Explore results and expand your knowledge
Friday, January 2, 2015
Medicity has worked with Trinity since 2010, providing electronic orders and results delivery, clinical summary exchange, closed loop referrals management capabilities and a Secure Messaging solution (using Direct protocol) to improve the exchange of information during transitions of care and meet Stage 2 Meaningful Use (MU2) requirements.
Monday, December 15, 2014
Regulatory policies have prompted greater use of core health information exchange (HIE) services. Since Stage 2 Meaningful Use requirements have been enacted, many hospitals have implemented notification systems for better care transitions, Direct, secure messaging, exchange of lab results and public health reporting. According to a 2014 Survey on Health Data Exchange, most hospitals surveyed report that access to external organization data is a challenge and that interoperability continues to be an obstacle as organizations work to integrate with multiple EHR vendors.
Tuesday, April 28, 2015
On March 20, 2015 The U.S. Department of Health and Human Services, Centers for Medicare & Medicaid Services (CMS) and Office of the National Coordinator for Health Information Technology (ONC) announced the release of the Stage 3 notice of proposed rulemaking for the Medicare and Medicaid Electronic Health Records (EHRs) Incentive Programs and 2015 Edition Health IT Certification Criteria.
Wednesday, January 14, 2015
As we look toward the future of Health Data Exchange, what have the current Certification and Testing Programs taught us? Join a leading panel of Health IT experts as we take a look at ways to ensure Continuous Interoperability as the next generation of technology platforms evolve. The panel discussed the benefits being delivered by the testing and certification efforts and the role of evolving standards like HL7 Fast Healthcare Interoperability Resources (FHIR). What steps do we take now to ensure a Continuously Interoperable learning healthcare system for the future?
Wednesday, December 10, 2014
Unlike today’s health data exchange and interoperability standards that are based on cross-document exchange, FHIR uses application programming interfaces (APIs) for data level access. FHIR’s modular components called “resources” can be combined together to solve clinical and administrative problems in a practical way.
Network insights for our health information exchange. Understand how your exchange is operating by defining and viewing reports relative to results, referrals, secure messages and access to health information — all the transactions distributed across your exchange network — available in an easily digestible way.
Monday, April 13, 2015 | By Brian Ahier| Published by Executive Insight
Direct secure message to foster innovation in the years ahead. Discussions about health care interoperability often focus on barriers and shortcomings, when in fact the current environment is performing reasonably well. While interoperability isn't yet where it needs to be, a great deal of meaningful exchange of health care data is happening today in ways that would have been impossible a few years ago. This points the way for gains to come.
Tuesday, April 7, 2015 | By Nancy J. Ham| Published by hmfa
One of the key financial levers for a successful accountable care organization (ACO) is growing the patient population and then retaining those patients within the ACO network. Although most ACO leaders recognize that patients seek care out-of-network, many participating providers underestimate the extent of the problem. In reality, between 55 percent and 65 percent of patient care may fall outside the ACO network (see e-Care Management Blog, “Patient ‘Leakage’: Rethinking Two Field-of-Dreams Assumptions About ACOs,” June 27, 2011).
Friday, October 10, 2014
eHealth Initiative presented its key findings from their 11th annual survey of health data exchange on October 8, 2014 via webinar to over 230 participants.
Friday, October 3, 2014
Direct Trusted Agent accreditation recognizes adherence to data processing standards and compliance with security infrastructure, integrity and trusted identity requirements