Deliver Secure Quality In-Home Patient Care Using the Simplicity of NFC

Similar documents
PATIENT AND STAFF IDENTIFICATION Understanding Biometric Options

Zebra Printing Solutions

A NATIONAL SURVEY OF MEDICAID READINESS FOR ELECTRONIC VISIT VERIFICATION

U.S. Department of Defense: Defense Logistics Agency (DLA) achieves unmatched agility through telework and BYOD strategy

WHITE PAPER: Extending Physician Collaboration. and Patient Care with Secure, High Definition Web Conferencing

Driving Business Value for Healthcare Through Unified Communications

Increasing security and convenience at Epic health systems

Maximizing the Return on a Telepresence Investment

Military medics save lives in the field, and now get some

WHITE PAPER. The four big waves of contact center technology: From Insourcing Technology to Transformational Customer Experience.

UP BILL PAYMENT 25% 30% 50% savings on document delivery costs. 3,600 clients trust ACI s industry-leading security and compliance

SPOK MESSENGER. Improving Staff Efficiency and Patient Care With Timely Communications and Critical Connectivity

COE. COE Snapshot APPLICATIONS & SERVICES CONNECTING OUR SOLDIERS EXAMPLE SERVICES. COE Enables. EcoSystem. Generating Force

TELEHEALTH FOR HEALTH SYSTEMS: GUIDE TO BEST PRACTICES

VMware AirWatch Guide for the Apple Device Enrollment Program (DEP) Using Apple's DEP to automatically enroll new devices with AirWatch MDM

VitalConnect. Saving lives and enhancing patient care through elegant healthcare solutions.

Unique Health Safety Identifier. Across The Continuum of Care

IMPROVING EFFICIENCY AND COST SAVINGS. Technology Solutions for NHS Hospitals

Mobilizing Your Mobile Workforce HOW MOBILE TECHNOLOGY STRENGTHENS EMPLOYEE PERFOR- MANCE, PARTNER RELATIONSHIPS AND CUSTOMER GROWTH

10 Things To Know About

Dangerous Game of Battleship. A Dangerous Game of Battleship 6/3/2015. New models bypass traditional providers

COLLABORATING FOR VALUE. A Winning Strategy for Health Plans and Providers in a Shared Risk Environment

AUSA BACKGROUND BRIEF

Scaling Remote Patient Monitoring to over 60,000 Patients, Where One Device Does Not Fit All

The creative sourcing solution that finds, tracks, and manages talent to keep you ahead of the game.

NINE TIPS TO BRING ORDER TO HOSPITAL COMMUNICATION CHAOS

State Policy in Practice

Transforming traditional case management through local provider partnerships

BACS Evidence Management System The Real ROI. White Paper Developed with the Assistance of North Andover Police Department

We Simplify Medication Management

work without walls Best Business Practices to Enable Remote Working By Rieva Lesonsky

Social- Powered Recruiting Embracing the Potential of Social Networking for Recruitment

Android Guide January 2017

Mobile App Process Guide

Assessment. SMP Foundations Training Kit. Table of Contents

About Humanscale Healthcare

The future of patient care. 6 ways workflow automation will transform the healthcare experience

Recruiting Game- Changing Talent

The American Recovery and Reinvestment Act: Incentivizing Investments in Healthcare

Request for Proposals Marketing, Communications, and Website Management, Social Media

Insight Driven Health. Top 10. Healthcare Game Changers Canada s Emerging Health Innovations and Trends

ABOUT TIGR PATIENT BENEFITS HOSPITAL BENEFITS. Patient-Specific Education. Engaged Patient Population. Improved Nursing Efficiency

Impact of OK AuthentiCare Electronic Visit Verification (EVV) on ADvantage Program Budget

Sage Nonprofit Solutions I White Paper. Utilizing Technology to Manage and Win Grants. For the Nonprofit and Government Sectors

KEY CONSIDERATIONS: Thermal Barcoded Infant Wristbands

YOUR BUSINESS CAN T WAIT for VoIP

PATIENT RECRUITMENT & RETENTION

Telehealth Services AMWELL.

RFP for Mobile Application for IBEF. Request for Proposal [RFP]

Courts Service ICT Strategy Statement

C4ISR-Med Battlefield Medical Demonstrations and Experiments

A Five-Step Roadmap to Building Your Mobility Strategy

Four Game-Changing Strategies for Transforming the Patient Experience

Introduction. The Rise of the Mobile Office. One in five employees worldwide telecommutes regularly. One in ten works remotely full-time.

SEVEN SEVEN. Credentialing tips designed to help keep costs down and ensure a healthier bottom line.

PARTNER FOR PROFIT. Reap the Rewards of the Fieldprint Station Site Network Partner Program

The Value of Creating Simple and Seamless Collaboration

How to Improve HEDIS Reporting Among Providers and Improve Your Health Plan Rankings

RISK MANAGEMENT BULLETIN

Five ways to be more productive at work

Connecting Care Across the Continuum

Atos Global FinTech program: A catalyst for innovation in Financial Services

Elderly Simplified Application Project Guidance

Healthcare mobile communication solution:

Alaris Products. Protecting patients at the point of care

Small business Big ambitions

Optum capability landscape. Modernising infrastructure. Advancing care. Empowering consumers.

DEPUTY SECRETARY OF DEFENSE 1010 DEFENSE PENTAGON WASHINGTON, D.C

SUBMISSION FORM

A Solutions Road map for an Optimal Healthcare Experience.

2018 Plan Year State Employees Prescription Drug Plan

Patient Safety It All Starts with Positive Patient Identity APRIL 14, 2016

EMS LIVE! CONFERENCE. What s New in the EMS Kiosk App. Harlean Stevenson. Product Manager EMS Software. October 15-17, 2017

VMware AirWatch Guide for the Apple Device Enrollment Program (DEP) Using Apple's DEP to automatically enroll new devices with AirWatch MDM

Optum Anesthesia. Completely integrated anesthesia information management system

How to Develop a System-Wide Access Strategy

New Ways of Working - How Cross-Boundary Collaboration is Transforming Business

BT: leading the way in healthcare IT

Eligibility verification findings

The primary care pressure cooker

Vodacom works with the SA Ministry of Health and local NGOs to provide better healthcare

2010 HOLIDAY GIVING. Research and Insights into the Most Charitable Time of the Year THIS RESEARCH INDICATES:

BIOMETRICS IN HEALTH CARE : A VALUE PROPOSITION FROM HEALTH CARE SECTOR

Care Plan Management and Visit Verification Using ecare21 Mobile App.

JABRA + LYNC FOR OFFICE 365 Enabling the power of conversation

Dave Tuttle Director, Digital Strategy TMP Worldwide TMP Worldwide. The Digital Brand Authority.

Recommendations for Adoption

Healthy Kids Connecticut. Insuring All The Children

Happy patients, healthy patients. Solutions for interactive patient care

Moving from HASP HL to Sentinel LDK Migration Guide

RFID-based Hospital Real-time Patient Management System. Abstract. In a health care context, the use RFID (Radio Frequency

Perspective: Case Study Emerging Care Management Models in Developing Countries

White Paper: Mobilizing Patient Care. Mobile Solutions Are a Game Changer for Hospital-Based Nurses

bd.com Pyxis Enterprise Server

LotusLive. Working together just got easier Online collaboration solutions for the working world

DEPARTMENT OF DEFENSE AGENCY-WIDE FINANCIAL STATEMENTS AUDIT OPINION

REQUEST FOR PROPOSAL (RFP) 360 TOUR

title here edit on Slide Master Safety, By Public Safety

Cisco Connected Real Estate for Healthcare: Changing How Hospital Real Estate is Developed, Used, and Managed

Introducing a new class of fire detection

Transcription:

Deliver Secure Quality In-Home Patient Care Using the Simplicity of NFC HID Global and its technology partners empower a secure, accountable, and accurate Electronic Visit Verification (EVV) Solution. Hospital to Home The demand for home healthcare services will escalate through the year 2030, in response to the expanding population of people over 60 years of age. The over-60 age group is the fastest growing segment of the world population. Currently accounting for nearly 300 million people in developed countries, or 24 percent of their total populations, the number of people 60-years-and-older is projected to exceed 375 million by 2030, 29 percent of the total.* For a significant portion of this populace, better quality care may be delivered more cost effectively by dispatching healthcare professionals to patient homes, rather than concentrating patient care in traditional hospitals, clinics and nursing homes. Home care also offers the potential to reduce demand for healthcare infrastructure that population growth may otherwise necessitate. With this significant shift, discussions as to how to best cut spending and combat billing fraud are on the forefront amongst federal legislators and healthcare administrators. The National Health Care AntiFraud Association (NFCAA) estimates that the financial losses due to healthcare fraud are in the tens of billions of dollars each year. Even so, financial losses are only part of the story. The human factor is also of issue when medical records are compromised or identities stolen in order to use someone else s legitimate insurance to submit falsified claims** There are a number of costs associated with delivering uncompromised patient care in the home, but the management of home based services can be costly, time-consuming and antiquated processes. Consider these factors: Providers need to be accurately paid while reducing excess and old processes. Agencies need to focus their efforts on the precise monitoring and delivery of quality care to inhome patients. Patients and family members need confidence that care is actually taking place and for the prescribed amount of time.

Combat Home Healthcare s Billion Dollar Dilemma Healthcare fraud comes in many forms, however the most common committed are: Billing for services that were never rendered by using genuine patient information obtained through identity theft, or Padding or fabricating entire claims with charges for procedures that did not take place. To combat these crimes and to manage their rapidly changing paradigm, healthcare organizations are using electronic visit verification solutions. EVV empowers communication with geographically dispersed health professionals, monitoring whether home health care is provided, to the right patient, for the prescribed amount of time. Additionally, EVV reduces and eliminates the potential for erroneous visits, as well as recording and billing errors. There are a number of EVV technologies available; however, there are also challenges to consider when determining which technology are best for your environment. Below is an explanation of how several of these options work: Traditional Telephony Home visits are called in using patients landlines and authenticated into EVV system through caller ID and voice biometrics. The challenge with this method is that traditional landlines are quickly disappearing, replaced by mobile. Additionally, there is significant implementation cost associated with this method. Display device A display device is mounted in the patient s home to generate a verification code. The code is entered in caregiver s mobile phone for visit verification. The challenge? Significant hardware costs associated with implementation and a high probability of human error entering verification codes. GPS Patient visit is verified through GPS location. The problem here, GPS does not provide a precise room within multi-unit housing buildings skewing audit records. NFC and BlueTooth - Provides visit verification when a caregiver taps their mobile device on a secure tag in the patient s home, which securely authenticates access to the EVV application. Implementing Secure Proof of Presence without Sacrificing Patient Care The nature of home healthcare makes it difficult to manage, especially monitoring mobile clinicians and ensuring care is delivered with accuracy. Home health agencies, insurance payers and family members require assurance of timely and appropriate care from qualified clinicians in patient homes. Adding secure EVV to current home healthcare applications allows all parties to trust that each visit actually happened in a secure automated environment. HID Global s Trusted Tag Services combine near field communication (NFC) technology and a cloudbased authentication platform to uniquely authenticate an assigned caregiver to a web application or mobile app, and to document each visit with the patient, their location and care services delivered during the visit. Leveraging NFC simplifies the caregiver s experience by using their mobile device to engage with the digital documentation platform and other healthcare applications in a secure environment. A simple automated experience allows clinicians to focus on their patient s care instead of all the paperwork. NFC Trusted Tags are securely placed in the patient s home or even a precise room. The tags are easily provisioned prior to deployment with the tap of an authorized NFC-enabled device. A simple tap on the secure tag with a mobile device is the only action each caregiver needs to deliver precise proof of presence, resulting in a digital record documenting and authenticating the caregiver s arrival and departure. 2

3

Secure NFC Tags Demarcate Unique Checkpoints HID Trusted Tags are available in a variety of sizes, shapes and component materials, enabling remote placement of unique NFC checkpoints anywhere within the home. HID Trusted Tag secure ID badge for the caregiver and tamper resistant labels are examples of tags imprinted for visible, secured placement in patient home. These tags are conspicuous reminders for staff members to complete their documentation, while reassuring patients of the connection to their care provider. Waterproof, comfortable ID Bands from HID Global may be worn by individual patients, requiring person-to-person contact for proof of presence. For more discreet tag placement, HID Global offers a wide selection of embeddable NFC/RFID transponders providing unique, trusted identity to practically any object, including medical equipment, supplies and home furnishings. Seamless EVV Integration into Existing Technology & Applications Securely mounted Trusted Tag on light switch, conveniently tapped by a caregiver as she enters or exits a room. Most field clinicians already possess and are familiar with using mobile NFC-enabled devices, allowing healthcare organizations to deploy a secure NFC EVV solution with no added investment in NFC reader infrastructure or training. Tens of millions of smartphones integrated NFC chipsets, including Android, Windows Phone and Blackberry devices. HID Cloud Authentication Services securely determines the authenticity of the caregiver s tap to the Trusted Tag. Encrypted data changes on every tap, blocking attempts to share, clone or manipulate NFC tags or URLs. Using frictionless cloud authentication and NFC technology, Home Healthcare agencies do not need to invest, develop, install, or manage additional applications to use. Additionally, there is no need to invest in new IT infrastructure equipment or software to manage. HID Trusted Tag Services uses single web service integration healthcare documentation software, clinical and administrative applications, streamlining the deployment of Trusted Tag Services. 4

Deliver Unprecedented Patient Care and Management, with confidence Integrating HID Global s Trusted Tag Services with digital documentation software or other healthcare management applications, healthcare agencies experience a secure EVV solution - precise proof of presence, organizational accountability and data accuracy, reducing the potential for billing fraud. Trust that you can stay true to the mission deliver quality care, comply with EVV mandates and billing requirements of insurance payers, including government programs. Undeniable Value and Benefits: Secure and Unique Taps Allows payers, caregivers and family to trust each visit actually happened. Effortless tap of an NFC mobile device to a Trusted Tag is secure and encrypted. Simple Integrations and Easy Adoption No need for additional reader and other equipment; eliminates related software development costs web and mobile app interaction eliminates the manual paperwork saving caregivers time and associated costs for visit verification. Proof of Presence and Identity Precise oversight and location of the prescribed visit and care delivered by the specific nurse or caregiver. Just as importantly, agencies have access to realtime data analytics for accurate billing and deeper insight into practical and effective care practices. In summary, HID Global Trusted Tag Services is at the heart of your EVV solution enhancing organizational communication empowering the mobile caregiver with familiar tools to deliver prescribed patient services in a safe, secure environment, with confidence. For more information, see the HID Trusted Tag overview and How it Works videos. About HID Global HID Global is the trusted source for innovative products, services, solutions, and know-how related to the creation, management, and use of secure identities for millions of customers around the world. The company s served markets include physical and logical access control, including strong authentication and credential management; card printing and personalization; visitor management systems; highly secure government and citizen ID; and identification RFID technologies used in animal ID and industry and logistics applications. The company s primary brands include ActivID, EasyLobby, FARGO, IdenTrust, LaserCard, Lumidigm, Quantum Secure and HID. Headquartered in Austin, Texas, HID Global has over 2,200 employees worldwide and operates international offices that support more than 100 countries. HID Global is an ASSA ABLOY Group brand. For more information, visit www.hidglobal.com hidglobal.com/rfid 2015 HID Global Corporation/ASSA ABLOY AB. All rights reserved. HID, HID Global, the HID Blue Brick logo, the Chain Design, HID Trusted Tag, IN Tag, Poly Tag, LogiTag and SlimFlex are trademarks or registered trademarks of HID Global or its licensor(s)/supplier(s) in the US and other countries and may not be used without permission. All other trademarks, service marks, and product or service names are trademarks or registered trademarks of their respective owners. 2015-12-01-hid-evv-trusted-tag-services-wp-en PLT-02661 *Source: United Nations, Department of Economic and Social Affairs, Population Division, 2015 **Source: National Health Care Anti-Fraud Association, 2015 5