HIMSS Montana Chapter The Montana Chapter Of HIMSS Was

2y ago
6 Views
3 Downloads
809.59 KB
6 Pages
Last View : 25d ago
Last Download : 3m ago
Upload by : Ronan Orellana
Transcription

SPONSORED BY:HIMSS Montana Chapter The Montana Chapter of HIMSS wasformed to provide a local resourcefor peer networking, education, andinformation sharing to helpprofessionals navigate through thechallenges in healthcare IT. A bit oflocal flavor is included sinceMontana’s hurdles, while similar tothe rest of the nation, are unique tosuch a large rural area.As a member of your HIMSS Chapter,you can Network with healthcare IT andmanagement systems professionalsand leaders in your own backyard. Participate in education programsfeaturing expert speakers andfocusing on the latest topics affectingour industry and your region. Stay up-to-date with regional publicpolicy and advocacy issues. Keep abreast of industry and HIMSSnational and local issues throughChapter promotions, as well asHIMSS E-News and HIT News.Get involved with the HIMSS MontanaChapter! If you are interested in becoming aHIMSS Montana Chapter member orboard member, please visit with anyof our board members or visit ourwebsite at www.montanahimss.org

Wednesday, May 14th Schedule:TimeTopic4 - 5 pmRegistrationLocationLobby Area5 – 7 pmPintler RoomMeet and GreetCasual get together for all vendors and attendees.Join us for drinks and light appetizers.Thursday, May 15th Schedule:TimeSession7 – 8 amPintler RoomSessionRegistration and Breakfast with VendorsPintler RoomConf Room 1088 – 10 am10 – 10:30 am10:30 – 11:30 amCoffee Break with VendorsICD 10- Organizational Readiness andPlanning: Delay or no delay , learn aboutneed to know tips on preparing andplanning for the education required forICD-10 success across all impactedpopulations.11:30 – 1pmBonnie Purdy, VicePEN Testing: Ethical Hacking 101 and theZakariya Syed, LeadPresident, HIMStrategic SourcingServices, Precyseimportance of a Security CulturePenetration Tester,Dakota State UniversityLunch with Vendors

1 – 2:00 pm2 – 3:00 pm3 – 3:30 pm4 – 5:30 pmTechnology and Innovation to BridgeHealthcare: Understand a new model ofDr. Alan Gee MD,PhD, FAAN,Mobile Device Management in HealthCare: this talk will examine this question inRoss Shaw, CISSP, CISA, CISM, Principlesustainable health information exchangeto connect patient’s and providers,especially in terms of smallerorganizations.Patient Portals: Truly achieve PatientEngagement, not just the requiredMeaningful Use components throughvarious types of portals. Betterunderstand portals and their true financialimplications.Lean and Six Sigma in HealthCare: Aprescription for facilitating improvementand performance excellence through ahigh level overview of Lean Six Sigma andreal life examples.Neurologist/HITConsultant, FrontierNeuroHealthdepth. It will also cover device security,employee responsibility, and mobileinformation management.Consultant, E3Technology, CeriumNetworksEd Duryee, CIOUsing Business Analytics to ImproveOperations: Explore tools designed to helpSandi Piatz, Sr.St Francis MedicalCenter, CapeGirardeau, MOManager, Eide Bailly, LLPidentify and analyze immense amounts of datarequired to truly improve your organization’soperationsLaura Merchant,Manager, OperationsAnalysis, BenefisACHE Panel - The Healthcare Executive’s Role in IT Decisions – Pintler RoomModerator: Mark HinmanPanelists: Patty Kosedar, Mary Erickson, Ed DuryeeToday’s healthcare executive works in a world of ever-increasing information technology options. How do they navigate, evolve and respond to the changinginformatics world. These leaders often do not work directly with information technology, nor necessarily understand the application, but they are asked to makecrucial decisions about their implementation. The outcomes of those decisions have financial, strategic and patient outcomes and the cost of a mistake can bedevastating. Is there a methodology or a roadmap to assist the non-technical executive to proactively make technology decisions?Topics for Discussion:-Successful approaches that other senior leaders have used to make confident decisions on topics for which they may have less specific contentknowledge. For example, when a CEO must make a purchase decision for a new medical device.How critical information technology is becoming in transforming patient careThe perils of chasing technologyHow to assess the huge capital and operating budgets required to support health information systemsHow new IT systems work cooperatively with existing systemsThe costs (financial and operational) of training staff to use new systems5:30 – 6pmBreak6 – 8:00 pmMT HIMSS Reception

Friday, May 16th Schedule:Time7 – 8 am8 am – 9:30 amSessionPintler RoomSessionBreakfast with Vendors & Montana HIMSS Member MeetingConf Room 108ACHE Panel - Telemedicine in the Healthcare Delivery System – Pintler RoomModerator: Thelma McClosky ArmstrongPanelists: Leila Samy, ONC; Dr. Allen Gee, Neurologist; Doris Barta,Telemedicine has become increasingly popular throughout the years. Its innovative benefits are of vital interest amid the implementation of the Affordable CareAct. Telemedicine uses a variety of forms of electronic communication technology to provide a convenient method to deliver healthcare services and education.This program will explore the current and future role of telemedicine in the delivery of health care. The program surveying the various uses and settings oftelemedicine will delve into how well this technology has been utilized and received by clinicians and patients. Technical, operational, regulatory and financialaspects of the development of telemedicine programs will be investigated. The expanding role that telemedicine holds in daily medicine and its direction intothe future of the healthcare delivery system will be explored.Topics for Discussion:How telemedicine has been used to care for patients and in what settings.How effective telemedicine has been in the treatment of patients.The technical and operational issues that must be considered in the development of telemedicine services.Legal and regulatory implications of employing telemedicine in the care of patients.The financial and reimbursement implications of employing telemedicine in the care of patients.Future applications of telemedicine and how the potential shift in healthcare reimbursement toward assuming greater risk may impact health careproviders’ use of telemedicine.9:30 – 10 am10 - 11 amCoffee Break with VendorsEHR and Patient Safety: a realistic look atMary Erikson,the true effect of EHR’s on patient safety andpossible future improvements.Health TechnologyConsultant & QISpecialist,HTS/Mountain PacificQuality HealthFoundationACHE Panel - Leading Information Safety: Planning for DataPrivacy and SecurityModerator: Tom HerringPanelists: John Whalen, Mac McMillan, Corey SteelInformation technology is increasingly a part of every aspect of the healthcareindustry. While more organizations are implementing electronic health records(EHR), health information exchanges (HIE), or computerized physician order entrysystems (CPOE), patients remain concerned about the privacy and security of theirinformation. Most healthcare organizations have at least implemented electronicfinancial records, and these need to be protected just as much. In addition, legalrequirements, such as HIPAA, impact what information organizations must keepsecure and how it should be done. Healthcare executives are asked to lead theway in security initiatives without knowing where technology will lead us in thecoming years, while obtaining the buy-in and trust of staff, patients and thecommunity.Topics for Discussion: Planning for long-term information securityUnderstanding an information security risk assessment

11- 12NLeading Information Safety: Betterunderstand the current hot topics andchallenges for security programs in ourindustry with a focus on risk managementplans and guidance to improve bothsecurity and risk management plans.12N– 1pm1 – 2:00 pm2 – 3:00 pm3 – 4:00 pm4 – 4:30pmMac McMillan,Chair – HIMSS Privacyand Security PolicyTask Force & HIMSSFellow 2012,CoFounder & CEO,Cynergis TekRegulatory impact on information securityPatient and community security concernsStaff participation in security measuresFostering an organizational culture that values information privacy andsecurityMeaningful Use Stage 2: A comprehensivesession on Stage 2 requirements for bothEligible Hospitals and Eligible Providers. Thissession will include information on 2014CEHRT Certification and reporting periods.Deb Anderson, HealthTechnology Consultant,Health Technology Services(MT/WY REC)Lunch with VendorsBring Your Own Device to Work: BestRoss McKnight,NCQA Patient Centered Medical Home:practices, HIPAA considerations andtechnical options and solutions will bediscussed in this session.Senior NetworkEngineer, Eide Bailly,LLPGain an understanding of the HIT componentsnecessary for PCMH, the components of PCMHdependent on HIT, and the downstreamimpact a medical home program may have onHIT.Meaningful Use 2014 and Beyond:Jane Alderson, RN,Expanded view and discussion onMeaningful Use Stage 2 as well as Stage 3considerations as they apply to yourorganization.Telemedicine in Montana: Montanaconsiderations and successes with a looktoward the future.Senior ManagementConsultant, AllscriptsThelma McCloskyArmstrong, Director,Eastern MontanaTelemedicine NetworkDirector, Telemedicine& Outreach Services,Billings ClinicMT HIMSS 2014 Spring Educational Conference and Tradeshow Wrap UpCheryl Dorsman, RNand Jody Haines,Manager - Medical HomeProgram, WesternMontana Region,Providence Medical Group

Please visit and thank our vendors

ICD-10 success across all impacted populations. Bonnie Purdy, Vice President, HIM Strategic Sourcing Services, Precyse PEN Testing: Ethical Hacking 101 and the Zakariya Syed, Lead Penetration Tester, Dakota State University 11:30 – 1pm Lunch with Vendors

Related Documents:

May 02, 2018 · D. Program Evaluation ͟The organization has provided a description of the framework for how each program will be evaluated. The framework should include all the elements below: ͟The evaluation methods are cost-effective for the organization ͟Quantitative and qualitative data is being collected (at Basics tier, data collection must have begun)

Silat is a combative art of self-defense and survival rooted from Matay archipelago. It was traced at thé early of Langkasuka Kingdom (2nd century CE) till thé reign of Melaka (Malaysia) Sultanate era (13th century). Silat has now evolved to become part of social culture and tradition with thé appearance of a fine physical and spiritual .

On an exceptional basis, Member States may request UNESCO to provide thé candidates with access to thé platform so they can complète thé form by themselves. Thèse requests must be addressed to esd rize unesco. or by 15 A ril 2021 UNESCO will provide thé nomineewith accessto thé platform via their émail address.

̶The leading indicator of employee engagement is based on the quality of the relationship between employee and supervisor Empower your managers! ̶Help them understand the impact on the organization ̶Share important changes, plan options, tasks, and deadlines ̶Provide key messages and talking points ̶Prepare them to answer employee questions

Dr. Sunita Bharatwal** Dr. Pawan Garga*** Abstract Customer satisfaction is derived from thè functionalities and values, a product or Service can provide. The current study aims to segregate thè dimensions of ordine Service quality and gather insights on its impact on web shopping. The trends of purchases have

Chính Văn.- Còn đức Thế tôn thì tuệ giác cực kỳ trong sạch 8: hiện hành bất nhị 9, đạt đến vô tướng 10, đứng vào chỗ đứng của các đức Thế tôn 11, thể hiện tính bình đẳng của các Ngài, đến chỗ không còn chướng ngại 12, giáo pháp không thể khuynh đảo, tâm thức không bị cản trở, cái được

Part One: Heir of Ash Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Chapter 10 Chapter 11 Chapter 12 Chapter 13 Chapter 14 Chapter 15 Chapter 16 Chapter 17 Chapter 18 Chapter 19 Chapter 20 Chapter 21 Chapter 22 Chapter 23 Chapter 24 Chapter 25 Chapter 26 Chapter 27 Chapter 28 Chapter 29 Chapter 30 .

TO KILL A MOCKINGBIRD. Contents Dedication Epigraph Part One Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Chapter 10 Chapter 11 Part Two Chapter 12 Chapter 13 Chapter 14 Chapter 15 Chapter 16 Chapter 17 Chapter 18. Chapter 19 Chapter 20 Chapter 21 Chapter 22 Chapter 23 Chapter 24 Chapter 25 Chapter 26