Protect the privacy of your patients and the reputation of your facility.
Training that’s smarter, more effective, and cost efficient.
Automate the COI disclosure and management process.
Whether it is live, taped, or computer-based, compliance training has to engaging and capture the attention of a workforce that seems to have a shorter attention span every year. Four suggestions to improve engagement.
HCCS has helped us propel our compliance training and other online education programs into the 21st century,” Kay says. “I’ve seen enough of the other courses to know that if you do compliance training online, HCCS does it better than anyone else.”
The Joint Commission has found inadequate safety culture to be a significant contributing factor to adverse outcomes. To support this finding, it recently emphasized the need for healthcare leadership to create an effective culture of safety.
In our first installment of the Second Opinions Podcast, Dr. Miles Snowden, the Chief Medical Officer at TeamHealth, shares his personal insight on the Medicare Access and CHIP Reauthorization Act (MACRA), and what it means for physicians, hospitals, and consumers.
HealthStream celebrates our customers who are Five-Star HCAHPS Summary Star winners. The HCAHPS Star Ratings will provide a quick summary of each HCAHPS measure in a format that is increasingly familiar to consumers.
HealthStream has used various surveys to collect information from healthcare leaders and employees on their organizations’ top HCAHPS challenges. Our analysis identifies the top three challenges as communication, consistency and sustainability, and understanding the survey and reports.
There are 25 Performing Provider Systems in New York’s DSRIP. Having spent two years getting infrastructure and project plans in place, it is time to start operationalizing all that work. April 1, 2017 marked the beginning of Year 3, and reporting now will be a major focus.
A CIA requires significant attention, data collection, legal defense, negotiation, new systems, new policies, oversight, and enforcement, possibly for many years. Healthcare facilities of all types, including hospitals, pharmaceutical manufacturers, long-term care, physician groups, and more have all seen increases in CIAs. Yet, these organizations often struggle with what to do if a recipient of one.
One of the challenges that governmental and institutional authorities face in evaluating the efficacy and cost effectiveness of therapeutics is determining who to rely on for technical and scientific support. On one hand, who better to explain the relative advantages of a new product than the inventor of a device, or the researcher who has overseen the development of a new and promising drug? On the other hand, who could be more invested in a favorable determination on safety and effectiveness?
The healthcare industry has passed the “if” stage of cyber-attacks and is now asking “when.” And, it’s no surprise cyber criminals have adjusted their targets. With patient records fetching 50 times more money on the black market than financial data and only 33% of healthcare facilities reporting their current cyber security posture as “very effective,” hackers have all the incentives in the world to breach your cyber defenses and steal patient data.
In today’s NFL not much is private. On any given Sunday, viewers are inundated with information about players’ personal and professional lives. One of the few stones left unturned when it comes to privacy are players’ medical records. For all their fame and fortune, when it comes to HIPAA, they are covered just like the rest of us. So when a report recently surfaced that a laptop containing medical records of thousands of players had been stolen from a Washington Redskins staff member, two relatively unrelated industries, healthcare and sports, made headlines for all the wrong reasons.
Last month we looked at the growing problem of ransomware and the potentially devastating impact it can have on systems, patient information and the entire operations of your facility. Ransomware is just one of many security issues that every facility needs to be concerned with and take steps to prevent. The list of security concerns includes physical security, social engineering, phishing, social media, mobile devices, access to patient records, malicious software and more.
Imagine you come into work one morning and the entire computer network is shut down and all files are inaccessible! That’s what happened to a friend of mine who owns a business in New Jersey. On their network were two letters from hackers that had hacked into their computer system overnight – one that contained a link where they could get their ENCRYPTED files and network back and another that told them how to get the special software key needed to decrypt those files.
Time will tell whether increased transparency will change dubious behavior, as designers of the database hope. What has become clear in the short term, however, is that the database is providing an excellent source of information for data mining by government investigators and reporters seeking evidence of connections between payments from industry and questionable actions by providers. It is the publicizing of these connections that will help to raise awareness and increase public pressure for the aforementioned changes in behavior.