iShare Medical® Blog

iShare Medical® is your connection to Healthcare Interoperability, Direct Protocol, HISP Services, Direct Messaging, Electronic Health Information Exchange and HIPAA-Compliant Email.

Seeing Double or more? The Truth About Patient Identity and Matching

Walk into any doctor’s office, hospital, or pharmacy and the first question you are most likely asked is some version of, “What is your name and date of birth?”

 

This is because patient matching in the U.S. healthcare system is done based on the patient’s name and date of birth. The problem is that there are many people who have the same name and date of birth. The larger the geographical area, the more common the name, the more likely that there will be two or more matches on the same name and date of birth.

Read More

Safeguarding Healthcare Data: The Essential Role of PKI

Sight unseen behind the scenes PKI plays an essential role in safeguarding medical information through advanced authentication and encryption methods.

What is PKI?

 

PKI (Public Key Infrastructure) is a security and identity framework that uses digital keys and certificates for digital identity, authentication, authorization, encryption, access, and digital signatures to help ensure the confidentiality, integrity, and authenticity of health information.

Read More

Post-Quantum Cryptography: Securing the Digital Future

In recent years, the world of computing has been buzzing with the promise and potential of quantum computers. These machines, harnessing the strange and powerful principles of quantum mechanics, have the potential to quickly solve complex problems that are currently beyond the capabilities of classical computers.

 

Read More

Why is Healthcare all abuzz about API's?

 

 

It seems like every time you turn around, there's another buzzword in healthcare. So, let's start by demystifying the latest API. An API or application program interface is a service that listens for requests to perform a task and then instantly springs into action upon request.

 

Read More

Behind the Cloud: Decoding Data Center Tiers

Data centers are classified into four tiers under the Uptime Institute’s data center classification system. The Uptime Institute is a professional organization devoted to improving the performance, efficiency, and reliability of business-critical data center infrastructure. Each tier represents a different level of fault tolerance.

Read More

Unlocking the Potential of Healthcare Data: A Comparative Analysis of Structured and Unstructured Data in Clinical Practice

Structured data conforms to predefined standards such as the definition of the data, format, size, and allowed content making it easily searchable and analyzable. Often this content is tied to a predefined standard that lists a code, its description, and often an accessible set of values. For example, the abbreviation for states in the United States are structured data because they are pre-defined to contain two alpha characters or letters such as MO for Missouri and MS for Mississippi.

Read More

DirectTrust Hits 4 Billion Direct Message Transactions

The DirectTrust Network just achieved a major milestone in the first quarter of 2023 of four billion Direct Messages transactions. The number of Direct Message transactions in the first quarter of 2023 was more than 222 million Direct Message transactions!

 

Read More

What is a Direct Address and Direct Standard Messaging Account?

A Direct Address is an electronic endpoint for sharing medical records nationwide. It looks like and acts like an email address, but this is no email system. A Direct Address bound to the real ID-proofed identity of the owner which can be a patient, provider, payer, or device.

Read More
CRUD

Whats CRUD got to do with streamlining workflow? Everything

CRUD is an acronym used in IT that stands for Create, Read, Update, and Delete. These functions are the essential operations that are necessary to create and maintain up-to-date information in a database. They can have different command names depending upon the programming language, context, and data source being accessed. Here are the list functions, description of what operations they perform, and common names for various programming language commands: 

Read More

FTCs 8 Best Practice Guidelines for Health App Developers

 

The FTC recently settled two “First-of-Its-Kind” civil penalty cases. Both cases involved consumer health apps that disclosed and/or sold for advertising purposes consumer personal health information without the consumers’ written consent. Further, in both cases, the FTC found

Read More