White papers

An Expedient Strategy for Image-Enabling an EHR

For large scale healthcare providers including ACOs, large hospital networks, and physician groups, the fundamentals of carecoordination can be daunting. Clinical images and important patient information is, in many cases, scattered across any number of locations, facilities, departments, and systems.

The 7 Essential Layers of Secure Cloud Computing

Cyber theft of patient protected health information (PHI) increased 40 percent between 2009 and 2013, according to an annual survey on data detection policy by the Ponemon Institute.

Why the sudden upsurge?

MU2 Gaps Closing Through Direct Clinical Information Exchange

EMR systems have become an essential staple for any modern healthcare provider for managing patient data. Recent legislation and reimbursement incentives by HIPAA and HiTECH have boosted the adoption of these EMR systems. Despite the rapid, successful adoption of EMRs/EHRs, exchange of information between the systems remains a challenge.

Children’s Minnesota Integrates EHR System with Smart Infusion Pumps

Children’s Minnesota became the first pediatric hospital system to achieve interoperability between their smart IV infusion pumps and electronic health record (EHR) system.

Clinically Integrated Networks and Population Health: Taking the Next Step

Healthcare organizations increasingly face the demands of value-based reimbursement as hospitals and physicians are held accountable for higher quality care delivered at a lower cost. As organizations plan and prepare for value-based care, they also must remain focused on margins threatened by increased cost structure and declines in reimbursement in the current fee-for-service environment.

Top 5 Takeaways From HIPAA Omnibus Audits

Are communications between physicians within your organization secure, and most importantly, HIPAA compliant?

Recent changes to the HIPAA Omnibus Rule demand providers and their partner organizations address security issues to minimize risk when sharing patient health information (PHI).

Mobile technologies and devices from outside of the organization are high risk security targets that must be managed.  The bottom line: providers must guarantee that mobile device usage meets HIPAA compliance standards, and guarantee that all PHI remains confidential.

EBOOK: Preparing for October: Revenue Cycle Management for 2015 ICD-10 Go-Live

In July 2014, the U.S. Department of Health and Human Services (HHS) issued a rule finalizing Oct. 1, 2015 as the new go-live date for healthcare providers, health plans, and healthcare clearinghouses to transition to ICD-10. Per the Health Insurance Portability Accountability Act (HIPAA), the transition to ICD-10 is required for all healthcare organizations.

LATEST RESEARCH: Cloud, Big Data, Mobile and Social Drive Next Generation EMR

A recent IDC study revealed how the emergence of Big Data, mobile technologies, cloud supported applications, and social media trends will play a major role in maximizing the value of data for healthcare organizations.

 This will result in the digital universe doubling in size every two years and multiplying 10-fold between 2013 and 2020 – from 4.4 trillion gigabytes to 44 trillion gigabytes.  

CASE STUDY: Midwest Hospital Saves Through Discovery of Hidden Telecom and IT Costs

Healthcare organizations are undergoing major transformations to combat rapidly rising costs and reimbursement restrictions associated with the Affordable Care Act (ACA). With this legislation in mind, hospitals are strictly regimenting budgets across departments, and are actively seeking opportunities to minimize expenses.

Oftentimes for healthcare IT (HIT) teams, these savings can come from examining and monitoring existing assets within their technologies or telecommunications portfolio, to uncover hidden costs to the bottom line.

Anatomy of a Healthcare Data Breach

Your patient health information (PHI) is not safe.  According to the Identity Theft Resource Center, healthcare data breaches accounted for 44 percent of all breaches in 2013. In fact, 1 out of 10 Americans have been affected by a large healthcare data breaches, resulting in an estimated cost of $5.6 billion

Case Study: North Shore-LIJ Health System Uses HealthShare to Make Care for High-Risk Patients Less Risky

A large healthcare network in Long Island is using InterSystems HealthShare® to connect diverse EHRs and clinical systems, enabling better coordination of care for individuals and populations. The proof-of-concept project is an automated process for managing the care of high-risk obstetrics patients.

Care givers from across the community share complete and up-to-date information on each patient, including alerts of admissions and any problematic lab results. The result is increased safety and patient satisfaction.

Healthcare Security: 10 Steps to Maintaining Data Privacy in a Changing Mobile World

Cyber criminals are increasingly targeting the healthcare industry, because medical identity theft is more lucrative than the theft of personal identification information alone. Meanwhile, health care systems are increasingly vulnerable to attack as electronic health records spread, and as the use of web portals for information exchange with patients and providers becomes more common.

Strategic Interoperability: The Clinical and Business Imperative for Healthcare Organizations

HIMSS Analytics conducted a survey to assess the progress of hospitals’ and health systems’ interoperability initiatives – the drivers for their efforts, benefits they are seeking, challenges they face and new opportunities interoperability provides.