Follow Us

Demo of Medical Records Automation at GE Centricity LIVE

The completion of medical record requests by patients and referring providers takes up a lot of staff time. For most medical providers, this is a manual process using fax and inefficient workflows. Overworked staff lose hours of valuable time faxing out information and entering records from other providers.

ACES Medical is attending the GE Centricity LIVE Conference in Boston, MA in May 2017. During this visit, ACES Medical is showcasing its automated medical records request solution to medical professionals, allowing them to see its time-saving benefits first-hand.

ACES Medical's Automated Medical Request Solution frees up staff time through streamlining these common requests. When a patient asks for their medical records, a staff member sets a flag in the patient's chart. Through automation and with ACES Medical staff, all medical record requests are compiled and sent to the patient. The patient gets their medical records in a secure HIPAA compliant form, such as through the practice’s patient portal or an encrypted CD.

Referring providers typically fax over a patient's chart when they send them over to your medical facility for services. ACES Medical puts this record into GE Centricity automatically, without requiring the staff's time and attention. ACES Medical staff also sets a flag in the patient’s chart or sends out an alert so the provider knows these documents are available for review. Finally, the referring doctor receives back your practice’s chart notes and other information relevant to their patient. Without this coordination between providers, patients could experience lower quality of care or providers might detect problems later. Everyone benefits through a streamlined information sharing process.

Medical providers and their staff work long hours and often lack the resources they need to address patient concerns in the time they have available. ACES Medical's Automated Medical Request Solution eliminates one of the biggest drains on the schedule. Interested medical professionals can get a first-hand look at this solution during the demo at GE Centricity LIVE Conference and get the chance to ask questions about whether it would be a good fit for their practices.

Demo of Automated Authorizations at GE Centricity LIVE

ACES Medical will showcase its automated insurance authorization workflow at the GE Centricity LIVE Conference in Boston this May. This new process is expected to be a breakthrough for health care providers. Typically, insurance authorizations take up a great deal of staff time as the process is manual and requires data entry. Automating the work will make things easier on staff members. Automating the process allows staff more time to concentrate on customer service and office management.

Prior authorizations are often needed for many procedures, including CT scans and MRIs, as well as other types of treatment. If a health care provider makes many of these requests, it may see a marked savings in time and expense by utilizing ACES Medical's service.

For those interested in GE Centricity automated authorizations, here is how the ACES Medical process works. ACES Medical allows medical office staff to get insurance authorizations for specialized appointments or procedures by noting the need in GE Centricity. This is determined by the appointment type and/or procedure code. The program then automatically runs each night to capture all the notes requesting insurance authorizations. The program pulls the notes into a report. Utilizing this report, all insurance companies are contacted to acquire the required authorization code or codes. After the insurance authorization number has been obtained, it is placed into the patient's chart.

ACES Medical differs from other GE Centricity vendors in that it offers hosted medical solutions in the ACES Medical cloud. Whether a health care provider is interested in GE Centricity hosting, GE Centricity HIPAA compliance, GE automated medical records, or GE Centricity training, ACES Medical can support the medical practice’s GE Centricity software. ACES Medical can also host practice’s medical data and meet their information technology needs. Contact ACES Medical today to learn about how GE Centricity automated authorizations can reduce the time, pressure, extra work and cost of obtaining prior authorizations.

Machine Learning Anti-Virus in Healthcare

Machine Learning Anti-Virus

When computers and other sophisticated machines are used which have access to the information found online they could be vulnerable to virus attacks hence anti-virus software developed by Cylance in healthcare is protecting potential damage to these very important systems that are saving lives all around the world.

It is a battle more or less lost as accepted by many which the US firm Cylance in healthcare are trying their best to combat and save all those patients who would otherwise not have access to such a very high diagnosis process which could give doctors the opportunity to treat patients effectively and quickly.

Placing the billions of megabytes of information in jeopardy if machine learning anti-virus strikes would not bode well for the world’s medical fraternity and in fact this is the strength on which Cylance in healthcare are basing their arguments to come out with the necessary ammunition to try to combat the universal problem of machine learning anti-virus before it delivers fatal blows to every information storing facility under the sun.

Machine learning would become an integral part of the medical profession with analytical data on many diagnostic results available online where doctors would be able to feed test results into the system and obtain accurate results enabling them to prescribe the right drugs.

 

HIPAA Compliance

Health Insurance Portability and Accountability Act which is popularly known in the medical fraternity as HIPAA compliance is mandatory for all companies dealing with and having access to sensitive patient diagnostic data.

The machine learning system once fully operational would need to strictly adhere to this act, whilst they could access and share results and other information pertaining to the procedures they are barred from disclosure of patient information.

HIPAA compliance would be strictly enforced hence any deviation would not be in the best interests of all the parties concerned and there would not be any break in procedure because those within the framework have more to lose than gain by disclosing such information.            

Companies with access to such sensitive data need to be certified as HIPAA compliance before they could use it for their diagnostic purposes.

This is going to change the way the doctors would be treating their patients as they would have the opportunity of feeding information they have in hand and obtaining very accurate diagnosis. 

Data Breaches Rise 60 Percent in November

According to the Protenus Breach Barameter, the number of breach incidents rose 60% in November compared to October. In fact, November has seen the highest number of breaches so far this year. The report found that 47 of the incidents reported resulted in a total of 448,639 breached records. The largest single incident in November involved 170,000 patient records. This incident was due to a third party insider error.

The report found that the biggest cause of these breaches were employees, or insiders, who caused 54% of the incidents. Seventeen of the insider breaches were a result of error but 14 were caused by wrongdoings. Only nine breaches in November were caused by hacking, in October there were 14 hacking incidents. Of the nine hacking incidents in November, three were caused by ransomware and one was extortion by TheDarkOverLord.

In November, it took 135 days (on average) from the time the breach was noticed to when the breach was reported to the Department of Health and Human Services. The report found that 60% of the breached entities took longer than the required 60-day windows to report the breach.

70 Percent of Attacked Businesses Pay Ransom

According to a recent report by IBM X’Force’s Ransomware report, 70% of businesses hit by ransomware pay the hackers to regain access to their systems and data. Of those attacked, 20% paid over $40,000 to retrieve data while more than half paid more than $50,000. Law enforcement officials tell businesses to stop paying ransoms, however, it is expected that cybercriminals will earn more than $1 billion from ransomware campaigns in 2017.

According to the report, nearly 60% of business leads said they would be willing to the pay the ransom in order to regain access to financial records, intellectual property, business plans, and consumer data. Depending on the type of ransomed data, business leaders would be willing to pay between $20,000 and $50,000 to get their data back.