Wednesday 30 September 2015

VA Sees Drop in Health Data Breaches; Other Orgs Report Breaches

 

Computer-aided detection during mammograms is meant to help mark areas of concern radiologist may miss, but the tech does not appear to change detection rate, according to a recent study.

The study, led by Constance Lehman of Massachusetts General Hospital in Boston, found that radiologists correctly detected breast cancer 85 percent of the time, and that didn’t change with CAD technology, according to a Reuters article.

In addition, the researchers determined that radiologists found fewer cancers when using CAD. Article

View the original content and more from this author here:
http://ift.tt/1FHFagV



from health IT caucus http://ift.tt/1L3FcA2
via IFTTT

VA Sees Drop in Health Data Breaches; Other Orgs Report Breaches

Last month, the Department of Veterans Affairs experienced a 72.8% decline in veterans whose protected health information was affected by a health data breach, according to VA’s August report to Congress, Health IT Security reports.

According to the report, 431 veterans were affected by a health data breach incident in August, including 237 who had their protected health information compromised. That figure is down from the 872 veterans who were affected by protected health information-related breaches in July.

Of the 431 veterans affected by a data breach in August:

  • 148 involved incorrectly mailed documents;
  • 117 involved lost or stolen Personal Identity Verification cards;
  • 84 involved “mishandled incidents;”
  • 47 involved lost or stolen devices; and
  • One involved items incorrectly mailed by a pharmacy (Heath, Health IT Security, 9/25).

Other Recent Health Data Breaches

Meanwhile, several other U.S. health care organizations recently disclosed data breaches, potentially affecting thousands of individuals.

Molina Healthcare Data Breach

California-based Molina Healthcare is alerting more than 54,000 patients to a breach of their protected health information after a CVS employee copied records from company computers to a personal computer, Clinical Innovation & Technology reports (Walsh, Clinical Innovation & Technology, 9/23).

CVS, which manages Molina Healthcare’s over-the-counter benefits, notified the managed care company of the breach, which occurred in late March, on July 20 (Jayanthi, Becker’s Health IT & CIO Review, 9/22). The breach affects the personal information of both current and former members of Molina Healthcare’s Medicare Options Plus HMO plan in 10 states:

  • California;
  • Florida;
  • Illinois;
  • Michigan;
  • New Mexico;
  • Ohio;
  • Texas;
  • Utah;
  • Washington state; and
  • Wisconsin (Clinical Innovation & Technology, 9/23).

Stolen information included:

  • CVS IDs and ExtraCare Health Card numbers;
  • Full names;
  • Member IDs;
  • Prescription plan numbers and states; and
  • Start and end dates (Becker’s Health IT & CIO Review, 9/22).

Surgical and Medical Group Data Breach

Last month, the California-based Silverberg Surgical and Medical Group discovered a two-year-old security lapse that exposed patient health records on the Internet, Health IT Security reports.

The medical group reported the incident, which began on Sept. 10, 2013, to the California Office of Attorney General.

According to a notification letter, a document scanning device “inadvertently exposed some patient health records to the Internet.” Potentially exposed information includes patients':

  • Addresses;
  • Beneficiary numbers;
  • Dates of admission;
  • Dates of Birth;
  • Email addresses;
  • Health plan data;
  • Medical information;
  • Medical record numbers;
  • Names; and
  • Telephone and fax numbers.

In some cases the exposed information included:

  • Full face photographic images;
  • Social Security numbers; and
  • State License numbers.

Silverberg did not disclose how many patients were affected, but it noted that it took down the information immediately, launched an investigation and is providing one year of identity monitoring to those affected (Snell, Health IT Security, 9/28).

View the original content and more from this author here:
http://ift.tt/1Vrco6b



from health IT caucus http://ift.tt/1L3FczY
via IFTTT

Survey: Patients Want Providers Who Offer Health IT Capabilities

Physicians who do not work to improve electronic health information sharing could lose patients to more technology-savvy providers,according a survey commissioned by Surescripts, Health IT Interoperability reports.

The survey, conducted by Kelton Global, polled more than 1,000 U.S. adults during the first week of May (Irving, Health IT Interoperability, 9/28).

Findings

According to the survey, 55% of respondents said their medical history is incomplete or missing altogether when they visit their physician, despite the use of electronic health records.

Among other things, respondents reported that providers often lacked information about their:

  • Allergies;
  • Existing medical conditions; and
  • Prescriptions.

Paul Uhrig, chief administrative and legal officer and chief privacy officer at Surescripts, said, “The challenge is the lack of interoperability” (Reed, Washington Business Journal, 9/28).

The survey concluded that technologically advanced providers have an advantage because:

  • 57% of respondents said they want a doctor who stores medical records electronically;
  • 57% want a doctor who enables them to complete paperwork online before an appointment;
  • 54% want to receive test results online; and
  • 54% want to schedule appointments online (Health IT Interoperability, 9/28).

Further, the survey found that:

  • 46% of respondents said they are more comfortable asking their provider questions via email or text, rather than just by phone; and
  • 43% said they would contact their provider more often if they could do so via text and email.

According to the survey, 70% of respondents said that doctors who use computers or tablets instead of paper during visits are organized and efficient. The majority of patients also said they were comforted, relieved and confident when their provider made administration tasks — such as appointment scheduling — digital.

Surescripts CEO Tom Skelton in a statement said, “Dangerous voids in health information sharing can easily be solved through the use of digital communications and technology” (Pai,MobiHealthNews, 9/28).

View the original content and more from this author here:
http://ift.tt/1VrcoTy



from health IT caucus http://ift.tt/1KKxiu3
via IFTTT

Health IT Projects Included in HHS’ Grants To Improve Patient Care

On Tuesday, HHS announced 39 organizations that have been awarded a total of $685 million in grants to help improve patient care, in part through health IT and the use of patient data, the Wall Street Journal reports.

According to the Journal, the grants reflect the Obama administration’s effort to shift from fee-for-service to value-based payment models (Armour, Wall Street Journal, 9/29).

Grant Details

HHS’ Transforming Clinical Practice Initiative awards include:

  • 29 Practice Transformation Networks, which will offer clinicians technical assistance and peer-support; and
  • 10 Support and Alignment Networks, which will focus on creating collaboratives for providers to improve care (CMS release, 9/29).

According to the Journal, the funding will be used to support various ambulatory programs, including continuing to educate and train providers on how to use patient data to improve care. The grant recipients’ programs aim to improve patient outcomes and communication through various strategies, such as enabling patients to email their providers.

In a release, HHS Secretary Sylvia Mathews Burwell said, “These awards will give patients more of the information they need to make informed decisions about their care and give clinicians access to information and support to improve care coordination and quality outcomes” (Wall Street Journal, 9/29).

Health IT-Related Recipients

The Practice Transformation Networks that leverage health IT include:

  • Arizona Health-e Connection, which will provide clinicians with technical and communications assistance, as well as IT support;
  • Colorado Department of Health Care Policy & Financing, which will provide clinicians with health IT assistance and educational webinars;
  • Consortium for Southeastern Hypertension Control, which will use a distance-learning platform — supported by data warehousing, analytics and Web-based educational tools — to train and educate clinicians;
  • Health Partners Delmarva, which will share health IT with clinicians and provide them with access to groups to learn about access to data and analytics, among other things;
  • National Council for Behavioral Health, which will help clinicians use a technology platform to facilitate communication between providers and across organizations;
  • New York eHealth Collaborative, which will track improvements among key indicators, including measures for Physician Quality Reporting System enrollment and reporting, and the meaningful use of health IT;
  • Trustees of Indiana University, which will provide technical assistance in meaningful use and PQRS;
  • Vanderbilt University Medical Center, which will use various informatics tools to bolster the collection and management of clinical data, provide clinical decision support and collect patient-reported data; and
  • VHS Valley Health Systems, which will develop an analytics and reporting team to facilitate reporting of quality and claims data from payers and providers.

The Support and Alignment Networks with health IT components include the:

  • American College of Radiology, which will coach participants in data collection, as well as in the use of PQRS and the adoption of clinical decision-support software; and
  • American Psychiatric Association, which will train psychiatrists in the use of telemedicine tools, registries and real-time clinical outcome data to improve quality and outcomes (CMS fact sheet, 9/29).

View the original content and more from this author here:
http://ift.tt/1PMXp4Q



from health IT caucus http://ift.tt/1jxyiIW
via IFTTT

You Should Obsess About Bone Health While You’re Still Young

Two new studies say that building bones with calcium supplements may be waste of time for older folks. Which means it’s even more important to strengthen your bones while you’re young — even though it’s the last thing on your mind. (Photo: Getty Images)

For older men and women, building stronger bones by increasing calcium intake has been a hot topic for some time now.

The questions: Does it work? Is it worth the risks? Or is it too late? Two new studies from the British Medical Journal might do more to sway a divided medical community.

Both BMJ reports cover older populations, specifically men and women over the age of 50. The first study was a meta-analysis of available literature on the effects of increasing calcium, either through diet or supplementation, on bone mineral density. After surveying 59 eligible pieces of research, they found that the effect was nearly negligible, upping bone density by just one to two percent.

The second study specifically focused on calcium’s effect on bone fractures. After reviewing two randomized controlled trials and 50 additional reports from 44 cohort studies, the researchers concluded that dietary calcium intake does not seem to reduce risk of fracture. They say there is no evidence that “calcium from dietary sources does not prevents fractures,” and evidence that supplements help reduce fractures is “weak and inconsistent.”

According to the study authors, the evidence shows that we should not be championing calcium in older men and women beyond that of a healthy dietary regimen, or suggesting supplements.

Elinor Mody, Director of the Women’s Orthopedic and Joint Disease Center at Brigham and Women’s Hospital in Boston, says the reports are interesting, but unlikely to settle the debate about whether or not we should be advocating for calcium.

“It brings up the question again, quite nicely, of whether or not we should really be doing this,” she tells Yahoo Health. “It’s a cumbersome pill, calcium isn’t well-absorbed in the body, and there are potential negative side effects like calcium stones and constipation.”

In older populations, bumping calcium intake may be a waste of time.

Does Calcium Really Help Build Bones?

Since the “Got Milk” campaigns of our childhood, we’ve been taught that high calcium equals strong bones. But other factors besides calcium intake play into our overall bone health, says Dana Hunnes, PhD, MPH, RD senior dietitian at Ronald Reagan UCLA Medical Center.

“Bone health, in general, is internally regulated by the hormones testosterone, estrogen, and parathyroid hormone, and vitamin D, which can act like a hormone,” Hunnes tells Yahoo Health. “When our blood levels of calcium are increased as the body absorbs the mineral from food, that can trigger bone formation — especially when we are younger and have higher levels of the above hormones.”

Related: The Ancient Aztec Food with More Calcium Than Milk

Since our bone health is mostly guided by an interplay of hormones and other metabolic pathways, it does make sense to Hunnes that calcium supplementation might not affect fractures either way in older populations.

Both Hunnes and Mody do note that, while the authors of the study indicate there is no evidence that increasing calcium through dietary sources seems to help bone health, there are instances where supplementing did seem to be beneficial. “Particularly, a study looking at women in nursing homes who already had very low calcium and vitamin D levels,” says Mody. “In this case, it did seem to help prevent fractures.”

So, it’s still important to check with your doc. Mody says that she generally only recommends supplements to those at high risk for osteoporosis or — for instance, women who are taking a steroid like prednisone. But generally, she doesn’t panic if a patient tells her she’s not taking a calcium supplement.

In fact, vitamin D might be the more important nutrient. Mody says she routinely checks levels of D, since it assists in calcium absorption and many people don’t get enough anyway. She’s says a good chunk of her patients are deficient, especially in New England where sunlight is lacking and people spend half the year indoors. In these cases, she typically recommends 1,000 IU per day, and no more.

View the original content and more from this author here:
http://ift.tt/1PMXp4K



from health IT caucus http://ift.tt/1jxyl7M
via IFTTT

Tuesday 29 September 2015

New federal assessment tool highlights the importance of threat intelligence for financial institutions

By HP Security Strategist Stan Wisseman

In a previous post, I’ve encouraged use of frameworks to help determine a cybersecurity baseline capability and  roadmap to reach the goals for your information security programs. This summer, the Federal Financial Institutions Examination Council (FFIEC) introduced a new tool to assist financial organizations in following this approach.

In 2014, the FFIEC piloted a cybersecurity examination program at over 500 community financial institutions to evaluate their preparedness to mitigate cyber risks. On June 30th of this year, the FFIEC published a Cybersecurity Assessment Tool to provide ALL financial institutions with a repeatable and measureable process to inform leadership of their organization’s cyber risks (Inherent Risk Profile) and cybersecurity preparedness in relation to that risk (Cybersecurity Maturity). If the level of preparedness is inadequate, the organization may take action either to reduce the level of risk or to increase the levels of maturity (a “target” state). The Tool is mapped to both the FFIEC Information Technology Examination Handbook (FFIEC IT Handbook), as well as to the NIST Cybersecurity Framework.  Initially, the Tool will be voluntary but in the long term is expected to be incorporated into the FFIEC IT Handbook and used in regular examinations. The Tool identifies five domains, as shown above.

I’m going to focus on the Threat Intelligence & Collaboration domain in this post. I’m a strong proponent for threat intelligence sharing and am pleased that the FFIEC added this domain to their Assessment Tool. Timely sharing of intel about new or ongoing cyberattacks and threats should help avoid or minimize major breaches from an attack. I recognize that there’s still some controversy around private sector organizations sharing their threat intel with US Government agencies. Some of the potential negative consequences to this sharing was discussed at the 2nd annual Senior Executive Cyber Security Conference I attended in Baltimore earlier this month. Efforts are underway to craft legislation to address some of these concerns (see ICIT brief), though it’s unclear whether the US Congress will finalize these legislative efforts this year. Independent of the legislation, I still think that harnessing the collective wisdom of peer organizations we trust should be a win-win and is necessary to survive within our evolving threat landscape. The bad guys collaborate. We also need to.

Returning to the Assessment Tool, each domain and maturity level has a set of declarative statements (e.g., requirements) organized by the assessment factor. I’ve extracted some of the declarative statements from the Advanced and Innovative maturity levels for the Threat Intelligence & Collaboration domain below:

  • Threat intelligence is automatically received from multiple sources in real time.
  • A threat analysis system automatically correlates threat data to specific risks and then takes risk-based automated actions while alerting management.
  • Emerging internal and external threat intelligence and correlated log analysis are used to predict future attacks.
  • The institution uses multiple sources of intelligence, correlated log analysis, alerts, internal traffic flows, and geopolitical events to predict potential future attacks and attack trends.
  • IT systems automatically detect configuration weaknesses based on threat intelligence and alert management so actions can be prioritized.
  • Relationships exist with employees of peer institutions for sharing cyber threat intelligence.
  • A network of trust relationships (formal and/or informal) has been established to evaluate information about cyber threats.
  • A mechanism is in place for sharing cyber threat intelligence with business units in real time including the potential financial and operational impact of inaction.

I think the Tool encourages the building of effective threat collaboration partnerships through trust. HP has a taken a similar approach with its Threat Central service. Threat Central enables organizations to collaborate via a community-sourced security intelligence platform that incorporates dynamic threat analysis scoring to produce relevant, actionable intelligence to combat advanced cyber threats. Use of Threat Central can help you achieve some of the Advanced and Innovative declarative statements called for in the Assessment Tool.

Learn more about HP Enterprise Security.

Figure source: http://ift.tt/1FFBXhJ

 

View the original content and more from this author here: http://ift.tt/1KOHSwT



from health IT caucus http://ift.tt/1FFBX1e
via IFTTT

Johnson & Johnson, IBM Watson to create virtual coach apps for patients

IBM Watson and Johnson & Johnson will team up to create apps for consumers that will provide them with a virtual health coach.

Tech giant Apple also will lend a hand in development of the apps, which will be marketed to hospitals and other healthcare organizations that will then offer them to patients, according to the Wall Street Journal.

A prototype app to coach patients after knee replacement surgery will be released by J&J in the fourth quarter of 2015. The app will use IBM Watson’s computing and analytics platform, Apple design and J&J clinical knowledge to help improve patient outcomes and provide encouragement and treatment plans. IBM first announced it would be working with J&J in April. Article

View the original content and more from this author here: http://ift.tt/1FyC1QJ



from health IT caucus http://ift.tt/1iYsgkL
via IFTTT

How APIs can improve health data sharing

Gajen Sunthara, who spent a year as a Presidential Innovation Fellow with the Office of the National Coordinator for Health IT, says that patients must be at the center of the healthcare system and that application programming interfaces (APIs) can help, in a post to the Health IT Buzz Blog.

Sunthara (pictured) worked on applying APIs to improve data access, creating, among other things, a prototype personal health record (PHR) called myHealth API, which enables patients to aggregate their data from various providers across multiple data access points using the Fast Health Interoperability Resources (FHIR) framework. Sunthara previously served as principal software architect at the Innovation Acceleration Program at Boston Children’s Hospital and wrote his master’s thesis at Harvard on streamlining surgeon workflow using Google Glass,according to MedTech Boston.

Creating a single app that combines patient-generated health data from wearable devices and visuals from lab results, as well as medications, immunizations, genomics and other types of health data, can create a powerful, comprehensive view of a patient’s health, he says. His prototype, Sunthara notes, gives patients “drag-and-drop” control over their data and privacy

In addition, myHealth API allows patients to share their data with others. For instance, a Type 1 diabetes patient on a continuous glucose monitoring device could share that device information with a doctor through an API, he says.

Demand and participation eventually will drive use of open public APIs in healthcare for sharing information between entities, former U.S. Chief Technology Officer Aneesh Chopra said earlier this year, but providers must be more willing to take the plunge.

Previous fellows worked on improving Blue Button functionality, and one of the fellows working within the Department of Veterans Affairs recently spearheaded an initiative to create better prosthetic limbs.

View the original content and more from this author here: http://ift.tt/1KHLqnP



from health IT caucus http://ift.tt/1iYsgkJ
via IFTTT

BCBS Health Plans Contribute Cost, Quality Data to New Repository

Last week, the Blue Cross Blue Shield Association announced that all 36 independent BCBS plans will contribute information to a new repository designed to help lower costs and improve quality of care,Healthcare IT News reports (Miliard, Healthcare IT News, 9/25).

Database Details

The platform will be housed on the Blue Cross Blue Shield Axis database, which already includes information on:

  • $350 billion in annual claims
  • 36 million provider records; and
  • More than 700,000 BCBS patient reviews (Walsh, Clinical Innovation & Technology, 9/25).

The new information will include plans’ cost and quality data from the last three years, according to Maureen Sullivan, senior vice president of strategic services and chief strategy officer at BCBS.

According to Health Data Management, the new repository, which can be accessed through individuals’ health plan websites, is already live with cost and quality data and reviews in some markets.

BCBS plans to update the repository to also include:

  • Information on experience levels and other aspects of providers’ work, such as readmission and infection rates;
  • Explanations of specific procedures; and
  • Tools to help steer members toward better care and outcomes (Goedert, Health Data Management, 9/25).

Security Protections

Sullivan noted that information on the Axis database will be de-identified.

Further, BCBS CIO Doug Porter said the board has taken steps “to make sure that we’re scanning all of our environments for appropriate controls and to make sure that we don’t have any evidence of any compromises of our infrastructure” (Small, FierceHealthPayer, 9/24).

View the original content and more from this author here: http://ift.tt/1iYsgkT



from health IT caucus http://ift.tt/1KHLofz
via IFTTT

Health secretary to meet junior doctors’ leader over contract row

WEDI: ‘Robust’ Health IT System, Data Analytics Key to ACOs

An interoperable health IT infrastructure is key to the success of accountable care organizations, according to an issue brief released by the Workgroup for Electronic Data Interchange, EHR Intelligencereports (Murphy, EHR Intelligence, 9/28).

Details of Issue Brief

The paper was released by WEDI’s Payment Models Workgroup. It outlined barriers and best practices for ACOs and offered questions to consider when developing future guidance.

Among topics addressed in the issue brief were:

  • Data and analytics;
  • Health IT infrastructure; and
  • Population health management (Dvorak, FierceHealthIT, 9/28).

Findings

Overall, the report stated, “Successful financial, clinical, population health and risk management of an ACO is dependent upon a strong health IT infrastructure and an ability to exchange health data across disparate systems and setting.”

The issue brief noted that the health IT infrastructure for ACOs typically starts with electronic health records and then is layered with additional components that support:

  • Clinical documentation;
  • Data analytics;
  • Patient engagement and communication;
  • Revenue cycle management;
  • Risk management; and
  • Quality measurement and improvement.

Some ACOs also participate in health information exchanges (EHR Intelligence, 9/28).

According to the issue brief, interoperability becomes more important as ACOs mature and add such components (FierceHealthIT, 9/28).

However, the brief noted that “most ACOs are not currently able to seamlessly push or pull complete patient health data in an accessible and timely manner — and until they are able to do so, many organizations will find themselves fundamentally handicapped in their ability to meet operational objectives” (EHR Intelligence, 9/28).

Meanwhile, WEDI also said that ACOs increasingly will need new technologies to analyze the troves of health data collected from patients.

The authors said that ACOs will need to:

  • Consider the “pain points” for collection, measurement and exchange of health data; and
  • Determine whether there is a business case for implementing predictive and prescriptive analytics.

The brief noted that such health IT infrastructures and data analytics capabilities will be necessary to support ACOs’ population health management efforts (FierceHealthIT, 9/28).

View the original content and more from this author here: http://ift.tt/1KHLq7t



from health IT caucus http://ift.tt/1KHLnZb
via IFTTT

Monday 28 September 2015

Cyber whistleblowing pivotal in ensuring corporate transparency and accountability in the IoT era

Whistle-blowing isn’t a new phenomenon, and has been recognized and protected under SOX, GLBA, Federal and State laws, as well as industry-specific regulatory frameworks. The Dodd-Frank Act has ensured additional protections for corporate officers who come forward with evidence of misconduct or wrongdoing, and created financial incentives for whistleblowers to report securities violations and fraud.

You may be aware of a recent decision by the Third Circuit Court of Appeals in FTC v. Wyndham Resorts, which affirmed FTC’s standing as a Federal cyber enforcer under the Court’s intentionally broad – and unanimous – interpretation of the “fair trade” doctrine. What this means is that the FTC will increase its scrutiny of cyber security issues which affect US commerce and involve US consumers, surely to add to its list of approximately 50 recent enforcement actions taken against a variety of firms thus far.

However, FTC can only act upon known issues. A breach affecting millions of consumers, such as the Wyndham case or the Target and Home Depot incidents, comes into FTC’s view only after the proverbial horse has left the barn. While FTC seeks to encourage responsible behavior through punitive action meant to act as a deterrent for the rest of the field, the retroactive nature of its action leaves much to be desired on the preventive side of the equation.

Despite a positive step in the right direction, the Commission’s post hoc enforcement scope creates a potential incentive for firms to conceal information security breaches at all costs in a bid to prevent additional scrutiny and likely punishment for failure to do adequately secure their information operations. In many cases, the firms are successful. As reported in the New York Times, a massive breach of a major industrial automation firm shortly after its $2-billion acquisition went unreported to the markets and regulators, remaining under wraps until a confidential customer memo was leaked to a well-known security blogger.

Wrapped in non-disclosure agreements and contract confidentiality clauses, manufacturers get to operate in secrecy, largely making the public disclosure of a breach a choice rather than an obligation (in cases not involving regulated consumer data such as credit cards and PII).

Transparency is difficult to come by in a field cloaked in what I call the “Three M’s” of cyber security: myth, mystique, and mystery. Confidentiality for confidentiality’s sake prevails throughout corporate organizations, stifling information sharing, discovery, and open debate – internal or external, – on cyber deficiencies and vulnerabilities.

CEO’s don’t want to hear about problems which they would be compelled to solve – if they actually heard about them. Integrity of internal controls, after all, is a serious matter well within the regulatory purview of the SEC. The logical answer, in the unscrupulous organizations at least, becomes rather obvious: keep the CEO and the Board from hearing about cyber issues they’d be forced to fix. With information security, that’s all too easy given the inherent complexity and difficulty in assessing the true state of cyber posture and maturity in global organizations.

This obfuscation doesn’t have to appear all that malicious, either. A simple omission, a confused statistic, an “honest mistake” in reporting threat or vulnerability data – all plausible enough to filter the information about known or suspected deficiencies in the enterprise security program.

How do we pierce this veil of corporate secrecy and obfuscation, designed to immunize and absolve the power structure while allowing cyber negligence to remain the accepted status quo? If internal reporting is suppressed, and those who speak out find themselves ostracized – or worse, – what channels are available for communicating internal issues tantamount to corporate misconduct and malfeasance?

The answer: Whistleblowing.

Encouraging and protecting those who come forward is essential to the functioning of markets and societies. Transparency, Integrity, and trust are non-negotiable. As our world continues to become “smarter”, more connected, more integrated, as our transactions become more distributed and rapid, as machine learning and automation become more mainstream by the day – it is fundamental we as consumers, and the regulators on our behalf, insist on total integrity and trustworthiness on the part of those who seek to populate our world with “smart” machines.

The manufacturers and suppliers competing for the lucrative space on our wrists, in our pockets, our kitchens, cars, and office buildings, must prove to us their technologies are safe, secure, and resilient before we allow them to take over our lives to the tune of 50 billion connected devices projected to surround us by the year 2020 (Gartner).

Whistleblowers are crucial in ensuring that no matter how complex an organization, how powerful or aloof the management, or how lucrative the business venture – consumers get to know the truth, and to make their choice in the marketplace based not only on the features of a product or service, but its maker’s trustworthiness and integrity.

Cyber whistleblowers have a pivotal role to play in the upcoming battle to connect our world. Let us encourage them and protect them.

In a recent article in CIO Magazine, the nation’s premier whistleblower attorney Debra S. Katz of Katz Marshall Banks provides an overview of the unique challenges faced by cyber whistleblowers, and the dangers for companies who retaliate against them:

View the original content and more from this author here:  http://ift.tt/1GbQEEi2985780/staff-management/changing-the-whistleblower-retaliation-culture.html



from health IT caucus http://ift.tt/1MAyGQA
via IFTTT

On ’60 Minutes,’ Donald Trump Accidentally Proposes Radical Reform Of U.S. Healthcare

In an interview with 60 Minutes, America’s most-watched television news magazine,Donald Trump, America’s most-watched presidential candidate, basically just promised that he can defy gravity.

I’m not talking about his vow that he could reduce taxes on the middle class — for some people, rates would go down to zero! — and corporations and pay for it by going afterWall Street fat cats and growing the economy. I’ll leave the plausibility of that to others. I’m talking about Trump’s faster treatment of the way he would repeal and replace President Barack Obama’s signature achievement, the Affordable Care Act, or Obamacare.

Trumps assurance, repeated again: he will make sure that every person in the country has health insurance, and will do so in a way that lowers rates for most Americans. And, he claims, he would do this in a way that actually lowers costs over the long term. In order to help the poorest 25% of the population, Trump said, he’d “make a deal with existing hospitals to take care of people.”

Sounds great. Except that’s what Medicaid, the program that already exists to take care of the poor, already does. It drives a hard bargain, and, as a result, 56% of psychiatrists and 40% of orthopedic surgeons don’t accept Medicaid patients. How does Trump expect to drive a harder bargain?

And as for the rest of the market, as my colleague Bruce Japsen writes, Trump is describing something very much like Obamacare, which he says is “a disaster.” Trump’s words: “[I]t’s going to be a private plan and people are going to be able to go out and negotiate great plans with lots of different competition with lots of competitors with great companies and they can have their doctors, they can have plans, they can have everything.”

This is already what’s supposed to be happening with Obamacare. But Trump’s version sounds, well, bigger. The Obamacare exchanges, remember, apply to a small sliver of the insurance market: those people who do not get insurance from their employers and do not qualify for Medicaid or Medicare. Trump seems to be describing a much bigger system where people purchase their own private plans.

We know that he’s a big believer in competition. In a far more detailed description of Trump’s health plan that his campaign gave to Forbes contributor Dan Diamond, Trump placed a great deal of confidence in the idea that getting rid of state barriers to insurance would result in more competition. Actually, as Diamond explained, it might allow insurance companies to evade regulation, because insurers are regulated at the state level.

As Obama did (remember “you can keep your plan”?), Trump ignores the fact that the only way insurers can control costs is to choose which doctors you can go to, which medicines you can take, and where you can get your surgery. That’s what forces hospitals and doctors and drug companies to agree to lower prices: the knowledge that they’ll lose business if they don’t make a deal.

View the original content and more from this author here: http://ift.tt/1iU6VJ7



from health IT caucus http://ift.tt/1Lgs2Sh
via IFTTT

It’s Time Health-Care Providers Listen to Their Customers

LEAH BINDER: Retirees in South Florida like to eat dinner early. Many line up for “early bird specials” by 4 p.m.

A year ago, a senior-citizen friend of mine was admitted to a hospital there.

“I should have listened to my neighbors and never come to this place,” my friend complained. What disappointed her so much about the hospital? Was it a cleanliness problem, rude staff, or a high infection rate?

No, she liked the hospital overall—and indeed it’s a high performer on standard indicators of quality. The hospital’s fatal flaw: dinner wasn’t served until 7 p.m.

I actually had the opportunity to speak to the chief executive of that hospital, who said he’d heard similar feedback but it wasn’t a big issue on his radar.

This was surprising to me. Shouldn’t customers dominate the executive’s radar?

Health care has virtually no tradition of considering the perspective of patients as mission-critical. That’s because in health care, the payment system creates confusion about who the customer really is: the patient or the payer? Patients often make different demands than health plans or Medicare. Providers meet the needs of both, but the check-writer tends to come first.

Providers also dismiss the perspective of patients because they aren’t experts in clinical medicine, or in the scientific principles of defining and measuring high quality care. The timing of dinner doesn’t appear in medical textbooks as an evidence-based best practice.

Yet serving dinner three hours late isn’t only a convenience issue for patients—though convenience matters when a hospital stay costs more than a suite at the Four Seasons. In fact, it has significant clinical ramifications for highly vulnerable inpatients. Adequate nutrition is important to the outcome of any treatment patients receive at the hospital. So in this case, the failure to put a priority on patient preference was more than a public-relations problem, it was a quality problem and a business problem. Listening to patients would solve it at all levels.

Luckily, times are changing. Nowadays, patients pay more of their bills out of pocket, and the expectations of the Internet generation put increasing pressure on health systems to respond to consumer demands in real time. The gap between payer and patient is closing.

Today, there’s a new buzzword in the industry: “patient-reported outcomes,” and it even comes with its own acronym (PRO). Hospitals are now required to conduct standardized patient surveys following discharge, and their payment from Medicare is partially based on those results.

We are also seeing innovative ways to solicit patient feedback, such as cellphone surveys and social media. Hospitals and health plans are using this data systematically to track consumer comment as a way to gauge overall quality of care. Policy makers and purchasers are increasingly incorporating patient reported outcomes into the criteria for payment and ratings of hospitals and physicians.

Leadership is taking note: The hospital industry invented a new job, the “chief experience officer,” to monitor patient feedback and drive change accordingly. Many hospitals have formed patient and family advisory committees that advise on a wide variety of operational and clinical issues.

Private-sector employers are also getting in on the action. A white paper by the Pacific Business Group on Health made a call for robust integration of patient perspectives into all phases of quality improvement and business purchasing decisions.

Outside of health care, pivoting your priorities to your customer is hardly a breakthrough. But in health care this is the new vanguard.

It’s a welcome departure from the tradition of keeping patients off the radar.

View the original content and more from this author here: http://ift.tt/1KJ67O9



from health IT caucus http://ift.tt/1PIYU45
via IFTTT

Emergency responders on the front lines of a mental health crisis

Maine emergency responders learning patience and understanding are critical to saving lives.

It had all the elements of a situation that could end badly.

The man had a history of mental health problems, and in the wee hours of one morning last year he seemed out of touch with reality. His mother decided he needed to go to the hospital, now. He decided he wasn’t going anywhere.

She called 911.

Eric Samson, then a deputy with the Androscoggin County Sheriff’s Department, responded with another deputy. Samson had been trained to deal with someone who was mentally ill.

Listen. Don’t discount the other person’s thoughts or feelings. De-escalate.

“He was resistant, actively resistant, didn’t really feel the need for law enforcement . . . I had remembered the technique of how to deal just verbally,” Samson said. “He was saying things to me that did not make sense. But I responded with asking him to explain, and I just waited for that opportunity through the conversation, accepting what he was saying was reality and talking to him about that. He brought up how he wants to help law enforcement. So I explained, ‘Well, if you want to help us, for us to be able to do our jobs we need you to come with us. And if you’re willing to come with us, that would be a great help.'”

The night ended with him willingly going to the hospital.

Samson, now Androscoggin County sheriff, still thinks about that success.

“Everything turned from him sitting in a chair refusing to go, and something that could have ended up (with police ordering) ‘You’re going,’ to (the man saying) ‘OK! Let’s go,'” Samson said.

It’s the kind of call Maine’s first responders often get: Help someone who is mentally ill or in crisis.

They’re complex situations that can escalate quickly, sometimes with the potential for violence, risking the lives of both first responders and the person needing help.

Mental health advocates and mentally ill Mainers say first responders in Maine tend to handle such calls well, with sensitivity, a sense of calm and knowledge.

Though both first responders and advocates say more can always be done.

Samson, for one, has started sending his officers to a weeklong training program run by the Maine chapter of the National Alliance on Mental Illness, or NAMI. One of his first volunteers was the deputy who went with him during that middle-of-the-night call last year.

“He said ‘I want to go’ because he saw,” Samson said.

‘We run into it every day’

First responders — including dispatchers, police, firefighters and emergency medical personnel — get involved with an emergency call at the beginning. Their job is to gather information, stabilize the situation and get help to the person who needs it.

Any call can go badly, whether it involves someone who has mental health problems or not. And the vast majority of people who are mentally ill aren’t violent. But calls that involve someone who is in crisis or struggles with mental illness can be particularly tricky to handle because the person may not want help, may not understand what’s going on, may be difficult to talk to or may have had a bad experience that makes going to the hospital or dealing with police anxiety-provoking.

“You can’t paint mental health with just a single brush. It’s a very complex situation,” said Jay Bradshaw, who recently retired after years heading Maine EMS, the emergency medical services arm of the Maine Department of Public Safety. “Sometimes the person’s mental health may need just a comforting voice of somebody who’s calm and near. That’s one thing. On the other end of the spectrum you may have somebody who has serious psychological, behavioral challenges that require reaching out to, perhaps, law enforcement.”

First responders say that when they encounter people who are mentally ill or in crisis, often those people are hallucinating, feeling anxious or depressed, having a panic attack, considering killing themselves or no longer taking care of themselves. Drugs and alcohol exacerbate the situation.

Sometimes other issues — like autism, a diabetic crisis or a bad reaction to medication — can resemble a mental health problem.

“There’s any number of possibilities that fall into that realm of behavioral emergency,” said Auburn Fire Chief Frank Roma, whose department handles both fire and medical calls. “We respond to behavioral emergencies on a fairly frequent basis . . . certainly at least weekly.”

About 51,000 Maine adults and 13,000 children have a serious mental health issue, according to a 2010 NAMI state fact sheet. That doesn’t include Mainers who have a less severe mental health issue or who will find themselves in a sudden crisis.

“The reality is that you don’t know when the issue is going to matter to you until it matters to you an incredible amount,” said Jenna Mehnert, executive director of NAMI Maine. “It has no racial, no socio-economic, no educational barrier. Mental health challenges touch everybody.”

First responders say they handle more mental health issues now than in decades past. Many believe that’s because the state — and the country — began shifting away from institutions in the 1990s, instead favoring outpatient care, which keeps people in their communities and, sometimes, in the path of first responders. Some say the long-running shortage of short-term and long-term psychiatric beds has also caused patients to cycle in and out of emergency care, stabilizing only for a short time before they need help again.

Whatever the reason, it’s become common to get calls involving someone with mental health issues.

“We run into it every day, from cars that we stop to well-being checks,” said Maine State Police Chief Robert Williams. “Mental illness or mental health is a huge problem facing law enforcement today. I read one study that said 80 percent of people we come in contact with has a mental illness. That seems kind of high, but we do deal with it a lot.”

Maine first responders have long been looking at ways to deal with people who are mentally ill or in crisis.

In 1996, after a mentally ill man killed two elderly nuns and injured two others in a Waterville chapel, police there began partnering with local mental health agency Crisis & Counseling Centers, having mental health workers ride along during some shifts. The program has since been adopted by a number of other police departments in Maine, including Augusta earlier this year.

In the early 2000s, Laurie Cyr-Martel, an experienced mental health worker, served as a dedicated crisis intervention officer tasked with working scenes with the Lewiston Police Department. She also wrote a book on dealing with people in crisis — “Responding to Emotionally Disturbed Persons: a Manual for Law Enforcement Personnel.”

Also in the early 2000s, NAMI Maine began offering Crisis Intervention Team (CIT) training to first responders and others. The 40-hour, weeklong course teaches them how to calm, contain and intervene in situations, and introduces them to people who have mental health problems so they can better understand the point of view of someone on the other end of a call.

NAMI Maine later added a more basic 8-hour “Mental Health First Aid” course for those who couldn’t commit to a full week of training.

Although many consider NAMI’s courses to be “the gold standard,” some first responders’ groups have their own specialized training.

“There’s a handling-suicidal-callers class that, depending on availability and funds, we’ll send students to,” said Phyllis Gamache, director for Lewiston-Auburn’s 911 communications center. “It’s good for new people who haven’t been exposed to a great deal. It’s nerve wracking. There’s a lot of responsibility for somebody who’s only been on the job for six months, or even three years, to have the responsibility to talk to someone who’s suicidal.”

Advocates, first responders and people with mental health issues say the training efforts have helped.

“They make you feel real comfortable,” said Judy Binnette, 66, of Auburn, who deals with anxiety, depression and PTSD and has had to call 911 for chest pains. “They try to calm you down so that you’re not getting overworked and getting more panicky and stuff. They’re really calm and very thoughtful with you.”

Paul Gauvreau, board chairman of Tri-County Mental Health Services in Lewiston and a Maine assistant attorney general who deals with involuntary hospital commitments, tends to hear about the most harrowing situations — like, recently, the man who was “obviously thought disordered” and found lying asleep on Route 202 in Greene. Police got him to the hospital without incident.

“It’s pretty stunning. There’s no other way to say it. People who are severely impaired put themselves in remarkable situations,” Gauvreau said. “I’m always impressed with the professionalism of first responders who go out of their way to make sure people are brought in to a secure setting.”

Attitudes have changed, too.

“The story I like to tell is when I first started at the (Lewiston) PD, the comments were ‘Oh, they’re just crazy or whacked out,'” said Cyr-Martel. “And then like 2006, 2008, I’d get officers saying, ‘Laurie, I think they’re de-compensating.’ It’s night and day.”

But while first responders, advocates and others agree that things have improved, they also say it could always be better.

Often, “better” starts with more training.

Listen

Although a few Maine departments have all or almost-all of their first responders CIT trained, most don’t. The program is free through NAMI Maine, but departments have to replace the trainee on the job for a week — often paying overtime — and that can be a financial barrier. It can also be difficult to push crisis training when departments have other training they need to prioritize, too.

And some first responders don’t know special training is available.

“It’s in the course of emergency training that you do (mental health training), but it’s just so cursory that it doesn’t give you anything in depth other than the fact that yes, this is mental illness, and this is what you shouldn’t do rather than what you should do,” said Donald Wormell, supervisor for United Ambulance Service in Lewiston. “Wouldn’t anyone want more training?”

Last year, United handled about 20,000 calls for help, 574 of them classified as “psychiatric, abnormal behavior or suicide attempt.”

When it comes to police, Mehnert at NAMI Maine said she’d like to see half of Maine’s officers go through the 40-hour CIT session.

State Rep. Richard Malaby, R-Hancock, would have been happy with 20 percent.

During the last legislative session, he introduced a bill that would have required at least 20 percent of officers in municipal and sheriff’s departments be CIT trained by 2017. The bill died in committee. Malaby wasn’t surprised.

“I knew that wouldn’t happen, to be frank. Nonetheless, I pushed the issue,” he said. “But I did end up with a good compromise by working with the head of the police academy.”

Starting this year, the Maine Criminal Justice Academy — which trains most law enforcement officers in the state, including wardens, marine patrol, municipal and state police — will require that all of its students take NAMI Maine’s 8-hour Mental Health First Aid class.

“Today, that’s kind of a critical piece of training law enforcement officers,” said training coordinator David Tyrol of crisis training.

The academy graduates 100 to 120 people a year. Previously, students got seven hours of NAMI’s time, but that was largely focused on involuntary commitment. They’ll now receive that information in three hours rather than seven.

Mental Health First Aid is not as intensive as the weeklong CIT, but advocates say it will be a good start for students who have little-to-no experience in the field. And they like the fact that training all academy students will mean that, eventually, virtually all Maine police will be trained.

Some departments aren’t waiting for students to graduate and move up through the ranks.

Samson, the Androscoggin County Sheriff, started putting his deputies through CIT this year and has spoken with NAMI Maine about designing training geared specifically toward his corrections officers.

Samson was trained in the 1990s and now serves as a board member for Tri-County Mental Health Services in Lewiston. His goal: train all the officers he’s responsible for.

As a deputy, he repeatedly saw how well his crisis training worked — including, two or three years ago, when a Wales woman got upset because she believed people were talking to her through her ceiling and wouldn’t leave her alone.

Rather than dismiss her claims and leave, Samson was trained to stay and listen. When the woman mentioned she had a mental health case worker, Samson called the worker and got her help.

“You see (training) is successful and you say, ‘This is something more people need,'” he said.

More ideas being tried

Some first responders are trying new things, in addition to training.

The Auburn Fire Department last year started offering an emergency registry for families with autistic children so first responders will know, for example, not to use lights and sirens because that will upset the child more. Autism isn’t a mental health issue, but someone with autism can fall into the same “behavioral emergency”category.

So far, about a half-dozen families have signed up. The Lewiston Fire Department is considering something similar.

The Maine State Police, meanwhile, is creating partnerships aimed at responding to mental health issues before they escalate.

The agency has some of the most well-trained first responders in the state, but its chief lamented that some situations still require force.

“I want to make sure the perception isn’t that when law enforcement gets called to somebody who’s in a mental health crisis that our first instinct is to shoot them, because that’s what we hear all the time,” Williams said. “In the last year or so, state police have been involved in two or three shootings where the person has had mental illnesses and that’s all we hear — why didn’t you have more training to de-escalate, why didn’t you this, why didn’t you that? Well, the bottom line is, in those situations where we had to use deadly force, we had to use deadly force.”

His officers often meet people who have obvious mental health issues; they’ve interacted with people who believe someone snuck into their house through an electrical outlet, people who labeled everything in their home with the date they first saw it — but there’s nothing for the police to do. Those Mainers may have mental health problems, but they haven’t committed a crime, they don’t want to hurt themselves or someone else, and they aren’t posing a danger.

However, mental health problems can intensify. One day police can’t do anything, the next day that person is in crisis.

“We want to try to prevent the case where nothing gets done — we’ve been there a dozen times and then the person escalates where the police have to intervene. If there’s a way to prevent that, we want to do that,” Williams said.

So the Maine State Police has started working on a new partnership with mental health providers across the state to connect people who have mental health issues with professionals who can help.

“We can refer them, then we can call that agency and tell them, ‘You need to do a follow-up on these people,'” he said.

Williams knows it won’t always work. Some people will still refuse help. But it’s something more.

“At least the people involved can say, ‘You know what? These are the things we did to try and fix this,'” he said.

View the original content and more from this author here: http://ift.tt/1LgrZWB



from health IT caucus http://ift.tt/1PIYWsK
via IFTTT

Students Love the Variety: Health and Wellness Fair

Students and faculty learned about health awareness and promotion at the annual Health and Wellness Fair last Tuesday.

The event, hosted by Student Health and Wellness and Healthy for Life, was held in Room 401 of the Student Union from 11 a.m. to 3 p.m.

Scott Thompson, Student Health and Wellness Administrator, expressed Student Health and Wellness’s goal for the event.

“The overall purpose is blending student health and employee health. It covers a lot of health promotion and prevention as well as health awareness,” Thompson said. “It’s just a mish-mosh of all good health prevention and promotion needs that people don’t often think about.”

The booths catered to both students and faculty, providing information concerning the promotion of health, preventative health practices and awareness.

One of these booths represented Be the Match, a national registry for bone marrow donors. Students and faculty interested in donating could do so there, simply by filling out an application and medical survey. The application also required each applicant to take mouth swabs so their DNA could be matched with a recipient. Be the Match hopes to raise the number of registered donors, helping patients fighting leukemia, aplastic anemia and sickle cell find positive matches.

The Office of Student Involvement hosted a booth promoting the Kangaroo Food Pantry, a recent program sponsored by UMKC. The Kangaroo Food Pantry is a food pantry available exclusively to students, faculty and staff located at 4825 Troost Ave.. The pantry seeks to help students having difficulty paying for food in addition to school expenses. The booth also hosted sign-ups for volunteers seeking to get involved with work at the pantry, as well as collecting donations around campus.

El-Centro, a non-profit based in Kansas City, Kan., attended the event as well. El-Centro offers bilingual services concerning financial, health and medical applications. They also seek to assist students with health insurance—enrolling in Health Marketplace Plans and avoiding tax penalties incurred for a lack of health insurance. El-Centro also provides emergency assistance with medicine, glasses prescriptions, SNAP or food stamps and disability applications. They are also a Medicine Cabinet site, providing one-time emergency assistance for the uninsured with the filling of medication and purchasing of medical equipment.

Sodexo Dining Services, Weight Watchers, AARP, Express Scrips, UMKC Women’s Center, Cleveland Chiropractic College and The Transgender Institute were among the other organizations in attendance. UMKC also hosted booths concerning the Swinney Recreation Center, Financial Aid and Counseling among others.

UMKC student Rian Sanders enjoyed the variety of booths that filled the room..

“I love it,” Sanders said. “I think it’s really interesting. I like how it’s a good mix of health—mind, body, physical. I like it, I think it’s beneficial.”

Much like Sanders, UMKC student Jasmine Donley enjoyed the many booths in attendance.

“I actually really love it because I’m a health care major, and being able to access the resources on campus is really a good opportunity for me to get more into my major,” Donley said. “And to find out what I can do in terms of community and outreach programs, opportunities to help out with different organizations.”

View the original content and more from this author here: http://ift.tt/1LgrZWx



from health IT caucus http://ift.tt/1PIYU41
via IFTTT

Breast cancer survivors dance back to health

Friday 25 September 2015

Could Delaying Retirement Be Great For Your Health?

He’s been at it for 45 years. Wake up before 2 a.m. Turn on the fryer. And have the glazed doughnuts and peanut-topped coffeecakes ready by 6 a.m.

Yup, Michael Doucleff Sr. is a baker and small-business owner in Alton, Ill.

At at age 70, he doesn’t show many signs of slowing down. He’s still working more than 40 hours a week, still carrying 50-pound bags of flour upstairs from the basement.

“You’ve got to wake up sometime in the morning — might as well have a purpose,” Doucleff says. “I think I still contribute to society. For me, that’s enjoyable.”

Despite having an autoimmune disease, Doucleff is in pretty good shape. No heart disease. No diabetes. And sharp as a tack.

Doucleff is my father-in-law. And in our family, he’s one of the healthiest for his age — and one of the hardest workers.

That might not be a coincidence.

A study published Thursday in the journal Preventing Chronic Disease finds that working in one’s 60s and 70s is associated with better physical and mental health.

“There’s something about the aging process — that if you stay working, then you stay hardy,” says University of Miami epidemiologist Alberto Caban-Martinez, who contributed to the study.

Caban-Martinez and his colleagues analyzed survey data from more than 85,000 adults age 65 and older. (The mean age was around 75.) In general, people who kept working were nearly three times as likely to report being in good health than those who had retired.

Compared with white-collar workers, blue-collar workers still on the job were 15 percent less likely to report multiple chronic diseases, like heart disease, diabetes and cancer. And all types of workers reported better mental health, compared with those who were retired or unemployed.

“Not to encourage workaholics, but there’s something to be said about part-time or full-time work,” Caban-Martinez says. “And there’s not much difference whether you’re in the service sector or you’re a white-collar worker.”

But the study does come with a big caveat. It couldn’t determine whether working leads to good health or if it’s good health that keeps people working.

“It’s kind of the chicken or egg problem,” Caban-Martinez says. “Maybe poor physical health is not allowing people to be in the workforce.”

Still, other research has shown that being active and socially engaged helps prevent problems as we age, Caban-Martinez says. “Maybe the workplace is giving you the physical activity that keeps you mentally and physically healthy.”

And it likely doesn’t take much, he says. Getting up early and making sure the bakery is open and running smoothly is certainly enough.

View the original content and more from this author here: http://ift.tt/1FjmtAd



from health IT caucus http://ift.tt/1VeNyGp
via IFTTT

How can health IT aid public health surveillance? (infographic)

Health IT obviously should be part of public health surveillance efforts because epidemiology relies so heavily on data. With this in mind, the federal Office of the National Coordinator for Health Information Technology has published a new infographic explaining the use of health IT in syndromic surveillance and electronic public health reporting.

Some of the numbers are impressive. Thanks in no small part to the Meaningful Useincentive program for electronic health records — something ONC certainly wants to promote — the volume of laboratory results available for electronic reporting to public health agencies has soared since 2011.

There certainly is a long way to go, however. While upwards of 1,500 hospitals are sending syndromic surveillance data electronically to public health agencies, that is barely a quarter of the nearly 5,700 U.S. hospitals in operation, according to American Hospital Association data.

onc_public_health_surveillance_infographic-11042014

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

View the original content and more from this author here: http://ift.tt/1OVAJkB



from health IT caucus http://ift.tt/1LBRJLG
via IFTTT

Monthly Cost Is Top Concern for Health Insurance Shoppers: Survey

Pragmatic Advice For Would-Be Health Entrepreneurs From The Medicine X Conference

At this morning’s Health Innovation Summit – part of the Stanford Medicine Xconference now underway – I had the opportunity to listen to a number of compelling presentations, and to moderate an author panel with UCSF Professor of Medicine Bob Wachter (book: The Digital Doctor) and Athena Health co-founder and CEO Jonathan Bush (Where Does It Hurt? – my WSJ review here, additional Forbes commentaryhere).

Based on an informal “raise your hand” survey I did when I started my session, it seemed like the audience was about 40% tech people who had moved into healthcare, and 60% healthcare people who had embraced technology.  The majority of attendees reported trying to obtain their health records at some point, and many, it seemed had been successful (suggesting the audience was either particularly well-connected or unusually persistent).  A large number – perhaps half – had obtained consumer genetic information, via either 23andMe or Ancestry.com – suggesting, again, an unusually high level of interest and engagement.

(Disclosure/reminder: I work at a cloud genomics company in Mountain View, CA.)

Four points from this morning seemed especially relevant to aspiring healthcare entrepreneurs.

EMRs: Extract My Revenue

One highlight of the morning was a compelling interview of entrepreneur Christine Lemke (Chief Product Officer of Evidation Health) by Rock Health’s Managing DirectorMalay Gandhi.  One point made by Lemke, and echoed by some of the other speakers and attendees, is that the key factor driving EMR selection for major hospitals (Epic was often called out, but perhaps only because it are said by many to do this the best) is the capability to enhance “revenue-cycle management.”  Translation: – it’s all about the Benjamins.  Perhaps more than anything else, hospitals want to maximize their revenue, and ensure they capture, and extract the most (permissible) value for the services they provide.

This matters for two reasons.  First, if you are an entrepreneur selling into the healthcare system, then you really need to understand the business of healthcare, and more specifically, must appreciate how and why the money flows.  There are a lot of lofty words and lofty intentions in healthcare, but at the end of the day, hospitals executives – the folks who make the large purchasing decisions — are driven largely by the financialbottom line, and entrepreneurs need to understand this.

Second, media coverage of EMRs tend to focus on interoperability – the ability to connect with external EMRs; provider discussions of EMRs often focus on the endless, soul-crushing data entry and aggravating workflow.  While hospital executives would probably say happier staff represents a “nice to have,” and improved interoperability is a “nice to say we aspire to have” (see here), neither of these factors seem to truly drive decisions around EMR choice or EMR implementation (with some exceptions, of course).  Mostly, it seems to be about the ability of the EMR system to be implemented reliably, and then generate revenue for the hospital.  In the prophetic words of H. L. Mencken, “When somebody says it’s not about the money, it’s about the money.”

View the original content and more from this author here: http://ift.tt/1VcGFKW



from health IT caucus http://ift.tt/1YF2Ets
via IFTTT

AHIMA conference attendees stand at brink of ICD-10 transition

It seems almost uncanny how the health IT conference most associated with ICD-10 and all things medical coding is being held this year literally on the eve of the historic transition from ICD-9 to ICD-10.

Indeed, when the 2015 AHIMA Convention & Exhibit ends in New Orleans the afternoon of Sept. 30, the ICD-10 deadline will be only about eight hours away at midnight on Oct. 1.

While some worry about the changeover, the ICD-10 milestone is one that leadership of the American Health Information Management Association, and the majority of AHIMA’s members, overwhelmingly support, considering that AHIMA has been one of the strongest advocates for ICD-10.

“There’s going to be a celebratory atmosphere,” Sue Bowman, AHIMA’s senior director for coding policy and compliance, told SearchHealthIT. “I think the vast majority of the industry is ready.”

Even so, there is simmering unease in some quarters about the advent of the new and exponentially more complex coding system, particularly among physicians and physician practices.

For an up-to-the-minute expression of this ICD-9 to ICD-10 angst, check out this blog post from Merge Healthcare Incorporated, the VNA vendor recently acquired by IBM Watson Health.

A Merge poll of its medical enterprise imaging clients found that about half felt they were 80% ready for ICD-10, and another 40% felt they were 50% to 80% ready., Many of those polled were worried not so much about the switch itself, “but rather the interim period following the switch where they will likely have to use both code sets for billing,” the blog says.

All that said, the AHIMA conference — expected to draw several thousand health information management professionals and a few hundred vendors — will deal with more than just ICD-10, though there will be panels devoted to last-minute conversion tips and vendors selling ICD-10 accessory software.

High on the agenda is information governance, a field that has been prominent for years in information management in other industries, but only made its first real splash in health IT last year at the AHIMA conference in San Diego.

This year, AHIMA is rolling out a host of information governance resources, including consulting services, Bowman noted.

In the meantime, Bowman said she feels confident that individual practitioners and others who see adopting ICD-10 as daunting will ultimately come around to the coding system’s benefits: more than six times as many codes as ICD-9 and the resulting richer trove of health data for analysis and mining and clinical knowledge.

“I think even physicians will see that it’s not too hard to use and will give them better health data,” she said.

View the original content and more from this author here: http://ift.tt/1KGmHhE



from health IT caucus http://ift.tt/1Wmzptf
via IFTTT

Thursday 24 September 2015

IOM Calls for Better Use of Health IT To Reduce Diagnostic Errors

The Institute of Medicine in a new report made several recommendations calling for better use of health IT to help hospitals reduce diagnostic errors, which are likely to affect nearly all U.S. residents in their lives, Health Data Management reports (Slabodkin, Health Data Management, 9/23).

Report Findings

The report, titled “Improving Diagnosis in Health Care,” concluded that most individuals will experience one or more diagnostic errors — defined as delayed or inaccurate diagnoses — in their lifetimes (Appleby, Kaiser Health News, 9/22).

Such errors affect one in 20, or about 12 million, patients annually (Health Data Management, 9/23). Further, they account for hundreds of thousands of adverse events and nearly 10% of all patient deaths.

However, IOM said that far too little attention has been paid to such errors as providers focus more on other safety concerns.

Health IT Findings

The report noted that electronic health records can act as barriers to correct diagnoses, noting:

  • “Auto-fill” functions can result in erroneous information being entered;
  • EHRs often lack interoperability; and
  • The volume of inputs and alerts can overwhelm staff (Kaiser Health News, 9/22).

According to the report, “Urgent change is warranted to address this challenge.”

Recommendations

Among other things, IOM recommended that vendors and the Office of the National Coordinator for Health IT work to ensure technologies:

  • Align with clinical workflows;
  • Demonstrate usability;
  • Facilitate the flow of information among patients and providers;
  • Incorporate human factors knowledge;
  • Integrate measurement capability; and
  • Provide clinical decision support (Health Data Management, 9/23).

IOM also recommended that:

  • ONC require health IT vendors by 2018 to comply with interoperability standards that facilitate the flow of patient information across care settings; and
  • Patient access to EHRs include clinical notes and diagnostic test results (Frieden, MedPage Today, 9/22).

In addition, IOM said HHS should require health IT vendors to:

  • “Notify users about potential adverse effects on the diagnostic process related to the use of their products”;
  • Submit their products for routine independent evaluation; and
  • Support the free exchange of information about real-time user experiences with health IT design and implementation that negatively affect the diagnostic process.

View the original content and more from this author here: http://ift.tt/1LyElI7



from health IT caucus http://ift.tt/1gQvGUG
via IFTTT

ONC releases health IT strategic plan

The plan that will govern the development and use of federal health IT through 2020 has been released. The Office of the National Coordinator for Health IT rolled out the plan Sept. 21, after months of considering and incorporating public feedback on the draft plan released in December 2014.

“This Plan outlines the commitments of all the agencies that use or influence the use of health IT across the nation for the next five years,” wrote ONC officials led by Karen DeSalvo, acting assistant secretary for health at the Department of Health and Human Services, in a blog post.

“The Plan is an action plan for federal partners, as they work to expedite high-quality, accurate, secure, and relevant electronic health information for stakeholders across the nation. The Plan’s strategies for achieving this aim focus on making electronic information available,” the entry reads.

The plan specifies four goals:

  1. Advance person-centered and self-managed health;
  2. Transform healthcare delivery and community health;
  3. Foster research, scientific knowledge and innovation;
  4. Enhance nation’s health IT infrastructure.

ONC received more than 400 pieces of feedback on the draft plan, according to the blog post, and solicited more through nearly two dozen listening sessions.

“The final Federal Health IT Strategic Plan reflects commenters’ recommendations that federal efforts, including government programs and policies, assist stakeholders as they use electronic information to improve health and support innovations that make health, care delivery, and research more effective,” wrote DeSalvo and her co-authors. “The Plan is a broad document that condenses the detailed work and strategic direction of many federal initiatives and plans. Its strategies and objectives support the use of health IT to accomplish these ongoing initiatives, such as precision medicine and delivery system reform.”

View the original content and more from this author here: http://ift.tt/1LyEnzV



from health IT caucus http://ift.tt/1gQvGUE
via IFTTT

Select produce by color to address specific health concerns

Fruits and veggies are important to include in your diet. But choosing which ones to grab can sometimes be overwhelming. Nutritionist Mary Pietras from Beyond Basics Health Coaching can help take the guess work out of grocery cart filling.

She recommends shopping for produce based on the color. Pietras said how it appears on the outside can tell you how it will make you feel inside.

Red-like beets and tomatoes-are great for cellular function, like anti- aging. Pietras said red veggies and fruits decrease inflammation. They’re also great for increasing energy.

Orange offers vitamin C, but it also boosts our immune system and also decreases inflammation.

But most produce might be green with envy of the color green. About 60% of your cart should be filled with greens.

“Because of the chlorophyll that’s in there and it actually is very close to what blood is like- the consistency the nutrients in there- so it allows your body to heal itself more and we can breathe better and get more oxygen into our system,” she said.

White produce is one of the most important in boosting your overall health. It has ECGC in it that stabilizes our hormones and also boosts our immune system. A lot of people don’t get that into their system- like garlic and ginger- can kill all the bad bacteria in the gut allowing the good to thrive which boosts immune system helps us be overall healthy.

View the original content and more from this author here: http://ift.tt/1LyElrP



from health IT caucus http://ift.tt/1gQvGUC
via IFTTT

Fixing Qld Health’s IT systems: start with the plumbing

Queensland Health will eschew a big bang transformation of its legacy systems in favour of a lower-risk, incremental approach to systems replacement in the hopes of reviving its IT fortunes. While much attention has been on the department’s disastrous implementation of an SAP payroll system …
View the original content and more from this author here: http://ift.tt/1gQvGUA



from health IT caucus http://ift.tt/1LyElrK
via IFTTT

Applying Data Science to Advanced Threats

The Problem

The cyber security industry is now over 30 years old. And just like people, with each passing decade, we realize that what worked for us in our 20s, simply won’t work for us now or going forward. In fact, carrying forward the mindset and behaviors of those first 20 years exposes us to countless problems in health and long term solvency. We learn that to survive in the world we must adapt and evolve to a higher form of existence. The antiquated and archaic practices of our past limit our visibility into the future in detecting, and thereby avoiding, maliciousness. Consequently they have given rise to a freight train sized hole of opportunity for the cyber criminals, nation states and cyber miscreants that wish to exploit our blindspots in the cyber world.

Blacklisting (and Signatures) Can Be Compromised

Blacklisting technologies rely almost 100% on signature based techniques for detecting bad files have been at the heart of our industry since the beginning when we had only rare outbreaks like Michelangelo, Stoned and the Morris Worm. The grossly unfortunate fact is that they remain the predominant form of detection (and thereby prevention) in the market today. Signature based approaches to security served us well then when the number of bad objects (files, network traffic, and vulnerabilities) was small and the techniques to alter those files to bypass detection were non-existent or at least non-trivial.

Today however, countless techniques exist to avoid these once stalwart protection technologies, including packers, mutation engines, obfuscators, encryption and virtualization bypass techniques.

Within milliseconds, a once easily detected malicious file can be altered to be completely invisible to even today’s best detection technologies while remaining functionally identical to its original maliciousness. This allows the bad guys to easily bypass security infrastructure that once detected them with ease.

The sheer numbers of files submitted to security vendors today for analysis (over 100k daily) is so overwhelming that most vendors simply cannot handle the volume. Their methods and manpower become easily avalanched over. The scale of the problem outnumbers the industry’s capacity for maintenance. As a result we have rampant miss rates.

Whitelisting Can Be Compromised

Whitelisting technologies developed in response to what the Blacklisting world is victim to: low detection rates. In other words, blacklisting alone detects only 5-10% of malicious files out there. The reason whitelisting was so promising for so long was that it effectively did the opposite of blacklisting: rather than stopping everything known bad (which is large and hard to do), whitelisting only allowed to run those files which are known good (which is much smaller and presumably easier to do). This technique has been applied to security through identification of permissible URLs and files that are known (or perceived) to be clean and safe. But these solutions have some fundamental problems as well.

The first challenge with solutions that rely heavily on whitelisting is that one must simply “trust” what the vendor (or your operations staff) has designated as “good”. We have seen this model fall down time and again with security and software vendors who have their development environments compromised and their private signing certificates stolen (e.g. Adobe, Bit9 and Opera Software). When these attacks occurred it allowed the thief to sign their own malicious files as if they came from the “trusted” vendor. And because whitelisting solutions rely so heavily on this “trust” model, it allows the bad guys to easily bypass the technology.

Trust Can Be Compromised

As a consequence to the identified gaps of blacklisting and whitelisting, numerous technologies have crept up to fill in the gaps of signature technology including host intrusion protection systems (HIPS), heuristics, behavioral, and both hardware and software sandboxing. But all of these techniques have two core weaknesses: 1) foundational signature elements, and 2) reliance on “trust”.

Technologies such as HIPS, heuristics and behavioral engines remain at their core, signature based. They rely on “knowing” what is bad and creating a signature for that “badness”. Even sandboxing technologies which claim no signatures are involved to autodetonate captured files and binaries, still rely on signatures to enable alerting and blocking the next time it sees it.

For these technologies to know if something is good or bad, they must map them to a list of known good or bad behaviors which can take minutes, hours, or days using manual verification. Even then, the attack has already happened and the detonation may not discern the maliciousness of the malware.

Can we simply “trust” our vendors to show us what is “good”?

Bad guys have the advantage in more resources and time to outwit the various detection schemes of security vendors. Additionally, many security models (like signatures) require the engagement of a human. Human involvement is fallible and limited in scale to the speed and sophistication of advanced threats.

Can we simply “trust” our security vendors to show us what is “bad”?

We as an industry must evolve from this outlived model to a new and ever-evolving technique; one that abandons signatures and blind trust; one that relies on a mathematical, algorithmic and scientific approach to better effectiveness and measurable accuracy. In short, we must evolve to “Trust the Math” and science of Cylance’s Infinity.

Introducing Cylance Infinity

Infinity is a fundamental and epic shift from traditional security methods of detecting good and bad. It is a highly intelligent, machinelearning, data analysis platform.

As battle tested security industry veterans, we know that the previous approaches can never cope with the volume and variety of advanced threats. So we designed Infinity to make intelligent decisions without relying on signatures. It does this by taking a predictive and actuarial approach to data on a network to determine good from bad.

This model exists in many other industries. Insurance companies use actuarial science to determine the likelihood of a risk event for the insured person at a surprisingly high rate of accuracy. This concept relies on advanced models of likely outcomes based on a variety of factors. For a standard insurance policy, they may consider twenty to thirty facts to determine the most likely outcome and charge appropriately. Infinity uses tens of thousands of measured facts harnessed across millions of objects to make its decisions, in near real-time.

Infinity, at its heart, is a massively scalable data processing system capable of generating highly efficient mathematical models for any number of problems.

Cylance uses these models applied to ‘big data’ to solve very hard security problems with highly accurate results at exceptionally rapid rates. It’s done by applying data science and machine learning on a massive scale. Coupled with world class subject matter experts, cyber security is able to leap ahead of threats.

While Infinity is problem agnostic, correctly designing solutions to hard problems takes time, knowledge and effort. The Cylance Infinity Labs team has focused all of their efforts on detecting advanced threats, in near real-time, correctly, without signatures.

While Infinity is problem agnostic, correctly designing solutions to hard problems takes time, knowledge and effort. The Cylance Infinity Labs team has focused all of their efforts on detecting advanced threats, in near real-time, correctly, without signatures.

What is Machine Learning?

Machine Learning (ML) is a formal branch of Artificial Intelligence and Computational Learning Theory that focuses on building computer systems that can learn from data and make decisions about subsequent data. In 1950, Alan Turing first proposed the question, “Can computers think?” However, rather than teaching a computer to “think” in a general sense, the science of machine learning is about creating a system to computationally do what humans (as thinking entities) do in specific contexts. Machine Learning (ML) and big data analytics go hand-in-hand so ML focuses on prediction, based on properties learned from earlier data. This is how Infinity identifies malicious versus safe or legitimate files. Data mining focuses on the discovery of previously unknown properties of data, so those properties can be used in future ML decisions. This means Infinity learns on a continual basis, even as attacker methodologies change over time!

How it Works

Infinity collects data, trains and learns from the data, and calculates likely outcomes based on what it sees. It’s constantly getting smarter from environmental feedback and a constant stream of new data from all around the world. To achieve its magic, Infinity performs the following steps. First it COLLECTS vast amounts of data from every conceivable source. Second, Infinity EXTRACTS FEATURES that we have defined to be uniquely atomic characteristics of the file depending on its type (.exe, .dll, .com, .pdf, .java, .doc, .xls, .ppt, etc.). Third, Infinity constantly adjusts to the realtime threatscape and TRAINS the machine learning system for better decisions. Finally, for each query to Infinity, we CLASSIFY the data as good or bad.

Infinity – The Rubber Meets the Road

Infinity be used to supercharge decision making at endpoints, and woven tightly into existing security systems via a variety of integration options. It is cloud enabled (but not cloud dependent) to support advanced detection on a global scale in limited form factor environments, or can operate autonomously while still achieving a stunning rate of protection.

The breadth of deployment options helps to solve several fundamental problem points on a modern network.

CylanceV and CylanceV Local

CylanceV is a REST SSL Application Programing Interface integration to Infinity’s intelligent cyber security decision making. Through the API and specially developed utilities, IT departments executing incident response and forensics can take the tedium out of tracking down malware and determining what is truly bad.

CylanceV enables a starting point for forensic analysis and timely remediation through an automated and highly efficient approach.

Tying other security tools like SIEM, Log analysis, host and network monitoring, HIPS/NIDS and investigation tools including anti-virus, anti-malware and forensics, into CylanceV provides contextual intelligence for more accurate and effective malware identification.

The CylanceV API allows utilities to be developed in most popular frameworks (.NET, Python, etc.) and invoked through HTTPS using tools such as CURL or WGET in order to make the data segmentation easier and more efficient.

CylanceV Local is an on-premise version of CylanceV that allows for use in restricted and sensitive environments.

Integrating 3rd party functionality, like Python scripts, Splunk, C# to Infinity quickly determines what is safe and what is a threat, making smart security smarter. Together, they reduce the total number of prospective compromised machines to something manageable.

Infinity On the Endpoint

CylancePROTECT is our host based security solution built on Infinity technology. It leverages algorithmic science to greatly increase the speed and accuracy of host protection without reliance on signatures, heuristics or behavior modeling. It offers a real-time protection layer on the endpoint that can make decisions about the nature of malware independent of connecting to Infinity and at a stunningly low performance impact. PROTECT offers a powerful front line of defense, whether your assets are behind your corporate firewall or in a coffee shop. Its extensive management capabilities easily blend the pervasive protection into your existing security workflow.

Summary

With Infinity, we can definitively determine good or bad file objects milliseconds, with extraordinarily high detection accuracy and extremely low false positive rates. Because the system is self-collecting, self-training, and selflearning, we always stay ahead of the changes and unknowns attempted by the bad guys. With such a mathematical approach, we may change the game of security… forever.

About Cylance

Cylance is a global cyber security products and services company headquartered in Irvine, California. Its founders, Stuart McClure and Ryan Permeh, know that today’s network and operations infrastructure is inadequately protected by flawed security.

Stuart is a leading authority in information security and lead-author of “Hacking Exposed: Network Security Secrets and Solutions”. Stuart launched the vulnerability assessment leader Foundstone, Inc. and served as Global CTO at McAfee as well as EVP/GM of the Security Management Business Unit.

Ryan is a leading expert in development of security technologies who, with Stuart, built TRACE, McAfee’s elite threat team, and unique detection technologies. Both have witnessed the security industry’s evolution firsthand over the past 25 years and know that the security infrastructure for today and tomorrow’s threats is fundamentally broken.

Cylance is driven by an impressive team of veteran Security executives, board of directors and advisors, and deeply talented security professionals to achieve a simple mission: Solve the world’s most difficult security problems

Cylance, Inc.

+1 (877) 973-3336

sales@cylance.com

www.cylance.com

West Coast Office: 46 Discovery, #200 Irvine, CA 92618 USA

East Coast Office: 11710 Plaza America Drive, # 2000 Reston, VA 20190 USA

To learn more about Cylance visit their website at www.cylance.com



from health IT caucus http://ift.tt/1R24m2R
via IFTTT