Web Resources your Practice will Love. Presented By: Serena Keshishi
|
|
|
- Noreen Mills
- 10 years ago
- Views:
Transcription
1 Web Resources your Practice will Love Presented By: Serena Keshishi
2 Disclosure I am the Technical Project Manager for Southern California Gastroenterology Associates, and general partner at Vintagon Web Design Firm. I hold no relevant financial interest or other relationships with the applications and/or products that I will present to you today. I do not sell or receive royalties from any of the software that I will be discussing.
3 How can apps help your practice? Provide effective and secure communication solutions Increase productivity Promote growth Maintain quality of care Create culture Optimize work-flows
4 Data Security The healthcare industry loses $7 billion a year due to HIPAA data breaches 94% of healthcare organizations have had at least one data breach in the last two years Since 2010, threats to healthcare organizations have become increasingly more difficult to control. Ponemon Institute, LLC. (2012) Third Annual Benchmark Study on Patient Privacy & Data Security. Retrieved July 1, 2013 from ID Experts Web site:
5 Data Security Only 40% of organizations have confidence that they are able to prevent or quickly detect all patient data loss or theft Ponemon Institute, LLC. (2012) Third Annual Benchmark Study on Patient Privacy & Data Security. Retrieved July 1, 2013 from ID Experts Web site:
6
7 Electronic Communication How do you communicate PHI electronically? Text/SMS Sharing of files, documents and images
8 in a Practice Setting Convenient Flexible Everyone s doing it
9 is popular!
10 Is it safe? Not all services are HIPAA compliant!
11 Best Practices If you have a web portal, always communicate with patients through your portal Use the messaging service that your EHR or PM system provides you with for communicating PHI with staff Resort to HIPAA compliant when the 2 scenarios above don t apply
12 What it takes for to be compliant? Assess its use of open networks Identify the available and appropriate means to protect PHI as it is sent Select a solution Document the decision Sign a Business Associate Agreement
13 Exceptions USPS No access to data regularly Data is sealed Only delivery service NOT a Business Associate Web Based Service Hackers & online threats Content accessible No envelope Won t sign BAA
14
15 Avoid Penalties Penalties do not apply if data is encrypted or otherwise rendered unusable, unreadable, or indecipherable.
16 Encryption Avoid legal trouble! Encryption is the process of converting your files, documents and text to code that can only be read by key-holder
17 Video About Encryption KSlmM
18 Web Based Services Use encryption apps built into your current service
19 What they do: Military grade encryption Work on computer and mobile device Add security passwords to outgoing messages Encrypt messages
20 Cost Minimal cost v. benefits Limited messaging for free Enlocked is $9.99/month for 100 messages Ciphercloud from $5-$20/user/month
21 Third Party Compliant Services Use third-party HIPAA compliant messaging services online $3/user/month
22 Provide customers with: Audit trail Recipient notifications Ability to revoke an message at any time Ability to set expiration dates Offers several identity verification methods Really neat!
23 Identity Verification 3UoXIM
24 Text Messaging According to a recent Johnson & Coker report, 80% of doctors use smartphones
25 Text Messaging Why? Simple Quick Reliable Mobile Revolutionary
26 Risks of Texting Can be read by anyone Forwarding texts Unencrypted Remain on device Wrong recipient 38% Losing your phone
27 A BIG NO-NO The Joint Commission has effectively banned physicians from using traditional SMS for communicating health information. Possible fine for a single violation? $50,000
28 Communicating Via Text Basic Precautions Password on device App for secure text messaging
29 Clinical Text Messaging Solutions
30 Text Securely These apps use: a secure server Encryption Communicate securely on your phone or desktop Setup an expiration time Securely share images and files Recall messages
31 Security Features So secure, it s questioned!
32 For GI Docs Communicating hospital charges Images of face sheet Complete information Legible No risk of loss No more note-pads! Free or very low cost
33 What is the cloud? Any data stored on a network of servers that s accessible by going online
34 How you re using the cloud
35 File Sharing Access and manage files, reports and documents from anywhere with any device Sharing files with key personnel Real time updates Paperless Provides storage Reliable - Back up
36 HIPAA Compliant Shared Drive Now compliant with HIPAA and HITECH obligations! Working with providers and payers to accelerate their work Integration with healthcare solutions (e.g. Tigertext + Medigram)
37 Practice Shared Drives Drives for: Individuals Departments Management Doctors/Medical Staff ASCs/Hospital Referring doctors
38 Examples of Shared Drives Dr. Happy s Office Hospital/ASC Colleague/Ref. Prov. Staff
39 Box.com Can be used on mobile device $15/user/month for business plan Enterprise solutions
40 Intranet Internal website that s only accessible by your staff High initial investment, but great benefits in the long run Easy to manage and maintain
41 Why you need one! Get the same word out quickly! No more water cooler gossip Same message to all employees at the same time Avoid miscommunication and misunderstandings
42 Why you need one (pt 2) Save time and resources! Reduce s Reduce time spent going through s Reduce requests from staff Boost morale! Sense of community Sense of unity (same information) Opportunities to engage Simple and organized
43 Intranet Solutions Google Sites Glasscubes Elcom Bloomfire
44
45 Project Management Tools
46 Tools I used to use: Calendar Tasking Apps Spreadsheets
47 Project Management Software Collaborate Document Manage tasks and deliverables Track objectives Reporting Control cost
48 How do I choose the right one? Your needs are likely to depend on Your project Your team Project-management style.
49 Project Management Software
50 What I use mine for: Keeping track of tasks by location Trouble-shooting issues Follow up Track completion Status inquiries Accountability
51 Doodle Meetings in a snap! Online scheduling tool that can be used quickly and easily to find a date and time to meet with multiple people.
52 How Doodle Works Suggest dates/times Choose participants to invite Doodle creates poll You get results! IT S FREE!
53 FreeConferenceCall.com Free teleconferencing Your own phone number + private pin Quick setup/registration Simple No restrictions/limits
54 Share your screen! Trouble-shooting and training
55 Why It s Different User friendly Simple setup Easy instructions Reliable Free for 9 participants
56 Improving Patient Communication Language Services
57 Overcoming the Language Issue! Benefits of translation services Improve care quality and outcomes Maintain timely patient visits Increase patient diversity There s an app for that!
58 Thousands of questions + instructions in 5 languages: Spanish Cantonese Mandarin Russian Creole More Coming Soon!
59 Language barriers Phrases in database written and reviewed by physician panel Organized around standard historytaking approaches Thoughtfully organized by system and symptom No internet required FREE!
60 Practice Marketing Keep patients coming Online directories Networking for providers Do more!
61 Online Directories 68% of online review readers said they used that information to select a: Drug or medical device Health plan Hospital Pharmacy Physician
62 Online Directories Lead generation Web presence Manage reputation Promote brand Cost effective marketing
63 Online Directories
64 Provider Networking First HIPAA compliant social networking for providers Network with referrers New business Maintain relationships with colleagues and partners Knowledge sharing forums Posting tough cases for input from other professionals
65 Key Facts 190,000 active members 15,000+ secure messages and online faxes daily 1,000 referral/expert searches daily Preview:
66 Administrative Tools Web Reference Resources
67 CMS Physician Fee Schedule Search Search pricing amounts, various payment policy indicators, RVUs, and GPCIs by a single procedure code, a range and a list of procedure codes.
68 The CAQH Practice Admin Module Simplifies data collection for Credentialing Claims processing Quality assurance Emergency response Member services Online Interview Multiple providers
69 CAQH: Practice Admin Module Simple and free Data is safe and secure Reduces paperwork & admin burden Data set meet requirements for CAQH and Joint Commission Widely accepted information Manage updates and distribute electronically Re-attest in minutes
70 PQRS & Meaningful Use Resources PQRS Measures: Meaningful Use:
71 Putting the Pieces Together for GI wwwww.asge.org/practicalsolutions
Document Imaging Solutions. The secure exchange of protected health information.
The secure exchange of protected health information. 2 Table of contents 3 Executive summary 3 The high cost of protected health information being at risk 4 The compliance officer s dilemma: keeping PHI
Cybersecurity for Meaningful Use. 2013 FRHA Annual Summit "Setting the Health Care Table: Politics, Economics, Health" November 20-22, 2013
Cybersecurity for Meaningful Use 2013 FRHA Annual Summit "Setting the Health Care Table: Politics, Economics, Health" November 20-22, 2013 Healthcare Sector Vulnerable to Hackers By Robert O Harrow Jr.,
Compliance Challenges. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard. Increased Audits & On-site Investigations
Enabling a HITECH & HIPAA Compliant Organization: Addressing Meaningful Use Mandates & Ensuring Audit Readiness Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard Compliance Mandates Increased
Security Compliance, Vendor Questions, a Word on Encryption
Security Compliance, Vendor Questions, a Word on Encryption Alexis Parsons, RHIT, CPC, MA Director, Health Information Services Security/Privacy Officer Shasta Community Health Center [email protected]
HIPAA COMPLIANCE AND DATA PROTECTION. [email protected] +39 030 201.08.25 Page 1
HIPAA COMPLIANCE AND DATA PROTECTION [email protected] +39 030 201.08.25 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and EagleHeaps
THE IMPORTANCE OF EMAIL ENCRYPTION IN THE HEALTHCARE INDUSTRY
THE IMPORTANCE OF EMAIL ENCRYPTION IN THE HEALTHCARE INDUSTRY EXECUTIVE SUMMARY Email is a critical business communications tool for organizations of all sizes. In fact, a May 2009 Osterman Research survey
Have you ever accessed
HIPAA and Your Mobile Devices Not taking the appropriate precautions can be very costly. 99 BY MARK TERRY Alexey Poprotskiy Dreamstime.com Have you ever accessed patient data offsite using a laptop computer,
Electronic Communication In Your Practice. How To Use Email & Mobile Devices While Maintaining Compliance & Security
Electronic Communication In Your Practice How To Use Email & Mobile Devices While Maintaining Compliance & Security Agenda 1 HIPAA and Electronic Communication 2 3 4 Using Email In Your Practice Mobile
How To Find Out What People Think About Hipaa Compliance
Healthcare providers attitudes towards HIPAA compliance in 2015 Created July, 27 2015 Healthcare providers attitudes towards HIPAA compliance in 2015 Over the course of this last year the healthcare industry
SOOKASA WHITEPAPER HIPAA COMPLIANCE. www.sookasa.com
SOOKASA WHITEPAPER HIPAA COMPLIANCE www.sookasa.com Demystifying HIPAA Compliance in the Cloud Healthcare s challenges There s no shortage of signals that the healthcare industry is under pressure: To
Securing Patient Portals. What You Need to Know to Comply With HIPAA Omnibus and Meaningful Use
Securing Patient Portals What You Need to Know to Comply With HIPAA Omnibus and Meaningful Use September 2013 Table of Contents Abstract... 3 The Carrot and the Stick: Incentives and Penalties for Securing
A PRACTICAL GUIDE TO USING ENCRYPTION FOR REDUCING HIPAA DATA BREACH RISK
A PRACTICAL GUIDE TO USING ENCRYPTION FOR REDUCING HIPAA DATA BREACH RISK Chris Apgar Andy Nieto 2015 OVERVIEW How to get started assessing your risk What your options are how to protect PHI What s the
HOW EMAIL ENCRYPTION STRENGTHENS SECURITY. www.zixcorp.com THE LEADER IN EMAIL ENCRYPTION
HOW EMAIL ENCRYPTION STRENGTHENS SECURITY www.zixcorp.com THE LEADER IN EMAIL ENCRYPTION THE SECURITY YOU NEED NOW Whether you are a HIPAA-covered entity or business associate, the changes to HIPAA through
HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing
HIPAA Omnibus Rule Practice Impact Kristen Heffernan MicroMD Director of Prod Mgt and Marketing 1 HIPAA Omnibus Rule Agenda History of the Rule HIPAA Stats Rule Overview Use of Personal Health Information
Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services
Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services Introduction Patient privacy has become a major topic of concern over the past several years. With the majority of
HIPAA COMPLIANCE AND
INTRONIS CLOUD BACKUP & RECOVERY HIPAA COMPLIANCE AND DATA PROTECTION CONTENTS Introduction 3 The HIPAA Security Rule 4 The HIPAA Omnibus Rule 6 HIPAA Compliance and Intronis Cloud Backup and Recovery
Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services
Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services 1 Contents 3 Introduction 5 The HIPAA Security Rule 7 HIPAA Compliance & AcclaimVault Backup 8 AcclaimVault Security and
Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches
Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches Speakers Phillip Long CEO at Business Information Solutions Art Gross President & CEO of HIPAA
COMPLIANCE ALERT 10-12
HAWAII HEALTH SYSTEMS C O R P O R A T I O N "Touching Lives Every Day COMPLIANCE ALERT 10-12 HIPAA Expansion under the American Recovery and Reinvestment Act of 2009 The American Recovery and Reinvestment
HIPAA PRIVACY AND SECURITY AWARENESS
HIPAA PRIVACY AND SECURITY AWARENESS Introduction The Health Insurance Portability and Accountability Act (known as HIPAA) was enacted by Congress in 1996. HIPAA serves three main purposes: To protect
HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services
HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services How MSPs can profit from selling HIPAA security services Managed Service Providers (MSP) can use the Health Insurance Portability
HIPAA Privacy and Information Security Management Briefing
HIPAA Privacy and Information Security Management Briefing Karen Pagliaro-Meyer Privacy Officer [email protected] (212) 305-7315 Soumitra Sengupta Information Security Officer [email protected] (212)
This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in
This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in the HIPAA Omnibus Rule of 2013. As part of the American
The CIO s Guide to HIPAA Compliant Text Messaging
The CIO s Guide to HIPAA Compliant Text Messaging Executive Summary The risks associated with sending Electronic Protected Health Information (ephi) via unencrypted text messaging are significant, especially
Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits
HIPAA Breaches, Security Risk Analysis, and Audits Derrick Hill Senior Health IT Advisor Kentucky REC Why Does Privacy and Security Matter? Trust Who Must Comply with HIPAA Rules? Covered Entities (CE)
Secure Cloud Hosting for Healthcare Organizations
Secure Cloud Hosting for Healthcare Organizations OUR MISSION FIREHOST MISSION Our core is an unshakable, no compromise commitment to protect our customer's digital assets with integrity and innovation
The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance
Date: 07/19/2011 The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance PCI and HIPAA Compliance Defined Understand
FTP-Stream Data Sheet
FTP-Stream Data Sheet Problem FTP-Stream solves four demanding business challenges: Global distribution of files any size. File transfer to / from China which is notoriously challenging. Document control
Ensuring HIPAA Compliance with Computer BYTES Online Backup and Archiving Services
Ensuring HIPAA Compliance with Computer BYTES Online Backup and Archiving Services Page 2 of 8 Introduction Patient privacy has become a major topic of concern over the past several years. With the majority
HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist
HIPAA Omnibus Rule Overview Presented by: Crystal Stanton MicroMD Marketing Communication Specialist 1 HIPAA Omnibus Rule - Agenda History of the Omnibus Rule What is the HIPAA Omnibus Rule and its various
STRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
7 Ways your Fax Machine is Putting You at Risk for Identity Theft. How is your company protecting private information in everyday transactions?
WHITEPAPER 7 Ways your Fax Machine is Putting You at Risk for Identity Theft How is your company protecting private information in everyday transactions? 2010 DPD International All Rights Reserved. This
Joe Dylewski President, ATMP Solutions
Joe Dylewski President, ATMP Solutions Joe Dylewski President, ATMP Solutions Assistant Professor, Madonna University 20 Years, Technology and Application Implementation Experience Served as Michigan Healthcare
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization
How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization Alertsec offers Cloud Managed - Policy Controlled - Security Modules for Ensuring Compliance at the Endpoints Contents
Email Encryption Services
Services ZixCorp provides easy-to-use email encryption services for privacy and regulatory compliance. As the largest email encryption services provider, ZixCorp protects tens of millions of members in
Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind
Page1 Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind The use of electronic medical records (EMRs) to maintain patient information is encouraged today and
HIPAA Privacy and Security
HIPAA Privacy and Security Course ID: 1020 - Credit Hours: 2 Author(s) Kevin Arnold, RN, BSN Accreditation KLA Education Services LLC is accredited by the State of California Board of Registered Nursing,
COLLEAGUES. CLIENTS. CONNECTED. CLOUD.
COLLEAGUES. CLIENTS. CONNECTED. CLOUD. THOMSON REUTERS Simplifying your life with powerful, integrated and innovative solutions. The Tax & Accounting business of Thomson Reuters provides the profession
HIPAA Compliance and the Protection of Patient Health Information
HIPAA Compliance and the Protection of Patient Health Information WHITE PAPER By Swift Systems Inc. April 2015 Swift Systems Inc. 7340 Executive Way, Ste M Frederick MD 21704 1 Contents HIPAA Compliance
Securing Data on Portable Media. www.roxio.com
Securing Data on Portable Media www.roxio.com Contents 2 Contents 3 Introduction 4 1 The Importance of Data Security 5 2 Roxio Secure 5 Security Means Strong Encryption 6 Policy Control of Encryption 7
HIPAA Compliance: Are you prepared for the new regulatory changes?
HIPAA Compliance: Are you prepared for the new regulatory changes? Baker Tilly CARIS Innovation, Inc. April 30, 2013 Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed
Data Breach and Senior Living Communities May 29, 2015
Data Breach and Senior Living Communities May 29, 2015 Todays Objectives: 1. Discuss Current Data Breach Trends & Issues 2. Understanding Why The Senior Living Industry May Be A Target 3. Data Breach Costs
How To Print With P2C
Introducing print2cloud247 Secure Printing from the Cloud Print2Cloud247 is a print mobility software solution that is highly secure, easy to manage, completely agnostic and provides mobile printing from
HIPAA Compliance: Efficient Tools to Follow the Rules
Bank of America Merrill Lynch White Paper HIPAA Compliance: Efficient Tools to Follow the Rules Executive summary Contents The stakes have never been higher for compliance with the Health Insurance Portability
Cloud Collaboration: Strategies and Technologies. Bud Porter-Roth Porter-Roth Associates
Cloud Collaboration: Strategies and Technologies Bud Porter-Roth Independent, vendor neutral, consulting in: Cloud Information Management (CIM) Electronic Document Management Document Imaging Records Management
HIPAA regulation: The challenge of integrating compliance and patient care
HIPAA regulation: The challenge of integrating compliance and patient care January 2016 Contents Introduction 3 HIPAA s technology neutral structure 3 creates opportunity and challenge Compliance can pave
A New Standard in Encrypted Email. A discussion on push, pull and transparent delivery
A New Standard in Encrypted Email A discussion on push, pull and transparent delivery By ZixCorp November 2010 2 Email enhances our daily business life. It enables efficient, real-time communication, unites
Reporting of HIPAA Privacy/Security Breaches. The Breach Notification Rule
Reporting of HIPAA Privacy/Security Breaches The Breach Notification Rule Objectives What is the HITECH Act? An overview-what is Protected Health Information (PHI) and can I protect patient s PHI? What
What Are The Odds Of a HIPAA Audit?
What Are The Odds Of a HIPAA Audit? 1 Random Odds The law Outline Why is enforcement up? What types of audits and what causes them Examples of enforcement What can you do to avoid audits and fines 2 3
OCR/HHS HIPAA/HITECH Audit Preparation
OCR/HHS HIPAA/HITECH Audit Preparation 1 Who are we EHR 2.0 Mission: To assist healthcare organizations develop and implement practices to secure IT systems and comply with HIPAA/HITECH regulations. Education
Email Encryption Services
Services ZixCorp provides easy-to-use email encryption services for privacy and regulatory compliance. As the largest email encryption services provider, ZixCorp protects tens of millions of members in
Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, 2014 2:15pm 3:30pm
Electronic Health Records: Data Security and Integrity of e-phi Worcester, MA Wednesday, 2:15pm 3:30pm Agenda Introduction Learning Objectives Overview of HIPAA HIPAA: Privacy and Security HIPAA: The Security
HIPAA: Bigger and More Annoying
HIPAA: Bigger and More Annoying Instructor: Laney Kay, JD Contact information: 4640 Hunting Hound Lane Marietta, GA 30062 (770) 312-6257 (770) 998-9204 (fax) [email protected] www.laneykay.com OFFICIAL
Five Ways to Improve Electronic Patient Record Handling for HIPAA/HITECH with Managed File Transfer
Five Ways to Improve Electronic Patient Record Handling for HIPAA/HITECH with Managed File Transfer 1 A White Paper by Linoma Software INTRODUCTION The healthcare industry is under increasing pressure
Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. [email protected] www.uslegalsupport.com
Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. [email protected] www.uslegalsupport.com HIPAA Privacy Rule Sets standards for confidentiality and privacy of individually
The HITECH Act: Implications to HIPAA Covered Entities and Business Associates. Linn F. Freedman, Esq.
The HITECH Act: Implications to HIPAA Covered Entities and Business Associates Linn F. Freedman, Esq. Introduction and Overview On February 17, 2009, President Obama signed P.L. 111-05, the American Recovery
Welcome to Sookasa. Getting Started Guide for SafeMonk users
Welcome to Sookasa Getting Started Guide for SafeMonk users Welcome to Sookasa! About Us Like Safemonk, Sookasa provides Dropbox encryption to protect your information at the file level, so it s safe both
Security Is Everyone s Concern:
Security Is Everyone s Concern: What a Practice Needs to Know About ephi Security Mert Gambito Hawaii HIE Compliance and Privacy Officer July 26, 2014 E Komo Mai! This session s presenter is Mert Gambito
