How we’re working to improve the clinician experience
By Craig Norquist, MD, chief medical information officer
KLAS Arch Collaborative survey
Results from the KLAS Arch Collaborative survey are in, and we are excited to share them with you.
Results will be shared:
- During departmental meetings, when possible.
- During the October planned Clinician Technology Experience Council (CTECH) meeting. (Please see below to sign up for CTECH.)
Clinician Technology Experience Council
Another reminder that our Clinical Technology Experience Council (CTECH) meetings take place every other month on the third Wednesday at 5 p.m.
- Last meeting, we discussed Epic Cosmos data set, Hippocratic AI and communications platforms.
- Previously, we also demonstrated the virtual nursing program, prior Arch Collaborative results, Ambient tech, augmented draft responses and other topics.
We will use this venue to show upcoming features to Epic as well as other technology advances.
Use this link to sign up and obtain the calendar request for the meetings.
Weight bearing status
As we continuously review our order sets and the components of them, we occasionally find confusing or incomplete orders that could be accomplished better or more specifically.
- Attached is an example of how we are changing the weight bearing status orders so that they are more appropriate and better understood.
- We are also in the process of cleaning up orders for ambulation as there are multiple confusing and redundant orders present for weight bearing.
Secure chat texting of orders
We are working on enabling a feature within Epic Secure Chat that will allow users to send orders to be signed by physicians when they are not at a workstation using Secure Chat.
- Previously this was not allowable, but the rules have since been softened to allow orders to be placed via text as long as it is on a secure text messaging platform.
- We will need to wait for legal/compliance review as well as changes to our medical staff governance documents to allow this feature to be used. Stay tuned for more details soon.
Cybersecurity and passwords
Reminder: When your password expires you will need to use a longer, 12-character password or passphrase for access.
Please consider using something different than you use for other passwords into websites outside of work.
- For example, your Netflix password or passphrase should not be the same as your HonorHealth passphrase in order to maintain security.
Also, for those of you who use two-factor authentication, only “authorize” a login prompt if you are sitting at the computer that needs to be logged into.
- Oftentimes, the dual factor authenticator app may prompt you at a timed interval, but there are times where it might be someone unauthorized trying to get into the network.
- If you are prompted to authorize a login, simply ignore it as this will deny the potential access. If you were to say “No”, you are likely to have your account locked for security reasons and will need to contact the service desk to unlock your account.
For any other security questions or concerns, please reach out to the information security team.
Artificial Intelligence and PHI
Many of you are interested in how we can leverage Artificial Intelligence (AI) and more specifically, generative AI in healthcare. We will soon have various opportunities to become more literate on AI uses and where HonorHealth is at in regards to AI.
Many are aware that we are being careful but diligent in rolling out new use cases to help you improve your ability to care for patients, but some might feel that we are moving too slow. There is a lot of potential risk involved with many of these tools, and we are doing what we can to protect you, our patients and the organization from unnecessary risk that may be introduced unknowingly.
Until we have secure platforms, please do not put any protected health information (PHI) into any of the commercially available websites or tools such as ChatGPT, Gemini or Co-pilot (large language model {LLM}). Obvious PHI includes name, address, medical record numbers, but also includes images or other biometric identifiers that might be used to triangulate back to determine an individual’s identity. If you are not sure if something is PHI, it is best to either not enter it or ask someone in compliance for direction. You should also assume anything entered into a commercially available LLM is not secure and becomes available for training models and can be discovered by the public.
Questions or concerns? Please reach out to me directly or to any of the informatics team members.