TABLE OF CONTENTS INTRODUCTION USE CASES FOR CONVERSION BETWEEN DIRECT AND XDR DATAMOTION XDR IMPLEMENTATION GLOSSARY OF TERMS
|
|
|
- Christopher Sutton
- 10 years ago
- Views:
Transcription
1
2 TABLE OF CONTENTS INTRODUCTION USE CASES FOR CONVERSION BETWEEN DIRECT AND XDR Conversion from Direct SMTP+S/MIME Messages to XDR Conversion from XDR to SMTP+S/MIME Data Transmission between two EHRS that use XDR XDM to XDR Handoff DATAMOTION XDR IMPLEMENTATION GLOSSARY OF TERMS
3 Electronic data exchange in healthcare is commonly utilized via network environments based on the SOAP-based Web Services protocols with detailed metadata. They utilize a family of IHE profiles, each applied to a different type of use case, which have a common metadata model and make use of Web Services in a common way. Implementation of data exchange in these environments is based on the XDR (Cross-Enterprise Document Reliable Interchange) and XDM (Cross-enterprise Document Media Interchange) specifications. XDR is a SOAP-based standard protocol for the description and encoding of data. It uses a web based point-to-point push network communication permitting Direct interaction between healthcare systems. XDM specification describes the format of the XML-based payload utilized to transfer documents and metadata using attachments and physical media. It also supports the use of web services to transfer data. XDR protocol with XDM payloads is utilized in the EHR systems deployed by major vendors such as Epic and MEDITECH, and predate the Direct Project by many years. In order to provide a uniform data delivery mechanism for the healthcare industry, such environments need to interoperate with the more recently introduced Direct Project that uses SMTP (RFC 5322) protocol as the primary content delivery mechanism. This paper covers the use cases associated with utilizing the XDR protocol for Direct Secure Messaging and its interoperability with SMTP for transferring healthcare-related documents between the following endpoints: A Direct HISP sending SMTP+S/MIME messages to an EHR that uses XDR. An EHR sending XDR messages to a Direct HISP that uses SMTP+S/MIME. An EHR sending XDR messages to another EHR that uses XDR via a single Direct HISP. An EHR sending XDR messages to another EHR that uses XDR via multiple Direct HISPs. For this use case, the paper also covers the topic of packaging conversion between XDR to XDM and back. In this case, an SMTP message is sent from a Direct user to an EHR system, which supports a SOAP endpoint. The HISP converts the message from an SMTP+S/MIME to SOAP/XML. A Direct Secure Message with files is sent from a provider s desktop to the Direct HISP. The HISP then converts the message to an XDM ZIP format. The necessary metadata is extracted from the XDM message by the XDR protocol, converted to a SOAP XML format, and sent to an Epic or MEDITECH system. The recipient then downloads the message from the EHR System.
4 The following use case is illustrated in the diagram below: A message is delivered via SMTP+S/MIME to a HISP; the received message is decrypted via a private key store. The intended recipient s address is verified via an address book database. The metadata from the XDM is extracted and converted to an XDR format. This message is then sent over TLS to an EHR, which then delivers it to a Direct Message Recipient.
5 In this case an XDR/SOAP message is sent through an EHR system. Upon receiving the message, the HISP converts it to an SMTP+S/MIME message which is then delivered securely to the recipient. The following use case is illustrated in the diagram below: An XDR formatted message is sent from an EHR to a receiving HISP. The XDR metadata is converted to an XDM message with a ZIP file, and the destination address is extracted from the XDR metadata. The destination address certificate is located from an address book. The S/MIME message is signed with a private key from a private key store. The S/MIME message is then encrypted with the destination certificate and sent encrypted to a Direct Message recipient.
6 There are two (2) different delivery scenarios when data is transmitted from one EHR to another EHR: When both EHRs are on the same HISP, a C-CDA message is encoded to an XDR message. The message is sent using SOAP web services over TLS to the HISP. The HISP will then send the message to the receiving EHR over TLS and the EHR will convert it back to a C- CDA formatted message. This is illustrated in Figure 3.
7 If the EHRs are parts of two (2) different HISPS, the delivery between these two (2) EHRs is different: Figure 4 - EHR-EHR delivery using different HISPs While the above uses cases cover end-to-end delivery of a direct message through various different methodologies, there have been some lingering questions as to the specific message format of the XDM to XDR handoff when the data is converted from XDR into SMTP with XDM payload and back. The Direct Project Wiki Section 5.2 ( Packaging Conversion from XDM to XDR ) provides detailed guidelines as to how the conversion should take place. Typically, the contents of an XDM message are sent as a zip file, and the EHR will accept the message, extract the ZIP file and the XML, and deliver the message as shown in Figure 1. The IHE specification does not specify how the zip files are attached. The specified guideline is: if there are several zip attachments, each one of them has to be tested for compliance with XDM before being implemented.
8 From the above referenced document: An XDM zip package contains a root directory, which includes a set of manifest content, and an IHE_XDM directory, which contains a set of subdirectories, each of which contain a packaged context with a metadata file equivalent to that provided in a XDR transaction. A single XDR transaction has to be constructed for each XDM subdirectory that has a metadata file. Additional details for the conversion are referenced at the end of Section 5.2 in the cited document. The table below is adopted from the educational material on the topic of XDR/XDM conversion provided by the ONC. summarizes the payload conversions that take place in these scenarios. RFC5322+MIME RFC5322+XDM SOAP+XDR RFC5322+MIME No conversion No conversion Receiver expected to be able to handle MIME packages Transport Conversion Metadata created RFC5322+XDM No conversion Receiver expected to be able to handle XDM packages No conversion Transport Conversion Metadata simply transformed SOAP + XDR Transport Conversion Transport Conversion No conversion Metadata simply transformed Metadata simply transformed Package delivered as XDM Package delivered as XDM The cell highlighted in the table represents the use case of transmission from XDR sender to SMTP recipient as illustrated in the diagram below.
9 As an EHNAC-accredited HISP, DataMotion participates in the DirectTrust bundle and can enable exchanging of Direct Secure Messages between the users of DataMotion and other HISPs. When the DataMotion client (typically an ACO) has an EHR that utilizes the XDR protocol for communicating with other healthcare entities, DataMotion bridges the gap between XDR protocols to Direct Addresses as illustrated in Table 1. The diagram below illustrates an example of sending an XDR message to a recipient that uses SMTP represented in the crossover of the last row and first column in Table 1 above. The recipient can be a user of DataMotion or of another HISP.
10 ACO CCDA EHR HISP Metadata ONC S/MIME SOAP TLS XDM XDR Acute Care Organization Continuing Care Document Architecture which allows healthcare entities to efficiently exchange patient information between points of care Electronic Health Record- health related information that conforms to nationally recognized interoperability standards Health Information Service Provider is an service provider that follows the Direct Project standards for providing users with a secure address for secure communication. It is defined as data about data. It identifies the creator, time and date, purpose, etc. of the data. The Office of the National Coordinator of Health Information Technology Secure/Multipurpose Internet Mail Extensions is a standard for encryption and signing MIME data. It is widely used in healthcare communications. Simple Access Object Protocol is a web services protocol used quite a bit in the healthcare industry to exchange information across enterprises. Transport Layer Security Cross-enterprise Document Media Interchange: specification that describes the format of the XML-based payload utilized to transfer documents and metadata using attachments and physical media. Cross-enterprise Document Reliable Interchange is a standard protocol for the description and encoding of data. It uses a web based point to point push network communication permitting direct interaction between healthcare systems.
11 Copyright , DataMotion, Inc. ( DataMotion ). ALL RIGHTS RESERVED. Your right to print, copy, reproduce, publish or distribute this document or parts of this document is limited by copyright law. DataMotion is a registered trademark of DataMotion, Inc. All other brand and product names are trademarks or registered trademarks of their respective companies. The information contained in this document is subject to change without notice. THIS DOCUMENT IS PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND. IN NO EVENT SHALL DATAMOTION BE LIABLE FOR INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY KIND ARISING FROM ANY ERROR IN THIS DOCUMENT, INCLUDING WITHOUT LIMITATION ANY LOSS OR INTERRUPTION OF BUSINESS, PROFITS, USE, OR DATA. Use Cases for XDR, (Cross-enterprise Document Reliable Interchange) Publication Date: November Printed in the United States of America. DataMotion, Inc. Confidential and Proprietary Information. Published By: DataMotion, Inc. 200 Park Avenue Florham Park, NJ USA or
Practical Guidance to Implement Meaningful Use Stage 2. Secure Health Transport for Certification and Meaningful Use
Practical Guidance to Implement Meaningful Use Stage 2 1. Introduction Association Standards and Interoperability Workgroup Meaningful Use (MU) Stage 2 introduces three transport standards for use in healthcare
The Direct Project Overview
The Direct Project Overview October 11, 2010 Abstract: The Direct Project specifies a simple, secure, scalable, standards-based way for participants to send authenticated, encrypted health information
The Direct Project Reference Implementation Architecture
The Direct Project Reference Implementation Architecture 1 NwHIN Direct Approach Develop specifications for a secure, scalable, standardsbased way to establish universal health addressing and transport
Direct Secure Messaging: Improving the Secure and Interoperable Exchange of Health Information
Direct Secure Messaging: Improving the Secure and Interoperable Exchange of Health Information Within the healthcare industry, the exchange of protected health information (PHI) is governed by regulations
How To Use Direct Messaging
Demystifying Direct Messaging Orion Health Whitepaper Author: Paul de Bazin, Integration Portfolio Manager Table of Contents 1! Introduction... 3! 2! Background... 3! 2.1! Standard Use Cases... 3! 3! Direct
How To Communicate In Healthcare With Direct Secure Messaging
Direct Secure Messaging Communicating in the Healthcare World Andy Nieto, Health IT Strategist, DataMotion Agenda Email and Direct in healthcare, a little history So what is Direct, really Certificates
Illinois Health Information Exchange Client Readiness Technical Assessment Checklist
Illinois Health Information Exchange Client Readiness Technical Assessment Checklist Date: 10/29/2013 File: ILHIE Client Readiness Document v1.6 Final 3-3-14.doc Page 1 Table of Contents Client Information...
IHE IT Infrastructure Technical Framework Supplement. Document Encryption (DEN) Trial Implementation
Integrating the Healthcare Enterprise 5 IHE IT Infrastructure Technical Framework Supplement 10 Document Encryption (DEN) 15 Trial Implementation 20 Date: August 19, 2011 Author: ITI Technical Committee
Transglobal Secure Collaboration Program Secure E-mail v.1 Gateway Design Principles
Transglobal Secure Collaboration Program Secure E-mail v.1 Gateway Design Principles Prepared by: CP Secure E-mail v.1 Project Team Version: 2.0.2 Date: 16 July 2012 Page i Copyright 2012 Transglobal Secure
Bridging People and Process. Bridging People and Process. Bridging People and Process. Bridging People and Process
USER MANUAL DATAMOTION SECUREMAIL SERVER Bridging People and Process APPLICATION VERSION 1.1 Bridging People and Process Bridging People and Process Bridging People and Process Published By: DataMotion,
Options for encrypted e-mail communication with AUDI AG Version of: 31 May 2011
Options for encrypted e-mail communication with AUDI AG Version of: 31 May 2011 1 Options for encrypted e-mail communication with AUDI AG Confidential information may only be transmitted in encrypted form
Data Provenance. Functional Requirements Document: Developed in Response to the Data Provenance Task Force Recommendations. Version 1.
Data Provenance Functional Requirements Document: Developed in Response to the Data Provenance Task Force Recommendations Version 1.0 May 2015 Version History Version Revision Author Description of Change
EHR Vendor Support for Meaningful Use Stage 2 Certification and Implementation Direct Basics & Transitions of Care. February 19, 2013 2:00 PM EST
EHR Vendor Support for Meaningful Use Stage 2 Certification and Implementation Direct Basics & Transitions of Care February 19, 2013 2:00 PM EST Initial Curriculum Topics Today s Session is focused on:
uently Asked NextGen Questions Share Frequently Asked uently Asked Questions Frequently Asked FAQ Pre-General Release (April-June 2014)
uestions Frequently Asked Questions Fre uestions Frequently Asked Questions Fre uestions FAQ Frequently Asked Questions Fre uestions Frequently Asked Questions Fre uestions Frequently Asked Questions Fre
New Security Features
New Security Features BlackBerry 10 OS Version 10.3.1 Published: 2014-12-17 SWD-20141211141004210 Contents About this guide... 4 Advanced data at rest protection... 5 System requirements... 6 Managing
March 2005. PGP White Paper. Transport Layer Security (TLS) & Encryption: Complementary Security Tools
March 2005 PGP White Paper Transport Layer Security (TLS) & Encryption: Complementary Security Tools PGP White Paper TLS & Encryption 1 Table of Contents INTRODUCTION... 2 HISTORY OF TRANSPORT LAYER SECURITY...
IMAGE SHARING. Review and Update - A Fond Farewell to CDs 2012
IMAGE SHARING Review and Update - A Fond Farewell to CDs 2012 David S. Mendelson, M.D. Professor of Radiology Chief of Clinical Informatics The Mount Sinai Medical Center Co-chair IHE International Board
Navigating the Trends in Health Care Today. MEDITECH Solutions for Meaningful Use and Interoperability
Navigating the Trends in Health Care Today MEDITECH Solutions for Meaningful Use and Interoperability Certification Update EHRs Meeting ONC 2014 Standards "There is no such thing as being 'Stage 1 Certified'
Prepared by Noam H. Arzt, PhD HLN Consulting, LLC
Architectures and Transport Mechanisms for Health Information Interchange of Clinical EHR Data for Syndromic Surveillance A Report from the International Society for Disease Surveillance Prepared by Noam
Business and Technical Description of Commercial Systems The scope of the technical solution is further described below.
Introduction MaxMD is pleased to provide the Pennsylvania ehealth Partnership Authority (Authority) the Business and Technical Requirements report under the Lab Grant pilot project. We have demonstrated
Clearswift Information Governance
Clearswift Information Governance Implementing the CLEARSWIFT SECURE Encryption Portal on the CLEARSWIFT SECURE Email Gateway Version 1.10 02/09/13 Contents 1 Introduction... 3 2 How it Works... 4 3 Configuration
Exchanging Medical Records Online with Direct
Exchanging Medical Records Online with Direct Scott Rea, VP GOV/EDU Relations & Sr. PKI Architect, DigiCert, Inc. [email protected] www.digicert.com +1 (801) 877-2100 Exchanging Medical Records Online
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Statewide Send and Receive Patient Record Exchange. Technical Specification
Statewide Send and Receive Patient Record Exchange Technical Specification Version 1.1 January 10, 2013 Technical Specification Statewide Send and Receive Patient Record Exchange Version: [1.1] Revision
Arizona Health Information Exchange Marketplace. Requirements and Specifications Health Information Service Provider (HISP)
Arizona Health Information Exchange Marketplace Requirements and Specifications Health Information Service Provider (HISP) Table of Contents Table of Contents... 1 Introduction... 2 Purpose... 3 Scope...
PrivaSphere Gateway Certificate Authority (GW CA)
PrivaSphere Gateway Certificate Authority (GW CA) Send and receive secure emails with your email program through restricting firewalls using SMIME gateway functionalities. PrivaSphere Secure Messaging
Policy Based Encryption Essentials. Administrator Guide
Policy Based Encryption Essentials Administrator Guide Policy Based Encryption Essentials Administrator Guide Documentation version: 1.0 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved.
Clinical Document Exchange Integration Guide - Outbound
Clinical Document Exchange Integration Guide - Outbound Integrate your healthcare IT system with Practice Fusion s Electronic Health Record (EHR) System Table of Contents 1 Introduction... 2 2 Integration
EHR Interoperability Framework Overview
Hospital Health Information System EU HIS Contract No. IPA/2012/283-805 Final version July 2015 Visibility: Public Target Audience: EHR Developers EHR Administrators EPR Systems Developers This document
<your organization logo> Make the Connection to <your organization name>
Make the Connection to The problem: Electronic health information exchange is challenging Local Care Community HIEs/HISPs No EHR Acute EHR Long term/post
StreamServe Encryption and Authentication
StreamServe Encryption and Authentication User Guide 4.1.2 SP2 Rev A StreamServe Encryption and Authentication User Guide 4.1.2 SP2 Rev A 2007 StreamServe, Inc. StreamServe is a trademark of StreamServe,
Quest Collaboration Services 3.6.1. How it Works Guide
Quest Collaboration Services 3.6.1 How it Works Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
Structured Data Capture (SDC) Trial Implementation
Integrating the Healthcare Enterprise 5 IHE Quality, Research, and Public Health Technical Framework Supplement 10 Structured Data Capture (SDC) 15 Trial Implementation 20 Date: October 27, 2015 Author:
CA DLP. Release Notes for Advanced Encryption. r12.0
CA DLP Release Notes for Advanced Encryption r12.0 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational purposes
Open Platform. Clinical Portal. Provider Mobile. Orion Health. Rhapsody Integration Engine. RAD LAB PAYER Rx
Open Platform Provider Mobile Clinical Portal Engage Portal Allegro PRIVACY EMR Connect Amadeus Big Data Engine Data Processing Pipeline PAYER CLINICAL CONSUMER CUSTOM Open APIs EMPI TERMINOLOGY SERVICES
Expanded Support for Medicaid Health Information Exchanges
Expanded Support for Medicaid Health Information Exchanges Joint Public Health Forum & CDC Nationwide Webinar April 21, 2016 CDC EHR Meaningful Use Webpage-Joint Public Health Forum & CDC Nationwide Webinars
Developers Integration Lab (DIL) System Architecture, Version 1.0
Developers Integration Lab (DIL) System Architecture, Version 1.0 11/13/2012 Document Change History Version Date Items Changed Since Previous Version Changed By 0.1 10/01/2011 Outline Laura Edens 0.2
Boundary Encryption.cloud Deployment Process Overview
Boundary Encryption.cloud Deployment Process Overview Boundary Encryption.cloud Deployment Process Overview Documentation version: 1.0 Legal Notice Legal Notice Copyright 2011 Symantec Corporation. All
Web Services Trust and XML Security Standards
Web Services Trust and XML Security Standards Date: April 9, 2001 Version: 1.0 Copyright 2001-2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States
Transport Layer Security (TLS) About TLS
Transport Layer Security (TLS) About TLS Contents Secure email at HSBC 2 About Transport Layer Security. 2 Setting up a Forced TLS connection with HSBC 4 Glossary... 5 Support..... 5 Secure email at HSBC
redcoal EmailSMS for MS Outlook and Lotus Notes
redcoal EmailSMS for MS Outlook and Lotus Notes Technical Support: [email protected] Or visit http://www.redcoal.com/ All Documents prepared or furnished by redcoal Pty Ltd remains the property of redcoal
Setting Up an AS4 System
INT0697_150625 Setting up an AS4 system V1r0 1 Setting Up an AS4 System 2 Version 1r0 ENTSOG AISBL; Av. de Cortenbergh 100, 1000-Brussels; Tel: +32 2 894 5100; Fax: +32 2 894 5101; [email protected], www.entsog.eu,
Quest Collaboration Services 3.5. How it Works Guide
Quest Collaboration Services 3.5 How it Works Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
New Security Features
New Security Features BlackBerry 10 OS Version 10.3.2 Published: 2015-06-08 SWD-20150608104314635 Contents About this guide... 4 What's new... 4 NFC smart card support... 5 OCSP stapling support in the
McAfee Email Gateway 7.x Encryption and IronPort Integration Guide
Sample deployment architecture For this guide, we have provided a deployment architecture example. This example includes an IronPort Email Gateway sending outbound email, and the McAfee Email Gateway Encryption
IHE IT Infrastructure White Paper. Health Information Exchange: Enabling Document Sharing Using IHE Profiles
Integrating the Healthcare Enterprise IHE IT Infrastructure White Paper Health Information Exchange: Enabling Document Sharing Using IHE Profiles Date: January 24, 2012 Author: Email: Karen Witting, John
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
StreamServe Persuasion SP4 Encryption and Authentication
StreamServe Persuasion SP4 Encryption and Authentication User Guide Rev A StreamServe Persuasion SP4 Encryption and Authentication User Guide Rev A 2001-2009 STREAMSERVE, INC. ALL RIGHTS RESERVED United
Securing Web Services With SAML
Carl A. Foster CS-5260 Research Project Securing Web Services With SAML Contents 1.0 Introduction... 2 2.0 What is SAML?... 2 3.0 History of SAML... 3 4.0 The Anatomy of SAML 2.0... 3 4.0.1- Assertion
Structured Data Capture (SDC) Draft for Public Comment
Integrating the Healthcare Enterprise 5 IHE Quality, Research, and Public Health Technical Framework Supplement 10 Structured Data Capture (SDC) 15 Draft for Public Comment 20 Date: June 6, 2014 Author:
Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability
Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical
ConCert by HIMSS Certification: An Overview
ConCert by HIMSS Certification: An Overview This paper provides an introduction to the ConCert by HIMSS certification program. An overview of the 2015 Certification Pilot program is also provided along
StreamServe Persuasion SP5 Encryption and Authentication
StreamServe Persuasion SP5 Encryption and Authentication User Guide Rev A StreamServe Persuasion SP5 Encryption and Authentication User Guide Rev A 2001-2010 STREAMSERVE, INC. ALL RIGHTS RESERVED United
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
SAP HANA Cloud Integration CUSTOMER
CUSTOMER Table of Contents 1 Introduction.... 3 2 from a Bird s Eye Perspective....4 3 Integration Capabilities....5 4 Connectivity Options....7 5 Using Predefined Integration Content....8 6 Security....
mkryptor allows you to easily send secure emails. This document will give you a technical overview of how. mkryptor is a software product from
Technical Overview mkryptor allows you to easily send secure emails. This document will give you a technical overview of how. mkryptor is a software product from Contents What is mkryptor? 1 Mkryptor VS
The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.
Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components
Information on Syslog For more information on syslog, see RFC 5424. Released: December 2006 Interoperability issues: None. Table 1: Syslog at a Glance
Syslog on Spectralink 84-Series Handsets Syslog is a standard for logging data and forwarding log messages in an IP network. You can use syslog to manage and secure devices, and to generate informational,
CA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Chapter 6 Electronic Mail Security
Cryptography and Network Security Chapter 6 Electronic Mail Security Lectured by Nguyễn Đức Thái Outline Pretty Good Privacy S/MIME 2 Electronic Mail Security In virtually all distributed environments,
Administration Guide. Wireless software upgrades
Administration Guide Wireless software upgrades SWDT207654-207654-0727045705-001 Contents Upgrading the BlackBerry Device Software over the wireless network... 3 Wireless software upgrades... 3 Sources
Burning Issues Health Information Exchange Webinar Series Session 2: HIE for Meaningful Use Stage 2 Summary of Care Record for Transitions of Care
Burning Issues Health Information Exchange Webinar Series Session 2: HIE for Meaningful Use Stage 2 Summary of Care Record for Transitions of Care Joe Kalaidis, Health IT Consultant Regional Extension
Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group
Using Self Certified SSL Certificates Paul Fisher Systems Consultant [email protected] Quest Software Desktop Virtualisation Group Quest Software (UK) Limited Ascot House Maidenhead Office Park Westacott
Model User Guide for Implementing Online Insurance Verification
Model User Guide for Implementing Online Insurance Verification Using Web services to verify auto insurance coverage Version 3.0 May 8, 2008 Executive Summary IICMVA s Model User Guide for Implementing
Centers for Disease Control and Prevention, Public Health Information Network Messaging System (PHINMS)
1 ebxml Case Study 2 3 4 5 Centers for Disease Control and Prevention, Public Health Information Network Messaging System (PHINMS) 4 October 2003 6 7 8 9 10 11 12 13 14 15 16 17 Document identifier: (Word)
Commonwealth of Massachusetts Executive Office of Health and Human Services. The Golden Spike Integration Options 8/20/2012
Commonwealth of Massachusetts Executive Office of Health and Human Services The Golden Spike Integration Options 8/20/2012 Agenda Introduction HIE Integration Options HIE Integration Specifications Golden
Title Draft Pan-Canadian Primary Health Care Electronic Medical Record Content Standard, Version 2.0 Data Extract Specifi cation Business View
pic Title Draft Pan-Canadian Primary Health Care Electronic Medical Record Content Standard, Version 2.0 Data Extract Specifi cation Business View Primary Health Care Who We Are Established in 1994, CIHI
USING SSL/TLS WITH TERMINAL EMULATION
USING SSL/TLS WITH TERMINAL EMULATION This document describes how to install and configure SSL or TLS support and verification certificates for the Wavelink Terminal Emulation (TE) Client. SSL/TLS support
Optus EmailSMS for MS Outlook and Lotus Notes
Optus EmailSMS for MS Outlook and Lotus Notes Service Description, August 2005. OVERVIEW This document provides an overview of the Optus EmailSMS service delivered jointly by Optus and redcoal. It highlights
UN/CEFACT STANDARD BUSINESS DOCUMENT HEADER Technical Specification Version 1.3 2004-6-04
1 2 3 4 5 UN/CEFACT STANDARD BUSINESS DOCUMENT HEADER Technical Specification Version 1.3 2004-6-04 6 UN/CEFACT Standard Business Document Header Technical Specification Page 1 of 82 7 8 9 10 11 12 13
Stage 2 Eligible Professional Meaningful Use Core Measures Measure 15 of 17 Last Updated: August, 2015
Summary of Care Objective Measures Exclusion Table of Contents Definition of Terms Attestation Requirements Additional Information Certification and Standards Criteria Stage 2 Eligible Professional Meaningful
IHE cross-enterprise document sharing for imaging: interoperability testing software
SOFTWARE REVIEW Open Access IHE cross-enterprise document sharing for imaging: interoperability testing software Rita Noumeir *, Bérubé Renaud Abstract Background: With the deployments of Electronic Health
De-Mail. A reliable and secure online communication platform. Armin Wappenschmidt (secunet) More information: www.de-mail.de
De-Mail A reliable and secure online communication platform Armin Wappenschmidt (secunet) More information: www.de-mail.de 1 Agenda Overview of De-Mail Implementation aspects Current status and outlook
Setting up Microsoft Office 365
Integration Guide Revision G McAfee SaaS Email Protection Securing Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft
Index of Innovative Analytics in Healthcare
Index of Innovative Analytics in Healthcare X-ID: machine-assisted de-identification of patient data in order to reduce the risk of re-identification while also preserving its usability for a particular
HotSpot Enterprise Mobile Printing Solution. Security Whitepaper
HotSpot Enterprise Mobile Printing Solution Security Whitepaper August, 2012 2012, Ricoh Americas Corporation. All rights reserved. Ricoh and the Ricoh logo are registered trademarks of Ricoh Company,
GlobalSign Enterprise Solutions
GlobalSign Enterprise Solutions Secure Email & Key Recovery Using GlobalSign s Auto Enrollment Gateway (AEG) 1 v.1.2 Table of Contents Table of Contents... 2 Introduction... 3 The Benefits of Secure Email...
AS2 AND EDI OVER THE INTERNET FAQ
AS2 AND EDI OVER THE INTERNET FAQ A SoftCare EC Inc. White Paper ABOUT SOFTCARE Founded in 1989 and headquartered in British Columbia, SoftCare EC Inc. develops e-business software. Our OpenEC product
4.0. Offline Folder Wizard. User Guide
4.0 Offline Folder Wizard User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this
Open EMS Suite. O&M Agent. Functional Overview Version 1.2. Nokia Siemens Networks 1 (18)
Open EMS Suite O&M Agent Functional Overview Version 1.2 Nokia Siemens Networks 1 (18) O&M Agent The information in this document is subject to change without notice and describes only the product defined
Digital certificates and SSL
Digital certificates and SSL 20 out of 33 rated this helpful Applies to: Exchange Server 2013 Topic Last Modified: 2013-08-26 Secure Sockets Layer (SSL) is a method for securing communications between
Connectivity to Polycom RealPresence Platform Source Data
Polycom RealAccess Security White Paper The Polycom RealAccess service is delivered using the Software as a Service (SaaS) model. This white paper outlines how the service protects sensitive customer data
TEST INSTRUCTIONS FOR CROSS VENDOR EXCHANGE TABLE OF CONTENTS
TEST INSTRUCTIONS FOR CROSS VENDOR EXCHANGE TABLE OF CONTENTS Introduction...2 Meaningful Use Objectives and Measures... 3 Eligible Professionals 495.6(j)(14)... 3 Eligible Hospitals and Critical Access
