Click here to close now.


News Feed Item

McGill University Health Centre implements new vendor credentialing program

Project to improve patient privacy, security and quality standards at MUHC hospitals

MONTREAL, April 11, 2014 /PRNewswire/ - A new program aimed at improving patient safety and quality care has been launched at McGill University Health Centre (MUHC) hospitals. The program, which is being conducted in collaboration with, is the first of its kind in a large academic Quebec hospital. The initiative will ensure that all vendors are credentialed, meeting MUHC patient safety and quality standards, and receive official photo identification (ID) at every hospital visit. The new technology has already been implemented in the operating rooms at the Montreal General Hospital, Royal Victoria Hospital, Montreal Children's Hospital and Montreal Neurological Hospital. Broader implementation across the institution is now underway.

The MUHC works with vendors from approximately 2,000 different companies, annually. Vendors can range from medical device and pharmaceutical representatives, to construction contractors, many of whom require access to sensitive areas of the hospital, such as the operating rooms and Intensive Care Units. "At the MUHC we are focused on creating and sustaining a culture of safety," says Patricia Lefebvre, Director of Quality, Patient Safety and Performance. "As vendors are an integral part of the hospital's day-to-day operations and they spend a significant amount of time in clinical areas, it is crucial that they are aware of our quality and patient safety standards to apply them at all times."

Credentials are established based on the specific needs of the departments visited by the vendor and by the type of work being conducted. Vendors collaborating in the care of a vulnerable patient will be required to understand and respect MUHC patient safety and quality care guidelines. These may involve vendors completing courses on infection control, having an up to date vaccination record, undergoing governmental privacy training, as well as attestations of background checks and proof of product competency. If vendors do not have the expected credentials, they will not receive their temporary photo ID badge when they log-in to one of the vendor kiosks now located at MUHC hospitals' entrances and will be denied access.

"Hospital vendors are essential as they support our healthcare teams with many products and services", says Donna Stanbridge, Associate Director of Nursing - Perioperative/MDR Services at the MUHC. "Wearing identification badges similar to those of our hospital staff will ensure that everyone follows the same safety regulations and standards. Patients as well as staff will know who they are interacting with, and we will have peace of mind that vendors are adequately prepared through the hospital credentialing process and that patient safety and privacy are being respected." The system will remind hospital staff of scheduled visits and inform them when the vendors arrive. Additionally, the system can communicate useful information to the vendors, such as changes in appointment times and locations, as well as hospital statutory holidays.

"During the past three years, has worked collaboratively with MUHC to ensure that the system is truly a reflection of their patient safety and quality needs", says Michelle Floh, President and CEO of "We are pleased that we have been able to incorporate features and functionality into our system that reflect Quebec's unique credentialing, access and transparency needs for healthcare vendors and contractors."

The MUHC is the first hospital in Quebec to implement the solution, which is a budget neutral solution because costs are negotiated between and the vendors themselves. The MUHC is also collaborating with and other hospitals on credentialing standards to ensure that the processes are standardized for vendors.

About Ltd. is a Canadian vendor management solution company that provides proprietary software for vendor registration, screening, training and monitoring.'s solutions allow hospitals to manage their policies and their procedures in a highly cost-effective manner. Though the need for credentialing is most clearly articulated within hospitals, can and will continue to address the emerging requirements for credentialing in all relevant markets.

About the McGill University Health Centre (MUHC)
One of the world's foremost academic health centres, the MUHC offers exceptional and integrated patient-centric care, research, teaching and technology assessment. Affiliated with the Faculty of Medicine of McGill University and part of the RUIS-McGill, the MUHC has a mandate to focus on complex care and is highly committed to working with partner organizations to ensure continuum of care in its community. The partner hospitals of the MUHC—the Lachine Hospital, the Montreal Chest Institute, the Montreal General Hospital, the Montreal Neurological Hospital, the Royal Victoria Hospital and the Montreal Children's Hospital—value multidisciplinary service throughout the lifespan, innovative technologies and practices, strategic partnerships and leadership in knowledge transfer. The MUHC is currently carrying out a $2.355-billion Redevelopment Project on three sites - the Glen, the Montreal General and Lachine hospitals. The project will support environments that ensure patients and their families receive the best care possible, now and for many generations to come. The sites are also anchored in best sustainable-development practices, including LEED® and BOMA BESt guidelines.


Image with caption: "Vendor Management Kiosk (CNW Group/MCGILL UNIVERSITY HEALTH CENTRE)". Image available at:

Image with caption: "McGill University Health Centre (CNW Group/MCGILL UNIVERSITY HEALTH CENTRE)". Image available at:

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Today’s connected world is moving from devices towards things, what this means is that by using increasingly low cost sensors embedded in devices we can create many new use cases. These span across use cases in cities, vehicles, home, offices, factories, retail environments, worksites, health, logistics, and health. These use cases rely on ubiquitous connectivity and generate massive amounts of data at scale. These technologies enable new business opportunities, ways to optimize and automate, al...
The IoT market is on track to hit $7.1 trillion in 2020. The reality is that only a handful of companies are ready for this massive demand. There are a lot of barriers, paint points, traps, and hidden roadblocks. How can we deal with these issues and challenges? The paradigm has changed. Old-style ad-hoc trial-and-error ways will certainly lead you to the dead end. What is mandatory is an overarching and adaptive approach to effectively handle the rapid changes and exponential growth.
There are many considerations when moving applications from on-premise to cloud. It is critical to understand the benefits and also challenges of this migration. A successful migration will result in lower Total Cost of Ownership, yet offer the same or higher level of robustness. Migration to cloud shifts computing resources from your data center, which can yield significant advantages provided that the cloud vendor an offer enterprise-grade quality for your application.
Manufacturing has widely adopted standardized and automated processes to create designs, build them, and maintain them through their life cycle. However, many modern manufacturing systems go beyond mechanized workflows to introduce empowered workers, flexible collaboration, and rapid iteration. Such behaviors also characterize open source software development and are at the heart of DevOps culture, processes, and tooling.
Chris Van Tuin, Chief Technologist for the Western US at Red Hat, has over 20 years of experience in IT and Software. Since joining Red Hat in 2005, he has been architecting solutions for strategic customers and partners with a focus on emerging technologies including IaaS, PaaS, and DevOps. He started his career at Intel in IT and Managed Hosting followed by leadership roles in services and sales engineering at Loudcloud and Linux startups.
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new da...
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...
The APN DevOps Competency highlights APN Partners who demonstrate deep capabilities delivering continuous integration, continuous delivery, and configuration management. They help customers transform their business to be more efficient and agile by leveraging the AWS platform and DevOps principles.
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at @DevOpsSummit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
As-a-service models offer huge opportunities, but also complicate security. It may seem that the easiest way to migrate to a new architectural model is to let others, experts in their field, do the work. This has given rise to many as-a-service models throughout the industry and across the entire technology stack, from software to infrastructure. While this has unlocked huge opportunities to accelerate the deployment of new capabilities or increase economic efficiencies within an organization, i...
In his session at DevOps Summit, Bryan Cantrill, CTO at Joyent, will demonstrate a third path: containers on multi-tenant bare metal that maximizes performance, security, and networking connectivity.
There are so many tools and techniques for data analytics that even for a data scientist the choices, possible systems, and even the types of data can be daunting. In his session at @ThingsExpo, Chris Harrold, Global CTO for Big Data Solutions for EMC Corporation, will show how to perform a simple, but meaningful analysis of social sentiment data using freely available tools that take only minutes to download and install. Participants will get the download information, scripts, and complete en...
Containers are revolutionizing the way we deploy and maintain our infrastructures, but monitoring and troubleshooting in a containerized environment can still be painful and impractical. Understanding even basic resource usage is difficult - let alone tracking network connections or malicious activity. In his session at DevOps Summit, Gianluca Borello, Sr. Software Engineer at Sysdig, will cover the current state of the art for container monitoring and visibility, including pros / cons and li...
Between the compelling mockups and specs produced by analysts, and resulting applications built by developers, there exists a gulf where projects fail, costs spiral, and applications disappoint. Methodologies like Agile attempt to address this with intensified communication, with partial success but many limitations. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a revolutionary model enabled by new technologies. Learn how busine...
IT data is typically silo'd by the various tools in place. Unifying all the log, metric and event data in one analytics platform stops finger pointing and provides the end-to-end correlation. Logs, metrics and custom event data can be joined to tell the holistic story of your software and operations. For example, users can correlate code deploys to system performance to application error codes.