Tuesday, January 12, 2010

Health Informatics News

Health Informatics News


New Programs to Focus on Building Health IT Workforce

Posted: 12 Jan 2010 06:40 AM PST

Oakland, Calif.-based Fulcrum Methods is extending its product offering to include curriculum and training programs designed to address the shortage of skilled IT personnel. According to the Bureau of Labor Statistics, there will be a shortfall of 51,000 qualified health IT workers required over the next five years to meet the needs of hospitals and physicians as they adopt EHRs. The Fulcrum Methods curriculum and programs can be used by higher education organizations seeking development grants as part of ARRA, as well as by healthcare organizations, consulting service organizations, and software or technology vendors to advance the healthcare IT skills and capabilities of their workforce. Fulcrum Methods is a provider of program management, project management, planning, vendor selection, system implementation, process redesign and change management methodologies to the healthcare IT industry. Its clients include Stanford Hospital, Lucile Packard Children’s Hospital and John Muir Health, among others.

Vendors Unite to Help Hospitals Comply with HITECH, HIPAA

Posted: 12 Jan 2010 06:36 AM PST

Iatric Systems (Boxford, Mass.), a provider of security and patient privacy software, and Transcendent Group , a Tampa, Fla.-based assurance and management consulting firm providing IT governance services, are partering to help healthcare organizations meet the privacy and security requirements of HIPAA and the HITECH Act. Through the partnership, clients of Iatric Systems’ Security Audit Manager will have access to complementary services from Transcendent Group, including: ·          Security Governance and Incident Management Assessments ·          HIPAA Security Gap Assessments (including HITECH and FTC red flag rules) ·          HITRUST and ISO27002/27799 Assessments and Implementations ·          Security Risk Analysis ·          Penetration Test and Intrusion Reviews ·          Design and Implementation of Information Security Governance ·          Processes and Solutions  

No comments:

Post a Comment