This document discusses the technical requirements and considerations for implementing an electronic medical records (EMR) system. It covers desktop and portable device specifications, network infrastructure including servers, security measures like virus protection, remote access options, printer and scanner support, data backup solutions, and the importance of ongoing maintenance and support for the IT systems that support the EMR. Proper planning and management of these IT systems and connections is necessary to ensure compliance, continuity of operations, and support for the EMR and related clinical applications.
2. What You Need to be Aware of Desktop specifications Tablet requirements/Preferences Virus Protection Switchgear Server requirements for local applications VPN/Firewall Wireless Access Printers and Scanners. Backup and Data recovery Management and Maintenance of your Network
3. At Your Desk Do your workstations match the requirements of the EMR? Processor Memory Hard Drive Operating System Network and Graphic cards
4. Portable Devices Tablet, laptop or PDA Processor Memory Hard Drive Operating System Network and Graphic cards
5. No More “Sick Visits” Virus protection against Spyware Malware Trojans Malicious Downloads
6. The Center of It All Switchgear 10/100 or Gigabit ASP or Local Internet connection Printing Upload and download speeds.
7. Local Applications How will your EMR receive access? SMB server Terminal SQL Remote Access Hosted Applications
8. Connecting to the Outside World Eathernet connections VPN Cable Fiber P2P Fail over
11. HIPPA Compliance How are you protecting your files? Encryption Retrievable Replaceable Keeping you running in a disaster Offsite storage
12. Business Continuity Monitoring and Maintenance Your Brothers nephews cousin? Desktop Phone support Remote support 24x7x365 Monitoring Proactive approach Automated Security Firewall Protection On site support
13. Server Management Unlimited Phone and Remote Support Availability Monitoring Emergency Support 24x7x365 monitoring Event logs Drive Space Monitoring Security Anti-virus and Software management Application Support Back up Monitoring Database and Critical Application Support
14. Who to Turn to In house Outsourced solution IT staff Multiple disaplines High availability Predictable Service High accountability