
{"id":2056,"date":"2012-09-25T00:00:00","date_gmt":"2012-09-25T00:00:00","guid":{"rendered":"http:\/\/otava.test\/liveblogging-from-mi-himss\/"},"modified":"2012-09-25T00:00:00","modified_gmt":"2012-09-25T00:00:00","slug":"liveblogging-from-mi-himss","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/liveblogging-from-mi-himss\/","title":{"rendered":"Liveblogging from MI-HIMSS!"},"content":{"rendered":"<p>Online Tech is liveblogging from the Michigan HIMSS 2012 Fall conference, <em>HITECH Status in Michigan: Navigating the Future of Electronic Health Records<\/em> at the Crown Plaza Hotel Detroit-Novi. Stay informed with our updates throughout the conference!<\/p>\n<p>If you&#8217;re attending, don&#8217;t miss Online Tech President and COO Mike Klein&#8217;s presentation, <em>Security and Compliance for Processing Facilities<\/em>, at 10:30AM ET with Gail Einhaus, Compliance, Education and Privacy Officer of Trinity Health.<\/p>\n<p><strong>9:00AM<\/strong> &#8211; <em><strong>Keynote Presentation: HITECH: Evolving to the Next Stage<\/strong><\/em><\/p>\n<figure id=\"attachment_8107\" aria-describedby=\"caption-attachment-8107\" style=\"width: 564px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-8107 \" title=\"MI-HIMSS Keynote\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/MI-HIMSS-Keynote.jpg\" alt=\"MI-HIMSS Keynote\" width=\"564\" height=\"318\" \/><figcaption id=\"caption-attachment-8107\" class=\"wp-caption-text\">MI-HIMSS Keynote<\/figcaption><\/figure>\n<p>Mary Griskewicz, MS &amp; HIMSS fellow, Senior Director Healthcare Information Systems, will kick off the MI HIMSS conference momentarily!<\/p>\n<figure id=\"attachment_8117\" aria-describedby=\"caption-attachment-8117\" style=\"width: 564px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-8117 \" title=\"Meaningful Use Analogy\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Meaningful-Use-Analogy.jpg\" alt=\"Meaningful Use Analogy\" width=\"564\" height=\"318\" \/><figcaption id=\"caption-attachment-8117\" class=\"wp-caption-text\">Meaningful Use Analogy<\/figcaption><\/figure>\n<p>Some memorable quotes:<\/p>\n<ul>\n<li>Mary&#8217;s challenge for those in healthcare: how will YOU bring meaning to #MU Meaningful Use? How will what you do today help patients, reduce costs, or improve care?<\/li>\n<li>When you realize a small hospital can have over 100 different info systems, it&#8217;s no wonder #MU2 stresses &#8220;exchange&#8221; and &#8220;interoperability&#8221;.<\/li>\n<li>Think internet connectivity isn&#8217;t holding healthcare back? Some clinicians still need 1G. &#8211; Mary Griskewicz, FHIMSS<\/li>\n<li>We don&#8217;t need to invest in infrastructure? &#8220;Most countries in Africa have better internet connectivity than the rural US.&#8221; &#8211; Mary Griskewicz.<\/li>\n<li>Michigan: until our physicians can answer what % of their patients received their flu shot, we have a LOT more #MU &amp; #MU2 work ahead of us.<\/li>\n<\/ul>\n<hr \/>\n<div><strong><span style=\"font-size: small;\"><span style=\"line-height: 21.81818199157715px;\">10:00 AM &#8211; Mike Klein discussing <em>Security &amp; Compliance for Processing Facilities<\/em><\/span><\/span><\/strong><\/div>\n<figure id=\"attachment_8124\" aria-describedby=\"caption-attachment-8124\" style=\"width: 345px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-8124 \" title=\"Mike Klein MI-HIMSS\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Mike-Klein-MI-HIMSS.jpg\" alt=\"Mike Klein MI-HIMSS\" width=\"345\" height=\"568\" \/><figcaption id=\"caption-attachment-8124\" class=\"wp-caption-text\">Mike Klein MI-HIMSS<\/figcaption><\/figure>\n<figure id=\"attachment_8125\" aria-describedby=\"caption-attachment-8125\" style=\"width: 594px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-8125 \" title=\"Mike Klein Presenting at MI-HIMSS\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/MikeK2.jpg\" alt=\"Mike Klein Presenting at MI-HIMSS\" width=\"594\" height=\"403\" \/><figcaption id=\"caption-attachment-8125\" class=\"wp-caption-text\">Mike Klein Presenting at MI-HIMSS<\/figcaption><\/figure>\n<p><strong>Security and Compliance for Data Center Facilities:<\/strong><br \/>\nWhich audit should you look for?\u00a0SSAE 16 is taking the place of SAS 70 as a new standard with the addition of attestation.<\/p>\n<p>Mike is discussing the difference between all of these audits offered, and some of the main differences in components between the audits administered. It&#8217;s important to ask for the audit from your data center operator. Get a non-disclosure, and ask for that SSAE-16 audit to get the most information about what they\u2019re going to do to secure their data.<\/p>\n<p>PCI DSS is very prescriptive and includes some unnecessary costs and complexity. It requires an independent audit. However,\u00a0HIPAA is specific to PHI (protected health information), and is not as prescriptive. It is much more about people, and the training that you follow. That includes how you manage a breach. It also includes physical, technical and administrative safeguards.<\/p>\n<p><strong>CE (Covered Entity) vs. BA (Business Associate) Responsibilities<\/strong><br \/>\nDo BAs (business associates) get HITECH? Some do and some don\u2019t.\u00a0We [Online Tech] will never open a data file. It\u2019s a fireable offense to open a file.\u00a0It&#8217;s important to know who owns what when it comes to data. Other business associate and covered entity \u00a0responsibilities\u00a0that are important to clarify include\u00a0timeline of breach notification, advance preparation, and breach insurance.<\/p>\n<p>Beware of data centers that claim to be \u2018HIPAA Certified\u2019&#8230;you can\u2019t do it. You can be &#8216;HIPAA compliant,&#8217; which\u00a0means that they\u2019re going to help with audits or breaches. &#8216;HIPAA certified&#8217; doesn\u2019t necessarily mean that they\u2019ve been audited, so be sure to ask for their audit report.<\/p>\n<p>Compliance is a culture, not just a checkbox. Being process-oriented and being transparent with your clients are values of a compliant culture.<\/p>\n<p><strong>HITECH Impact<\/strong><br \/>\n<em><strong>Admin Safeguards include:<\/strong><\/em><\/p>\n<ul>\n<li>Risk analysis and management<\/li>\n<li>HIPAA training (training for every employee)<\/li>\n<li>Disaster Recovery (we provide this for all customers, colo to cloud)<\/li>\n<li>Solid Business Associates Agreement(there are a lot of things that can\u2019t go into a BAA)<\/li>\n<\/ul>\n<p><em><strong>Technical Safeguards include:<\/strong><\/em><\/p>\n<ul>\n<li><a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">Antivirus<\/a> (will not sign BAA unless the CE has anti-virus)<\/li>\n<li>Dedicated firewall and VPN<\/li>\n<li><a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/daily-log-review\">Log Monitoring<\/a> and REVIEW (on a daily basis)<\/li>\n<li>Patch Management (non-negotiable. We do this to all servers)<\/li>\n<li><a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/file-integrity-monitoring-fim\">File Integrity Monitoring<\/a><\/li>\n<li><a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">Web Application Firewalls<\/a> (helps block SQL injections)<\/li>\n<li><a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">SSL Certificate<\/a><\/li>\n<li><a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">Vulnerability Scanning<\/a> (best practice. Every month scan and do automated testing)<\/li>\n<li><a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">Two-factor Authentication<\/a> for VPN (want to control who gets in when)<\/li>\n<li>Data Encryption (different in HIPAA and PCI. Not required for HIPAA. Highly recommended for mobile devices)<\/li>\n<\/ul>\n<p><em><strong>Physical Safeguards include:<\/strong><\/em><\/p>\n<ul>\n<li>Facility Security<\/li>\n<li>Offsite backup and DR (we require that HIPAA folks have DR in order to sign BAA)<\/li>\n<li>Proper Data Destruction and Disposal (what happens when we turn down these servers? If you lose your drives, how do you guarantee that it\u2019s been destroyed).<\/li>\n<li>Show me the HIPAA report. If someone\u2019s not going to show you the report, you should be asking the tough questions.<\/li>\n<\/ul>\n<p><strong>Win-Win culture:<\/strong><br \/>\nCompliance, Trust, Process-Oriented, Transparency, Embraces Independent Input. Culture is extremely important to make sure that you\u2019re getting all the tools at your fingertips so you can be sure you know what\u2019s going to happen with your data.<\/p>\n<p>Most people are just looking for their checkmark, but it\u2019s not their business like it is for us. It&#8217;s key to understand the technology. You may or may not want some of those safeguards, but you need to be knowledgeable of what they are so you can make an informed decision.<\/p>\n<hr \/>\n<p><em><strong>Business Associate HIPAA Compliance &#8211; Impact on the Business Associate and Covered Entity:<\/strong><\/em><br \/>\nSpeakers Joe Dylewski of\u00a0Health Care Management\u00a0and\u00a0Meredith Philips<\/p>\n<p>Joe: Defining the \u2018certain functions or activities\u2019\u00a0safeguards: people are seeing them as vague language.\u00a0HITECH: Health Information Technology for Economic Recovery and Reinvestment Act was developed to educate and enforce HIPAA and meaningful use.<\/p>\n<p>The idea of security was out there, but there was no one to enforce it, before HITECH.<br \/>\nA few changes include:<\/p>\n<ul>\n<li>Physician attestation for meaningful use<\/li>\n<li>Office of civil rights is now auditing for meaningful use<\/li>\n<li>Improved enforcement<\/li>\n<li>HIPAA ignorance no longer tolerated.<\/li>\n<li>BAs (business associates) now have the same responsibilities as CEs (covered entities) they service<\/li>\n<li>When it came to breaches with 500+ people affected, not only did they have to report it, but the media had to be notified as well.<\/li>\n<\/ul>\n<p>BAs were involved in 58% of breaches. From the the CE&#8217;s perspective:<\/p>\n<ul>\n<li>Increased effort and decreased risk.<\/li>\n<li>When a breach happens, even if a BA is involved, the CE is still responsible. It&#8217;s necessary to have a BAA (business associates agreement) in place if you\u2019re working with BA.<\/li>\n<li>The BA needs to have done some sort of due diligence, by conducting a risk assessment, then seeing that your BA is working toward compliance, and the last step is having proof of HIPAA compliance.<\/li>\n<\/ul>\n<p><em><strong>Common Qs:<\/strong><\/em><\/p>\n<ul>\n<li><em>Is the CE responsible for their BA&#8217;s HIPAA compliance, and vice versa?\u00a0<\/em>No<\/li>\n<li><em>Is the CE responsible for engaging in relationships with HIPAA compliant BAs?\u00a0<\/em>Yes<\/li>\n<li><em>If the BA claims HIPAA compliance, does this imply that the CE is HIPAA compliant?\u00a0<\/em>No &#8211;\u00a0the CE has their own responsibility to be compliant.<\/li>\n<\/ul>\n<p>Protected Health Information is being touched by potentially:<\/p>\n<ul>\n<li>EMR<\/li>\n<li>DR site<\/li>\n<li>Physician Practice<\/li>\n<li>IT services of practice<\/li>\n<li>Document Destruction of practice<\/li>\n<li>Data center<\/li>\n<li>Health System<\/li>\n<li>Lab<\/li>\n<\/ul>\n<p>These all need to be compliant.<\/p>\n<p>What constitutes compliance?<\/p>\n<ul>\n<li>Policies<\/li>\n<li>Privacy\/security<\/li>\n<li>Proof (most important, to be able to show that the policies and securities are in place, and being able to show how you execute that)<\/li>\n<\/ul>\n<p>Who enforces HIPAA compliance?<\/p>\n<ul>\n<li>US Dept. of Health and Human Services<\/li>\n<li>Office for Civil Rights<\/li>\n<li>Individual state\u2019s Office of The Attorney General<\/li>\n<\/ul>\n<hr \/>\n<p>Speaker: Meredith R. Phillips, CHC, CHPC,\u00a0Chief Privacy Officer of the\u00a0Henry Ford Health System<\/p>\n<p><em><strong>Data Breach Responses Involving Business Associates<\/strong><\/em><\/p>\n<p>The HFHS Landscape:<\/p>\n<ul>\n<li>Founded in 1915 and has:<\/li>\n<li>4 acute care facilities<\/li>\n<li>1200 member medical group<\/li>\n<li>Health plan serving 640,000 members<\/li>\n<li>Home health, retail pharmacy, optical care, Hospice, Occupational Health, Extended care divisions<\/li>\n<\/ul>\n<p>In 2011:<\/p>\n<ul>\n<li>Awarded Malcolm Baldrige Natl Quality Award (big part of that was being transparent about the struggles that they\u2019ve had within their system)<\/li>\n<li>Around 31,000 workforce members<\/li>\n<li>3.3 million outpatient visits,<\/li>\n<li>around 550 BAs<\/li>\n<\/ul>\n<p>Now everything is streamlined, standardized, and centralized.<\/p>\n<p>Vendor Compliance: the group that manages BAAs to make sure that they don\u2019t agree to things that they don\u2019t like about vendors.\u00a0They take part in notification in the event that there\u2019s a breach. They created a manual process for conducting breach risk assessments\u00a0and applied the plan to previous breaches to vet approach.\u00a0Create plan to notify all known BAs about the HITECH implications. Your exposure is not going to come from someone breaking into the network. Exposure is going to come from someone making a spreadsheet, and then saving it on a device that gets lost or stolen.<\/p>\n<p>They created a HFHS branded data breach response program so the workers could get more information and understand what the program does, and what protocol is in the event of a breach. That way people can react appropriately.\u00a0Decided that it was the hospital&#8217;s responsibility to educate the BA on what their responsibility is in order to protect patient data.<\/p>\n<p>Lessons Learned:<\/p>\n<ul>\n<li>BAs don\u2019t always understand requirements and you are \u2018protector\u2019 of data<\/li>\n<li>Ensure incident response plan is communicated effectively to BAs<\/li>\n<li>Document any education or risk assessments that you provide or conduct on your BAs<\/li>\n<li>Ensure your BAA gives you ability to terminate relationship in the event of a breach or failed risk assessment with no penalty to you.<\/li>\n<\/ul>\n<p>Things to Consider:<\/p>\n<ul>\n<li>Assess your organization\u2019s culture to determine the best approach for BA breach response<\/li>\n<li>Risk tolerance assessment<\/li>\n<li>Rapid response teams<\/li>\n<li>Branding opportunities<\/li>\n<li>Communication strategy<\/li>\n<li>Breach response partners<\/li>\n<li>Continuous education<\/li>\n<li>Elimination of immediate risk (the low hanging fruit. Get encrypted flash drives, for example.)<\/li>\n<\/ul>\n<p>Implement the following formalized programs:<\/p>\n<ul>\n<li>BA educational program<\/li>\n<li>BA risk assessment program<\/li>\n<\/ul>\n<hr \/>\n<p><em><strong>IT Security &#8211; Indirect Threats to Patient Data<\/strong><\/em><br \/>\nAdam Goslin, Chief Operations Officer with High Bit Security<\/p>\n<p>IT security trends:<\/p>\n<ul>\n<li>Medical community targeted<\/li>\n<li>Increase in small scale breaches (different than in the past, when it was big businesses. Now, bigger businesses have raised their security bar, so hackers have moved to smaller businesses where security is still lagging)<\/li>\n<li>Lost\/stolen devices (phones, laptops, tablets)<\/li>\n<li>Social networking exposure (causing problems by exposing data more easily and frequently)<\/li>\n<li>Data encryption (not the end-all solution)<\/li>\n<li>Data breach notification regulations<\/li>\n<li>Mobile threats (with the upswing of mobile devices, mobile device insecurities and vulnerabilities)<\/li>\n<li>Critical infrastructure attacks<\/li>\n<li>Consumers leave\/avoid after security attack<\/li>\n<\/ul>\n<p>Recent medical security events:<\/p>\n<ul>\n<li>9.12.12 CSO for Alaska Dept Health fined 1.7M<\/li>\n<li>8.31.12 Cancer Care Group 55,000 records exposed<\/li>\n<li>7.25.12 15% of FDA medical device recalls raise security and privacy concerns<\/li>\n<li>6.15.12 Memorial Sloan-Kettering Cancer Center gives patient data away via PowerPoint presentation<\/li>\n<\/ul>\n<p>Targeted attacks<\/p>\n<ul>\n<li>Specific institutions or companies.<\/li>\n<li>Insider threats (disgruntled employees, for example)<\/li>\n<li>Hacktivism<\/li>\n<li>Defacing web pages<\/li>\n<li>Denial of Service attacks<\/li>\n<li>Outing of private information (passwords and credit card lists)<\/li>\n<\/ul>\n<p>Head of interpol stated:<br \/>\nMay 2012 &#8211; Cost of cybercrime is larger than the combined costs of cocaine, marijuana, and heroin trafficking.<\/p>\n<p>The US government is building a \u2018hacking monitoring facility.\u2019<br \/>\nBreach costs are presently averaged at $194 per record.(this includes detection, escalation, notification, resolution and after-the-fact response). At 2000 records, you\u2019re already up to $388,000. There are huge costs associated with a breach.<\/p>\n<p>Why is it so difficult to maintain security?<\/p>\n<ul>\n<li>Security covers a huge range of devices and channels, from websites to mobile apps to special medical equipment.<\/li>\n<li>Security is a specialty. Developers and administrators may be good at what they do, but they may not be the best security advisors, because that\u2019s not their specialty.<\/li>\n<\/ul>\n<p>Two questions to ask about your security:<\/p>\n<ul>\n<li>Where are my security holes today? Found via testing<\/li>\n<li>How do I create an environment that is as secure as possible?\u00a0This is a big, and very difficult question to answer.<\/li>\n<\/ul>\n<p>75% of total data loss happened or were targeted towards medical facilities\/business.<\/p>\n<p>Malware and Worms:<br \/>\nThese pieces of software show up from email, the web, USB drives<\/p>\n<ul>\n<li>Malware: usually working to get protected data, display adware, stop operations<\/li>\n<li>Worms: these replicate themselves.<\/li>\n<li>Phishing is working to get data by acting like it\u2019s something it\u2019s not (an example would be an email that looks like it\u2019s from Facebook, but then when you click on the link, it takes you to a malicious site)<\/li>\n<li>Botnets: computers that are controlled by a different server. Your computer becomes something of a puppet in order to administer a malicious attack.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Online Tech is liveblogging from the Michigan HIMSS 2012 Fall conference, HITECH Status in Michigan: Navigating the Future of Electronic Health Records at the Crown Plaza Hotel Detroit-Novi. Stay informed with our updates throughout the conference! If you&#8217;re attending, don&#8217;t miss Online Tech President and COO Mike Klein&#8217;s presentation, Security and Compliance for Processing Facilities, at 10:30AM ET with Gail Einhaus, Compliance, Education and Privacy Officer of Trinity Health. 9:00AM &#8211; Keynote Presentation: HITECH: Evolving to the Next Stage Mary Griskewicz, MS &amp; HIMSS fellow, Senior Director Healthcare Information Systems, will kick off the MI HIMSS conference momentarily! Some memorable quotes: Mary&#8217;s challenge for those in healthcare: how will YOU bring meaning to #MU Meaningful Use? How will what you do today help patients, reduce costs, or improve care? When you realize a small hospital can have over 100 different info systems, it&#8217;s no wonder #MU2 stresses &#8220;exchange&#8221; and &#8220;interoperability&#8221;. Think internet connectivity isn&#8217;t holding healthcare back? Some clinicians still need 1G. &#8211; Mary Griskewicz, FHIMSS We don&#8217;t need to invest in infrastructure? &#8220;Most countries in Africa have better internet connectivity than the rural US.&#8221; &#8211; Mary Griskewicz. Michigan: until our physicians can answer what % of their patients received&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2056","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Liveblogging from MI-HIMSS! | OTAVA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/liveblogging-from-mi-himss\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Liveblogging from MI-HIMSS!\" \/>\n<meta property=\"og:description\" content=\"Online Tech is liveblogging from the Michigan HIMSS 2012 Fall conference, HITECH Status in Michigan: Navigating the Future of Electronic Health Records at the Crown Plaza Hotel Detroit-Novi. Stay informed with our updates throughout the conference! If you&#8217;re attending, don&#8217;t miss Online Tech President and COO Mike Klein&#8217;s presentation, Security and Compliance for Processing Facilities, at 10:30AM ET with Gail Einhaus, Compliance, Education and Privacy Officer of Trinity Health. 9:00AM &#8211; Keynote Presentation: HITECH: Evolving to the Next Stage Mary Griskewicz, MS &amp; HIMSS fellow, Senior Director Healthcare Information Systems, will kick off the MI HIMSS conference momentarily! Some memorable quotes: Mary&#8217;s challenge for those in healthcare: how will YOU bring meaning to #MU Meaningful Use? How will what you do today help patients, reduce costs, or improve care? When you realize a small hospital can have over 100 different info systems, it&#8217;s no wonder #MU2 stresses &#8220;exchange&#8221; and &#8220;interoperability&#8221;. Think internet connectivity isn&#8217;t holding healthcare back? Some clinicians still need 1G. &#8211; Mary Griskewicz, FHIMSS We don&#8217;t need to invest in infrastructure? &#8220;Most countries in Africa have better internet connectivity than the rural US.&#8221; &#8211; Mary Griskewicz. Michigan: until our physicians can answer what % of their patients received...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/liveblogging-from-mi-himss\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2012-09-25T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/MI-HIMSS-Keynote.jpg\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/liveblogging-from-mi-himss\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/liveblogging-from-mi-himss\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Liveblogging from MI-HIMSS!\",\"datePublished\":\"2012-09-25T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/liveblogging-from-mi-himss\/\"},\"wordCount\":2035,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/liveblogging-from-mi-himss\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/MI-HIMSS-Keynote.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/liveblogging-from-mi-himss\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/liveblogging-from-mi-himss\/\",\"url\":\"https:\/\/www.otava.com\/blog\/liveblogging-from-mi-himss\/\",\"name\":\"Liveblogging from MI-HIMSS! | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/liveblogging-from-mi-himss\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/liveblogging-from-mi-himss\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/MI-HIMSS-Keynote.jpg\",\"datePublished\":\"2012-09-25T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/liveblogging-from-mi-himss\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/liveblogging-from-mi-himss\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/liveblogging-from-mi-himss\/#primaryimage\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/MI-HIMSS-Keynote.jpg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/MI-HIMSS-Keynote.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/liveblogging-from-mi-himss\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Liveblogging from MI-HIMSS!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Liveblogging from MI-HIMSS! | OTAVA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/liveblogging-from-mi-himss\/","og_locale":"en_US","og_type":"article","og_title":"Liveblogging from MI-HIMSS!","og_description":"Online Tech is liveblogging from the Michigan HIMSS 2012 Fall conference, HITECH Status in Michigan: Navigating the Future of Electronic Health Records at the Crown Plaza Hotel Detroit-Novi. Stay informed with our updates throughout the conference! If you&#8217;re attending, don&#8217;t miss Online Tech President and COO Mike Klein&#8217;s presentation, Security and Compliance for Processing Facilities, at 10:30AM ET with Gail Einhaus, Compliance, Education and Privacy Officer of Trinity Health. 9:00AM &#8211; Keynote Presentation: HITECH: Evolving to the Next Stage Mary Griskewicz, MS &amp; HIMSS fellow, Senior Director Healthcare Information Systems, will kick off the MI HIMSS conference momentarily! Some memorable quotes: Mary&#8217;s challenge for those in healthcare: how will YOU bring meaning to #MU Meaningful Use? How will what you do today help patients, reduce costs, or improve care? When you realize a small hospital can have over 100 different info systems, it&#8217;s no wonder #MU2 stresses &#8220;exchange&#8221; and &#8220;interoperability&#8221;. Think internet connectivity isn&#8217;t holding healthcare back? Some clinicians still need 1G. &#8211; Mary Griskewicz, FHIMSS We don&#8217;t need to invest in infrastructure? &#8220;Most countries in Africa have better internet connectivity than the rural US.&#8221; &#8211; Mary Griskewicz. Michigan: until our physicians can answer what % of their patients received...","og_url":"https:\/\/www.otava.com\/blog\/liveblogging-from-mi-himss\/","og_site_name":"OTAVA","article_published_time":"2012-09-25T00:00:00+00:00","og_image":[{"url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/MI-HIMSS-Keynote.jpg","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/liveblogging-from-mi-himss\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/liveblogging-from-mi-himss\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Liveblogging from MI-HIMSS!","datePublished":"2012-09-25T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/liveblogging-from-mi-himss\/"},"wordCount":2035,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/liveblogging-from-mi-himss\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/MI-HIMSS-Keynote.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/liveblogging-from-mi-himss\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/liveblogging-from-mi-himss\/","url":"https:\/\/www.otava.com\/blog\/liveblogging-from-mi-himss\/","name":"Liveblogging from MI-HIMSS! | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/liveblogging-from-mi-himss\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/liveblogging-from-mi-himss\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/MI-HIMSS-Keynote.jpg","datePublished":"2012-09-25T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/liveblogging-from-mi-himss\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/liveblogging-from-mi-himss\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/liveblogging-from-mi-himss\/#primaryimage","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/MI-HIMSS-Keynote.jpg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/MI-HIMSS-Keynote.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/liveblogging-from-mi-himss\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Liveblogging from MI-HIMSS!"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2056","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2056"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2056\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2056"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2056"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2056"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2056"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}