Tag: Health Level 7

Understanding the Benefits of Data Registries for Advancing Patient Centricity and Research

By Alexandra Weiss, nonprofit strategy, patient organizations, IQVIA.

The past few years ushered in a historic wave of innovation in the therapeutic development landscape, heightening the demand for high-quality, real-world data that captures insights from across the entire patient journey. Advancements in government regulations and data technologies are dramatically improving access to electronic health information, presenting unique opportunities for patient advocacy organizations to serve as trusted data stewards.

As regulations, technology and vendor offerings continue to evolve, patient data strategies and data technology capabilities will equip patient advocacy organizations with the ability to advance research through the lens of real-world patient-centric data. In harnessing the full value of advanced data registries to collect, analyze and share information, patient advocacy organizations can better engage with patients and their communities. These tools also present an unprecedented opportunity for patient organizations to collaborate with the research and life sciences community to drive research advancements using patient-centered data that places patient needs and priorities front and center.

Navigating Changes in the Clinical Research Landscape

When discussing the value of research-grade data registries, it is critical to first consider the ways in which the clinical research industry has evolved. Landmark regulatory advancements such as the 21st Century Cures Act and draft FDA guidance on real-world evidence have accelerated the ability to access interoperable health data.

The Cures Act empowers patients with ownership of their own health data, which they can share with advocacy organizations. This provides patient advocacy organizations with access to insights for a broader scope of patients, disease experiences and treatment journeys, equipping them to play a more active role in regulatory decision making and the advancement of drug approval.

In addition to regulatory advancements, the technology and vendor ecosystems have vastly expanded. Data exchange standards such as Health Level 7, Fast Healthcare Interoperability Resources and data models such as Observations Medical Outcomes Partnership are simplifying analytic product delivery by enabling growth in the automation of data capture and data processing. There is also a broader range of commercial partnership opportunities available to help expand patient engagement and generate evidence related to care delivery and treatment responses.

Finally, patient centricity is transitioning from a general aspiration to an immediate operational priority. As patients become increasingly involved in the clinical research and care process, patient advocacy organizations are better equipped in their roles as trusted data stewards.

These advancements present new opportunities for patient organizations to build a cohesive data strategy and expand registry capabilities to capture a 360-degree view of patient perspectives while supporting patient centricity, data ownership, privacy and security.

With the right patient data registry, patient advocacy organizations can accomplish the following:

Continue Reading

Data Security Protocols for an Increasingly Mobile Healthcare System

Guest post by Pawan Sharma, director of operations for healthcare at Chetu.

Pawan Sharma
Pawan Sharma

Healthcare is quickly adapting to the digital environment by leveraging web-based technologies, electronic health records (EHR) and mobile devices to facilitate the movement of information. With innovative software technology comes great responsibility. One of the unfortunate downsides to increasing the use of technology for data sharing in the healthcare world is the risk of data falling into the wrong hands. Full measures need to be put in place to protect patient’s Protected Health Information (PHI). The Health Insurance Portability and Accountability Act (HIPAA) mandates that all PHIs be secured. Any breach, if not handled appropriately under established procedures, can lead to grave consequences including heavy penalties, jail time, or both. Needless to say that proper mechanisms need to be implemented to secure data while it is stored, transmitted and consumed.

Understanding Regulatory Standards

Knowledge is power. It is paramount that software providers look for back-end development partners that have Healthcare IT experience. This includes extensive knowledge and proficiencies with federal regulations like American Recovery and Reinvestment Act (ARRA), meaningful use stage 1 and 2, Accountable Care Act, etc. Also, regulatory health information exchange (HIE) standards such as Health Level 7 (HL7), Health Information Exchange Open Source (HIEOS), Fast Healthcare Interoperability Resources (FHIR), Consolidated-Clinical Document Architecture (C-CDA), Continuity of Care (CCD/CCR) as well as clinical and financial work flows.

Encryption

With information traveling over a network it may be subject to interference. Hence, it is important that data be encrypted in transit. Vendors must include encryption technology to prevent disclosure of patient health information while data is communicated between the application and the server. Web traffic must be transmitted through a secure connection using only strong security protocols such as Secure Sockets Layer (SSL) or Transport Layer Security (TLS). SSL/TLS certificates are light weight data files that are purchased and installed directly onto the server. Once implemented, a user will be able to connect to the web-based application server via a secure tether with an internet browser.

Code Hardening

Organizations have been keen on securing networks and internal infrastructure from external threats. With this in mind, malicious entities are looking to breach data at the application level. Healthcare software proprietors must protect their application from security threats by employing hardening tactics, which shields bugs and vulnerabilities in the coding. This technique primarily includes code obfuscation. Code obfuscation is the act of intentionally creating obscure source code to make it difficult for entities to decipher. Properly employing this tactic hinders a threats ability to reverse engineer and tamper with an application to facilitate a breach.

Continue Reading