PVMC Legacy Wireless Networks To Be Disabled

Now that PVMC is using the SCL standard wireless networks, we are making plans to disable the legacy PVMC wireless networks.

The new SCL wireless networks that are now in place include:

  • SCLHS (this is the primary for laptops, etc.)
  • SLCHS_VOIP (used for corporate VOIP telephones devices like SpectraLinks)
  • SCLHS_BIOMED (used for BioMed equipment)
  • SCLHS_PUBLIC (this is the public guest wireless network for patients, visitors, personal cell phones and laptops, etc.)

The legacy PVMC wireless networks that will be disabled include:

  • PVMC_Mobile
  • PVMC_Svc
  • PVMC_Guest (this has already been disabled)

There are a great deal of personal devices – smart phones, laptops – that are currently connecting to PVMC_Mobile and PVMC_Svc. We recommend you reconfigure your devices to instead connect with SCLHS_PUBLIC. We know that there are also quite a few corporate devices still pointing to the legacy PVMC networks as well, and the PVMC IT team will be working with those areas affected to ensure they get moved as well.

Our target date to disable the legacy PVMC networks is February 1, please make these changes to your personal devices as soon as possible. The IT department will send out reminders between now and then, and please reach out to Tim Branningan at timothy.brannigan@sclhs.net or the PVMC IT team with any questions in the meantime.

 

Cyber Security Awareness Month – Helping Others Secure Themselves

As October ends, so does Enterprise Security’s Annual Cyber Security Awareness Month. This year we have focused on several topics;

  • Week 1: The Truth about Data Breaches walked through the Equifax breach and how to protect your identity after this breach.
  • Week 2: Focused how to protect SCL Health confidential information such as patient and credit card information.
  • Week 3: Explained Social Engineering and how to not fall victim to a scam at work or at home.
  • In week 4 we are focusing on how to help others secure themselves. This may be a parent, a child, a neighbor, or anybody who does not feel comfortable in how to securely use technology.

Many of us feel comfortable with technology, to include how to use it safely and securely. However, other friends or family members may not feel so comfortable. In fact, they may be confused, intimidated, or even scared by it. This makes them very vulnerable to today’s cyber attackers. Cyber security at home does not have to be scary, and you can help guide them in understanding the basics.

Five Simple Steps
Here are five simple steps you can take to help others overcome those fears and securely make the most of today’s technology.

  1. Social Engineering: Social engineering is a common technique used by cyber attackers to trick or fool people into doing something they should not do, such as sharing their password, infecting their computer, or sharing sensitive information. This is nothing new. Scams and con artists have existed for thousands of years. The only difference now is bad guys are applying these same concepts to the Internet. You can help others by explaining to them the most common clues of a social engineering attack, such as when someone creates a tremendous sense of urgency, when something is too good to be true, or when a cyber-attacker pretends to be someone you know but their messages don’t sound like them. Share examples of common social engineering attacks, such as phishing emails or the infamous Microsoft tech-support phone calls. If nothing else, make sure family members understand they should never give their password to anyone or allow remote access to their computer.
  2. Passwords: Strong passwords are key to protecting devices and any online accounts. Walk your family members through how to create strong passwords. We recommend passphrases, as they are the easiest to both type and remember. Passphrases are nothing more than passwords made up of multiple words. In addition, help them to install and use a password manager. It is important to have a unique password for each of your devices and accounts. Finally, help them enable two-step verification (often called two-factor authentication) for important accounts. Two-step verification is one of the most effective steps you can take to secure any account.
  3. Patching: Keeping systems current and fully up-to-date is a key step anyone can take to secure their devices. This is not only true for your computers and mobile devices, but anything connected to the Internet, such as gaming consoles, thermometers, or even lights or speakers. The simplest way to ensure all devices are current is to enable automatic updating whenever possible.
  4. Anti-Virus: People make mistakes. We sometimes click on or install things we probably should not, which could infect our systems. Anti-virus is designed to protect us from those mistakes. While anti-virus cannot stop all malware, it does help detect and stop the more common attacks. As such, make sure any home computers have anti-virus installed and that it is current and active. In addition, many of today’s anti-virus solutions include other security technology, such as firewalls and browser protection.
  5. Backups: When all else fails, backups are often the only way you can recover from mistakes (like deleting the wrong files) or cyber-attacks, like ransomware. Make sure family and friends have a file backup system in place. These solutions make it easy not only to back up data, but to recover it.

Enterprise Information Security hopes you found the information presented during this year’s Cybersecurity Awareness Month useful and helpful. You can view other cyber education topics on our page on The Landing or via HealthStream. It is our intent to not only educate to protect SCL Health but your family and home from cyber-attacks that can have a large impact on your personal life and finances.

Thank you for all you do in protecting SCL Health and our patients from data breaches! If you have questions please reach out to enterprisesecurity@sclhs.net.

Cyber Security Awareness Month – Social Engineering

A common misconception most people have about cyber attackers is that they use only highly advanced tools and techniques to hack into people’s computers or accounts. This is simply not true. Cyber attackers have learned that often the easiest way to steal your information, hack your accounts, or infect your systems is by simply tricking you into making a mistake. This week, you will learn how these attacks, called social engineering, work and what you can do to protect yourself.

What is Social Engineering?

Social engineering is a psychological attack where an attacker tricks you into doing something you should not do. The concept of social engineering is not new; it has existed for thousands of years. Think of scammers or con artists, it is the very same idea. What makes today’s technology so much more effective for cyber attackers is you cannot physically see them; they can easily pretend to be anything or anyone they want and target millions of people around the world, including you. In addition, social engineering attacks can bypass many security technologies. The simplest way to understand how these attacks work and protect yourself from them is to take a look at two real-world examples.

You receive a phone call from someone claiming to be from a computer support company, your ISP, or Microsoft Tech Support. The caller explains that your computer is actively scanning the Internet. They believe it is infected and have been tasked with helping you secure your computer. They then use a variety of technical terms and take you through confusing steps to convince you that your computer is infected. For example, they may ask you to check if you have certain files on your computer and walk you through how to find them. When you locate these files, the caller assures you that these files prove that your computer is infected, when in reality they are common system files found on almost every computer in the world. Once they have tricked you into believing your computer is infected, they pressure you into buying their security software or giving them remote access to your computer so they can fix it. However, the software they are selling is actually a malicious program. If you purchase and install their software, not only have they fooled you into infecting your computer, but you just paid them to do it. If you give them remote access to your computer, they are going to take it over, steal your data, or use it for their bidding.

Another example is an email attack called CEO Fraud, which most often happens at work. This is when a cyber-attacker researches your organization online and identifies the name of your boss or coworker. The attacker then crafts an email pretending to be from that person and sends the email to you. The email urgently asks you to take an action, such as conducting a wire transfer or emailing sensitive employee information. Quite often, these emails pretend there is an emergency that urgently requires you to bypass standard security procedures. For example, they may ask you to send the highly sensitive information to a personal @gmail.com account. What makes targeted attacks like these so dangerous is the cyber attackers do their research beforehand. In addition, security technologies like anti-virus or firewalls cannot detect or stop these attacks because there is no malware or malicious links involved.

Keep in mind, social engineering attacks like these are not limited to phone calls or email; they can happen in any form, including text messages on your phone, over social media, or even in person. The key is to know what to look out for–you are your own best defense.

Detecting/Stopping Social Engineering Attacks

Fortunately, stopping such attacks is simpler then you may think—common sense is your best defense. If something seems suspicious or does not feel right, it may be a social engineering attack. The most common clues of a social engineering attack include:

  • Someone creating a tremendous sense of urgency. They are attempting to fool you into making a mistake.
  • Someone asking for information they should not have access to or should already know, such as your account numbers.
  • Someone asking for your password. No legitimate organization will ever ask you for that.
  • Someone pressuring you to bypass or ignore security processes or procedures you are expected to follow at work.
  • Something too good to be true. For example, you are notified you won the lottery or an iPad, even though you never even entered the lottery.
  • You receive an odd email from a friend or coworker containing wording that does not sound like it is really them. A cyber attacker may have hacked into their account and is attempting to trick you. To protect yourself, verify such requests by reaching out to your friend using a different communications method, such as in person or over the phone.

If you suspect someone is trying to trick or fool you, do not communicate with the person anymore. If the attack is work related, be sure to report it to your help desk or information security team right away. Remember, common sense is often your best defense.

Please be on the lookout for further topics every week in October on how to secure and protect SCL Health’s data as well as your personal data from data breaches.

Enterprise Information Security hopes you find the information presented during Cybersecurity Awareness Month useful and helpful.  You can view other cyber education topics on our page on The Landing here or via HealthStream.  It is our intent to not only educate to protect SCL Health but your family and home from cyber-attacks that can have a large impact on your personal life and finances. Thank you for your help in protecting SCL Health and our patients from data breaches.  If you have questions please reach out to enterprisesecurity@sclhs.net.

Congratulations to Sophie, Nas and Carly in Information Services

I am extremely pleased to announce a few changes and promotions on the PVMC IS/CI Team.

Sophie Plante has been promoted to Director of the CI Team. Sophie has been with Platte for almost 19 years, in a number of clinical and IS roles, to include numerous years of leadership. The contributions she has made, and critical projects and efforts she has been involved with, are too numerous to list. Her guidance and work during the SCL  Health transition, to include the creation of the CI team, are just the latest in the litany of influences she has made towards the success of PVMC, and the PVMC IS/CI team.

Nas Khan has been promoted to EUA Supervisor. Nas has been on our IS team for over four years and brings a broad and varied IT engineering background and education to the team. Nas was instrumental in numerous projects over the last few years, not the least of which was the SCL Health transition.

Carly Cray has joined our CI team as a Clinical Informaticist. Carly has been at PVMC for over eight years, and was most recently the OR Clinical Coordinator.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

My profound thanks, and congratulations, to all three of these individuals. Please join me in sharing your well wishes with these PVMC family members the next time you see them.

Thanks,

Tim Brannigan

Cybersecurity Awareness Month: The Truth about Data Breaches

As we kick off SCL Health’s Cybersecurity Awareness Month, we start by getting to the “Truth about Data Breaches.” Enterprise Information Security wants to bring to your attention data breach risks that target your everyday life and provide some helpful tips to help guard you against identity theft.

Today, computer viruses and Trojans are designed to do everything from stealing data to watching you in your webcam, to the theft of billions of dollars.  A data breach is an intentional or unintentional release of secure or confidential information to an untrusted environment. As our lives become more digital, whether credit and debit cards for purchasing, online banking, social media, and communications, this data is being increasingly targeted by cybercriminals for profit. Protecting this data is becoming increasingly difficult, and data breaches are putting your identity at risk.

Some of the biggest breaches to date

  1. Equifax – Announced September 2017. 143 million (almost half of the US population) including addresses, social security, driver’s license numbers and 209,000 credit card numbers.
  2. Yahoo – Over 500 million accounts compromised. Passwords and personal information including security questions.
  3. Verizon – In 2017 over 14 million customer records were left exposed on Amazon Web Services.
  4. U.S. Government Office of Personnel Management – In 2015 the Office of Personnel Management was breached of 18 million citizen records containing data of detailed security clearances.
  5. Anthem Blue Cross – In 2015 Anthem Blue Cross announced hackers had stolen 78.8 million medical records containing detailed personal information to include medical data and social security numbers.

What Happens to Breached Data?

The theft of data fuels a large and lucrative underground market.  Data is money.  Criminals take your information and sell it in underground market places. For example, in the Target breach, credit card data was sold from between $27 – $45 per record.  Social security numbers have value and a medical identity can fetch up to $500.  Loss of this data can severely impact patients and customers as well as a company’s long term viability and can even lead to bankruptcy.

Steps to take if you have been notified of a breach/what do I do?

The actions you take depends on the type of data compromised. If you have been affected you should receive written notification of what information was exposed and when. Although notices tend to be reassuring in tone research has shown nearly 1 in 3 data breach victims also become a fraud victim in the same year. Remember “phishing” scammers often take advantage of data breaches purporting to be from the breached company in hopes of getting people to reveal personal information. So be safe, be very suspicious of emails or phone calls purporting to be from breached companies. Instead visit the official company website to learn about the breach and access help.

If the compromised data was…

  • Password – Change your password for that account immediately. If you use the same password for other accounts, change those as well. If you know the company offers two-factor authentication (2FA) you should implement 2FA after changing your password.
  • Email address – Watch your inbox for messages requesting information or to click on a link. If you receive a suspicious email delete or call the sender to verify they sent to you.  Consider closing the email address and opening a new email address.
  • Credit Card Number – Call the creditor and ask for a new card with a new number. Often creditors will automatically issue new cards to affected customers. Monitor your credit card account statements for any unauthorized charges.
  • Debit Card Number – Cancel your card and change your PIN number. If the bank account number was exposed, close the account and open a new one with a new number. Monitor your bank statements for any unauthorized charges.
  • Social Security Number – Place a fraud alert on your account through one of the major credit reporting agencies.
    • Purchase or sign up for credit monitoring service.  This is often offered for free when your information has been compromised.  Often these services fall short in protecting you from identity theft, so consider taking further steps to protect yourself.
    • Consider placing a credit freeze on your files. A credit freeze makes it harder for someone to open a new account in your name. A credit freeze won’t prevent a thief from making charges to your existing accounts.
    • Monitor your existing credit and debit cards, as well as your bank accounts closely for fraudulent activity.
    • If you decide against a credit freeze, consider placing a fraud alert on your flies to warn creditors you may be an identity theft victim and they should verify that anyone seeking credit in your name is really you.
    • File your taxes early. Tax fraud is growing rapidly by scammers. Tax identity theft happens when someone uses your Social Security number to get a refund or a job.

Child Identity Theft

Adults aren’t the only ones that can have their identity compromised in a data breach. A child’s Social Security number can be used by identity thieves to apply for government benefits, open bank and credit card accounts, apply for a loan or utility service or rent a place to live.

If you believe you or your child have been a victim of identity theft the Federal Trade Commission offers a comprehensive web site to report identity theft and to create a recovery plan.  You can visit www.identitytheft.gov for further information.

Conclusion

We hope you find this information informative and helpful. You will be impacted by data breach if you haven’t already.  These steps can help protect you and your family in the event your personal data has been stolen.

Please be on the lookout for further topics every week in October on how to secure and protect SCL Health’s data as well as your personal data from data breaches.

Enterprise Information Security hopes you find the information presented during Cybersecurity Awareness Month useful and helpful.  It is our intent to not only educate to protect SCL Health but your family and home from cyber-attacks that can have a large impact on your personal life and finances. Thank you for your help in protecting SCL Health from cyber-attacks and if you have questions please reach out to enterprisesecurity@sclhs.net.

Epic 2017 Upgrade Downtime, Lockdown and Command Center

The Epic 2017 Upgrade is scheduled to take place September 9-10, 2017. These messages are meant to help keep you informed about upgrade highlights and benefits, key dates, training, and what you can do to prepare. Please follow this link to The Landing to see more Epic 2017 Upgrade Communications.

Announcing the Downtime

  • The eSummit with Epic 2017 Upgrade is scheduled to begin on Saturday, September 9, 2017 at 2030 MT/ 2130 CT and complete on Sunday, September 10, 2017 at 0500 MT/0600 CT.
  • Downtime Start Time and Duration Information
    • eSummit will be in lockdown starting September 4, 2017 – September 10, 2017 when eSummit is released to all users.
    • eSummit will be unavailable starting Saturday, September 9, 2017 at 2030 MT/2130 CT until recovery is complete at approximately 0500 MT/0600 CT on Sunday, September 10, 2017.
    • Shadow Read-Only (SRO) will be available during the system downtime and recovery period.

Lockdown
We are using the transparent upgrade process to upgrade to Epic 2017. During the “transparent lockdown” period before the system downtime for the upgrade, you’ll notice that you can’t make changes that customize certain aspects of your workflows. This is because the transparent upgrade process is updating related data behind the scenes while you continue to use the system.

The transparent lockdown period will last from Monday, 9/4/2017 at 0600 MT/0700 CT – Sunday, 9/10, 2017 until the upgrade is complete at 0500 MT/ 0600 CT.

Applying filters in workqueues

  • What to do: If you see an error message when attempting to add or edit a filter, close the error message and continue your workflow. The changes that you made before the error message appeared aren’t applied to your workqueue. Use your workqueues as they’re currently set up and make any needed changes after the upgrade.

Creating or editing SmartPhrases and Smartlinks
During the lockdown, you won’t be able to create new SmartLinks and SmartPhrases or edit your existing ones.

  • What to do: Type the text that you want to appear instead.

Personalizing dashboards
After you click  and update settings or edit the components of a Radar dashboard, an error message appears when you click Accept.

  • What to do: Close the error message and continue working in Hyperspace. You won’t be able to make your changes until after the upgrade.

Creating, Editing and Sharing Notewriter Macros
If you click attempt to create a macro or save changes to a macro during the lockdown, an error message appears. Additionally, the Owners/Users tab in the SmartBlock Macro Editor is read-only during the lockdown, so you can’t add owners or users for the macro.

  • What to do: Wait to make your changes, create macros, or share macros until after the upgrade.

Moving your notes
You cannot move the Notes activity to a floating window or sidebar or set other note preferences during the lockdown.

  • What to do: Wait to move the Notes activity until after the upgrade.

Creating or editing Quick Actions
When you create or edit a QuickAction in In Basket, an error message appears indicating that the QuickAction is locked. Note that there are two different error messages that can appear.

  • What to do: Wait until after the upgrade to create a new QuickAction. Continue to complete the action as you did previously. If you need to edit a QuickAction before using it again, you might need to complete the action without using the QuickAction until after the upgrade.

Saving SlicerDicer Sessions
When you save a SlicerDicer population or session, an error message appears when you click Save Session, and the session isn’t saved.

  • What to do: Continue working in SlicerDicer, but be aware that you can’t save your work until after the upgrade.

If you have questions or encounter any issues completing a workflow during the lockdown, contact TAC at 303-866-8282.

The Epic 2017 Upgrade Command Center will be in effect 24/7 beginning on Sunday, September 10, 2017 at 0500 MT/0600 CT through Friday, September 22, 2017. Call the Command Center for Upgrade-related tickets / issues throughout the duration of the Command Center. You will have local support from your Clinical Informatics (CI) Team, Health Network Informatics (HNI) Team, Super Users, and Subject Matter Experts (SMEs), as well as from the Systems and Technology Service Center (STSC). Your local CI/HNI Teams, Super Users and SMEs are your first line of support.

The Command Center at Golden Hill will be staffed by:

  • Call Takers – entering tickets from associates
  • Commander – organizing call taking effort
  • Application Analysts – ready to address issues that arise
  • EL&PD – ready to augment and deploy training materials
  • Clinical Architects – one to triage command center tickets and another to work with informatics, analysts and EL&PD, assisting in changes and approvals as need.

While the Command Center is in effect, there will be daily huddle calls to discuss successes and outstanding issues.

  • Acute Daily Huddle Call, 0900 MT/1000 CT
  • Ambulatory Daily Huddle Call, 1200 MT/1300 CT
  • RSC Daily Huddle Call, 1600 MT/1700 CT (Monday-Friday only)

 

Timeline for the eSummit 2017 Upgrade
December 2016 – April 2017 Upgrade Release Note Review & Committee Reviews/Planning, Proof of Concept Build and Unit Testing
May 2017 Upgrade Build
June – August 2017 Upgrade Testing
June – August 2017 Training Development & Upgrade Training
September 9 – 10, 2017 Epic 2017 Upgrade Go-Live
September 10 – 22, 2017 Epic 2017 Upgrade Command Center

This upgrade will help us continue to optimize eSummit with Epic and stay current in the ever-changing field of healthcare technology. The upgrade is critical for SCL Health to maintain good standing with Epic, meet government requirements and to provide the best care for patients. Epic 2017 will continue SCL Health’s efforts to provide consistent service across care sites through standardization with special attention to the people, processes, culture and technology of the organization.

For questions about the upgrade contact Terra DeLockroy at Terra.DeLockroy@sclhs.net, or your Clinical Informatics (CI) or Ambulatory Informatics (AI) Teams.

Thank you for your support as we prepare for this exciting upgrade!

 

Epic 2017 Upgrade Willow

The Epic 2017 Upgrade is scheduled to take place September 9-10, 2017. These messages are meant to help keep you informed about upgrade highlights and benefits, key dates, training, and what you can do to prepare. Each week we will draw attention to enhancements coming to specific Epic modules.

Below are examples of the enhancements for Willow with Epic 2017. Please follow this link to The Landing to see the full Willow memo and more Epic 2017 Upgrade Communications.

Willow is the Epic module that is used in the inpatient pharmacies at our acute care sites. The majority of the application supports pharmacy users (Pharmacist, Rx Technicians, and Rx Managers and Buyers), their workflows and daily clinical routines including: medication inventory, dispense and formulary lists, department specific medication preference lists, medication ERXs, default dispense NDCs and barcode scanning and medication order sets.

In addition the Willow application supports other clinical end users within the inpatient setting including: providers, nurses and other clinical users whose daily activities involve placing medication orders and the documentation of medication administration (MAR).

The Epic 2017 Upgrade for Willow includes:

  • Redesigned Dispense Check Activity
  • Updated Critical Dose Warnings
  • Redesigned Order Preference List Browsers
  • Highlighting in Verification Lets Pharmacists Know When Administration Instructions have changed
  • Identify Backdated Medications During Ordering Workflow
  • Nested Panels
  • Pharmacy Performance Metrics: Including anticoagulant safety and pain management

Redesigned Dispense Check Activity:

Pharmacy users can now scan several medications and queue them up in the dispense check activity.

  1. The highlighted line will show a warnings if a technician has overridden or if the patient has been discharged. Below users can see a detail explanation about the warning.
  2. To the right, Users can now Approve or Reject the orders.

Updated Critical Dose Warnings:

Updated Critical Dose Warnings with clearer explanation of the reason the ordering provider is seeing it now appear for any dose that exceeds the recommended maximum single dose by 200% or more.

Please follow this link to The Landing to see the full Willow memo and more Epic 2017 Upgrade Communications.

Timeline for the eSummit 2017 Upgrade
December 2016 – April 2017 Upgrade Release Note Review & Committee Reviews/Planning, Proof of Concept Build and Unit Testing
May 2017 Upgrade Build
June – August 2017 Upgrade Testing
June – August 2017 Training Development &Upgrade Training
September 9 – 10, 2017 Epic 2017 Upgrade Go-Live
September 10 – 22, 2017 Epic 2017 Upgrade Command Center

This upgrade will help us continue to optimize eSummit with Epic and stay current in the ever-changing field of healthcare technology. The upgrade is critical for SCL Health to maintain good standing with Epic, meet government requirements and to provide the best care for patients. Epic 2017 will continue SCL Health’s efforts to provide consistent service across care sites through standardization with special attention to the people, processes, culture and technology of the organization.

For questions about the upgrade contact Terra DeLockroy at Terra.DeLockroy@sclhs.net, or your Clinical Informatics (CI) or Ambulatory Informatics (AI) Teams.

Timeline for the eSummit 2017 Upgrade

Timeline for the eSummit 2017 Upgrade
December 2016 – April 2017 Upgrade Release Note Review & Committee Reviews/Planning, Proof of Concept Build and Unit Testing
May 2017 Upgrade Build
June – August 2017 Upgrade Testing
June – August 2017 Training Development &Upgrade Training
September 9 – 10, 2017 Epic 2017 Upgrade Go-Live
September 10 – 22, 2017 Epic 2017 Upgrade Command Center

This upgrade will help us continue to optimize eSummit with Epic and stay current in the ever-changing field of healthcare technology. The upgrade is critical for SCL Health to maintain good standing with Epic, meet government requirements and to provide the best care for patients. Epic 2017 will continue SCL Health’s efforts to provide consistent service across care sites through standardization with special attention to the people, processes, culture and technology of the organization.

For questions about the upgrade contact Terra DeLockroy at Terra.DeLockroy@sclhs.net, or your Clinical Informatics (CI) or Ambulatory Informatics (AI) Teams.

Thank you for your support as we prepare for this exciting upgrade!

Epic 2017 Upgrade Hospital Billing

The Epic 2017 Upgrade is scheduled to take place September 9-10, 2017. These messages are meant to help keep you informed about upgrade highlights and benefits, key dates, training, and what you can do to prepare. Each week we will draw attention to enhancements coming to specific Epic modules.

Below are examples of enhancements for Hospital Billing with Epic 2017. Please follow this link to The Landing to see more Hospital Billing enhancements and more Epic 2017 Upgrade Communications.

The Hospital Billing Resolute Application supports billing activities throughout the Revenue Cycle, including account creation, charge entry, charge editing tools, claims processing and editing, insurance payment posting, guarantor statement processing and payment posting, adjustment posting, and self-pay follow-up.  The Hospital Billing application helps move charges efficiently through the Revenue Cycle from charge entry through payment in full and is critical to the financial health of the system overall.

Hospital Billing will be implementing over 160 release notes as part of the Epic 2017 Upgrade.  Below are a few examples of enhancements coming to Hospital Billing with the Epic 2017 Upgrade.

  • MyChart functionality improvements
  • New Columns and Customization Options in the Enterprise Guarantor Summary
  • Process Bank Account and Check Payments Through Standard Credit Card Workflow
  • Efficiencies for Replacement Claims
  • Reporting on Billing Activities and User Productivity

MyChart – functionality improvements will significantly improve the patient experience, helping to make progress on one of our key blue chips – the patient experience.

Key features:

  • Patient initiated payments
  • Smarttext messages to guarantors
  • Auto tax letters
  • Auto move to paper billing
  • Patient sign up for payment plans
  • Patient can pay using their Bank Account Information

Below is a snapshot of the patient ability to set up a payment plan:

 

New Columns and Customization Options in the Enterprise Guarantor Summary.  Updates to the Hospital Accounts section in the Enterprise Guarantor Summary increase user control.

Key features:

  • Customize which columns appear and how the information is sorted
  • New columns available to choose from

Below is a snapshot of the Enterprise Guarantor Summary screen:

Please follow this link to The Landing to see more Hospital Billing enhancements listed below and more Epic 2017 Upgrade Communications.

  • Process Bank Account and Check Payments Through Standard Credit Card Workflow
  • Efficiencies for Replacement Claims
  • Reporting on Billing Activities and User Productivity

Windows Update Tomorrow Morning

The Systems and Technology Service Center (STSC) will be performing routine computer maintenance to install Critical Windows Updates beginning on Wednesday morning (July 26th) at midnight. If your device needs updates, you may be prompted to reboot at any time. 

Important information:

  • You will receive a one-hour notification prior to your computer rebooting, which can be minimized or used to manually restart your computer.
  • Once the countdown reaches 15 minutes, an additional notification will occur that cannot be minimized. You cannot postpone the reboot between midnight and 5 a.m. MT.
  • You can select the “Restart” button to reboot your device immediately or wait for the countdown clock to restart your computer automatically.

Here is an example of the popup you may see:

If you have any questions, please contact the Technical Assistance Center (TAC) at 855-866-8282.

 

Wireless Network Cutover Scheduled for July 18

On Tuesday, July 18, the STSC Network Team will be moving Platte Valley to our new Cisco Wireless Access Points. This will begin at 6 pm and is expected to last 6 hours.

Timing and Locations Impacted:

  • Between 6 and 10 p.m., non-clinical areas (MOB’s, Admin, Basement Areas, etc.) will be impacted
  • Between 10 p.m. and 12 a.m., the Inpatient areas and ED will be impacted

Each area will experience up to a 15 minute wireless connectivity outage during their window. There may also be brief connectivity issue when “roaming” from area to area until all areas have been completed.

The Engineers and/or PVMC IS personnel will notify the Charge Nurse or other appropriate individuals approximately 15 minutes before their area will be migrated.

As part of this change, individuals will see new wireless networks available to them, primarily the default “SCLHS” wireless network, among others. Please continue to use the wireless networks you are already configured for, (pvmc_svc or pvmc_mobile, for example).

There will be follow up effort to get all individuals and equipment moved over to the appropriate new wireless networks in the very near future.

If you have any questions, please contact the Technical Assistance Center (TAC) at 855-866-8282.

TAC Call Menu Changes

Effective today, Tuesday June 20, the TAC call menu will change. We will remove the first option that was for MyChart calls. These calls will be going to a new number established for patient facing options. That new number is 1-855-274-2517While on the Platte Valley campus, you can also dial x4357 to access the TAC. This number currently has 3 options available when dialed and those options are listed below. MyChart patient materials have been updated with this new number and have been distributed to the various sites. In addition, relevant online resources and the SCL MyChart application have also been updated with this new number.

  1. If you are a patient calling about MyChart Press 1
  2. For help finding a doctor or other health care provider Press 2
  3. To sign up for a class or event Press 3
  4. To hear the options again Press the * key

The new TAC call menu is listed below. The TAC Phone number 1-855-866-8282 will not change, only the menu will. As you will notice option one is no longer MyChart. TAC will continue to handle MyChart technical calls however, the patient will call the new number mentioned previously and select the MyChart option from that phone number and those calls will route to TAC just as they always have. This change was done so that patients are not dialing an internal number intended for internal SCL Health associates and hear options that do not pertain to them and information they should not hear such as system outage announcements. Below is a the new TAC call menu.

  1. Press 1 if you are a provider or are calling about a clinical application
  2. Press 2 for all others
    1. Press 1 for an Existing Ticket
    2. Press 2 for a New Issue
  3. Press 3 to leave us a non-urgent voice mail

Go-Live Today for Multi-Factor Authentication Aruba VIA and OWA Go-Live

If you use Aruba VIA or Outlook Web Access to access the SCL Health network remotely, you need to enroll in the new multi-factor authentication (MFA) process.  After you complete enrollment, you will not notice a change when logging in, until after the Aruba VIA and Outlook Web Access Go-Live, today, 4/25.

Please enroll now so you are prepared for this go live date. 

To enroll, follow these easy steps:

  1. Install Duo Mobile app on your smart phone.
  2. Go to https://duo.sclhs.net from your SCLHS computer.
  3. Follow the on screen instructions.

Enrollment step by step instructions can be found here on The Landing.

Step by step instructions for using Aruba VIA can be found here on the The Landing.

More details about MFA:

This technology is commonly used by banks and other organizations where privacy and security are especially important, so chances are you may be familiar with how MFA works. By using something you know (username and password), and something you have (phone, tablet, or token), it can better validate that you are you, and not a criminal.  We have selected Duo Security as our solution because of their ease of use and track record of success in the health care industry.

Additional communications will be forthcoming.

Please see our Frequently Asked Questions for additional information.

Any questions or concerns can be addressed to EnterpriseSecurity@sclhs.net

Voice & Data Maintenance 10 pm Tonight

There will be Voice and Data maintenance beginning at 10:00 p.m. It’s scheduled to end by 12:00 a.m. Friday, April 21.  During this window, phones and applications may be temporarily unavailable.

The Incident Command Center will be operating from the ED Conference Room beginning at 9:30 p.m. through the duration.

If you have any questions, please contact the Technical Assistance Center (TAC) at x4357 or 855-866-8282.

We apologize for any inconvenience this may cause.

Thank you.

Everything eSummit: Your Essential Guide/PTO Freeze Clarification

We are 86 days out from eSummit with Epic and Business Systems Go-Live. It will be vitally important for all associates to regularly tune into the ICE for updates on this process. The quickest way to reference an update is to visit http://pvmcicenews.org/tag/esummit-updates/ for a listing of all news, events, training and updates related to the eSummit with Epic and Business Systems integration.

Today’s update is on the PTO freeze scheduled from from May 1st through June 16. The eSummit with Epic and Business Systems integration will impact every associate, and nearly all of the systems we currently use. The PTO Freeze is important for two reasons:

  1. We want you receive all of the training you need to be comfortable when we Go Live on June 1. The PTO freeze ensures that you won’t miss any of the training available to you.
  2. This will be a labor intensive process. We will need all hands on deck to make sure that our workflow is running seamlessly, and that our patients and visitors will be minimally impacted.

During the freeze, associates will be able to take a maximum of two consecutive days of PTO and only with their immediate supervisor or director approval. For indirectly connected departments, your immediate supervisor or director will know the impact to your department and will administrate this PTO freeze accordingly.

Whether you are directly or indirectly connected to these projects, we are asking everyone to be mindful and honor this freeze. If something should come up during the PTO freeze, please speak with your immediate supervisor and director to determine the best possible way to accommodate your needs and the needs of your department.

 

TAC Tips: What is a P1 Ticket?

If you need the Technical Assistance Center (TAC), it’s really important to understand how to prioritize your issue. Every call that comes into the TAC will receive a ticket number and priority number. Knowing how to prioritize will make the process go much easier. Here’s a quick guide to help you decide whether an IT issue is the most important priority (P1) or something else:

When To Call In a P1

  • If the issue has an immediate impact to patient care
  • Has an immediate impact to hospital revenue
  • If multiple users are impacted with same issue
  • AND there is no viable workaround

So, why is it so important to correctly prioritize IT issues? Well, when a P1 issue is reported, an analyst is paged (24/7). They must drop whatever else they are working on to address the new P1 issue. If every issue gets reported as a P1, then it downplays the importance of true P1 problems, and takes longer to get all IT tickets done.

Additionally, if the issue is a P1 to IT, then it is a top priority to the person who reported it too! To ensure a timely resolution, if you report a P1, please remain available or designate another point of contact so that the IT professional can resolve the issue as quickly as possible.

What if your issue is not a P1? There are several other priority levels to consider. Please see the chart below to understand how to decide which priority your problem is.

The Technical Assistance Center can be reached by calling x4357 on any landline in the hospital, or by emailing your issue to TAC.Mailbox@sclhs.net.

 

Phishing Drills to Begin Soon

Starting in tomorrow, February 1, phishing (pronounced ‘fishing’) drill e-mails will be sent to random associates. Phishing is a way that someone fraudulently tries to obtain information and/or access to computer systems, usually information like log-ins, passwords, credentials, etc.  If an associate clicks on the phishing drill email, that associate will be required to take the eLearning course in HealthStream on phishing.  Of course, any associates interested in learning more about phishing scams are welcome to take the course. You can also review these tips for spotting phishing scams.

Phishing scams pose significant risk to SCL Health information.  These drills are a way to train and create awareness to better arm and protect the organization. We must all do our part to be aware and alert for these risks.

You can also view the phishing alert tips by clicking on this photo:

Submitting a Ticket to the TAC

There are two ways to submit a ticket to the Technical Assistance Center. The first is by calling the HELP desk at 4375, which now connects you to the TAC.

An additional way to submit a ticket request is by email. You can send your tickets to TAC.Mailbox@sclhs.net

Make sure to provide the TAC with all the basic information of your issue. If you need help remembering what to include, try to answer these questions:

  • WHAT is the problem
  • WHO is affected
  • WHERE is the problem located
  • WHEN did this happen? Or HOW long has this been a problem?
  • If you have tried to fix the issue, WHAT have you already tried?

Once your ticket is submitted, it will be assigned a priority level. Priority levels range from 1 (most severe) to 5 (least severe). These levels help the team to determine how quickly a ticket needs to be addressed, and in which order they are handled.

Some tickets will of course be higher priority than others. However, the TAC team works hard to make sure all tickets are handled in a timely manner. If you are concerned that your ticket is taking too long to be processed, please reference the green and blue priority chart in the image to the right. It may be that your ticket is being handled, but that it wasn’t as high a priority as a more urgent ticket. When your ticket is handled and closed, you will receive a confirmation email that your issue is resolved.

Phishing Drills to Start in February

Starting in February phishing (pronounced ‘fishing’) drill e-mails will be sent to random associates. Phishing is a way that someone fraudulently tries to obtain information and/or access to computer systems, usually information like log-ins, passwords, credentials, etc.  If an associate clicks on the phishing drill email, that associate will be required to take the eLearning course in HealthStream on phishing.  Of course, any associates interested in learning more about phishing scams are welcome to take the course. You can also review these tips for spotting phishing scams.

Phishing scams pose significant risk to SCL Health information.  These drills are a way to train and create awareness to better arm and protect the organization. We must all do our part to be aware and alert for these risks.

You can also view the phishing alert tips by clicking on this photo:

IT HELP Desk Moves to Technical Assistance Center (TAC)

Starting today, January 17, when you call the current PVMC HELP Desk number (x4357) for computer assistance your call will route through SCL Health’s Technical Assistance Center (TAC).

Here’s what you can expect when you call:

You will be greeted by an automated voice system. Choose the appropriate prompts to direct you a TAC analyst. These individuals have been trained to provide quality customer service and have the necessary tools and resources to assist you.

What information is needed?

To best assist you, these basic troubleshooting questions will be asked:

– What is your user ID (Network login)? – Where are you located? – What is a good 10-digit contact number? – What is the issue you are having? – What is the specific application you are accessing? – When was the last time you had access/the application worked? – If it is a printing issue, what are you trying to print? – What is the IP address/workstation ID of your computer and/or printer? – What does the error message say? – Are there other people having the same issue? – Do you have a workaround until further assistance arrives? – Is this affecting patient care/financials?

What happens next?

The TAC analyst will do his/her best to resolve your technical issue. If they determine it requires the assistance of additional teams, you will be informed of next steps and will receive an estimated time frame for resolution. You will also receive an incident number so you can keep track and reference it if needed. If you provided your email address, you will also receive an email with any updates to your issue.

The reason for the move to the TAC is tracking and system-wide support. TAC members are able to analyze system concerns because they have the global perspective. This allows team members a much broader view of what’s happening with all systems which allows better support. In addition, there are over 30 members who work at the TAC which means a larger pool of support techs to help you get immediate response.

This change does mean, however, that Platte Valley will no longer have in-person IS support. If there are specific Platte Valley-related issues, they will get routed back to an in-house Platte Valley analyst.

“Our goal is customer service,” explains IT Site Director Tim Brannigan. “We’re focused on trying to get first call resolution from the TAC whenever possible to minimize the amount of time tickets are open. This new process also allows us to evaluate performance, look for improvement areas, and more appropriately give priority to issues. We know it’s a big change, but we’re asking for cooperation and patience.”

For additional information and tips for using TAC, download this brochure now.

EPIC & Lawson Kicks-Off This Week

The room was exploding with energy yesterday as a dedicated team from SCL Health’s System Technology Service Center (STSC) joined Platte Valley’s leadership meeting to share the roll-out plan for our upcoming EPIC and Business Systems implementation set to occur on June 1, 2017. There were at least 40 STSC members who were introduced as the highly-skilled, dedicated individuals who will work with us through the transition over the next several months. Below is the anticipated timeline.

epic-lawson-announcement

Currently, assessments are underway and teams are working with departments to determine specific workflows and needs. The key takeaway from yesterday was that SCL Health is dedicated to supporting this implementation with a very large team with specialized experience in EPIC and Business Systems integration. A communication plan is currently being developed and information will be shared along the journey.

 

Active Directory Network Migration

Today, we will begin the first round of migrations to the SCL Active Directory network login ID. In short terms, this migration means that all of our PVMC network accounts are migrating over to the SCL Domain. This will not change the function of any applications or programs you currently use, it will only change the format you use to log into the PVMC network. Associates will be migrated in batches, and you will receive an email from IS notifying you of your migration date so that you can prepare.

Previously, you have been using a first initial + last name format to log in, such as jdoe. You have been assigned an SCL network ID number, also known as an s number or s#. Once your account has been migrated, you must begin using your new s# to log in to your computer and any of the applications you access through the PVMC network. Your password does not change. If your PVMC network login was jdoe and your password was Bronco$Rock15, it will still be Bronco$Rock15.

To login, you will add the SCLHS\ prefix to your s# to log in. For example: SCLHS\s0123456.

In order to prepare for the migration, you should download and follow these instructions to find your s# and start memorizing it.

Outlook Helper: Email Groups

In the weeks following our migration to the SCL email domain, questions have come up about how to find some PVMC-specific email addresses. Here are a couple tips for finding those addresses and group mailing lists.

  • All PVMC-specific group mailing lists, such as “Directors” or “House Supervisors” are now organized under the prefix “Platte Valley.”
  • All PVMC-specific resources such as “Help Desk” or “Conference Room A” are organized under the prefix PVMC.
  • When typing into the search field, do not press the Enter key to generate the search. The search will happen automatically, and pressing Enter will only open an unrelated side window.

 

Helpful Numbers for IS Department

ipad-806394_1920We all have little issues with our computers and office technology from time to time, so here’s a handy listing of useful phone numbers for the IS department. If you need to get a hold of an individual, please do not hesitate to call them directly. However, if you have something new that needs to be addressed, please call the Help Desk at x4537 (HELP) so that the issue can be logged and documented, and assigned to the correct team. Please understand that if you contact an individual directly with a new issue, they will ask you to contact the Help Desk for this reason.

Kyle Simmons – Help Desk – x4357

Jon Ackerman – Telecom, Servers, Networking – x1402

James Alter – Infrastructure Supervisor – x1403

Bettina Alvidrez – Clinical Applications – x1417

Hope Anderson – Clinical Applications – x1407

Tim Brannigan – Department Director – x1400

Fran Carraher – Data Warehouse and Decision Support Systems – x1408

Don Diliberto – Desktop / End User Analyst – x1411

Cindy Gallagher – Help Desk – x4357

Lisa Hitner – Desktop / End User Analyst

Nas Khan – Desktop / End User Analyst – x1410

Sophie Plante – Applications Supervisor – x1405

Stephanie Reid – Applications & Interfaces – x1401

Estella Ruiz – Business / Financial Applications – x1409

Lydia Thompson – Business / Financial Applications – x1406

Email Migration Updates

In the past week we have received some requests for more information regarding the email migration. Here is a selection of frequently asked questions and answers:

  1. How do I access my email at home?
    • You will continue to access email remotely with the Outlook Web App (OWA), which can now be reached at webmail.sclhs.net. Your username is now your old username with a PVMC\ prefix. For an example, ewiant is Evelyn’s former OWA username; its now PVMC\ewiant. Please make sure you’re using the back slash (\) not the forward slash (/).
  2. How do I send emails to Share-A-Compliment?
  3. How to I send emails to the Help Desk?
  4. What about scheduling meetings in the conference rooms?
    • All of our conference rooms and meeting places now have the PVMC prefix added to them. So, Conf A is now PVMC Conf A, Conf 6 is now PVMC Conf 6.
    • When searching for conference rooms, make sure you’ve selected the “Name” bubble (not the “Other Columns” one) and type in PVMC to see all our rooms.Conference Rooms

 

 

 

 

 

 

 

 

 

Do you have a question we haven’t covered? Please send it to Evelyn at evelyn.wiant@sclhs.net.

Email Migration Process Continues

button-1437180_1280This week we started the process of migrating our email accounts over to our new SCL Health addresses. When it is completed, your email address will fit the SCL Health format of a FirstName.LastName@sclhs.net.

Here are some details about the migration which will help you understand what steps will be taken and how you can prepare for them.

  • E-mail users will be migrated by department and all users will receive an email reminder on their migration day.
  • The migrations will take place after hours starting at 5 pm, unless notified otherwise.  A few specific groups will start their migration at 5 am. Please pay close attention to your migration day and time.
  • On the day of your migration you must make sure you are completely logged out of your system and do not log back in overnight. Outlook will be configured to your new e-mail address automatically the next time you log in.
  • During the migrations, you will not be able to book meeting rooms until they have been migrated.
  • You will only be able to see other users’ availability if they are in the same migration status (migrated/waiting to migrate).

Helpful tips:

  • The e-mail address Auto-Fill cache (the tool that automatically fills in an email address you’ve contacted before) will NOT be migrated, so users will have to either enter the address or go back through their archive to copy/paste the address from an old message. If you have non-PVMC contacts you work with often, you may want to save those addresses into your contacts list to have them handy since you won’t be able to use Auto-Fill.
  • Update your e-mail signature block with your new e-mail address.
  • Check your e-mail rules. Generally, your current rules will migrate correctly, but if the rule specifically references the PVMC domain, the rule will not work. Users will need to update those rules.

For currently approved mobile e-mail users: Call the Help Desk to get instructions for setting up your specific (Android or iPhone) device. Please note, in the near future all mobile users will be required to utilize the XenMobile application which provides greater security. Instructions for current users to install XenMobile will be sent at a later time.

On the day after your migration, start giving out your new email address. Don’t worry, any messages sent to your old e-mail address will be routed to your new one for a short period of time. Please direct your questions to Evelyn at evelyn.wiant@sclhs.net.

Email Migration to SCL Health Inboxes

button-1437180_1280Very soon we will begin to migrate our email inboxes over to our new SCL Health addresses. This process will take up to two weeks, and we will migrate in groups by department. When it is completed, your email address will fit the SCL Health format of a FirstName.LastName@sclhs.net.

Several days before your group migrates, both you and your director will receive a notice that your group is ready to be migrated. On the day of your group migration, you will be asked to completely log out of your network account, and leave yourself logged out until you start work the next day. It is very important that this process goes smoothly, so please make sure to follow the directions you are given.

The migration will happen automatically once you are logged out. You will not loose any emails that are currently in your inbox, and any messages sent to your old pvmc.org email will continue to be forwarded to your new address for a few months. However, you will want to inform all your non-PVMC contacts that your address has changed. For those that receive email on your smart phone or tablet device, your email on those devices will temporarily stop working. Instructions will be provided to re-establish your mobile email after your migration is complete.

If you have any questions regarding the email migration process, please email Evelyn at evelyn.wiant@sclhs.net or call her at x1481.

Don’t Forget: Deadline to Change Passwords This Friday

password-866981_1920To further improve the security of sensitive healthcare information, all associates who login to the network will be required to change their network password (the password used to login to the computer) by this Friday, July 22. We are updating our password requirements to be consistent with those across SCL Health.

The new requirements mean that every password must have a minimum of nine characters, and contain at least three of the following:

  • Uppercase letters (ABC)
  • Lowercase letters (abc)
  • Numbers (123)
  • Special characters (!@#)
  • No spaces

July 22 is the deadline to set your new password, and you can make this change starting immediately.

Instructions: 

  1. After you are logged into your computer account, press Ctrl+Alt+Delete.
  2. Choose the menu option to “Change A Password”
  3. Enter your current password, then create a new password that follows the guidelines.
  4. Click the “save” button. If there is no save button, click the round, blue and white arrow icon.

The SCL Enterprise Information Security Team recommends using passphrases, which will help you develop longer passwords that are easier to remember. Passphrases are a combination of easy-to-remember words strung together with character substitutions for letters. An example of this would be; “IL0veTheBr0nc0$” or “New0rle0n$!sMyFav0riteCity.”

Thank you for your understanding as we work to ensure the safety of our patients and their personal information to the best of our ability.

As always, please contact the Help Desk at 303-498-4357 (x4357) with any questions

Update Your Network Password by Next Friday, July 22

password-866981_1920To further improve the security of sensitive healthcare information, all associates who login to the network will be required to change their network password (the password used to login to the computer) by next Friday, July 22. We are updating our password requirements to be consistent with those across SCL Health.

The new password policy goes into effect on Monday, July 18, and requires all passwords to be changed by Friday, July 22. The new requirements mean that every password must have a minimum of nine characters, and contain at least three of the following:

  • Uppercase letters (ABC)
  • Lowercase letters (abc)
  • Numbers (123)
  • Special characters (!@#)
  • No spaces

July 22 is the deadline to set your new password, and you can make this change starting immediately.

The SCL Enterprise Information Security Team recommends using passphrases, which will help you develop longer passwords that are easier to remember. Passphrases are a combination of easy-to-remember words strung together with character substitutions for letters. An example of this would be; “IL0veTheBr0nc0$” or “New0rle0n$!sMyFav0riteCity.”

Thank you for your understanding as we work to ensure the safety of our patients and their personal information to the best of our ability.

As always, please contact the Help Desk at 303-498-4357 (x4357) with any questions

New IS Leader Joins PVMC Family

tim 001In collaboration with SCL Health’s System Technology Service Center (STSC), we are pleased to introduce our new Information Services team leader Tim Brannigan. Tim joins our team starting today. He takes the helm as our Information Services Care Site Manager and will lead the integration of our local operations team.

With nearly 30 years of IT experience in a variety of industries, including 12 years in healthcare, Tim is a results-driven senior leader with experience leading people and project teams, implementing and overseeing technology development, deployment and support, and administering large budgets. He most recently served 11 years at Denver Health where he was the Associate Chief Information Officer.

Tim brings the expertise and personality to blend well with our team. Tim and his fiancée, Paula, will be getting married this fall in Ireland, and will be joined by Paula’s children, Christian (18) and Hannah (12). He is an avid traveler, a history buff, and definitely someone you want on your trivia team!

Please give Tim a warm welcome when you see him.

4.0 Upgrade Issues Nothing IS Can’t Handle

24253961

Our amazing IS department has been working hard to deliver both a new Windows 7 desktop and the 4.0 upgrade to Soarian.  You may have experienced some delays or interruptions in your day to day work during this transition, but IS has been diligent about keeping track of problems and fixing them as quickly as possible.

From all of us around the hospital, we’d like to say “thank you,” to the wonderful IS staff for the extra work they’re putting in and to Wendy Colon for helping to keep all staff updated.

Any ongoing issues or problems should be reported to the IS Help Desk at  x4357 during normal business hours, or to the House Supervisor after hours.

Logical Ink Launch

Logical Ink

Last Tuesday, Information Services launched a new system that allows us to capture patient signatures electronically and file the signed document in the patient chart without relying on paper. This program, called Logical Ink, will capture signatures using iPads at registration.  In time, this same system can be used for consents and other documents that need to be signed or annotated.  In the future we will be able use Logical Ink to document using the camera on the iPad and annotate images for the patient record (wound care, for example, or any time photographic documentation is ideal).

Logical Ink is a great new tool that minimizes the need for paper forms and the problems associated with paper. Signed forms are sent electronically to the patient record and filed immediately. Forms are standardized, and version control is streamlined (no old forms to clean out of file cabinets). In the future, Logical Ink may be able to handle forms that are part of the patient record but require signature, drawing, or other annotations not currently covered by Logical Ink’s capabilities.

“We’ve had a lot of good feedback from patients and staff,” says Vianey Alba, patient access manager, of the program. “They like that it saves paper, and it’s saving time. It’s very easy to use and very efficient.” Today the project is limited to COA signature capture only, but Logical Ink gives us the capability to expand as our needs change.

 

Darrell Messersmith Has New Credentials

Darrell

Darrell Messersmith is “sporting” new credentials! If you haven’t noticed, he’s now CHCIO certifited! (CHCIO = Certified Healthcare CIO – ” the first professional certification expressly for healthcare CIOs and IT executives, the College of Healthcare Information Management Executives (CHIME) CHCIO designation is “more leadership/executive than technical,” according to CHIME education director).  Darrell has invested a lot of personal time and effort to obtain this credential. PVMC is privileged to have one of the “best in the HIT biz” leading our initiatives.

Nice work, Darrell!  Please share a word of congrats with Darrell next time he’s helping you solve one of your HIT mysteries (his forté!)!

Hope Anderson Joins IS Team

Hope Anderson has accepted a full time position on the IS team as a Clinical Systems Analyst.  Hope’s experience with the eCareNet project and live support in 2011 as well as her more recent PRN work will prove valuable as she moves into a permanent full time role on December 2.

Hope’s unique ability to calmly and gently assist users to better understand and effectively use technology is a great asset.  An important part of Hope’s new responsibilities will be to help PVMC recognize opportunities for training, update curriculum for core EMR training, and lead our efforts to expand our Clinical Help Desk.

Please take a moment to congratulate Hope and wish her the best as she transitions to a very challenging and rewarding career in Healthcare IT.

Electronic Records Launches in the Emergency Department

Beth's Commander Cape in it's full glory.

Beth’s Commander Cape

 

The Emergency Department has forged the way for yet another milestone. On September 24, the Emergency Department Information System was successfully implemented. This system gives both the medical provider and the nursing staff the capability of integrated assessment documentation in the electronic record.

The day started as many others except with a whole lot more nursing staff and providers. Wendy Colon spearheaded the event with the IS team in the Incident Command Center located ED/MI conference room. Beth Wichmann (Super User, Charge Nurse) took over as the incident commander overnight. Beth was the first-line support for the emergency department team.

In appreciation of her great understanding and expert knowledge, a special super hero cape was created for Beth (Super User Extraordinaire and Incident Commander). You will see that Beth sports the cape well. The Siemens staff was quite impressed with how well she did in her role.

The entire ED team has done well with the new system as we continue through our learning curve of becoming fast and efficient with the new documentation. Thank you to the entire ED team because they prepared and trained for the system, and thank you to the entire organization for their understanding while the ED makes this incredible journey. Darrell Messersmith and his entire team have helped the emergency department immensely. We could not have considered such an incredible leap without such an incredible team! Great job everyone, and Beth-what a great Incident Commander you make!

How to Protect Your Personal PC From Getting “Hacked!”

You may have clicked over to pvmcicenews.org last month to see an unrecognizable image. Yes, The ICE Blog was “hacked,” unfortunately by a not-so-friendly organization who thought they were taking down an American newspaper (ICE News). Thankfully, we have a great webmaster team who was able to restore our employee ICE Blog and our main hospital website (www.pvmc.org) was unaffected.

We have now initiated several security features to not only protect the future of our online employee newsletter, but the hospital’s website as well, including hiding the URL (address) from Google so that the public can no longer search our site’s content. You can, however, still access The ICE via www.pvmcicenews.org.

 

Think You’re At Risk?

We asked our very own Technical Support Analyst Dale Foster to supply us with helpful tips to protect our personal computers. Visit this link to learn how to protect you and your family at home.

Tap-N-Go, Single Sign On Added to Thinclients

As you know, PVMC will go live with Tap-N-Go and Single Sign On later this month. These solutions will allow us to access our computer sessions and programs with a PVMC badge “Tap” at the computer rather than repeatedly typing in a username and password for access. Only Thinclient computers will receive the upgrade, so all clinical computers will be Tap-N-Go and Single Sign On capable.

Benefit: Virtually eliminates the need to repeatedly enter username and passwords, replaced by tapping your PVMC badge at the computer. Single Sign On adds the capability to bring your work with you from desktop to desktop.

As always, try to remember to log out of your session before you walk away. Although the desktop will lock after 2 minutes of inactivity, its still important to maintain the practice of logging out when you are done with your session. We have tested the solutions and will start work in our production systems on August 16; user enrollment will start on Aug 20. More details regarding the deployment sequence and enrollment process will be coming out soon.

Information Services Announce New Promotions: Kudos to Darrell Messersmith and James Alter

Darrell Messersmith

Congratulations to Darrell Messersmith who has officially been promoted as the Director of Informational Services. Darrell’s leadership and dedication to excellence were evident with the recent successful eCareNet launch. Ron Ropp will continue working with PVMC through the transition to Outlook/exchange and will be available as needed in the future.

James Alter

In addition, James Alter has been promoted to Senior Network Administrator and will oversee the technical components of the department. Let’s all give both Darrell and James a “high-five” as we cross in the halls!

TOP