|
|
|
|
|
|
Efficiency:
The amount of time needed to report and resolve an incident
and to prepare weekly, monthly, quarterly and annual reports
is drastically reduced. |
|
|
|
Ease
of Use: The intuitive interface allows for
quick and easy entry of data, allowing staff to focus more time
and attention on patient care. |
|
|
|
Convenience:
Incident Manager is completely browser-based. All entries
and analysis can be performed from any PC with access to the
internet/intranet.
|
|
|
|
Confidentiality: Reporting
can be confidential, thereby, reducing reluctance of hospital staff
members to report incidents. The application does not require
any paper form to be completed. And, only authorized personnel
can view and analyze the data reported. |
|
|
|
Communication:
The application immediately notifies all those who need to
know
when an incident is entered which dramatically improves the
time to respond and resolve issues. |
|
|
|
Evaluation:
The application has the tools and functionality to perform a
wide range of analysis and reporting for the Quality Improvement
staff. It also enables Management and Administration to monitor and
analyze data for the incidents in their area. |
|
|
|
Customization:
Most drop-down fields and code tables can be
maintained on-demand. |
|
|
|
Compliance:
The application facilitates the compliance with JCAHO and
regulatory standards.
|
|
|
|
Integration:
Report data can be exported to Microsoft®
Excel, Microsoft®
Word, or PDF format for further analysis or distribution. |
|
|
|
Support:
No installation of software is necessary on any PC that accesses
the application and support requirements from internal IT staff
is minimal. |
|
|
|
Scalability:
The application provides functionality for an endless number
of facilities. Data can be analyzed for a single
facility or be rolled up to multiple facilities. The
application can run on a single server or in a clustered server
environment where load balancing is critical. |
|
|
|
Security:
128-bit encryption is used
to protect your data, the highest level of protection possible
for financial or confidential transactions when utilizing web
applications. |
|
|
|
Architecture:
The application is
built using a combination of Active Server Pages (ASP),
Microsoft® XML Parser (MSXML), Visual Basic® 6.0, COM+,
ActiveX® Data Objects (ADO), and SQL Server™ 2000.
The HTML presentation layer is implemented
in Active Server Pages. The
business layers are implemented as COM+ components written in
Visual Basic®
6.0 to access data in a disconnected manner through ADO. The
database layer is implemented using Microsoft® SQL Server. The SQL Server™
2000 database uses stored procedures for best performance and
maintainability. |