Electronic Health Records

Planning & Selection; Adoption & Implementation; Optimization & Workflow Redesign; EHR Replacement & Data Migration; (more…)

Health IT Playbook

 

Meaningful Use: Modified Stage 2

AFMC HealthIT – 2018 Modified Stage 2 Meaningful Use Criteria for Eligible Professionals (EPs)

CMS Specification Sheets:

Protect Patient Health Information

Clinical Decision Support

Computerized Provider Order Entry (CPOE)

Electronic Prescribing (eRx)

Health Information Exchange

Patient-Specific Education

Medication Reconciliation

Patient Electronic Access

Secure Electronic Messaging

Public Health Reporting

Public Health Reporting: Modified Stage 2

Arkansas Department of Health’s Meaningful Use Registration and Communications System (MURCS)

Meaningful Use 2014 CEHRT Immunization HL7 Validation Tool

Meaningful Use 2014 CEHRT Syndromic Surveillance HL7 Validation Tool

 

Meaningful Use: Stage 3

AFMC HealthIT – 2019 Stage 3 Promoting Interoperability (Formerly Meaningful Use) Criteria for Eligible Professionals

CMS Specification Sheets:

Protect Patient Health Information

Electronic Prescribing (eRx)

Clinical Decision Support

Computerized Provider Order Entry (CPOE)

Patient Electronic Access to Health Information

Coordination of Care through Patient Engagement

Health Information Exchange

Public Health and Clinical Data Registry Reporting

Public Health Reporting:  Stage 3

Arkansas Department of Health’s Meaningful Use Registration and Communications System (MURCS)

Meaningful Use 2015 CEHRT Immunization HL7 Validation Tool

Meaningful Use 2015 CEHRT Syndromic Surveillance HL7 Validation Tool

 

Meaningful Use:  Clinical Quality Measurements (CQMs)

Medicare and Medicaid EHR Incentive Programs Clinical Quality Measures: Reporting Requirements from 2017 through 2018

 

Meaningful Use Project Management Tools and Links

AFMC HealthIT – Medicaid Provider’s Guide to Meaningful Use

AFMC HealthIT – Calculating Medicaid Encounter Volumes

AFMC Health IT – Provider Eligibility Tool for Working in Multiple Locations

AFMC HealthIT – Making CQMs Meaningful: 2018 Checklist

AFMC HealthIT – 90-Day Calendars, 2017-2018

AFMC HealthIT – Health Information Exchange (HIE) Checklist

Certified Health IT Product List

Medicare and Medicaid EHR Incentive Program Registration and Attestation System

Arkansas Medicaid Provider Portal

eCQI Resource Center

College of Healthcare Information Management Executives (CHIME) Understanding the varying Meaningful Use Requirements in 2017 & 2018

 

EHR Audits – Resources

AFMC HealthIT – Medicaid EHR Audits

CMS – EHR Incentive Programs in 2015 through 2017 Supporting Documentation For Audits February 2016

CMS – EHR Incentive Programs Appeals Overview February 2016

 

Patient Engagement Resources

AFMC HealthIT – Patient Engagement – Patient Portal Poster

AFMC HealthIT – Patient Engagement – Patient Portal Poster (Spanish)

AFMC HealthIT – Patient Portal Implementation Practices

AFMC HealthIT – Tips for Successful Patient Engagement

HealthIT.gov – Patient Engagement Playbook

 

AFMC HealthIT HIPAA Resources and HIPAAWatch Newsletters

HHS – Helping Entities Implement Privacy and Security Protections

HIPAA and Business Associate Agreements

HIPAA Privacy Right of Access 1 – Patient Request for Medical Records

HIPAA Privacy Right of Access 2 – Denying Patients Access to Medical Records

HIPAA Privacy Right of Access 3 – Medical Records Copy Fees

HIPAA Privacy Right of Access 4 – Patient Requests to Release to Another Person or Third Party

HIPAA Privacy Right of Access 5 – Patient Information Sent Through Unencrypted Email

HIPAA Privacy Right of Access 6 – HIPAA vs Meaningful Use Portal Access

HIPAA/HITECH Business Associate Decision Tree

How secure is your Password?

Information Systems Activity Review:  Sample triggers for review of protected health information (PHI) access

Manage Mobile Device

Notice of Privacy Practices (NPP) Tips

Protecting Data in Transit

Risk Analysis and Management Tool

Sample Notice of Privacy Practices

Securing your EHR Data with Encryption

SRA fact or fiction

Top 10 Tips for Cybersecurity in Health Care

What is a Breach?

What is PHI?