© 2015 RCM&D. All Rights Reserved. Technology and the Aging; Upside and Downside Risk Management...
-
Upload
horace-chase -
Category
Documents
-
view
216 -
download
2
Transcript of © 2015 RCM&D. All Rights Reserved. Technology and the Aging; Upside and Downside Risk Management...
© 2015 RCM&D. All Rights Reserved.
Technology and the Aging; Upside and Downside Risk Management
Karen B. Mathura, RN, JD, CPHRMDenise M. Shope, RN, MHSA, ARM, CPHRM, FASHRM
Risk Management Consultants
October 8, 2015
Fall Leaders Forum – Embracing the Future
© 2015 RCM&D. All Rights Reserved.
Participants will:
▪ Identify 2 new technologies that specifically target the needs of our aging population.
▪ Discuss the risks inherent in these new technologies.▪ Discuss interventions that can mitigate the risks with
new technology
2
© 2015 RCM&D. All Rights Reserved.
Setting the Stage
3
© 2015 RCM&D. All Rights Reserved.
▪ Aging is a disruptive force in many countries and economies. Imagine:– There are more walkers and wheelchairs than baby
carriages in parts of Europe– People over 60 in China are more numerous than the entire
population of Russia– Japan’s population by mid-century may reduce by half and
nearly a third will be over 65– 77 million American baby boomers, born between 1946-
1964 are now passing 65 nearly one every seven seconds– Even in ‘young’ South American and African nations, there
are concentrations of older adults that rival or even surpass the oldest countries of Europe
Disruptive Demographics
4
© 2015 RCM&D. All Rights Reserved.
▪ The new disruptive demographics of aging means many older people have:– Vast cultural, lifestyle, and economic diversity within and
across nations– Fewer family caregivers and working age adults to support
an aging society– Greater expectations of baby boomers in North America
and Europe to not only live longer but to live better than previous generations
– Higher expectations and lifelong experience with the promise of technology to improve the quality of life – from accessing healthcare, connecting to loved ones, to remaining engaged rather than ‘retired’ from society
– Better health, more education and income than their parents and grandparents
Disruptive Demographics
5
© 2015 RCM&D. All Rights Reserved.
6
© 2015 RCM&D. All Rights Reserved.
▪ CAST Center for Aging Services Technology (Leading Age) http://www.leadingage.org/CAST.aspx
▪ Center for Technology and Aging http://www.techandaging.org/programs_home.html
▪ Aging Well Hub by Phillips http://www.agingwellhub.org/o Community, Caregiver, Healthcare, Mind/Body/Spirit
▪ MIT AgeLab http://agelab.mit.edu/
Setting the Stage
7
© 2015 RCM&D. All Rights Reserved.
▪ AGNES (Age Gain Now Empathy System)
MIT AgeLab
8
© 2015 RCM&D. All Rights Reserved.
▪ PEW Research- Older people, 65 and older, are the most likely to reap the emotional benefits of Smartphone technology. More than any other age bracket, they consider a Smartphone to be "freeing," rather than "a leash," according to the Pew Research Center. On the other hand, 18- to 29-year-olds are the most likely to consider Smartphones a leash.
Setting the Stage:
9
© 2015 RCM&D. All Rights Reserved.
▪ The elderly also felt more strongly than any other age group that Smartphones are "connecting" devices, as opposed to "distracting." Again, 18- to 20-year-olds were the most pessimistic: 37 percent considered their phones to be more of a distraction than a device that served to connect them to friends and family.
Setting the Stage
10
© 2015 RCM&D. All Rights Reserved.
▪ Communication▪ Safety▪ Health▪ Social and Learning
Application of Technology in Aging
11
© 2015 RCM&D. All Rights Reserved.
▪ This space is enormous and includes email, chat, games, video, cell phones, Smartphone’s and tablets, as well as personal computers.
Communication and Engagement
12
© 2015 RCM&D. All Rights Reserved.
▪ All manner of home security systems are springing up.
▪ The systems deal not only with possible intruders but a growing range of personal health and safety issues.
▪ They use sensors, webcams and digital communications to provide help with fall detection and the broader areas of personal emergency response systems.
o sneakers (with tracking technology for elopement risk)
Home Safety and Security
13
© 2015 RCM&D. All Rights Reserved.
Telehealth and mHealth (the "m" stands for mobile), medication and disease management tools and fitness products.
▪ mHealth and eHealth» Examples of eHealth and mHealth» Technology – Smartphone’s, tablets, watches, Fit Bits, » Apps – glucose meter, blood pressure monitor (
https://www.youtube.com/watch?v=xp1x82IakBc), ECG/EKG device (https://www.youtube.com/watch?v=X0NiQWFqZYI)
» The Google Glass IntelliVue Solutions
Home Health and Wellness
14
© 2015 RCM&D. All Rights Reserved.
▪ Digital Stethoscope and Smartphones The new-generation stethoscope wirelessly streams heart sounds to a Smartphone app, which, in turn, can save those recorded beats to a patient's electronic medical record. The record of a patient's heartbeat can be viewed as a heart-sound wave form and shared via a secure link with a cardiologist offering a second opinion.
Home Health and Wellness
15
© 2015 RCM&D. All Rights Reserved.
▪ TeleHealth and Remote Patient Monitoring
Home Health and Wellness
16
© 2015 RCM&D. All Rights Reserved.
Home-centered communications technologies▪ stay connected with friends/family▪ engage in online learning▪ participate in volunteer activities▪ earn income from home.
• AARP Tek Academy » Social Media» Online Safety» Tablets and Phones» Connected Life» Real Pad
http://aarptek.aarp.org
Learning and Social Contribution
17
© 2015 RCM&D. All Rights Reserved.
▪ Gamification– Wii ®– Rise of Nations ® Gold Edition
Karl M. Kapp, Ed.D., CFPIM, CIRMAssistant Director, Institute for Interactive TechnologiesProfessor of Instructional TechnologyBloomsburg University
Learning and Social Contribution
18
© 2015 RCM&D. All Rights Reserved.
▪ From Meals-on-Wheels to Dinner-by-Drone http://bigthink.com/disruptive-demographics/from-meals-on-wheels-to-dinner-by-drone
Learning and Social Contribution
19
© 2015 RCM&D. All Rights Reserved.
▪ Combines form and function– wearable gear in the form of watches, eyeglasses and
more.
The Wearable Technology
20
© 2015 RCM&D. All Rights Reserved.
▪ A common basic template for how they work– sensors capture impulses and translate them into
actionable data.– then, microprocessors extract, transform and load data
to a transmittable format. – finally, transmitters wirelessly send data to cloud
storage for further processing and reporting.
Wearable Technology
21
© 2015 RCM&D. All Rights Reserved.
Wearable technology risks fall into three main categories for the manufacturer/vendor:
▪ Cyber Risks. If data transmitted via wearables is not properly secured, companies can face class action lawsuits, costly fines and damage to their reputation.
▪ Bodily Injury Risks. Malfunctioning devices can cause injuries, illnesses and even death of wearers or patients. Device manufacturers may face a product liability lawsuit.
▪ Technology Errors and Omissions Risks. Companies can be held liable for an economic loss from the failure of a device to work as intended.
So will the manufacturer/vendor attempt to transfer this risk to the users???
Wearable Technology - Risks
22
© 2015 RCM&D. All Rights Reserved.
Safelet®
Google ® GlassMental Health Sensors
Apple Watch® 23
© 2015 RCM&D. All Rights Reserved.
Risk Management Considerations
24
© 2015 RCM&D. All Rights Reserved.
Risk Management Solutions
25
© 2015 RCM&D. All Rights Reserved.
Preparedness
26
Understand and meet regulatory compliance? Records retention schedule and policy?Do you have a response plan?Focus on Internal Monitoring
Plan
What information exists?Where is it?What format is it in?How easy or difficult is it to access?Conduct Risk Assessments
Identify
© 2015 RCM&D. All Rights Reserved.
Preparedness
27
Incident response teamIntegrate Risk/IT/Medical Records/Legal/PRWork with Insurers and Service ProvidersOngoing Education
Implement
Are your systems and networks secure?EncryptionDo you use compliant storage technologies?Securing or destroying end of lifecycle data?
Protect
© 2015 RCM&D. All Rights Reserved.
Response
28
Retain outside counsel with privacy expertiseDetermine who and what caused the breachDocument investigation and findings in a legally defensible manner`
Investigate
Determine the scope of the breach and potential notification dutyAppropriate parties contacted in a timely and professional mannerProvide a mitigation or remediationRetain crisis and reputational advisory
Respond
DefendRegulatory defenseCivil liability defense
© 2015 RCM&D. All Rights Reserved.
– Recording Conversations – Protection of Information- Cyber exposure
▪ Privacy v Autonomy ▪ telemed/mHealtho legitimacy/accuracy of apps; malware/virus riskso risks to ePHI; medical identity theft
Privacy
29
© 2015 RCM&D. All Rights Reserved.
Safeguarding the Data
30
▪ Secure Data Centers▪ Encryption▪ Recipient Authentication▪ Audit Controls▪ Individual Device Security▪ Access Security▪ Vet mHealth apps and software vendors!
© 2015 RCM&D. All Rights Reserved.
– The Equipment
▪ Technology malfunction/failure▪ Display limitations, i.e. small screens, difficult to read▪ Upgrades▪ Costs▪ Operations/Logistics▪ Poor connection▪ Continuity of care▪ Embedding collected data into medical record▪ The “fine” print (terms and conditions)
The Device
31
© 2015 RCM&D. All Rights Reserved.
– Regulatory Considerations▪ HIPAA, FDA (mobile apps/medical devices), FCC, FTC (claims
made by apps under scrutiny - http://www.theguardian.com/technology/2015/feb/25/ftc-fines-apps-detect-melanoma)
Regulations and Control
32
© 2015 RCM&D. All Rights Reserved.
HIPAA Security Rule
33
Administrative Safeguards
▪ Security Management Process▪ Security Personnel▪ Information Access Management▪ Workforce Training & Management▪ Evaluation
Physical Safeguards
▪ Facility Access & Control▪ Workstation & Device Security
Technical Safeguards
▪ Access Control▪ Audit Controls▪ Integrity Controls▪ Transmission Security
http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/securityruleguidance.html
© 2015 RCM&D. All Rights Reserved.
FDA
34
▪ When equipment or software is intended for use in the diagnosis or treatment of a disease or other condition, it is considered to be a medical device.
▪ As of September 25, 2013, the FDA regulates mobile medical apps that:o Are used as an accessory to an FDA-regulated medical device
o Transform a mobile platform into a regulated medical device
▪ FDA applies same risk-based approach used to assure safety and effectiveness for other regulated medical devices.
© 2015 RCM&D. All Rights Reserved.
FCC
35
© 2015 RCM&D. All Rights Reserved.
In Summary
36
▪ Both mHealth & technology (wearable and more) can improve the quality of health care and the quality of life for our seniors if they are appropriately used.
▪ Assess risks before implementing an mHealth program or new technologies and monitor, evaluate, and improve thereafter.
▪ Take the time to vet mHealth applications and vendors before purchasing, implementing, or utilizing any app or software.
© 2015 RCM&D. All Rights Reserved.
Daddy…
37