Best Practice Guidelines: Healthcare Practice Management & POPIA Compliance Framework

Best Practice Guidelines: Healthcare Practice Management

POPIA Compliance Framework




Copyright © 2021 GoodX Software. All rights reserved.

GoodX online Learning Centre

learning.goodx.co.za

1. Introduction to GoodX Software

1.3. Configuration, Onboarding & Authentication

This chapter is meant to be read by:

  1. new clients of GoodX who
    1. are starting a new practice or business;
    2. move their practice or business from another software system to GoodX Software; and
  2. existing clients of GoodX who implement new features into their workflow.

1. Some notes to new clients

Client onboarding is the process of assisting you as our new client to bring your practice onto our software and ensure that you understand the services available to you.

This chapter will provide information so that:

  1. The practice can implement proper change management strategies so that the onboarding can be successful;
  2. The practice will know which information to provide GoodX during the practice analysis so that GoodX can configure the software to meet the practice or business's custom needs.
Changing from one software system to another has its challenges that can easily be overcome by proper planning and consultation. GoodX will contact the practice before installation for a practice analysis, the details of which are discussed below. GoodX will also facilitate an onboarding process so that the practice or business will make a smooth transition to the new software.


2. Some notes to existing Clients - Embracing new technology to optimise practice management

An active pursuit of systematic implementation of new technology will significantly enhance practice management.

When choosing new software, the healthcare practice is usually very keen to implement all the bells and whistles of the software, immediately having the benefit of all the great new features that prompted the practitioner to obtain the software in the first place. However, as the years continue, if new software features get overlooked, the practice can find itself in a situation where the management of the practice becomes unnecessarily tedious.

As practices grow, more and more work needs to be done by fewer hands, and essential tasks, such as managing outstanding debts, get placed on the back burner. As a result, higher overheads and lack of proper resource management often lead to loss of income that the practice could have used to further its endeavours.

More and more practices are moving towards a paperless environment, which has the benefit of using fewer storage facilities, working from any place at any time, and reducing the risk of information loss or unauthorised access. In addition, human error as a result of data duplication or sloppy administration is eliminated.

The wins and challenges of new feature implementation

GoodX always continues to develop their software and make new features available to keep up with the times. There are a lot of wins as a result of development. New features are developed to make the practice management easier and more efficient, leaving staff to get more work done more accurately. This often results in cost savings and the reduction of risks.

Unfortunately, the elephant in the room also needs to be addressed. There are not only wins but also teething problems with the continued development and implementation of new features. For example, it can lead to slower work performance at the beginning of implementation or create bugs that strain the standard workflow and create frustration. This reality sometimes produces the unwillingness on the part of the practice to embrace change.

Change management strategies

Practices will do well to adopt well-planned change management strategies so that their practice management will not become stale and outdated.

Firstly, all stakeholders, including owners and personnel, should collaborate on how they want to move forward and what could benefit the practice as a whole. When the personnel are on board with continuous incremental improvement, it will avoid sabotage of the process and provide job security in people’s minds. It is incredulous that personnel would stop progress because of a fear of losing their jobs since if their time is spent better, they would have the ability to complete those tasks that they put on the back burner.

Secondly, a process audit should be conducted so that the current processes can be evaluated and new opportunities for optimisation can be recognised. New process design will be an aid in the implementation process. For example, investigate

  1. who does what and are there overlaps in the tasks between different role players?
  2. which processes manual that could be automated?
  3. which paperwork can be digitised?
  4. which communication channels can be optimised?
  5. how can the practice cut down on administrative tasks that could be improved or automated?

The list goes on.

Thirdly, an action plan should be designed in terms of which the practice

  1. can provide proper training to employees so that the new processes can be implemented without too much strain on the workflow;
  2. can work with GoodX to identify and implement changes; and
  3. a continued effort of improvement can be sustained.

The desired outcome

Once change management and optimisation become the new culture in the practice, the benefits will be huge. 

There will be extra time to finish the tasks that are crucial but not always urgent. Personnel will experience less stress in the workplace since tedious tasks like duplication of information will be eliminated. The practice can implement better security to protect personal information, and healthcare information will become accessible to practitioners wherever their work leads them, be it a clinic or home office.

The practice will also experience a reduction of costs since the roles in the practice can be optimised, and stationary and storage costs can be reduced or eliminated. No business wants to carry unnecessary expenses, and using the software to the full will, in the long run, open up resources that can be used to grow the practice.

Conclusion

Every healthcare practice should embrace change and manage it well so that future endeavours can be undertaken with less stress, fewer costs and less frustration. However, if change seems like more effort, let the final outcome of lightweight practice management move you toward the necessary change and allow you to focus on what is really important - your patients.

Stay abreast with GoodX's new technology and features by regularly visiting the GoodX Learning Centre and taking note of the updates and additions.


Database & Applications

The GoodX software product consists of a database with two different software applications/front-ends, namely:

  1. the Web App; AND
  2. the Desktop App.
Clients can either use the Web App or the Desktop App or choose to use a hybrid of both, depending on the roles users fulfil in the practice.


Hosting

The database can be installed on two types of hosting environments, namely:

  1. local server; or
  2. the GoodX cloud server.
Clients who want to use the Web App must host their database on the GoodX cloud and preferably use the latest Chrome as their Internet browser.

We trust that your practice will fully use all the functions available in GoodX to reap all the benefits.


Onboarding & Change Management

The prospect of working on a new system can be daunting for personnel who have either never worked on a medical software system or those who are accustomed to working on other software. Often processes within the practice or business are built around the way software functions, and these processes need to be re-evaluated and optimised. New practices need to think through the required business processes. The critical business process diagrams read together with this best practice manual can guide the design of the necessary processes.

All personnel must be involved and optimistic about the onboarding process. The person who performs the role of practice manager takes control as the change agent. If personnel are not involved and supportive of the process, the onboarding can fail.

The change agent:

  1. should make sure that all personnel know of the transition to the new software and are optimistic about the change;
  2. should evaluate and document all processes in the practice so that amendments can be efficiently designed and communicated to all personnel;
  3. must be the one providing instructions to GoodX about the configuration, process design and support requests. 

Onboarding consists of the following stages:


  1. Docs & Fees: Completing the GoodX Standard Licence Agreement, completing all install documents and paying the install fee.
  2. Collaborate with all personnel to get everyone involved in the changeover.
  3. Evaluate and design business processes based on the new software functionality.
  4. Completing a practice analysis with the practice manager to obtain all necessary information to configure the software for the needs of the practice/business.
  5. Installation and configuration of the software.
  6. Personnel receive training on the new software and continue learning via the online Learning Centre.
  7. On-site installation & onboarding by GoodX personnel to:
    1. install RDP's and correct internet browsers;
    2. make sure all users have the proper access to the software;
    3. assist the practice manager to either implement new work processes or to make any necessary changes to establish optimal work processes;
    4. assist users in customising the software according to their user preferences;
    5. check that personnel use the software correctly;
    6. help personnel to implement their training knowledge with the use of the software;
    7. to quality ensure the installation and application of the training. 

Onboarding schedule:

A typical onboarding schedule will look like this: (Stock management & Accounting management onboarding will each have different schedules.)

Date Onboarding Stage GoodX Department(s) involved
Before Go Live Date Sign Contract, Install Fee Payment & Completion of Documents Marketing
Before Go Live Date Practice Analysis for custom configuration Onboarding
Before Go Live Date Install & Database Configuration Technical
Before Go Live Date Fundamental Training:
  1. At the GoodX training centre - FREE  (SEE DATES) OR
  2. Virtual webinar training (YouTube) - FREE OR
  3. On site: R1,800.00 pd & travel & accommodation (unless included in the original quotation)
Onboarding
Go Live Date *
On-site Installation & Onboarding (Assistance) Onboarding
After Go-Live Date  Support by Client Liaison:
help@goodx.co.za
Support 
* Take note: it is NOT advisable to go live at the beginning of the month as it creates extra pressure on staff.

Software Configuration based on the Practice Analysis

A training & onboarding team member will contact the practice for a practice analysis. The outcome that needs to be achieved is that GoodX will be able to properly configure the software for the needs of the practice and be in a position to properly prepare for the onboarding of the practice with the go-live month.

Some of the information that will be required will be:

  1. The layout of the practice
  2. The patient movement through the practice and workflow of the employees
  3. The demographic details of the practice
  4. VAT & Banking details
  5. Who the users are and which roles do they perform in the practice
  6. Key points in the practice
  7. The medical price lists used by the practice
  8. Which medical aid contracts the practice has signed
  9. If demographic patient data needs to be imported
  10. If the practice will be using the accounting management module:
    1. A list of the ledgers from the accountant
    2. Opening balances for the trial balance
    3. Cashbook setup (all bank accounts as well as the petty cash account)
    4. List of every entity/practice number’s creditors
    5. Opening balances of the creditors
  11. If the practice will be using the stock management module:
    1. The counting locations that the wants GoodX to configure for the stock (places where the stock is kept);
    2. The stock list is divided into counting locations (e.g. code, description, Nappi code, pack size, price and counting location (places where the stock is kept Consultation room – cupboard 1 – drawer 1)
    3. Which stock items should be marked as non-chargeables?
    4. Which stock items should be marked as non-stock items? (Costing but without movement.)
    5. List of every entity/practice number’s creditors
    6. Opening balances of the creditors


Authentication

Various user authentication technologies are in high demand for both online and desktop software and services. Healthcare practices must recognise that passwords are not the only way of authenticating users. There are various authentication mechanisms available to enhance security when users access information in the practice.

The traditional username and password authentication method is a single security layer. However, usernames are often easy to discover, as users often utilise readily available information, like email addresses or birthdays, as their passwords. Furthermore, passwords are often difficult to remember, so people choose easy ones or use the same password across many platforms.

That is why almost all service providers like banks, social media platforms and medical software providers have added additional security layers to accounts. Users could access their software or account settings and activate multi-factor authentication.

What is Multi-Factor Authentication?

Authentication is the process of confirming the identity of a person, device, or entity attempting to access data, resources or applications. Validating identity establishes a trust relationship for further interactions and access. 

There are various authentication methods whereby a user is granted access only after successfully presenting one or more pieces of evidence (factors) to an authentication mechanism. Multi-factor authentication (MFA) is a security mechanism that requires more than one verification method to validate a user's identity. MFA thus creates a few layers of defence that makes it more difficult for an unauthorised person to access a location, device, network or database.

Three categories of factors

The most commonly used factors fall into one of these three categories:

  1. Knowledge is something the user knows, like a personal identification number (PIN), a password or the answer to a secret question.
  2. Possession is something the user has, like a security USB key fob or a mobile phone used to accept a text message or run an authentication app that can generate a one-time password (OTP).
  3. Inherence is something the user is, which can be any form of biometric identification, like fingerprints and facial recognition.

It is essential to make use of factors from different categories. For example, thieves may steal a password, but they cannot easily steal a fingerprint.

Benefits of Multi-Factor Authentication 

  • Multi-factor authentication increases security with third parties and organisations. Adding another form of authentication — mobile, biometric, or physical — creates a layered defence. 
  • MFA controls who has access to files. Instead of using just passwords, which can be passed around or duplicated, multi-factor authentication restricts access to authorised users only.
  • It eliminates password risks. As long as passwords have been in existence, they have been cracked or guessed. Over 65% of accounts use duplicated passwords, so if an unauthorised person finds the password for an employee's email account, there is a 65% chance they have access to other sensitive information deeper in the network. Best practice requires the use of unique and complex passwords, used with multi-factor authentication.

Multi-Factor Authentication within GoodX Web

The following outline presents the factors by category that GoodX Web utilises to enhance security and access control:

  • Knowledge (something you know): 
    • Passwords: a password is required to log into the software, which password should be changed regularly.
    • Pin: a pin is required to populate the practitioner's signature on clinical events.
  • Possession (something you have): 
    • Pushnotify: send a notification to a device, such as a computer or a smartphone, asking it to accept a login request.
    • Userfob: a USB key must be presented before attempting to log in.
  • Inherence (something you are): 
    • Facial recognition - an image is saved to the user's profile and compared to the current facial structure to accept a login request. Facial recognition technology is used in conjunction with a Stationfob to verify a station in a secured location, reducing the risk of using a social media image. It is typically used at a nurses station or similar setting where only authorised personnel are allowed.

Authentication technology is constantly evolving. As a result, businesses must look beyond passwords and consider authentication to improve security and user experience. Using multi-factor authentication is one of the easiest ways to prevent unauthorised users from accessing confidential information and therefore protecting the business against legal claims and fines.

GoodX provides different types of login details. A practice and users could typically receive the following information:

 

Web App

GoodX Cloud

Desktop App

Learning Centre

Client Portal 
URL
Unique URL provided to each practice RDP icon on your desktop None
learning.goodx.co.za   client-portal.quantsolutions.co.za/login
Username
Per user Created on each computer Per user One login per practice
NB Case sensitive!
Email address of User *
Password
Per user Per user Per user NB Case sensitive!
 Chosen by the User


Please take note:

  1. * Only Users added as Contacts to the GoodX Install in the GoodX Management System will be able to register on the Client Portal.
  2. Please make sure that you use the correct Login details for the correct application. Your FCL will assist you if you are unsure.
  3. All access to the software is connected to the user. The access control will be linked to the username.

    ** Beware: Never reveal your password to anybody. The system keeps an audit trail of all changes made in the system. If your user account is used for unauthorised changes, you will be held liable for those changes. If your password is compromised, change the password as soon as possible.