Mobile Technology Resources for the Field Based Employee. Kelly Aldridge Vice President of Sales and Marketing Home Solutions, Hammonton, NJ

Size: px
Start display at page:

Download "Mobile Technology Resources for the Field Based Employee. Kelly Aldridge Vice President of Sales and Marketing Home Solutions, Hammonton, NJ"

Transcription

1 Mobile Technology Resources for the Field Based Employee Kelly Aldridge Vice President of Sales and Marketing Home Solutions, Hammonton, NJ 1

2 CE Credit in Five Easy Steps! 1. Scan your badge as you enter each session. 2. Carry your Evaluation Packet to every session so you can add session evaluation forms to it. 3. Track your hours on the Statement of Session Attendance Form as you go. 4. At your last session, total the hours and sign both pages of your Statement of Session Attendance Form. Keep the PINK copy for your records. Put the YELLOW and WHITE copies in your Evaluation Packet. Make sure a completed Session Evaluation Form is in your Evaluation Packet for each session you attended. Missing one? Extras are in a file near Registration. 5. Complete the General Attendance Evaluation Form located in your Evaluation Packet and place it back in your envelope. Write your name on the outside of your Evaluation Packet envelope, seal it, and drop it in the box near Registration. Applying for Pharmacy CPE? If you have not yet registered for an NABP e Profile ID, please visit to do so before submitting your packet. You must enter your NABP e Profile ID in order to receive CE credit this year! 2

3 Disclosure Slide The speaker declares no conflicts of interest or financial interest in any service or product mentioned in this program. Clinical trials and off label/investigational uses will not be discussed during this presentation. 3

4 Learning Objectives Name 3 uses of technology applications to assist in time management, document management, and health care resources. Identify "Best Use" applications for business integration with referral entities; ex. physicians, home health agencies, etc. Site opportunities and risks associated with mobile applications and protected health information (PHI). 4

5 5

6 The Stats Reference: Punchkick Interactive Media 6

7 Reference: Punchkick Interactive Media 7

8 Reference: Punchkick Interactive Media 8

9 9

10 Why Use Technology Time Management Innovation 10

11 Time Management Cloud Document Storage CRM Applications Expense Applications 11

12 Efficiency Money Hour Interruptions Copying & Faxing Phone Calls s Traffic Routing Mobile Scanning Solutions Do Not Disturb Options Real time Traffic Alerts Text to Voice Applications Route Applications 12

13 Innovation Campaign Social Media Marketing Presentations 13

14 Health Care Mobile Resources Drugs Interactive Images Prescribers E Docs & EMR Photos Many of the top 5 free medical apps in 2013 were related to drug education and access to the Electronic Medical Record. 14

15 Breakout Exercise List current business challenges you or your staff experiences when in the field. What technology tools or resources could you use to solve these problems? 15

16 Breakout Exercise Share e programs or apps that you have used in your job or for your customers. Ex. Marketing, Social Media, Presentations, Medical Journals 16

17 Breakout Exercise Recap Shared Experiences Cool Factor Best New App Customer Impact Resource 17

18 Data Protection A recent survey of 600 U.S. hospital executives, physician organizations, health insurers, Mobile theft accounted for 66 and pharmaceutical/life sciences companies found that theft accounted for 66% of reported data breaches over the past two years. Reference: Center for Democracy and Technology, HIPAA Security Rule Compliance When Communicating with 18 Patients Using Mobile Devices, (January 2011).

19 Data Protection Risks Associated with ephi on mobile devices: Authentication Encryption Wi Fi Connectivity HIPAA Security Rule: Administrative Safeguards Physical Safeguards Technical Safeguards 19

20 Safeguards Keep an inventory of mobile devices for health care professionals. Storing mobile devices in locked offices or locked location (car). Installing radio frequency identification ( RFID ) tags on mobile devices to help locate a lost or stolen mobile device. Use remote shutdown tools to prevent data breaches by remotely locking mobile devices. 20

21 Data Protection What data safeguards are you required to follow for your organization? 21

22 The mobile phone acts as a cursor to connect the digital and physical. Marissa Meyer Thank You! 22