Office of Mental Health Wireless Communication Project April 24, 2002.

Slides:



Advertisements
Similar presentations
Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
Advertisements

Encrypting Wireless Data with VPN Techniques
Mobile phone based real time solution to track completed / in progress work The programme officer initiates the work by capturing the site image, GPS.
McAfee One Time Password
Wireless network Usually use Radio Frequency (RF) technology Adv :
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Introduction Total Recall – The Innovative and Professional Choice in Communications Recording V
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
POC Security System High security system combining PIN-on-Card, information security, physical access, control and alarm – all in one system.
Supporting The Mobile Client: Expanding Our Borders John Guidone Manager, Desktop Technologies and Dawn E. Colonese Manager, Help Desk & Client Access.
1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
The Remote Workplace Designing, deploying, and supporting the remote workplace environment Presented by: John Milhoan Information Technology Cooperative,
HIPAA Security Standards What’s happening in your office?
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Principles of Information Technology
Bar|Scan ® Asset Inventory System The leader in asset and inventory management.
Remote Networking Architectures
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
Computerized Networking of HIV Providers Networking Fundamentals Presented by: Tom Lang – LCG Technologies Corp. May 8, 2003.
Chapter 10 Remote Access and Wireless Networking Business Issues Logical & Physical Topology Technology: Hardware & Software, & Wireless Personnel Communication.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
PPT Slides by Dr. Craig Tyran & Kraig Pencil Computer Networking – Part 2 MIS 320 Kraig Pencil Summer 2014.
Communications & Networks
6-1 Extranet Uses. 6-2 Case 2: Maryland and Colorado Serving their customers without using wires Earth Alert Emergency Management System in Maryland provides.
“web to wireless” Technology. A LEADER IN web to wireless ASSET MANAGEMENT ROM Communications Inc.
Component 4: Introduction to Information and Computer Science Unit 1: Basic Computing Concepts, Including History 1 Health IT Workforce Curriculum Version.
DECT Data Applications Contents DECT Data Application Scenarios DECT Data Interoperability DECT Data Standards DECT Data Trends Conclusions.
1 WHY NEED NETWORKING? - Access to remote information - Person-to-person communication - Cooperative work online - Resource sharing.
Business Data Communications, Stallings 1 Chapter 1: Introduction William Stallings Business Data Communications 6 th Edition.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Corporate Information Systems Delivery of Infrastructure IT Services.
Health Information Technology Basics January 8, 2011 by Leola McNeill adapted from Information Technology Basics by June 2009, Kayla Calhoun & Dr. Frank.
Group 2: Marco Hidalgo Wesley Lao Michelle Marquez-Lim
Copyright 2005 Agilis Systems, Inc. All rights reserved. intelligent Business Integration System Agilis Systems, Inc. Phone: (314) Fax: (314)
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Introduction to Information and Computer Science Basic Computing Concepts Including History Lecture c This material (Comp4_Unit1c) was developed by Oregon.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Section 2 Section 2.1 Identify hardware Describe processing components Compare and contrast input and output devices Compare and contrast storage devices.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
An innovative, electronic personal health record Overview.
Week 12 (2012) Dr. Ghada Drahem. INTENDED LEARNING OUTCOMES This lecture covers: Networking concepts and terminology Common networking and communications.
Component 4: Introduction to Information and Computer Science Unit 1: Basic Computing Concepts, Including History Lecture 3 This material was developed.
Networks.
Computers Are Your Future Eleventh Edition
Introduction to Information Systems Lecture 06 Telecommunications and Networks Business Value of Networks Jaeki Song.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Component 8 Installation and Maintenance of Health IT Systems Unit 1b Elements of a Typical Electronic Health Record System This material was developed.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
1 © 2007 Chapter 10 Information Technology and Systems Infrastructure Assessment.
Implementing EHR in Home Health Care Component 11/Unit 9d An example on the Implementation of a Point of Care System.
Higher Computing Networking. Networking – Local Area Networks.
IT Services Model Business Requirements IT Strategies Goals
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Component 8/Unit 1bHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 1b Elements of a Typical.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Clouding with Microsoft Azure
Computers in the Ambulatory Care Setting
CLOUDENTIFY.
Chapter 7. Identifying Assets and Activities to Be Protected
Principles of Information Technology
Presentation transcript:

Office of Mental Health Wireless Communication Project April 24, 2002

Project Overview Primary focus to support the clinical agenda Promote safety for patients and staff Monitor Mobile Assets Providing information at point of use HIPAA Compliant Partnership with vendor Rapid delivery schedule Targeted solution Concept investment by OMH and Vendor Available off the shelf technology and software

History of Wireless Wireless Lan at OMH Introduced November of 2001 Communication protocol b Unsecured for confidential information Signal leak of 3/8 mile outside of building Flexible options for infrastructure Solution for confidential information V-LAN with VPN for encryption

History of Wireless Wireless WAN at OMH Began July of 2001 Concept of mobile computing for staff New direction for OMH and vendor technology based on cell modem Compaq’s iPAQ  Windows CE 3.0  OMH infrastructure difficult to integrate Choices and options have changed

Wireless Hardware Platform Compaq iPAQ  3670 Pocket PC Fujitsu LT P-600 Tablet PC  Sprint PCS 510 Air Card  - CELL Verizon Air Card  – CDPD GPS Receiver - Teletype  or Pharos 

Off the Shelf Software Suite Pocket Streets and Trips 2002  Physician Desk Reference  PDR Desk Top Software – MSWord  etc Signature Signon OMH Applications MHARS  – Electronic Medical Record GroupWise  – Web based Dragon Naturally Speaking 6  – Tablet only

Technical Overview for Security HIPAA Compliant – Privacy and Security iPAQ  / Tablet Protection - signature signon, RSA , password and combination of all three McAfee  Anti-Virus Encryption for Internet traffic is provided by a VPN or SSL Interfaces to standard OMH security protocol Hard Drive encryption iPAQ  - sqlserver database encryption Tablet – encryption Safeguard Easy 

Overview of Costs per Unit Compaq 3670 iPAQ  $ Fujitsu LT P-600  $3, Sprint Air Card 510  $ Cell 2 year $80.00/month Verzion Air Card 310  $ CDPD 2 Year $25.00/month GPS Hardware/Software $ Off the Shelf Software $ $100.00

AURORA iPAQ  Login Authorization MHARS  - iPAQ 1. User enables application and signs in. SALUTE (DLL) 2. User enters token for virtual connection 3. Server authenticates user using new SALUTE.DLL 4. Authorization message is sent back to iPAQ 5. Application is displayed with proper rights invoked. MHARS  - Server OMH - Server

Tablet Login A uthorization MHARS  - Server Virtual connection is already established AURORA (Oracle) OMH - Server 1. User enables application and signs in. 2. User enters token for virtual connection 3. Server authenticates user using SALUTE.DLL 4. Authorization message is sent back to tablet 5. Application is displayed with proper rights invoked.

GPS Communication Path

GPS and Emergency Notification Under development and testing Notification via SMTP to OMH Helpdesk via specifying last know position of user Helpdesk procedures to locate and advise Contact information for Local Authorities

Notification to Helpdesk

Downside of Wireless WAN Narrow bandwidth for cell connection Need to cradle for maintenance Coverage -too many dead spots If not CDPD then it’s expensive Cell service start-up is time consuming Anything but Web-based tough to run Battery time is short Re-connect options are manual Hardware is portable so are the problems

Downside of Wireless LAN Currently b is unsecured for confidential information OMH building not configured for wireless Hardware becomes portable so do the problems Must use VPN or other method for strong encryption – 128bit or higher

Upside of Wireless WAN Allows staff to communicate with others while in the field especially during emergencies Increases the safety/productivity of staff Allows real-time management of resources from Central Office Web Based Application best choice Client/Server possible although difficult

Upside of Wireless LAN Reduced effort for cabling Client/server applications work fine Computer support now mobile no longer office bound Messages and information at your fingertips Not much different from wired desktops

Closing Remarks Project is technology neutral Use of Corporate partnership Leverages investment in existing OMH infrastructure Technology is transportable Short development cycle with focus Base software components are replaceable

Contacts for more information Michael Mittleman Ph.D. Chief Information Officer Deputy Commissioner Scott Derby Project Coordinator Director Patient Systems Phone: