IT Support and Hardware for Clinics
35.9K views | +7 today
IT Support and Hardware for Clinics
News, Information and Updates on Hardware and IT Tools to help improve your Medical practice
Your new post is loading...
Your new post is loading...!

Recording clinical data in e-clinic

Recording clinical data in e-clinic | IT Support and Hardware for Clinics |

There are many ways to securely and accurately record clinical data in e-clinic, and the method you choose is largely a matter of personal preference. We look at all the options below, including Word templates, PDF forms and hard-coded clinical questionnaires.

1) Appointment notes

Some practitioners simply choose to make free format notes which are linked to the appointment record. e-clinic also lets you to set up your own appointment notes templates, allowing you to order your notes into sections and complete text for each section. An outcome can be recorded for every appointment. Appointment notes are logged with the date, time and practitioner and can be securely locked. You can also makes notes on phone calls and other events.

2) Attaching files and photographs

A practitioner may also typically attach files or photographs to the patient record during the appointment. These may be facial photographs, x-rays, scanned documents or blood tests. You can also attach video or audio files.

3) Annotating images

e-clinic allows you to annotate an image or chart to show things like areas of pain or injection sites. We have some standard images but most practitioners prefer to load their own, which may reflect the paper charts and forms they were previously using.

4) Word templates

Many people prefer to record clinical notes into Word. You can create your own template for any treatment and then copy and paste ‘bookmarks’ into the template. These pull through information from the patient’s file like name, age, date of appointment, date of birth and so on, as soon as the template is opened. You can also add items like checkboxes. Once the template is opened and the patient information pulled through, you can then add your own notes during or after the consultation or treatment. You would then simply save the Word document with there patient record.

5) PDF forms stored as data

A sophisticated way to record clinical data in e-clinic is with a custom PDF form. If you already have skills in creating PDF forms using Adobe Acrobat, you may want to create your own, but we normally find that clients prefer us to do this as bespoke development. A paper form can be transformed into a PDF with drop-downs, checkboxes and free text areas. The form is called up and completed during consultation or treatment, then stored against the patient record. The most impressive aspect is that, unlike with Word template, input is stored as data fields, meaning it can be reported on or exported at a later date.

6) Hard-coded clinical forms

Any medical or clinical form can be hardcoded into e-clinic by our development team. A form created in this way can include drop-downs, checkboxes and free text and fields are stored as data.

7) Consent forms

A basic consent form can be created in e-clinic and signed on an iPad by the patient. Consent forms created in this way would simply consist of text, which the patient reads and then signs. If you want a more complex consent form which encompasses checkboxes for example, it would be better to create it as a Word template or ask us to create a hard-coded form.

Technical Dr. Inc.'s insight:
Contact Details : or 877-910-0004

No comment yet.!

Apple Spending $2 Billion to Build Two New Data Centers in Europe

Apple Spending $2 Billion to Build Two New Data Centers in Europe | IT Support and Hardware for Clinics |

Apple announcedon Monday that it will invest €1.7 billion to build and operate two new data centers in Europe. The state-of-the-art facilities will be located in County Galway, Ireland and the Central Jutland Region of Denmark, powering Apple's online services such as the App Store, iTunes Store, iMessage, Maps and Siri for European customers.

“We are grateful for Apple’s continued success in Europe and proud that our investment supports communities across the continent,” said Tim Cook, Apple’s CEO. “This significant new investment represents Apple’s biggest project in Europe to date. We’re thrilled to be expanding our operations, creating hundreds of local jobs and introducing some of our most advanced green building designs yet.”

The data centers will be powered by 100% clean and renewable energy sources, with each having the lowest environmental impact yet for any Apple data center. Apple will also work with local partners to develop additional renewable energy projects derived from wind and other sources for future usage.

“We believe that innovation is about leaving the world better than we found it, and that the time for tackling climate change is now,” said Lisa Jackson, Apple’s vice president of Environmental Initiatives. “We’re excited to spur green industry growth in Ireland and Denmark and develop energy systems that take advantage of their strong wind resources. Our commitment to environmental responsibility is good for the planet, good for our business and good for the European economy.”

The 166,000-square-meter data centers are expected to be begin operations by 2017 and help support nearly 672,000 jobs in Europe, a large portion of which relate to the development of iOS apps. Apple claims that developers have earned more than €6.6 billion through app sales since the App Store launched in 2008.

No comment yet.!

New Trustwave Report Reveals Security Deficiencies That Increase Data Breach Risk

New Trustwave Report Reveals Security Deficiencies That Increase Data Breach Risk | IT Support and Hardware for Clinics |

CHICAGO, IL--(Marketwired - Dec 9, 2014) - A new report from Trustwave reveals many businesses still struggle with information security deficiencies and common security weaknesses that can elevate their risk of data breaches.

Based on a global survey of 476 information technology and security professionals located in more than 50 countries, the 2014 State of Risk Report from Trustwave offers benchmarks by which IT and security professionals can compare their risk stance against their peers. Data from the report can also be used to inform senior leadership about the largest threats they are facing, gaps that need filling and how they can remediate weaknesses and improve their security posture.

Key findings from the 2014 State of Risk Report include:

  • Data is the lifeblood of business: 81 percent of businesses store and process financial data, 71 percent store intellectual property and 47 percent store payment card data.
  • High level executives are only somewhat involved: 45 percent of businesses have board- or senior-level management who take only a partial role in security matters; 9 percent do not partake at all.
  • Sensitive data may be off the radar: 63 percent of businesses do not have a fully mature method to control and track sensitive data, while 19 percent do not have one at all. Additionally less than half (49 percent) fully encrypt stored sensitive data, with 51 percent only partially or not at all.
  • If they're breached, they don't know what to do: 21 percent of businesses do not have incident response procedures in place; 20 percent of businesses do not have a process that enables the reporting of security incidents.
  • They understand legal implications but fail to take action: 60 percent of businesses are fully aware of their legal responsibilities in safeguarding sensitive data, yet 21 percent never perform security awareness training, 23 percent never hold security planning meetings and 24 percent do not have employees that read and sign their businesses' information security policy.
  • They do not know where their valuable data lives: 33 percent of businesses have not commissioned a risk assessment to identify where their valuable data lives and what controls -- if any -- are in place to protect it.
  • Assumptions about third-party providers' security controls: 58 percent of businesses use third-parties to manage sensitive data, yet almost half (48 percent) do not have a third party management program in place.
  • They lack patch management programs: 58 percent of businesses do not have a fully mature patch management process in place, and 12 percent do not have a patch management process in place at all.

"Businesses must look at security as a business-as-usual imperative," said Michael Aminzade, vice president of Global Compliance & Risk Services at Trustwave. "Understanding their risk level is the first step. By identifying their largest security shortfalls and rectifying them, businesses can stay ahead of the criminals and decrease their risk of getting breached."

No comment yet.!

Fake patient data could have been uploaded through SAP medical app

Fake patient data could have been uploaded through SAP medical app | IT Support and Hardware for Clinics |

SAP has fixed two flaws in a mobile medical app, one of which could have allowed an attacker to upload fake patient data.

The issues were found in SAP’s Electronic Medical Records (EMR) Unwired, which stores clinical data about patients including lab results and images, said Alexander Polyakov, CTO of ERPScan, a company based in Palo Alto, California, that specializes in enterprise application security.

Researchers with ERPScan found a local SQL injection flaw that could allow other applications on a mobile device to get access to an EMR Unwired database. That’s not supposed to happen, as mobile applications are usually sandboxed to prevent other applications from accessing their data.

“For example, you can upload malware to the phone, and this malware will be able to get access to this embedded database of this health care application,” Polyakov said in a phone interview.

They also found another issue in EMR Unwired where an attacker could tamper with a configuration file and then change medical records stored on the server, according to an ERPScan advisory.

“You can send fake information about the medical records, so you can imagine what can be done after that,” Polyakov said. “You can say, ‘This patient is not ill’.”

SAP fixed both of the issues about a month ago, Polyakov said.

The German software giant also fixed another flaw about a week ago found by ERPScan researchers, which affected its Mobile Device Management software, a mobile client that allows access to the company’s other business applications.

The issue was a server-side buffer overflow that could cause a denial-of-service attack, according to an advisory. That may not seem serious, but that server software accepts supply-chain reports from the field and is also used by executives to get access to business-critical data, Polyakov said.

“If you can disable the mobile server for at least an hour, the supply chain of the company can be stopped, so you can imagine how bad it can be for a company,” Polyakov said.

The vulnerability is not remotely exploitable, so an attacker would need to have access to a SAP Mobile Device Management client, he said. But that would be accessible from inside the company and possibly from third-parties, he added.

No comment yet.!

Looks like Microsoft is outsourcing a part of its cloud

Looks like Microsoft is outsourcing a part of its cloud | IT Support and Hardware for Clinics |

CDN expert Dan Rayburn reported Monday that Microsoft is deep-sixing its home-grown content delivery network capabilities and is instead turning to Verizon EdgeCast to deliver video for Microsoft Azure customers. Verizon bought Edgecast for its media delivery expertise, in late 2013.

Reached for comment, a Microsoft spokesman provided a limited confirmation: “Microsoft licenses technology from many partners to complement our product offerings and to give customers complete solutions. We are happy to partner with EdgeCast to provide an integral component of the Azure Media Services workflow.”

Delivery of content of all kinds, including bandwidth-hungry video, has been a priority for the Azure forces. Microsoft trumpeted the use of Microsoft Azure Media Services to help live stream Winter Olympic events from Sochi, for example, but that effort relied on CDN market leader Akamai.

“While azure did have some CDN services of its own before shutting them down, but they were basic, Rayburn said via email.

“Partnering with Verizon’s EdgeCast gives Azure more CDN functionality, greater reach and capacity and allows Azure to get all of the advantages of one of the best CDNs in the market, without any of the major capex or opex challenges. It’s a smart move on Azure’s part,” he said.

As Rayburn pointed out on his blog, Amazon builds almost everything in its cloud from foundation to rooftop. Microsoft, on the other hand, is more partner-focused and thus more inclined to license or buy technology.

And, don’t forget, Microsoft is also playing cloud catch up to Amazon Web Services, which, having launched in 2006, has a multi-year head start over competitors. Azure, in its first PaaS-based incarnation launched in 2010, but the more AWS-comparable version kicked off in 2013.

When you’re behind in the race, buying in could be a way to make up for lost time.