Reaching out for Some RHIO Help

June 24, 2011
The following questions were posed by a friend of the publication who prefered to remain anonymous. If anyone out there can help, please offer your
The following questions were posed by a friend of the publication who prefered to remain anonymous. If anyone out there can help, please offer your comments below. Thanks, Anthony


RHIO's are expected to be the first step of Statewide and National infrastructures. Each RHIO has had the latitude to develop based on their regional needs. Some States have provided funding via grants yet have not provided standards of minimum data sets so the infrastructure can, in the future, connect to a National Infrastructure. There does not seem to be a repository of what data elements RHIO's have decided to collect and what efforts were abandoned. If you are involved with a RHIO,
or feel you can offer a best practice, please share what data you are collecting, what data did you originally collect but disband and why? What data yielded improvement in patient care and how it was measured. What vendors were used?

Sponsored Recommendations

A Cyber Shield for Healthcare: Exploring HHS's $1.3 Billion Security Initiative

Unlock the Future of Healthcare Cybersecurity with Erik Decker, Co-Chair of the HHS 405(d) workgroup! Don't miss this opportunity to gain invaluable knowledge from a seasoned ...

Enhancing Remote Radiology: How Zero Trust Access Revolutionizes Healthcare Connectivity

This content details how a cloud-enabled zero trust architecture ensures high performance, compliance, and scalability, overcoming the limitations of traditional VPN solutions...

Spotlight on Artificial Intelligence

Unlock the potential of AI in our latest series. Discover how AI is revolutionizing clinical decision support, improving workflow efficiency, and transforming medical documentation...

Beyond the VPN: Zero Trust Access for a Healthcare Hybrid Work Environment

This whitepaper explores how a cloud-enabled zero trust architecture ensures secure, least privileged access to applications, meeting regulatory requirements and enhancing user...