Get faster access to critical information
Virtual desktops can transform the way computing services are deployed and managed. By Alex Weeks
he implementation of electronic healthcare sys- tems creates a huge challenge for IT. Not only do IT personnel face the challenge of implementing the application itself, but they also have to inte-
grate it with ever-changing healthcare processes. With many technologies, implementing and enforcing new processes can prove to be a big challenge. IT must find ways to create processes that minimize negative impact on users to ensure compliance. This is especially true when these processes have the potential to impact the revenue-generating portions of an organization.
In healthcare, every second counts. Anything that slows down a healthcare professional means a loss of revenue and potentially even a loss of life.
The current state of desktop computers and usage in many hospitals is abysmal. It can take a long time for a doctor or nurse to log into a computer and all of their required applica- tions – longer than many want to take. As a result, and because time is money, they find a way around doing this. Many users simply won’t log in or out of a computer. They will just leave computers logged in as the last person who was there, and use it as is. If IT is empowered to enforce security policies to prevent this, healthcare professionals still find a way around needing to log in and out of all of their various applications. Far too often, there will be a Post-it Note somewhere with the password to unlock the screen or log in. Just look on the monitor or under the keyboard.
This creates a number of compliance nightmares when trying to implement EMR/EHR, two of the biggest being the ability to secure patient data, and the ability to audit patient care. If the computer is always logged on, or if the password to unlock it is taped to the monitor (or someplace else easy to find), then it’s just as insecure as if it wasn’t locked at all. Policies need to be written and enforced to secure applications and data, preventing unauthorized access. However, these policies can be difficult – if not impossible – to enforce; when they impact clinician productivity, they are often viewed as obstacles. The goal is to remove these obstacles or minimize them to the point where they are so minor that the clinician is not challenged by them.
When it comes to the ability to audit patient care, health- www.healthmgttech.com
care organizations need to be able to track who did what and when they did it. If a nurse admin- isters medication to a patient, the medication,
Alex Weeks is virtualization practice manager, Kovarus. For more on Kovarus: www.rsleads.com/210ht-207
dosage and time it was administered need to be accurately recorded. The same thing is true when logging any other procedures. If everyone is working off a single user account that never gets logged out, it becomes impossible to have that accountability. This can create an expensive nightmare if the organization is audited or involved in a lawsuit. Not only is the healthcare organization at risk, but the individual healthcare professional whose account the procedure was logged under could be blamed for improper care. However, to enforce a desktop policy that is perceived as slow or painful can be near impossible. If a healthcare professional can treat 10 patients an hour, that is what the hospital can bill for. If the introduction of password policies reduces his ability to treat patients to five an hour, that’s lost revenue – not only to the hospital, but also to individual doctors who may bill separately from the hospital for their services. It’s hard to make a case for security and compliance when the money makers of the organization are impacted by that policy and want it to go away. In many cases, security and compliance vs. revenue, IT will most likely lose. The problem is, when an audit or lawsuit happens, who’s going to take the heat? To add to these challenges is the ever-growing popularity of tablet computers. Regardless of whether it’s an iPad or an Android-based tablet, more and more doctors want to be able to use these instead of, or in addition to, hospital-supplied computers. The challenge with this is how to ensure patient privacy. What happens if that device is lost or stolen? How do we ensure patient privacy and that no data was cached locally to the device?
How do we ensure compliance, streamline log in/log out processes and lay a solid foundation for an EMR/EHR deploy- ment? Virtual desktop infrastructure (VDI) can be the answer in many cases. VDI enables organizations to transform the way desktop services are deployed and managed. By taking a
HEALTH MANAGEMENT TECHNOLOGY
Continued on page 17 9