ShadowLink 2. Overview. May 4, 2015. ONLINE SUPPORT emdat.com/ticket/ PHONE SUPPORT (608) 270-6400 ext. 1



Similar documents
Workflow Solutions Data Collection, Data Review and Data Management

Docufide Client Installation Guide for Windows

XIA Configuration Server

enicq 5 System Administrator s Guide

Experian Secure Transport Service

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity

Ajera 8 Installation Guide

1 (11) Paperiton DMS Document Management System System Requirements Release: 2012/

safend a w a v e s y s t e m s c o m p a n y

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Paxera Uploader Basic Troubleshooting

Important. Please read this User s Manual carefully to familiarize yourself with safe and effective usage.

DSI File Server Client Documentation

Installation & Configuration Guide

Setting Up Scan to SMB on TaskALFA series MFP s.

How to Migrate to MailEnable using the Migration Console

Ad Hoc Transfer Plug-in for Outlook Installation Guide

Omgeo OASYS Workstation Installation Guide. Version 6.4 December 13, 2011

Customer Tips. Xerox Network Scanning TWAIN Configuration for the WorkCentre 7328/7335/7345. for the user. Purpose. Background

SyncThru TM Web Admin Service Administrator Manual

STERLING SECURE PROXY. Raj Kumar Integration Management, Inc.

White Paper. Securing and Integrating File Transfers Over the Internet

Mediasite EX server deployment guide

Xerox Mobile Print Cloud

Perceptive Content Security

GlobalSCAPE DMZ Gateway, v1. User Guide

Secure Data Transfer

Web Plus Security Features and Recommendations

Registry Plus Central Registry Tools Systems and IT Personnel Requirements

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

Print Audit Facilities Manager Technical Overview

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

SyncLockStatus Evaluator s Guide

Server Software Installation Guide

redcoal SMS for MS Outlook and Lotus Notes

Xerox Multifunction Devices. Verify Device Settings via the Configuration Report

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation

isupplier PORTAL ACCESS SYSTEM REQUIREMENTS

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Mobile Device Management Version 8. Last updated:

Security White Paper The Goverlan Solution

Installation and Deployment

Installation and Setup Guide

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001

Server Installation, Administration and Integration Guide

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Online Backup Client User Manual

IBM Application Hosting EDI Services Expedite software adds Secure Sockets Layer TCP/IP support

Configuring Security Features of Session Recording

Contents. Before You Install Server Installation Configuring Print Audit Secure... 10

Introduction to the EIS Guide

WhatsUp Gold v16.2 MSP Edition Deployment Guide This guide provides information about installing and configuring WhatsUp Gold MSP Edition to central

Novacura Flow 5. Technical Overview Version 5.6

Centralizing Windows Events with Event Forwarding

Aspera Connect User Guide

Enterprise Solution for Remote Desktop Services System Administration Server Management Server Management (Continued)...

PC-Duo Web Console Installation Guide

MEGA Web Application Architecture Overview MEGA 2009 SP4

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20

Aspera Connect User Guide

IBackup Drive User Guide

Copyright 2013, 3CX Ltd.

Demo of Data transferring (.CSV Files) from EGX300 to Our local PC/Laptop using- FTP

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

Enterprise Manager. Version 6.2. Installation Guide

SysPatrol - Server Security Monitor

smartoci User Guide Secure FTP for Catalog Loads

GFI Product Manual. Deployment Guide

Ipswitch Client Installation Guide

Konica Minolta s Optimised Print Services (OPS)

QMEDET SOLUTIONS CLIENT BUILD INFORMATION REQUEST FORM

Receptionist-Small Business Administrator guide

Installation Notes for Outpost Network Security (ONS) version 3.2

Nexio Connectus with Nexio G-Scribe

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

Ekran System Help File

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3

Desktop Surveillance Help

Device Log Export ENGLISH


Password Reset PRO INSTALLATION GUIDE

DameWare Server. Administrator Guide

Interwise Connect. Working with Reverse Proxy Version 7.x

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version and higher

OneStop Reporting OSR Portal 4.6 Installation Guide

SSL Guide. (Secure Socket Layer)

with the ArchiveSync Add-On Evaluator s Guide 2015 Software Pursuits, Inc.

Redtail CRM Integration. Users Guide Cities Digital, Inc. All rights reserved. Contents i

PROPALMS TSE 6.0 March 2008

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015

OneStop Reporting 3.7 Installation Guide. Updated:

Remote Management Reference

Deployment Planner. inexx Novo Grid Practice Agent HW Requirements.pdf

MHS EMR Program. EMR HIE Integration Toolkit

Mobility Manager 9.0. Installation Guide

Administration Quick Start

Installation and Connection Guide to the simulation environment GLOBAL VISION

Galileo SSL Installation Guide Galileo SSL Client v

Transcription:

ShadowLink 2 Overview May 4, 2015 ONLINE SUPPORT emdat.com/ticket/ PHONE SUPPORT (608) 270-6400 ext. 1

1 Interfacing with Emdat ShadowLink is an Emdat developed product that securely moves data between the Emdat servers and client s PC or server over the public Internet. It encrypts files using Secure Socket Layer (SSL) / Transport Layer Security (TLS) protocols that are embedded in the Microsoft Operating System on the local machine for communication across the Internet. As SSL/TLS uses port 443, there are typically no firewall issues. ShadowLink uses the highest level SSL/TLS protocol that is supported on the client s PC or server. ShadowLink runs on a client s workstation under Microsoft s Server 2008, Server 2012, Vista, Windows 7, and Windows 8 operating systems. 1.1 Local Resources ShadowLink is a service application written using the Microsoft.NET framework, version 4.0 or higher. It runs as a service in the background, but also has a user interface for entering service account credentials. This interface can be used to monitor the service but is not required to be running. During installation, the.net framework version 4 will be installed on the workstation if it s not currently installed. Other than the.net framework (20 MB), ShadowLink has a small footprint on the client workstation (less than 0.5 MB). It uses the local drive for logging and for temporary storage of data while the message is in transit. This temporary storage is cleaned up over time by the ShadowLink service so space is conserved. It requires very little memory or CPU cycles. 1.2 Communication ShadowLink communicates with the Emdat servers over a SSL/TLS connection. ShadowLink uses HTTPS (secure HTTP protocols) to utilize web services running on our servers. Each HTTPS request is authenticated with a service account login ID, client identifier, password, IP address, and workstation name using basic HTTP authentication over a SSL/TLS session. For example, a typical request would be to post a HL7 message with patient information to our server. ShadowLink running on the client s workstation has to successfully authenticate to the Emdat servers to do so. Likewise the ShadowLink client will submit an HTTPS request frequently to our servers to see if any transcriptions are available for downloading. These requests also require authentication. The authentication process also uses the workstation name from the workstation it is running on. This is compared to the workstation name that was recorded when ShadowLink was ShadowLink 2 Overview Page 1 of 6 May 4, 2015

originally configured. This ensures that new instances of ShadowLink cannot be arbitrarily installed without the service account being reset by an authorized user. ShadowLink was designed to encrypt information using SSL/TLS when transmitted to and from the Emdat servers. No SSL certificates are used on the client-side application; the certificates are used from Emdat s servers. The advantage of using this method is that all communications are performed using the secured SSL/TLS connection which was established inside of the client s network; either within the firewall or within the client s firewall DMZ zone. Communication between ShadowLink and the client s EHR system is configurable and set up on a case by case basis. It has capabilities to transfer to the EHR using TCP or transferring to a folder or network path. There is a possibility of additional communication methods such as using web services but it may require custom development. Any inquiries regarding this can be forwarded to your Emdat contact. ShadowLink saves information on the workstation s local hard drive only while it is waiting for a response from the Emdat servers that the patient or Associate information was successfully received or while it is waiting for the EMR (or the file store) to respond that the transcription was successfully received. ShadowLink automatically removes all locally stored information. 2 Messages in an HL/7 Environment ShadowLink transfers: Patient demographic, visit/account, appointment, and order information from the client s information system to the Emdat servers. Outside physician names, addresses, and fax numbers from the client s master file system to the Emdat servers. Transcriptions from the Emdat servers to the client s EMR. Upload documents that were signed in the EHR back to the Emdat Servers for access and storage. Patient Information: For the patient related information, the ShadowLink application installed locally will listen on a specific port for incoming messages. When it receives a message, it will encrypt and forward the message to the Emdat servers where it will be decrypted, parsed, and loaded in the clientspecific tables. When receiving data from the client s system, Emdat is able to accept the fairly standard HL7 formats. The typical messages used by vendor systems are ADT, SIU, ORM, and MFN message types. Transcriptions: ShadowLink 2 Overview Page 2 of 6 May 4, 2015

In a similar fashion, the Emdat messages used to deliver a transcription to the EMR can be produced in a variety of HL7 flavors. Common Message types: MDM (Medical Document Management) ORU (Observation Results Message) Embedded Transcription formats: Some clients prefer flat text with a separate line for every 65 characters of text, each in a unique OBX segment. Others prefer a single OBX segment with linefeeds designated by an HL7 repetition character ( ~ in most cases). Some require the body of the report in an RTF or PDF format. Some are using newer HL7 Content Document Architecture (CDA) formats. Emdat can produce each of these as well as other customized formats. The Emdat servers produce the proper HL7 export message at a specific trigger point within the Emdat InQuiry application. The message is encrypted and queued for delivery by ShadowLink. At the client site, ShadowLink queries the Emdat server at recurring intervals and pulls down these HL7 messages when available. It decrypts the message and then passes it to a specific client-defined IP address and port. Document Upload: The client can send transcriptions signed in the EMR back to the Emdat servers for further processing such as AutoFaxing or print distribution via ShadowPrint and storage. Both MDM and ORU HL7 formats are supported. Integration Process Assumptions: The transcription was created within the Emdat platform. The transcription being imported is identified by the Emdat TID number from the transcription to be replaced. The transcription being replaced is in the Preliminary Folder of InQuiry. The body of the transcription from the client s EMR can be imported and placed into the Transcription Body field of the Emdat transcription record. That is, Emdat will not extract any field values from the Transcription Body nor massage any part of the imported text prior to placing it into the Transcription Body field, with the exception of escaped reserved HL7 characters such as ^~\&. ShadowLink 2 Overview Page 3 of 6 May 4, 2015

3 Other file formats Patient Information: ShadowLink is also configurable to accept patient information in an Emdat-defined fixed-width text (.TXT) format, a customized fixed-width text format, or a.csv format. Emdat can also accept many text-based reports that can be parsed for the required information. Instead of listening to a port for an HL/7 message, ShadowLink is configured to look in a specific directory for the file or to look into a network share. When configured in this manner, ShadowLink looks in the configured location every couple of minutes. When the file is present, the file is encrypted and sent to the Emdat server which decrypts the file, parses the required information, and stores it in the client-specific tables. Transcriptions: Similarly, the transcription export can be created on the Emdat servers in a variety of file formats including Microsoft Word (97-2003),.RTF,.PDF formats and.txt formats. Emdat can build custom or proprietary formats for a client's system as well. The files can be named using a variety of fields and data if necessary. The Emdat Server encrypts the transcription and queues the result. ShadowLink queries the server on a recurring basis and, when a file is present, encrypts the transcription, transfers the file over the internet, decrypts the file, and sends the transcription to a specific IP address and port, or saves the file to a specified directory or network share. 4 Associate information Most clients send copies of transcriptions to outside referring physicians, insurance companies, or government organizations. The Emdat system saves this address information in a clientspecific Associate database. While this database may be updated by hand via Emdat InQuiry, the ShadowLink product allows this database to be updated from the client s EMR database of contacts. This requires the EMR to produce a file of all new associate records, associate records that have changed, or deleted associate records. ShadowLink will look for this file in a specified directory at recurring intervals and, if present, will encrypt the file and move it to the Emdat Servers. The file is decrypted at the Emdat servers and the records are added, updated, or deleted in the Client s Associate database. Emdat support CSV, TXT, and XML file types. Other text-based file types are also available. The data fields used in the Associate Database are: Delete Record 1 or D for delete, blank otherwise. Associate ID the client s system identifier for the Associate. Required to update or delete a record. Associate First Name Associate Middle Initial ShadowLink 2 Overview Page 4 of 6 May 4, 2015

Associate Last Name Business Name Specialty this is used in the address label between Business Name and Address 1. Greeting the greeting used for this associate on letters. (For example, Dear Dr. Smith:.) Address1 Address2 Address3 City State Zip Code Phone Prefix for example, Dr. Suffix for example, M.D. Fax the fax number to send copies of report to Email only used in Australia; not in U.S. Auto-Fax Set to a 1 for AutoFax, 0 otherwise. 5 Requirements ShadowLink runs on a client-supplied Server or PC running Microsoft operating system Server 2008, Server 2012, Vista, Windows 7, or Windows 8. Support for XP SP3 and Server 2003 has been dropped at the same time as Microsoft dropped support for their operating system. ShadowLink versions previously installed on these version will continue to work. However, future versions of ShadowLink will not be designed or tested to run on these operating systems and continued support for these older versions is not supported. The client is responsible for: The PC or Server hardware with a supported Microsoft Windows operating system. Keeping the operating system upgraded with the most recent Microsoft upgrades. Anti-virus and anti-malware software and upgrades. Internet connection. Initial ShadowLink installation. (Emdat can provide assistance via a remote connection.) Specifying the required export, patient, and appointment messages or file formats. Working with Emdat on testing. Ensuring the ShadowLink service stays running The installation involves downloading the ShadowLink installation software from an Emdat website, installing the software, entering a client-specific ID and password into the configuration, and notifying Emdat of the installation. The installation process typically takes less than 5 minutes. Emdat is responsible for: Completing the ShadowLink configuration to extract the required patient and appointment. ShadowLink 2 Overview Page 5 of 6 May 4, 2015

Developing the program to export the transcription into the proper format and configuring ShadowLink to deliver the message / file. Testing of the communication path and file / message formats. Ongoing day-to-day maintenance of backend ShadowLink servers Supporting clients utilizing ShadowLink 6 ShadowLink Overview Client s Practice Management System Demographics information sends from the system to the ShadowLink client Demographic information is forwarded to Server ShadowLink processes demographic information from the client into the database. Client s ShadowLink Client ShadowLink client requests transcriptions from the server, and receives them if available Emdat Web Server The web servers check the database to see if there are any transcriptions to send to the client Emdat Database Transcriptions are sent to the Client s EMR Export servers monitor the database to see if any transcriptions should be processed for transmission. If so, it processes them. Client s EMR Emdat Export Processing Server Farm ShadowLink 2 Overview Page 6 of 6 May 4, 2015