Knowing the HIPAA rules and regulations could keep your business out of trouble with the law. Read on to learn how HIPAA compliance applies to your healthcare organization.
I can guarantee that anybody reading this blog uses machine learning dozens of times each day without even realizing it. When you perform a web, search using Google or Bing, for instance, the search engine works so well because their software has figured out how to predict searches and rank pages for you.
A few weeks ago, my colleague started the discussion on signs that you need a more automated way to get valuable information out of a document, 4 Signs You Need an Advanced OCR Solution. People turn to OCR to convert text from a fax, scanned document, or PDF into raw text that can be used more readily. Companies like ours put an intelligent layer over that OCR process and automate the extraction, pre-validation and structuring of that data so that it becomes even more useful more quickly and in a more automated way.
It couldn’t happen to us.
I doubt anyone still feels that a HIPAA breach is impossible in their organization. Results speak louder than words.
A quick search reveals that every year there is a large number of breaches in the US. There is no doubt these organizations know the threat of HIPAA breaches have taken some number of steps to protect against a breach but there is always more that could have been done to reduce/eliminate the exposure.
Let’s be honest. We could all use an extra hour in the day. Or two… or three… or even just 30 minutes!
In working with labs we have found one of the biggest pain points is the inability to find the time to scan or fax in lab results and manually enter the data into the EMR. This is an enormous issue, considering if these results aren’t entered into the EMR quickly and accurately, someone’s life could be in harm’s way.
When it comes to security and PHI for hospitals, it’s best to keep out of the news headlines…
In talking with our healthcare partners these days, a lot of our conversations tend to move toward security, and more specifically, securing PHI. With the recent cyber-attacks on healthcare organizations making headlines and resulting in complete shutdowns of hospital IT systems, you can understand how this is a priority.
They are systematically gathering data about all of us. No bit of data is too small because it could be a critical piece of the puzzle that connects all of the seemingly unimportant information they’ve already collected on you. Imagine creating a digital picture of you, one pixel at a time. Get it? No wait, they’ve got it.
Once again I had the pleasure of attending the 24th Annual UNOS Transplant Management Forum for my 4th time earlier this year. As always, it was a flurry of learning, knowledge-sharing, networking, and well-deserved awards for leaders in the industry.
It was as apparent this time as it was every time before, that the transplant community is a close-knit group who all struggle with similar things regardless of their geographical location. These struggles span across many areas, including financial, staffing, regulatory requirements, lack of organs, information technology, reporting, managing the constant deluge of paper, and many more. While I can't claim that Extract can help with all of these, there are two specific struggles that we excel at fixing: extracting discrete results from faxed external lab results and intelligently splitting, classifying, and filing large documents (such as referral packets) into patients' charts.
I chose the title for this blog a bit tongue in cheek. You see, there are numerous blog posts about how to “properly” redact PDF files. While all of those other blog posts correctly explain the challenges that makes redacting PDF files difficult and outline all of the steps that one must take to ensure private information is completely and irreversibly redacted, all of those blog posts fail to mention one critical idea that anyone tasked with the important job of redacting electronic documents should be aware of -- automation.
In the course of a clinical research project or trial, researchers must gather patient data and records and prepare them for adjudication and analysis. In keeping with the spirit of HIPAA and PHI regulations, the organization conducting this research or trial likely wishes to control access from both within and outside of its firewall to ensure that any potential for breach of this personal information is strictly curtailed.
You finally found the perfect solution to problem of getting data out of documents and into your EMR or other system. It’s a system that automates this data entry and the workflows surrounding the entire document handling and quality assurance processes. Now it’s time to go ask for permission (budget) to purchase this solution.
There’s been a lot of news lately about the 2015 NIH budget being flat, worrying researchers that the funding pinch will have a significant impact on current and future projects. Even Nobel prize winning researcher Craig Mello from the University of Massachusetts Medical School recently commented on the impact this could have on his ongoing work, noting that if he couldn’t get a grant he’s applied for he may have to reduce staff.