centers, over 95 physician prac=ces 1,300 physicians 11,000 employees 1,273 beds Primary Service Area Cone Health 3
4 Objectives 1) Outline the major business objec=ves for implemen=ng a data reten=on program 2) Describe the Legacy Archive Framework 3) Describe the specific ac=vi=es that have led to an improved applica=on porqolio. 4
5 Legacy Archiving I. Why? Outline the major business objectives for implementing a data retention program. 5
6 Legacy Archive Background Create a framework focused on legacy por9olio efforts to either decommission or archive legacy applica(ons that are no longer needed for opera(onal purposes. The house- wide EHR implementa(on typically drives this effort. Archive (retain to access) Legal data reten=on =me requirements exist for the data within the applica=on. Internal recommenda=ons require us to keep the data. Decommission (permanently destroy) Legal reten=on requirements have been met, the data is no longer needed. The data does not have legal requirements to retain. I. Why? 6
7 Objectives Reduce Costs Applica=on maintenance, hardware and resource costs over mul=ple applica=ons likely exist as opera=onal expenses that can be reduced. Efforts to con=nue keeping the lights on get expensive! Meet Legal Reten1on Requirements State and federal reten=on requirements are likely in place that could lead to fines if your organiza=on is non- compliant. Audits are also a key reason to ensure access to legacy data. Release of Informa=on (HIM) Minimize Security Risks Minimizing loca=ons of data as soon as it is no longer required for opera=onal purposes helps minimize the risk of security breaches. Hardwire Enterprise Process Implement data reten=on standards for enterprise processes to ensure steps to decommission are consistent throughout the organiza=on. I. Why? 7
8 Retention Requirements There are mul=ple sources that can be leveraged to generate standard policy and procedure. Per AHIMA, there is no single standardized record reten=on schedule that organiza=ons and providers must follow. Instead, a variety of reten=on requirements must be reviewed to create a compliant reten=on program. I. Why? 8
9 Retention Requirement Resources I. Why? 9
10 Retention Requirement Resources I. Why? Source: hcp:// 10
11 Legacy Archiving II. What? Describe the framework that leveraged. 11
12 Data Retention Governance Establish Project Governance and Ongoing Support Structure Descrip=on: Develop the management framework within which Data Reten=on and Legacy Applica=on related decisions are made and support is provided on an ongoing basis. This provides hospitals with a structured approach to conduct ini=al Legacy Applica=on remedia=on ac=vi=es as well as future data reten=on efforts. Benefits: Provides a logical and repeatable decision- making framework. Iden=fies who in the organiza=on is responsible for overall and day- to- day Data Reten=on decisions and ac=vi=es. Helps IT provide more consistent response and support related to Legacy Applica=ons. II. What? 12
13 Data Retention Governance Finance Opera=ons Informa=on Services HIM Risk Legal Purpose Group Decision Efforts Vendor Strategy Priori=za=on of applica=ons Ensure policy and standards are followed Legacy applica=on related decisions (Who owns the data?) Applica=on valida=on oversight Organiza=on & Regula=on Awareness II. What? 13
14 Governance & Support Establish Ongoing Governance and Support Structure Oversight Data Reten=on Steering CommiJee Project Management Communica=on Policy & Procedure Business Sponsor Data Reten=on Program Management Exis=ng Forums Legacy Applica=on Vendor Applica=on SME Valida=on Users Applica=on Users (Training) IT Security DBA Data Reten=on Vendor II. What? 14 App Support
15 Vendor Strategy & Approach Single Vendor Mul1ple Vendors Enterprise Portal for all legacy applica=ons ( one stop ) Limited training Loss of intellectual property over =me Ease of use/support Higher return on investment Lower Opera=onal Costs Disparate Solu=ons Technical Support Impacts Higher administra=ve costs II. What? 15
16 Cone Health Archiving Summary Cone s Experience MediQuant was selected as the archiving vendor One applica=on GE/IDX Centricity Business, Ac=ve A/R 7 month project dura=on Hosted remotely ~.25 FTE =me commitment for internal IT Analyst ~.5 FTE Program Management, strategy, applica=on porqolio, future archive planning II. What? 16
17 Cone GE/IDX Timeline Nov 2014 Dec 2014 Jan 2015 Feb 2015 March 2015 Sample Extract Provided Sample Extract Loaded Sample Extract Validated Staging Period (View Only) Final Extract Provided GE/IDX Centricity Business (Physician) BAR PA & GE Centricity (Hospital) HPA PA Final Extract Loaded Final Extract Validated Go- Live 17
18 IT Analyst Role IT Department Coordina1on Liaison between end users, vendor, PM, IT department, contractors Network & security teams, Ac=ve Directory Archiving Applica1on SME Assist with valida=on Determine end user roles and security Fulfill report requests for users User administra=on up front and on- going Interim end user support Transi=on to business unit resource aner stabiliza=on is complete II. What? 18
19 Legacy Archiving III. How? Describe the speci;ic activities that have led to an improved application portfolio. 19
20 Prioritization Drivers Business opera=onal needs and =ming impacts Return on Investment Vendor Maintenance & Contractual requirements Impacts (cancella=on/no=ce requirements) Vendor applica=on confidence level Sonware not supported factors, sonware stability Infrastructure Concerns III. How? 20
21 Examples of Data Sources Op=cal Drives Applica=ons that will require formal archiving Unsupported Applica=ons Paper Charts Data PorNolio Unsupported Servers e.g. Win Server 2003 III. How? 21
22 Legacy Portfolio Components A well documented legacy applica(on por9olio is vital to the success of the program. Data Element Examples Applica=on Site Current Maintenance Vendor Fees (Annual) Addi=onal Annual Costs (Hardware, Staffing) Vendor Contract Requirements (Cancela=on) Type of Data (PM, EMR, Images) Data Timeframe Data Popula=on Reten=on Requirements Accounts Receivable Status (if PM) Technical Considera=ons Opera=onal Considera=ons Contact(s) Applica=on Name Clinic A, geographic loca=on $XX,XXX $X,XXX Descrip=on/Example 90 day no=ce prior to annual renewal PM & EMR Feb 2007 through Fall 2011 e.g. Adult, Minor, Ob/Gyn 7 years (from 2011) $XX remaining balance ac=vely being collected Hardware is unstable, not connected to the network, storage space is limited, physically located in the clinic Clinic site will move into new building over the next 6 months, prefer not to move the system due to stability issues. Primary contact name for informa=on provided. III. How? 22
23 Vendor Storage Terminology Tier Examples Interac=ve/Dynamic: Ac=ve A/R and bad debt, pos=ng payments/adjustments/account and line items, claims update, field level edi=ng, Agency exports/imports Sta=c: Data records viewed on demand either on screen or through report genera=on Vault: Full implementa=on, Front End GUI developed Straight to Vault: No GUI, validate & vault III. How? 23
24 Some Lessons Learned Enterprise Governance is an absolute must- have. There are lots of decisions! Commence archiving projects ASAP, while SMEs are s=ll available. All stakeholders need to be at the table to define requirements. Gathering requirements from legacy applica=on end- users is cri=cal. There are a small number of healthcare specific archiving vendors in this space currently, more entering the market every month. No one vendor is going to have all of the skills necessary to convert all your disparate applica=ons, there will be some ramp- up on some applica=ons. Incumbent vendors may provide archiving services. Watch out for proprietary and encrypted databases. Keep watching your converted legacy applica=ons, you may be able to vault or turn them off at some point post- conversion. Strong Project Management is required. III. How? 24
25 Questions & Open Discussion Wendy Laposata Himforma=cs Tom Chase Cone Health 25
Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES
Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define
More informationIT Change Management Process Training
IT Change Management Process Training Before you begin: This course was prepared for all IT professionals with the goal of promo9ng awareness of the process. Those taking this course will have varied knowledge
More informationCase Study. The SACM Journey at the Ontario Government
Case Study The SACM Journey at the Ontario Government Agenda Today s Objec=ves The Need for SACM Our SACM Journey Scope and Governance Process Ac=vi=es Key Process Roles Training and Measurement Lessons
More informationFTC Data Security Standard
FTC Data Security Standard The FTC takes the posi6on (Being tested now in li6ga6on) that Sec6on 5 of the FTC Act requires Reasonable Security under the circumstances: that companies have reasonable controls
More informationCouncil Monitoring & Assessment Program Development
Council Monitoring & Assessment Program Development Steve Giordano & Mark Monaco, Na9onal Oceanic & Atmospheric Administra9on Greg Steyer & Mike Lee, U.S. Geological Survey Alyssa Dausman & Jessica Henkel,
More informationPROJECT PORTFOLIO SUITE
ServiceNow So1ware Development manages Scrum or waterfall development efforts and defines the tasks required for developing and maintaining so[ware throughout the lifecycle, from incep4on to deployment.
More informationCSER & emerge Consor.a EHR Working Group Collabora.on on Display and Storage of Gene.c Informa.on in Electronic Health Records
electronic Medical Records and Genomics CSER & emerge Consor.a EHR Working Group Collabora.on on Display and Storage of Gene.c Informa.on in Electronic Health Records Brian Shirts, MD, PhD University of
More informationPhone Systems Buyer s Guide
Phone Systems Buyer s Guide Contents How Cri(cal is Communica(on to Your Business? 3 Fundamental Issues 4 Phone Systems Basic Features 6 Features for Users with Advanced Needs 10 Key Ques(ons for All Buyers
More informationOnline Enrollment Op>ons - Sales Training. 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1
Online Enrollment Op>ons - Sales Training 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1 Agenda Understand Why This is Important Enrollment Op>ons Available EDI Blues Enroll
More informationBusiness Analysis Standardization A Strategic Mandate. John E. Parker CVO, Enfocus Solu7ons Inc.
Business Analysis Standardization A Strategic Mandate John E. Parker CVO, Enfocus Solu7ons Inc. Agenda What is Business Analysis? Why Business Analysis is Important? Why Standardization of Business Analysis
More informationShannon Rykaceski Director of Opera4ons CCFHCC
Shannon Rykaceski Director of Opera4ons CCFHCC PRESENTER BIO Shannon Salicce Rykaceski Director of Opera4ons for the Catholic Chari4es Free Health Care Center (CCFHCC), located in PiCsburgh, PA. Prior
More informationHIPAA Breaches, Security Risk Analysis, and Audits
HIPAA Breaches, Security Risk Analysis, and Audits Derrick Hill Senior Health IT Advisor Kentucky REC What cons?tutes PHI? HIPAA provides a list of 18 iden?fiers that cons?tute PHI. Any one of these iden?fiers
More informationAn Introduc+on to CloudPrime
TM An Introduc+on to CloudPrime Secure messaging pla/orm to protect pa2ent privacy and uphold HIPAA/HITECH regula2on Mari Tangredi, CloudPrime 1 CloudPrime Company Overview! Headquartered in San Francisco,
More informationInforma.on Systems in Organiza.ons
Informa.on Systems in Organiza.ons MIS 2101 Week 7 / Chapter 7 Enhancing Business Processes Using Enterprise Informa.on Systems Photo: Objet Mathema+que by Man Ray, 1934 Chapter 7 Learning Objec.ves Core
More informationSan Jacinto College Banner & Enterprise Applica5on Review Task Force Report. November 01, 2011 FINAL
San Jacinto College Banner & Enterprise Applica5on Review Task Force Report November 01, 2011 FINAL 1 Content Review goal and approach 3 Barriers to effec5ve use of Banner: Consultant observa5ons 10 Consultant
More informationProject Management Introduc1on
Project Management Introduc1on Session 1 Part I Introduc1on By Amal Le Collen, PMP Dr. Lauren1u Neamtu, PMP Session outline 1. PART I: Introduc1on 1. The Purpose of the PMBOK Guide 2. What is a project?
More informationTop Practices in Health IT Compliance. Data Breach & Leading Program Prac3ces
Top Practices in Health IT Compliance Data Breach & Leading Program Prac3ces Overview Introduc3on to ID Experts & Secure Digital Solu3ons Healthcare Data Breach Trends & Drivers Data Incident Management
More informationManaged Services. An essen/al set of tools for today's businesses
Managed Services An essen/al set of tools for today's businesses Manage your enterprise better with a holis/c solu/on to all your IT worries only at Infolob What are Managed Services? By far the most cu/ng
More informationPES Has The Sustainable Solu2on For Chronic Care Management
PES Has The Sustainable Solu2on For Chronic Care Management Empowering pa2ents to lead the management of their chronic diseases through a proven and effec2ve model of collabora2on with clinicians and caregivers.
More informationBreakout A: From Paper to EMR- Preparing for the Transi;on
Quality Counts! Breakout A: From Paper to EMR- Preparing for the Transi;on The Maine Regional Extension Center Forum Breakout Objec
More informationFounda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework
Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework Steven Hunt Enterprise IT Governance Strategist NASA Ames Research Center Michael
More informationProtec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko
Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning MIS5206 Week 8 In the News Readings In Class Case Study BCP/DRP Test Taking Tip Quiz In the News Discuss items
More informationProgram Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional.
Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional. 163 Stormont Street New Concord, OH 43762 614-286-7895
More informationDisaster Recovery Planning and Implementa6on. Chris Russel Director, IT Infrastructure and ISO Compu6ng and Network Services York University
Disaster Recovery Planning and Implementa6on Chris Russel Director, IT Infrastructure and ISO Compu6ng and Network Services York University Agenda Background for York s I.T. Disaster Recovery Planning
More informationDeveloping Your Roadmap The Association of Independent Colleges and Universities of Massachusetts. October 3, 2013
Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts October 3, 2013 Agenda 1. Introductions 2. Higher Ed Industry Trends 3. Technology Trends in Higher Ed
More informationSyndromic Surveillance BioSense Onboarding in Arizona
Syndromic Surveillance BioSense Onboarding in Arizona Sara Imholte, Stanley Kotey, Manoj Shaw & Krystal Collier Electronic Disease Surveillance Program April 1, 2015 Introduc*ons Background Onboarding
More informationPrivileged Administra0on Best Prac0ces :: September 1, 2015
Privileged Administra0on Best Prac0ces :: September 1, 2015 Discussion Contents Privileged Access and Administra1on Best Prac1ces 1) Overview of Capabili0es Defini0on of Need 2) Preparing your PxM Program
More informationBank of America Security by Design. Derrick Barksdale Jason Gillam
Bank of America Security by Design Derrick Barksdale Jason Gillam Costs of Correcting Defects 2 Bank of America The Three P s Product Design and build security into our product People Cultivate a security
More informationGraduate Systems Engineering Programs: Report on Outcomes and Objec:ves
Graduate Systems Engineering Programs: Report on Outcomes and Objec:ves Alice Squires, alice.squires@stevens.edu Tim Ferris, David Olwell, Nicole Hutchison, Rick Adcock, John BrackeL, Mary VanLeer, Tom
More informationBig Data. The Big Picture. Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas
Big Data The Big Picture Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas What is Big Data? Big Data gets its name because that s what it is data that
More informationConfigura)on Management Process and Environment MACS Review 1 February 5th, 2010 Roland Moser
Configura)on Management Process and Environment MACS Review 1 February 5th, 2010 Roland Moser R. Gutleber 1 Goals Configura)on Management (CM) is the implementa)on and the execu)on of processes and procedures
More informationMobility in the Modern Factory. Discussion of Mobile Adop7on for the Factories of the Future
Mobility in the Modern Factory Discussion of Mobile Adop7on for the Factories of the Future Talking Points History Lesson The Reasons for Going Mobile Mobile Infrastructure Mobile Device Security BYOD
More informationExchange of experience from a SuccessFactors LMS Implementa9on
Exchange of experience from a SuccessFactors LMS Implementa9on Seen from a user perspective Hanne Vasshus Ask Competency Management Cau9onary Statement The following presenta9on includes forward- looking
More informationPerformance Management. Ch. 8 The Strategy Implementa9on Mechanism. Chiara Demar9ni UNIVERSITY OF PAVIA. mariachiara.demar9ni@unipv.
UNIVERSITY OF PAVIA! Performance Management Ch. 8 The Strategy Implementa9on Mechanism Chiara Demar9ni mariachiara.demar9ni@unipv.it Master in Interna+onal Business and Economics! Defini9on Strategy implementa9on
More informationEffec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies
Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step Arbela Technologies Why Upgrade? What to do? How to do it? Tools and templates Agenda Sure Step 2012 Ax2012 Upgrade specific steps Checklist
More informationManaging Social Media as Official Records
Managing Social Media as Official Records Archives & Records: Ensuring Access COSA, NAGARA, SAA Joint Annual Mee?ng August 10-16, 2014 Washington, D.C. Geof Huth, Director of Government Records Services,
More informationProject Por)olio Management
Project Por)olio Management Important markers for IT intensive businesses Rest assured with Infolob s project management methodologies What is Project Por)olio Management? Project Por)olio Management (PPM)
More informationData Warehousing. Yeow Wei Choong Anne Laurent
Data Warehousing Yeow Wei Choong Anne Laurent Databases Databases are developed on the IDEA that DATA is one of the cri>cal materials of the Informa>on Age Informa>on, which is created by data, becomes
More informationSaving Time and Money with Web Based Benefits Administra9on and Consolidated Billing
Saving Time and Money with Web Based Benefits Administra9on and Consolidated Billing Compliancy Group Webinar 11/11/14 NOTICE: Proprietary and Confiden)al. This material is proprietary to Benera)on, LLC.
More informationMigrating to Hosted Telephony. Your ultimate guide to migrating from on premise to hosted telephony. www.ucandc.com
Migrating to Hosted Telephony Your ultimate guide to migrating from on premise to hosted telephony Intro What is covered in this guide? A professional and reliable business telephone system is a central
More informationRetaining and Preserving the Scholarly Record: An Update on the Eastern Academic Scholars Trust
Retaining and Preserving the Scholarly Record: An Update on the Eastern Academic Scholars Trust Susan Stearns, Execu?ve Director Boston Library Consor?um sstearns@blc.org From NERD to EAST Ini?al planning
More informationFinancing to Scale Blended Learning
Financing to Scale Blended Learning Overview October 2015 Financing to Scale Blended Learning Finance is one of the key elements for implemen;ng scalable and sustainable high- quality blended learning.
More informationIMPACT OF THE NEW ICD- 10 CODING SYSTEM ON THE MEDICAL BILLING AND PAYMENT PROCESS
IMPACT OF THE NEW ICD- 10 CODING SYSTEM ON THE MEDICAL BILLING AND PAYMENT PROCESS ICD- 10 Acronym Interna(onal Classifica(on of Diseases Tenth Revision ICD- 10 Basic Facts Replaces ICD- 9 Five digit coding
More informationEstablishing Effec/ve Data Governance
Establishing Effec/ve Data Governance Data Quality Council Much of what I say is taken from 2 publica/ons put out by the na/onal Center for Educa/on Sta/s/cs and Na/onal Forum on Educa/on Sta/s/cs Forum
More informationPCI VERSION 2.0 AND RISK MANAGEMENT. Doug Landoll, CISSP, CISA, QSA, MBA Practice Director Risk and Compliance Management
PCI VERSION 2.0 AND RISK MANAGEMENT Doug Landoll, CISSP, CISA, QSA, MBA Practice Director Risk and Compliance Management Objec&ve: Protect cardholder data (CHD) wherever it resides Applica&on: All card
More informationB2B Offerings. Helping businesses op2mize. Infolob s amazing b2b offerings helps your company achieve maximum produc2vity
B2B Offerings Helping businesses op2mize Infolob s amazing b2b offerings helps your company achieve maximum produc2vity What is B2B? B2B is shorthand for the sales prac4ce called business- to- business
More informationICD- 10: Learning for a Successful Transi:on Part 2. Objec.ves for the Webinars. ICD- 10 Webinar Topics
ICD- 10: Learning for a Successful Transi:on Helene Fearon, PT, FAPTA Rhea Cohn, PT, DPT August 21, 2015 Practice Management Expertise for the Rehabilitation Professional DOCUMENTATION / CODING / BILLING
More informationMAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term
MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT How to Drive Adop.on, Efficiency, and ROI for the Long Term What We Will Cover Today Presenta(on Agenda! Who We Are! Our History! Par7al
More informationCovered En**es Should Periodically Audit Third Party Vendors/Business Associates Why, What, & How?
Covered En**es Should Periodically Audit Third Party Vendors/Business Associates Why, What, & How? March 27 th 12 pm EDT Moderator: Gerry Blass Panelists: Mac McMillan, Francois Bodhuin, Lou Dignam Webinar
More informationRange of Organiza7onal Approaches
Status of Design and Implementa7on Plan for UH System and Mānoa Organiza7onal Changes and Consolida7ons to Improve the Efficiency and Effec7veness of Support Services Presenta7on to UH Board of Regents
More informationPrivate Cloud Website Solu2on
Private Cloud Website Solu2on Who We Are 2 HighPoint Solu1ons is a premier provider of specialized Management and IT services dedicated to the Life Sciences and Healthcare industries. Since 2000, our business
More informationVision of Interoperability Jamie Ferguson, Stan Huff, Cris Ross
Vision of Interoperability Jamie Ferguson, Stan Huff, Cris Ross Evolu&on of Interoperability As HIE evolves, the interoperability framework standards advance for reliable exchange and data integra=on across
More informationBusiness Analysis Center of Excellence The Cornerstone of Business Transformation
February 20, 2013 Business Analysis Center of Excellence The Cornerstone of Business Transformation John E. Parker, CEO Enfocus Solutions Inc. www.enfocussolutions.com 0 John E. Parker (Introduc3on) President
More informationDEFINING COMPONENTS OF NATIONAL REDD+ FINANCIAL PLANNING
DEFINING COMPONENTS OF NATIONAL REDD+ FINANCIAL PLANNING WORKSHOP ON BUILDING MULTI- SOURCE REDD+ FINANCING STRATEGIES Antigua, Guatemala July 17 and 18, 2014 Objec'ves of REDD+ Financial Planning Financial
More informationCapitalize on your carbon management solu4on investment
Capitalize on your carbon management solu4on investment Best prac4ce guide for implemen4ng carbon management so9ware Carbon Disclosure Project +44 (0) 20 7970 5660 info@cdproject.net www.cdproject.net
More informationDTCC Data Quality Survey Industry Report
DTCC Data Quality Survey Industry Report November 2013 element 22 unlocking the power of your data Contents 1. Introduction 3 2. Approach and participants 4 3. Summary findings 5 4. Findings by topic 6
More information2015-16 ITS Strategic Plan Enabling an Unbounded University
2015-16 ITS Strategic Plan Enabling an Unbounded University Update: July 31, 2015 IniAaAve: Agility Through Technology Vision Mission Enable Unbounded Learning Support student success through the innovaave
More informationIBM Enterprise Content Management Solu5ons Informa(on Lifecycle Governance
IBM Enterprise Content Management Solu5ons Informa(on Lifecycle Governance Mohan Natraj Content Collec(on & Archiving Informa(on Lifecycle Governance Enterprise Content Management 2011 IBM Corporation
More informationHelp Framework. Ticket Management Ticket Resolu/on Communica/ons. Ticket Assignment Follow up Customer - communica/on System updates Delay management
Help for JD Edwards Our Help Framework Ticket qualifica/on Ticket crea/on Ticket Rou/ng Closures L1 issues Resolu/on KG SOPs Co- ordinate Ticket Assignment Follow up Customer - communica/on System updates
More informationConnec(ng to the NC Educa(on Cloud
NC Educa)on Cloud Connec(ng to the NC Educa(on Cloud May 2012 Update! http://cloud.fi.ncsu.edu! Dave Furiness, MCNC! Phil Emer, Friday Institute! 1 First Things First Year one was about planning we are
More informationFinancial Opera,ons Track: ROI vs. ROCE (Return on Customer Experience) Speaker: Robert Lane, Strategic Sourcing Manager, Premier Health Partners
Financial Opera,ons Track: ROI vs. ROCE (Return on Customer Experience) Speaker: Robert Lane, Strategic Sourcing Manager, Premier Health Partners INTEGRATION: Merging internal and external excellence into
More informationPoten&al Impact of FDA Regula&on of EMRs. October 27, 2010
Poten&al Impact of FDA Regula&on of EMRs October 27, 2010 Agenda The case for regula&ng Impact on manufacturers Impact on providers Recommenda&ons and best prac&ces 2 A Medical Device Is an instrument,
More informationDiscovering Computers Fundamentals, 2010 Edition. Living in a Digital World
Discovering Computers Fundamentals, 2010 Edition Living in a Digital World Objec&ves Overview Discuss the importance of project management, feasibility assessment, documenta8on, and data and informa8on
More informationInformation and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework
Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework Don t screw with my chain, dude! Jon Boyens Computer Security Division IT Laboratory November
More informationSelling Hosted MS Exchange 2010 & SharePoint
Selling Hosted MS Exchange 2010 & SharePoint Presenters: David Kidd, Senior Manager, Product Management Verio Tim Shields, President and Owner Shields Technologies Moderator: Janine Soika, Channel Market
More informationDiscovering the New Frontier of Syndromic Surveillance: A Meaningful Use Dialogue on Ambulatory EHR Technology. Corey Spears McKesson Corpora/on
Discovering the New Frontier of Syndromic Surveillance: A Meaningful Use Dialogue on Ambulatory EHR Technology Corey Spears McKesson Corpora/on Definitional Outpa/ent Pa/ent visit from start to end is
More informationAgenda. What Data Science Can Learn from Training in Biomedical Informa8cs: The OHSU Experience
What Data Science Can Learn from Training in Biomedical Informa8cs: The OHSU Experience William Hersh, MD, FACP, FACMI Professor and Chair Department of Medical Informa8cs & Clinical Epidemiology Oregon
More informationDisrup've Innova'ons Track
Disrup've Innova'ons Track Product Disrup-ons: Medical Device Cybersecurity Presenter: Adam Brand, Associate Director, Pro-vi- V. 1.1 FACULTY DISCLOSURE The faculty reported the following financial relationships
More informationTop 5 Ways to Improve Your Billing & Collec=ons
Top 5 Ways to Improve Your Billing & Collec=ons Presenters: Jillian Longpre Vice President Franco Rizzolo, DC CEO Brought to you by: Industry leading Educa1on Cer1fied Partner Program Please ask ques1ons
More informationHealth Informa - A Key Components of Data Analytics
Data Analytics and Stewardship: Key Components in Managing Health Information " Mervat Abdelhak Pittsburgh, PA, USA! Angelika Handel Erlangen-Nuremberg, Germany! Candace Gibson London, Ontario, Canada!
More informationSUMMIT. November 2010
SUMMIT November 2010 Why Summit? Comprehensive Summit provides a unified approach to IT enterprise management following a prescriptive, ITIL based framework Rapid Deployment Summit is developed for and
More informationKaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars
Kaseya Fundamentals Workshop DAY THREE Developed by Kaseya University Powered by IT Scholars Kaseya Version 6.5 Last updated March, 2014 Day Two Overview Day Two Lab Review Patch Management Configura;on
More informationA R o a d t o y o u r C l o u d. Professional Service. C R M a n d C l o u d C o n s u l t i n g
RM-C A R o a d t o y o u r C l o u d Professional Service C R M a n d C l o u d C o n s u l t i n g CRM-C Highlights! A Unique Cloud CRM Consulting service firm! Specializing in cloud CRM and Office Collaboration
More informationAchieving Global Cyber Security Through Collaboration
Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department November 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda
More informationThe Pros and Cons of Organiza2on
Remain Independent or Align? A Guide To Manage Through This Cri2cal Decision Sponsored By: TRG Healthcare October 12, 2010 1 Welcome Remain Independent or Align? A Guide To Manage Through This Cri=cal
More informationFixed Scope Offering (FSO) for Oracle SRM
Fixed Scope Offering (FSO) for Oracle SRM Agenda iapps Introduc.on Execu.ve Summary Business Objec.ves Solu.on Proposal Scope - Business Process Scope Applica.on Implementa.on Methodology Time Frames Team,
More informationVoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov
VoIP Security How to prevent eavesdropping on VoIP conversa8ons Dmitry Dessiatnikov DISCLAIMER All informa8on in this presenta8on is provided for informa8on purposes only and in no event shall Security
More informationRetail Pharmacy Clinical Services: Influence of ACOs & Healthcare Financing Models
Retail Pharmacy Clinical Services: Influence of ACOs & Healthcare Financing Models Tim Kosty, R.Ph., MBA President Pharmacy Healthcare Solu
More informationSOURCE, SELECT, MANAGE: THE CWM ATHLETE S TRIATHLON GUIDE SIG San Francisco Bay Symposium November 12, 2014. Matt Katz, VP Strategic Solutions
SOURCE, SELECT, MANAGE: THE CWM ATHLETE S TRIATHLON GUIDE SIG San Francisco Bay Symposium November 12, 2014 Matt Katz, VP Strategic Solutions WELCOME! It s another beaueful day in the Bay Area! 2 OPTIONAL:
More informationApplication of Supply Chain Concepts to the Analysis Process
Application of Supply Chain Concepts to the Analysis Process Rob Handfield, PhD Bank of America University Distinguished Professor of Supply Chain Management Executive Director, Supply Chain Resource Cooperative
More informationComputer Security Incident Handling Detec6on and Analysis
Computer Security Incident Handling Detec6on and Analysis Jeff Roth, CISSP- ISSEP, CISA, CGEIT Senior IT Security Consultant 1 Coalfire Confiden+al Agenda 2 SECURITY INCIDENT CONTEXT TERMINOLOGY DETECTION
More informationVENDOR MANAGEMENT Presented By:
VENDOR MANAGEMENT EXAMINER EXPECTATIONS FOR ASSESSING & MANAGING 3RD PARTY RISK Presented By: Tom Hinkel, VP of Compliance Services Safe Systems, Inc. Agenda Blurred Lines: Defini/on of vendor Recent regulatory
More informationRealm of Big Data Ini0a0ves
Realm of Big Data Ini0a0ves Kamlesh Mhashilkar Head - Analy0cs, Big Data and Informa0on Management (ABIM) Prac0ce TCS Digital Enterprise Copyright 2013 Tata Consultancy Services Limited 1 Realm of Big
More informationReali9es of Being PCI Compliant
Reali9es of Being PCI Compliant Miguel (Mike) O. Villegas CISA, CISSP, GSEC, CEH, QSA, PA- QSA, ASV Vice President- K3DES LLC Professional Strategies S23 CRISC CGEIT CISM CISA Abstract PCI DSS compliance
More informationCommunity and Economic Development: Collaborative Leadership To Promote Regional Workforce Development
Community and Economic Development: Collaborative Leadership To Promote Regional Workforce Development Presented By: Todd Greene Vice President ATLANTA SKYLINE Photo by Chuck Koehler, Creative Commons
More informationPanorama Consulting Group. PERFECT Fit ERP Selection Framework
Panorama Consulting Group PERFECT Fit ERP Selection Framework 1 Goals of the meeting Meeting Goals and Agenda Help Panorama better understand the Client Address questions about Panorama s ERP selection
More informationUAB Cyber Security Ini1a1ve
UAB Cyber Security Ini1a1ve Purpose of the Cyber Security Ini1a1ve? To provide a secure Compu1ng Environment Individual Mechanisms Single Source for Inventory and Asset Management Current Repor1ng Environment
More informationSan Francisco Chapter. Presented by Mike O. Villegas, CISA, CISSP
Presented by Mike O. Villegas, CISA, CISSP Agenda Information Security (IS) Vision at Newegg.com Typical Issues at Most Organizations Information Security Governance Four Inter-related CoBIT Domains ISO
More informationHIPAA Privacy Policy (Revised Feb. 4, 2015)
Valley Bone & Joint Clinic HIPAA Privacy Policy (Revised Feb. 4, 2015) 1. PURPOSE Valley Bone & Joint Clinic is commi2ed to protec6ng the rights of our pa6ents. In compliance with the Health Insurance
More informationCompTIA A+ Partner Update October 21, 2015
CompTIA A+ Partner Update October 21, 2015 Agenda Cer;fica;on Update Industry & Job Role Changes Cer;fica;on Changes Posi;oning & Compe;;ve Comparisons Key Dates Marke;ng and Promo;ons 2 WHY CHANGE IT
More informationUpdate on the Cloud Demonstration Project
Update on the Cloud Demonstration Project Khalil Yazdi and Steven Wallace Spring Member Meeting April 19, 2011 Project Par4cipants BACKGROUND Eleven Universi1es: Caltech, Carnegie Mellon, George Mason,
More informationSupport from the CMS Innova2on Center for Rural ACOs
Support from the CMS Innova2on Center for Rural ACOs Hoangmai Pham, MD, MPH Director, Seamless Care Models Group CMS Innova
More informationHadoop- Based Data Explora1on for the Healthcare Safety- Net Technical & Sociocultural Challenges to Big Data Usability
Hadoop- Based Data Explora1on for the Healthcare Safety- Net Technical & Sociocultural Challenges to Big Data Usability David Hartzband, D.Sc. Research Affiliate, SSRC, MIT & Director, Technology Research
More informationCloud Compu)ng in Educa)on and Research
Cloud Compu)ng in Educa)on and Research Dr. Wajdi Loua) Sfax University, Tunisia ESPRIT - December 2014 04/12/14 1 Outline Challenges in Educa)on and Research SaaS, PaaS and IaaS for Educa)on and Research
More informationTHE STATE OF IT RECOVERY FOR SMBS: A SURVEY OF IT PROFESSIONALS
Introduction Unscheduled downtime can have dramatic impacts on business results. Outages are detrimental to any business, regardless of its size. With increasingly complex and critical IT environments,
More information10 Steps to Preparedness
10 Steps to Preparedness Key Take- Aways Review basics of disaster recovery and con2nuity of opera2ons. Understand what you can do to prepare your pool and its members for an unplanned interrup2on. Ini2ate
More informationWelcome! Accelera'ng Pa'ent- Centered Outcomes Research and Methodological Research. Andrea Heckert, PhD, MPH Program Officer, Science
Accelera'ng Pa'ent- Centered Outcomes Research and Methodological Research Emily Evans, PhD, MPH Program Officer, Science Andrea Heckert, PhD, MPH Program Officer, Science June 22, 2015 Welcome! Emily
More informationSo#ware quality assurance - introduc4on. Dr Ana Magazinius
So#ware quality assurance - introduc4on Dr Ana Magazinius 1 What is quality? 2 What is a good quality car? 2 and 2 2 minutes 3 characteris4cs 3 What is quality? 4 What is quality? How good or bad something
More informationPu?ng B2B Research to the Legal Test
With the global leader in sampling and data services Pu?ng B2B Research to the Legal Test Ashlin Quirk, SSI General Counsel 2014 Survey Sampling Interna6onal 1 2014 Survey Sampling Interna6onal Se?ng the
More informationHow To Protect Virtualized Data From Security Threats
S24 Virtualiza.on Security from the Auditor Perspec.ve Rob Clyde, CEO, Adap.ve Compu.ng; former CTO, Symantec David Lu, Senior Product Manager, Trend Micro Hemma Prafullchandra, CTO/SVP Products, HyTrust
More information