Thursday, March 29, 2012

ICD9 - ICD10 Conversion Assistant - MxConvert

Ok,
So this is pretty slick and I have to tell you about it. We recently launched an ICD9 - ICD10 conversion assistant tool called MxConvert that works within Excel. This is geared for you Code Warriors in Healthcare who have to undertake the massive task of converting ICD-9 codes to ICD-10. Take a look:
http://www.metaanalytix.com/page.php?page=38

Wednesday, March 7, 2012

This ain't your grandma's locker! - PHI in the Cloud

So, recently I was talking to a potential customer about our MAx on Demand offering, which is our SaaS Healthcare Informatics platform and he said that one of the challenges he's been facing is convincing his Sr. Executives that it is safe to host Protected Health Information (PHI) in the cloud. He asked me if I had any arguments for it. Boy, where do I begin? Here is a stab at it.

Not your grandma's locker!
That's right, this is not granny's locker where the key hangs "securely" around her neck! If you have doubts about how sophisticated our data protection capabilities are, take a look:

Companies like ours, take the security of our clients' and their customers' data very seriously. So, there are two high levels of security in place, Physical Security & Network Security.

Physical Security
To access our data center physically, you have to go through a series of checks. If you are an employee, you are given a badge (after background checks of course!). This badge lets you in the parking lot and to the office spaces. You still can't get to the data center. To get to the data center, you have to have biometric access and a secure access code. This will let you into the data center. From the data center, to access your server, you have to have another secure pin that allows you to physically touch the servers. All of your actions are monitored by security cameras and stored.

If you are a visitor to our data center, you have to register with the guard station. You are ID'd and photographed. You will be escorted by an employee during your visit. 

Network Security
Our network security policies and procedures ensure the protection of company wide networks, related devices, and their services from unauthorized intrusion, modification, destruction, or disclosure. Network security provides assurance that a network performs its critical functions correctly, efficiently, and without any interference. Its primary goal is to provide a reliable and secure platform, designed specifically so that users and programs perform only the actions allowed.

Firewalls – Firewalls are utilized to provide dedicated, security specific processing hardware and a complete set of Unified Threat Management (UTM) security features including stateful firewall and web filtering.

Virus Protection – Antivirus software is installed on all Microsoft based servers and workstations. Automatic updates are configured to ensure latest signature download for system protections.

Logging – System logging occurs according to system settings defined by the administrator. Log records can be retrieved as needed. Successful and failed logon activities are logged by domain controllers.

Attck Monitoring - If that is not enough, you can always request 24x7 attack monitoring for your servers!

Disaster Recovery - If a disaster strikes, you can still sleep tight knowing that there is a triple redundant power supply to our data center. Oh, by the way, did I mention that this is a Category 5 hurricane resistant building?

Business Associate Agreements
And if you are still worried about liability, most reputed companies like ours will sign Business Associate Agreements as defined by HHS that makes us adhere to HIPAA laws and liable for breach of Private information: (http://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/contractprov.html)

So yeah, we know that you take your data protection seriously, so do we!