Implementation
CTS implementation team applies the principles, procedures, and best practices of the Project Management Institute to insure a seamless transition. PMI is recognized as a global leader in developing standards for the practice of project management. Our implementations are designed with a practical methodology and a consistent approach from hospital to hospital. Our project manager will work with your team to scope a project, build a schedule in MS project manager, optimize the plan, define the steps, and track the results.
ADT
CTS automates the receipt of patient demographic information whenever possible. Utilizing an ADT feed from a client’s health system greatly improves accuracy of transcribed documents. We can accept an ADT in real time, scheduled, or batch communication. The receipt of inbound messages and the delivery of outbound results are part of a formal implementation plan. ADT greatly improves the patient identification step.
HL7
HL7 is a protocol for data exchange. It defines the format and the content of the messages that applications must use when exchanging data with one another in various circumstances.
CTS utilizes a bi- directional interface to receive patient demographic information from a Hospital Information System and makes that available to CTS operations for transcription and billing.
CTS is able to accept all the necessary components of an HL7 ADT or orders message and retain that information to generate an HL7 result and/or billing transaction.
HL7 ensures patient results are correctly identified and delivers valuable clinic information to where it is needed
Interface
CTS has experience interfacing with the most prevalent HIS systems. A partial list of interfaces include Softmed Chartscript, Cerner, Meditech, Epic, IDX, QuadraMed, GE Logician, and Dolby Fusion. CTS can also write an interface for homegrown or legacy applications.
Security
CTS has developed its infrastructure, hardware, and software architecture with security as a primary requirement. Client exchanges regarding patient health information are transferred over a secure network. Voice files are compressed, encrypted and password protected. User rights are configurable and can limit access to certain functions. Audit trails of all transactions are logged