|By Business Wire||
|July 10, 2013 09:06 AM EDT||
Two Texas groups, the Health Information Technology (Health IT) Program at The University of Texas at Austin (UT Austin) and Jericho Systems Corporation will participate in a national pilot program designed to explore advanced patient control over shared medical records. The pilot, which was recently approved by members of an Office of the National Coordinator for Health Information Technology (ONC) working group, will focus on how patients can better control the release of their Protected Health Information (PHI) when their medical records are requested electronically from their healthcare provider.
The pilot will simulate the exchange of electronic medical records through a commonly used Internet specification called the eHealth Exchange (once known as the Nationwide Health Information Network Exchange). The simulated exchange will be augmented by adding a centralized repository where virtual patients can specify conditions under which their PHI can be electronically shared. The pilot also will explore how requests for a patient’s PHI can be reported back to the patient so that each patient can be aware of who is asking for their medical information.
By participating in the pilot, UT Austin’s Health IT faculty and students will gain valuable experience through proof of concept testing a centralized, consent directive repository that enables granular privacy control by the consumer over their electronic medical record.
“We view this pilot as an opportunity for our students and faculty to experience and contribute to the important process of developing standards-based, privacy controls that will be required to protect consumers’ medical data as access requests continue to escalate,” commented Dr. Leanne Field, director of UT Austin’s Health IT program. “In addition, by partnering with Jericho Systems and other participants in the pilot, our students will benefit from participating in applied research and will have the opportunity to develop real-world skills.”
Healthcare consumers currently cannot easily review electronic requests submitted remotely on the eHealth Exchange for their PHI or learn the outcome of those requests. The pilot will add transparency to the PHI exchange process by reporting each time that PHI has been released by the consumer's provider organization to requesting organizations. In addition, knowledge of who is trying to access PHI may also help future patients to identify possible medical identity theft or cases of mistaken identity that could impact their subsequent treatment.
UT Austin’s Health IT program and Jericho Systems are strong advocates of transforming the nation’s health IT system so that health professionals and researchers can electronically access complete and accurate health information. The experiences gained through proof of concept testing and validation of new technologies that strengthen patients’ control over their PHI will allow both organizations to join with other thought leaders to advance this critical area of health IT.
“With years of engagement with the healthcare standards community, Jericho is proud to support the ONC and advance the next generation of secure medical information exchange technology," said Brynn Mow, CEO of Jericho Systems.
Jericho Systems’ EnterSpace Exchange™ and EnterSpace Decisioning Service software were recently included in a SAMHSA-VA Phase I healthcare pilot of a “push” ecosystem, conducted at the Health Level Seven (HL7) Working Group on behalf of the ONC Data Segmentation for Privacy DS4P pilot working group.
About Jericho Systems Corporation
Dallas-based Jericho Systems Corporation provides enterprise-scalable access control, decisioning, and privilege management solutions, with its largest customers representing the healthcare, Department of Defense, intelligence, and homeland security communities. Jericho specializes in fine-grained, policy-based data filtering technology that supports dynamic, attribute-based access control (ABAC). Jericho’s EnterSpace Exchange PatientPortal™ was recognized as a “Best Privacy Technology of 2012” at the Second International Summit on the Future of Health Privacy.
EnterSpace Technology® is covered by United States patents 7,779,247, 7,792,828, 8,060,504, and 8,438,159. For more information or to arrange a product demonstration, please call 972-231-2000, email [email protected], or visit www.jerichosystems.com.
This work is supported by the US Army Medical Research and Materiel Command (USAMRMC) under Grant No. W81XWH-13-C-0116.
About The University of Texas at Austin Health IT Program
The Health IT Program at The University of Texas at Austin is comprised of a unique combination of state-of-the-art facilities and focused educational programs including the nine-week certificate program designed to “fast track” university graduates into the rapidly evolving field of health IT.
The facilities include a health IT learning center where students develop hands-on skills with six electronic health record (EHR) software systems, and an advanced telemedicine system. The recently launched HIE laboratory, funded by the Longhorn Innovation Fund for Technology, is a collaboration between the university’s Health IT program and two major corporate HIE software vendors, Information Corporation of America (ICA) and Orion Health, together with two leading Electronic Health Record (EHR) software companies, eClinicalWorks and e-MDs. This “first in the nation” HIE laboratory not only allows students to engage with the latest HIE technologies, but also has the potential to serve as a vender-neutral test site for the evaluation of emerging HIE standards, and as a center for applied research to study the development and implementation of “best practices” for state and nationwide health information exchange.
The Health IT certificate program includes a comprehensive curriculum of healthcare policy, economics, technology, data systems and business practices and gives students an opportunity to carry out applied research projects. The program’s curriculum was designed to meet the skills and workforce training requirements identified by major health IT industry and healthcare sponsors of the certificate program.
For more information on The University of Texas at Austin Health IT Program, please go to: https://healthit.cns.utexas.edu.
In a recent research, analyst firm IDC found that the average cost of a critical application failure is $500,000 to $1 million per hour and the average total cost of unplanned application downtime is $1.25 billion to $2.5 billion per year for Fortune 1000 companies. In addition to the findings on the cost of the downtime, the research also highlighted best practices for development, testing, application support, infrastructure, and operations teams.
Jul. 29, 2015 05:30 PM EDT
"We specialize in testing. DevOps is all about continuous delivery and accelerating the delivery pipeline and there is no continuous delivery without testing," noted Marc Hornbeek, Sr. Solutions Architect at Spirent Communications, in this SYS-CON.tv interview at @DevOpsSummit, held June 9-11, 2015, at the Javits Center in New York City.
Jul. 29, 2015 05:15 PM EDT Reads: 360
How do you securely enable access to your applications in AWS without exposing any attack surfaces? The answer is usually very complicated because application environments morph over time in response to growing requirements from your employee base, your partners and your customers. In his session at @DevOpsSummit, Haseeb Budhani, CEO and Co-founder of Soha, shared five common approaches that DevOps teams follow to secure access to applications deployed in AWS, Azure, etc., and the friction an...
Jul. 29, 2015 04:30 PM EDT Reads: 497
"Alert Logic is a managed security service provider that basically deploys technologies, but we support those technologies with the people and process behind it," stated Stephen Coty, Chief Security Evangelist at Alert Logic, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
Jul. 29, 2015 04:15 PM EDT Reads: 321
Digital Transformation is the ultimate goal of cloud computing and related initiatives. The phrase is certainly not a precise one, and as subject to hand-waving and distortion as any high-falutin' terminology in the world of information technology. Yet it is an excellent choice of words to describe what enterprise IT—and by extension, organizations in general—should be working to achieve. Digital Transformation means: handling all the data types being found and created in the organizat...
Jul. 29, 2015 04:00 PM EDT Reads: 1,065
The essence of cloud computing is that all consumable IT resources are delivered as services. In his session at 15th Cloud Expo, Yung Chou, Technology Evangelist at Microsoft, demonstrated the concepts and implementations of two important cloud computing deliveries: Infrastructure as a Service (IaaS) and Platform as a Service (PaaS). He discussed from business and technical viewpoints what exactly they are, why we care, how they are different and in what ways, and the strategies for IT to tran...
Jul. 29, 2015 03:15 PM EDT Reads: 368
The Internet of Everything (IoE) brings together people, process, data and things to make networked connections more relevant and valuable than ever before – transforming information into knowledge and knowledge into wisdom. IoE creates new capabilities, richer experiences, and unprecedented opportunities to improve business and government operations, decision making and mission support capabilities.
Jul. 29, 2015 03:15 PM EDT Reads: 237
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and benefit of the SDDC, and offers an opportunity to build security 'from the ground up' and weave it into the environment from day one. In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin,...
Jul. 29, 2015 03:00 PM EDT Reads: 466
The Internet of Things is not only adding billions of sensors and billions of terabytes to the Internet. It is also forcing a fundamental change in the way we envision Information Technology. For the first time, more data is being created by devices at the edge of the Internet rather than from centralized systems. What does this mean for today's IT professional? In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists addressed this very serious issue of pro...
Jul. 29, 2015 03:00 PM EDT Reads: 1,254
With SaaS use rampant across organizations, how can IT departments track company data and maintain security? More and more departments are commissioning their own solutions and bypassing IT. A cloud environment is amorphous and powerful, allowing you to set up solutions for all of your user needs: document sharing and collaboration, mobile access, e-mail, even industry-specific applications. In his session at 16th Cloud Expo, Shawn Mills, President and a founder of Green House Data, discussed h...
Jul. 29, 2015 02:30 PM EDT Reads: 321
Container technology is sending shock waves through the world of cloud computing. Heralded as the 'next big thing,' containers provide software owners a consistent way to package their software and dependencies while infrastructure operators benefit from a standard way to deploy and run them. Containers present new challenges for tracking usage due to their dynamic nature. They can also be deployed to bare metal, virtual machines and various cloud platforms. How do software owners track the usag...
Jul. 29, 2015 02:30 PM EDT
Discussions about cloud computing are evolving into discussions about enterprise IT in general. As enterprises increasingly migrate toward their own unique clouds, new issues such as the use of containers and microservices emerge to keep things interesting. In this Power Panel at 16th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the state of cloud computing today, and what enterprise IT professionals need to know about how the latest topics and trends affect t...
Jul. 29, 2015 02:00 PM EDT Reads: 1,167
"Our biggest growth area has been the security services, the managed services - the things that differentiate us in the market that there is no client that's too small and there's no client that's too big," explained Paul Mazzucco, Chief Security Officer at TierPoint, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
Jul. 29, 2015 02:00 PM EDT Reads: 372
SYS-CON Events announced today that HPM Networks will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. For 20 years, HPM Networks has been integrating technology solutions that solve complex business challenges. HPM Networks has designed solutions for both SMB and enterprise customers throughout the San Francisco Bay Area.
Jul. 29, 2015 01:45 PM EDT Reads: 422
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at DevOps Summit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
Jul. 29, 2015 01:00 PM EDT Reads: 1,059