Best of Blogs

June 24, 2011
The following commentaries are the most read postings from HCI's Blogosphere. To read other postings and leave your comments and questions, visit

The following commentaries are the most read postings from HCI's Blogosphere. To read other postings and leave your comments and questions, visit http://www.healthcare-informatics.com/blogs, register with a username and password, and blog away.

Top Trends: What am I Missing?Posted on: 3.17.2008 6:45:56 PM Posted by Anthony Guerra

I recently had a meeting at which I was asked to present some of the major trends in healthcare IT — here they are (these are rough notes):

Investment optimization — Initial monies have been spent (electronic medical record packages) — now it's time to focus on continuing education, optimization, change management, adoption, fostering adoption — getting more people to use more of the system — how do you get the right information to the right clinician at the right time in the right format (Clinical decision support)

Stark — everyone wants to lock up the docs first

ERP optimization — Integrating revenue cycle management, computerized physician order entry (CPOE), operating room scheduling into enterprise resource planning for financial reporting and analytics

Efficiency — staffing/scheduling, patient logistics, asset and patient tracking

Patient safety — reducing medical errors, medication administration, CPOE, workflow management, optimization

Cross vendor application integration — integration (sharing single database) rather than interfacing — HL7, CCR, DICOM, CCHIT, HITSP, ASTM

Project management — system selection – how many to involve, super-users

Vendor relationship management — Utilization of consultants in baseline, needs assessment, request for proposal development, system selection, contract negotiation, and service level agreement management (it's a marriage)

What do you think?

Comments:

Monday, March 17, 2008 9:01:35 PM by Nardo

You are missing Business Process Management, Improvement and Optimization

Monday, March 31, 2008 8:17:39 AM by Pete Rivera

Outsourcing — IT Infrastructure Management, Data Center and Billing and Reimbursement departments. As it becomes harder to attract talent, especially in remote areas, outsourcing is becoming critical for the bottom line. It is also much more efficient to outsource your billing (for instance) at a smaller percentage of your revenue than what you are currently paying in salary, benefits and expenses.

Oops, They Did It AgainPosted on: 3.16.2008 2:09:43 PM Posted by Reece Hirsch

Human curiosity is a powerful thing, often more powerful than a hospital's privacy policies and procedures. The L.A. Times reports that employees at UCLA Medical Center were warned of the consequences of snooping on the medical records of Britney Spears' when she was admitted as a patient on January 31. Days later, several employees and physicians did just that, examining Ms. Spears' records when they were not involved in the patient's treatment. The result — 13 of the employees of the medical center were fired and six doctors face disciplinary action.

Unnecessary access to a patient's records will generally be considered a violation of the HIPAA Privacy Rule's “minimum necessary” rule governing uses and disclosures of protected health information (“PHI”). Incidents like this one and the one involving George Clooney (see posting below) suggest that privacy policy violations are increasing becoming firing offenses. Privacy and data security are becoming critical compliance issues that affect patient trust in an organization. Being willing to fire an employee for a privacy violation is one way to demonstrate to your community and your workforce that you don't take these issues lightly.

HIPAA Security Rule Investigations: CMS Casts A Wider NetPosted on: 3.21.2008 6:02:43 PM Posted by Reece Hirsch

In an earlier post, I talked about the “new era of HIPAA Security Rule enforcement,” which was heralded by public statements made by Tony Trenkle, the director of the Centers for Medicare and Medicaid Service (“CMS”) Office of E-Health Standards and Services (“OES”). In February, OES posted additional information about the new HIPAA security enforcement initiatives on its website, and there were a few surprises.

First, Mr. Trenkle's initial statements indiciated that OES would focus its HIPAA security “investigations” on covered entities that had already been the subject of complaints of non-compliance submitted to CMS. Apparently, OES is going to being reviewing a broader range of entities. The OES website states, “Onsite investigations may be triggered by complaints alleging non-compliance, while onsite compliance reviews will typically arise from non-compliant related sources of information such as rmedia reports or self-reported incidents.” This means that a HIPAA covered entity that has experienced a high-profile security breach can add “OES HIPAA security compliance review” to the list of bad things that could happen to them (right alongside “class action lawsuit” and “Attorney General enforcement action”).

Second, the sample checklist that OES posted includes some items that are not strictly required by the HIPAA Security Rule. For example, the checklist indicates that OES may ask for a covered entity's vulnerability scanning plans and network penetration testing policy and procedure, along with the results from the most recent vulnerability scan and network penetration test. These measures are certainly consistent with reasonable data security practices, but they highlight that HIPAA covered entities should not focus exclusively on the standards and implementation specifications set forth in the Security Rule. CMS's mantra during the development of the Security Rule was that the measures were intended to reflect “reasonable” security practices. These new statements from OES should put covered entities that reasonable security is an ever-evolving standard and the letter of the Security Rule standards is only the beginning.

Vendor Relationships Are Critical in Complex Environments (like yours!)Posted on: 3.17.2008 10:27:10 PM Posted by Travis Gathright

Deep knowledge and skill are required to run the complex enterprise systems we find in healthcare organizations. Considering the large breadth of Department responsibilities and technical complexity of systems in play in most organizations, the necessary depth of knowledge for each and every system is beyond what should be expected solely from internal Department members.

Using outsourcing effectively requires intense vendor management until a relationship is built. Once trust is built, vendor management can be less intense. The relationship, as with all relationships, should always be tended. With a solid partnership as a foundation, outsourcing can be extremely important to the creation of a high functioning information technology department.

Hanging ProtocolsPosted on: 3.16.2008 11:00:25 AM Posted by Marc Deary

Every PACS application has a set of image viewing and manipulation tools. Basic features include Window and Leveling (adjusting the density, brightness and contrast), Magnify, Zoom, Flip and Rotate. Diagnostic Workstation software usually includes more analytical tools like Measurements, Filters, Cine Loops and Annotations. Another feature found in the Diagnostic Workstation is the ability to create or activate Hanging Protocols.

Hanging Protocols provide a unique set of viewing instructions determining the layout and display of the image(s). This significant feature allows the user to initiate the viewing of an image or study based on the modality type, number of images, availability of comparison images and many other user defined criteria. Predefined Hanging Protocols allow the viewer to immediately begin the interpretation process using optimal viewing settings for the specific image or exam type.

Advanced hanging protocols features can include the loading and display of similar images for comparison, initiation of an integrated Digital Dictation or RIS session and activation of advanced image manipulation tools (3D, MPR, MIP). Most PACS applications allow Diagnostic Workstation users to create and store a set of personal hanging protocols or utilize shared protocols from a hanging protocol pool.

Initial configuration and testing of Hanging Protocols is a key step in the successful implementation of a new PACS or PACS upgrade. Applications training for the Diagnostic Workstation user should include detailed instruction on the creation and editing of hanging protocols. Effective use of properly configured hanging protocols alleviates the need to arrange and adjust images upon initial display. When used appropriately, hanging protocols will increase the efficiency and productivity of the diagnostic reader.

Sponsored Recommendations

A Cyber Shield for Healthcare: Exploring HHS's $1.3 Billion Security Initiative

Unlock the Future of Healthcare Cybersecurity with Erik Decker, Co-Chair of the HHS 405(d) workgroup! Don't miss this opportunity to gain invaluable knowledge from a seasoned ...

Enhancing Remote Radiology: How Zero Trust Access Revolutionizes Healthcare Connectivity

This content details how a cloud-enabled zero trust architecture ensures high performance, compliance, and scalability, overcoming the limitations of traditional VPN solutions...

Spotlight on Artificial Intelligence

Unlock the potential of AI in our latest series. Discover how AI is revolutionizing clinical decision support, improving workflow efficiency, and transforming medical documentation...

Beyond the VPN: Zero Trust Access for a Healthcare Hybrid Work Environment

This whitepaper explores how a cloud-enabled zero trust architecture ensures secure, least privileged access to applications, meeting regulatory requirements and enhancing user...