Glossary

A

Access Control

Access control refers to the practice of restricting access to certain resources or areas to authorized individuals while preventing unauthorized individuals from gaining entry. This can include physical access control, such as using locks and keys to secure buildings, as…

API

An API, or Application Programming Interface, is a set of rules and protocols that allows different software applications to communicate with each other. APIs define the methods and data formats that applications can use to request and exchange information. They…

Artificial Intelligence (AI)

Artificial Intelligence (AI) refers to the simulation of human intelligence in machines that are programmed to think and act like humans. This technology enables machines to learn from experience, adjust to new inputs, and perform tasks that typically require human…

Authentication

Authentication is the process of verifying the identity of a user or system attempting to access a network or application. This verification is typically done by confirming that the user possesses the correct credentials, such as a username and password,…

Authorization

Authorization: Authorization refers to the process of granting or denying access to resources or services based on a set of rules or permissions. It is a crucial aspect of security measures in various systems, including computer networks, databases, and applications.…
B

Big Data

Big Data refers to large volumes of structured and unstructured data that inundates a business on a day-to-day basis. This data comes from various sources such as social media, business transactions, sensors, and other digital sources. The sheer volume of…

Blockchain

A blockchain is a decentralized, distributed ledger technology that records transactions across a network of computers. Each transaction is verified by multiple participants in the network, known as nodes, before being added to a block. Once a block is filled…
C

CDS (Clinical Decision Support)

Clinical Decision Support (CDS) is a health information technology tool that provides healthcare professionals with knowledge and patient-specific information to enhance decision-making in patient care. CDS systems are designed to assist healthcare providers in making clinical decisions by providing evidence-based…

Clinical Data

Clinical data refers to information collected during the course of a patient's medical care. This data includes a wide range of information, such as medical history, laboratory test results, imaging studies, medications prescribed, and notes from healthcare providers. Clinical data…

Clinical Integration

Clinical Integration refers to the coordination of patient care across multiple healthcare providers, settings, and disciplines to ensure that patients receive high-quality, cost-effective care. This approach involves the sharing of information, resources, and best practices among healthcare providers to improve…

Clinical Workflow

Clinical Workflow refers to the sequence of tasks, activities, and processes that healthcare professionals follow to deliver patient care. It encompasses the entire patient care journey, from the initial appointment scheduling to the final discharge and follow-up. Clinical workflows are…

Cloud Computing

Cloud computing refers to the delivery of computing services over the internet, allowing users to access and store data and applications on remote servers rather than on their local devices. This technology enables individuals and organizations to access computing resources…

CMS (Centers for Medicare & Medicaid Services)

The Centers for Medicare & Medicaid Services (CMS) is a federal agency within the United States Department of Health and Human Services (HHS) that administers the nation's major healthcare programs. CMS is responsible for overseeing Medicare, which provides health coverage…

Cybersecurity

Cybersecurity: Cybersecurity refers to the practice of protecting computer systems, networks, and data from digital attacks. These attacks can come in various forms, such as malware, ransomware, phishing, and hacking. The goal of cybersecurity is to prevent unauthorized access to…
D

Data Aggregation

Data aggregation refers to the process of collecting and combining data from multiple sources into a single dataset for analysis. This can involve gathering information from various databases, spreadsheets, or other sources and consolidating it into a unified format. By…

Data Exchange

Data Exchange: Data exchange refers to the process of transferring data between different systems, applications, or organizations. This can involve the sharing of information in various formats, such as text files, spreadsheets, databases, or web services. Data exchange is essential…

Data Governance

Data governance refers to the overall management of the availability, usability, integrity, and security of data used in an enterprise. It involves establishing processes and policies to ensure that data is accurate, consistent, and reliable across an organization. Data governance…

Data Integration

Data integration is the process of combining data from different sources into a single, unified view. This can involve merging data from various databases, applications, and systems to create a comprehensive and accurate representation of an organization's data. By integrating…

Data Interoperability

Data interoperability refers to the ability of different data systems or software applications to communicate, exchange, and interpret data seamlessly. This is crucial in today's interconnected world where data is constantly being shared and used across various platforms and systems.…

Data Migration

Data migration refers to the process of transferring data from one system to another. This can involve moving data between different types of storage systems, such as from on-premises servers to cloud storage, or from one software application to another.…

Data Normalization

Data normalization is a process used to organize a database in a way that reduces redundancy and dependency by dividing large tables into smaller tables and defining relationships between them. This technique helps to eliminate data anomalies and inconsistencies, ensuring…

Data Privacy

Data privacy refers to the protection of personal information and data from unauthorized access, use, or disclosure. It involves ensuring that individuals have control over how their data is collected, stored, and shared by organizations. Data privacy is essential for…

Data Security

Data security refers to the process of protecting digital data from unauthorized access, corruption, or theft. It involves implementing various measures and protocols to ensure that sensitive information is kept safe and secure. Data security is essential for businesses, organizations,…

Data Sharing

Data Sharing: Data sharing refers to the practice of allowing multiple parties or individuals to access and use the same set of data. This can involve sharing data within an organization, between different organizations, or with the public. Data sharing…

Data Standardization

Data standardization is the process of establishing and implementing consistent formats, structures, and definitions for data across an organization or industry. This ensures that data is uniform and can be easily compared, integrated, and analyzed. Standardizing data is essential for…

Data Transformation

Data transformation refers to the process of converting data from one format or structure into another. This can involve various operations such as cleaning, filtering, aggregating, and combining data to make it more suitable for analysis or storage. Data transformation…

Database Management

Database management refers to the process of organizing, storing, and managing data in a structured manner within a database system. This involves creating, updating, and deleting data as well as ensuring the security and integrity of the data stored in…

DICOM

DICOM stands for Digital Imaging and Communications in Medicine. It is a standard for handling, storing, printing, and transmitting information in medical imaging. DICOM files contain a combination of text, images, and other data related to patient scans, such as…

DICOM (Digital Imaging and Communications in Medicine)

DICOM (Digital Imaging and Communications in Medicine) is a standard for handling, storing, printing, and transmitting information in medical imaging. It was developed by the National Electrical Manufacturers Association (NEMA) to ensure the interoperability of medical imaging equipment from different…

Digital Health

Digital health refers to the use of digital technologies, such as mobile devices, wearables, telehealth, and health information systems, to improve healthcare delivery, patient outcomes, and overall wellness. It encompasses a wide range of technologies and applications that aim to…

Digital Transformation

Digital transformation refers to the process of integrating digital technologies into all aspects of a business, fundamentally changing how it operates and delivers value to customers. This transformation involves leveraging digital tools and technologies to streamline operations, improve efficiency, and…

Discharge Summary

A discharge summary is a document that provides a comprehensive overview of a patient's hospital stay, including the reason for admission, the treatment received, and the patient's condition upon discharge. It is typically prepared by the attending physician or healthcare…
E

EDI (Electronic Data Interchange)

Electronic Data Interchange (EDI) is the electronic exchange of business documents between trading partners in a standardized format. This process allows companies to send and receive important information such as purchase orders, invoices, shipping notices, and other documents electronically, rather…

EDI X12

EDI X12, or Electronic Data Interchange X12, is a standard format for exchanging business documents electronically. It is widely used in the United States and Canada for various types of transactions, such as purchase orders, invoices, and shipping notices. The…

EHR (Electronic Health Record)

An Electronic Health Record (EHR) is a digital version of a patient's paper chart. It contains the patient's medical history, diagnoses, medications, treatment plans, immunization dates, allergies, radiology images, and laboratory test results. EHRs allow healthcare providers to access and…

EMR (Electronic Medical Record)

An Electronic Medical Record (EMR) is a digital version of a patient's paper chart. It contains all of the medical and treatment history of a patient in one practice. EMRs are used by healthcare providers to document, monitor, and manage…

Encryption

Encryption is the process of converting data into a code to prevent unauthorized access. It is a security measure used to protect sensitive information from being intercepted or accessed by unauthorized individuals. Encryption works by using algorithms to scramble data…

Endpoint Security

Endpoint security refers to the practice of securing endpoints or end-user devices such as desktops, laptops, mobile devices, and servers from cyber threats. These endpoints are the entry points for cybercriminals to gain access to an organization's network and sensitive…

Enterprise Healthcare

Enterprise Healthcare refers to the management and delivery of healthcare services within a large organization or corporation. This type of healthcare system is designed to meet the unique needs of employees and their families, providing comprehensive medical care and wellness…
F

FHIR

FHIR stands for Fast Healthcare Interoperability Resources. It is a standard for exchanging healthcare information electronically. FHIR was developed by Health Level Seven International (HL7), a non-profit organization that develops standards for the exchange, integration, sharing, and retrieval of electronic…

FHIR (Fast Healthcare Interoperability Resources)

FHIR, which stands for Fast Healthcare Interoperability Resources, is a standard for exchanging healthcare information electronically. It was developed by the Health Level Seven International (HL7) organization and is designed to facilitate the exchange of healthcare data between different systems,…

Firewall

A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and an untrusted external network, such as the internet.…
H

Health Analytics

Health analytics is the process of analyzing and interpreting data related to healthcare in order to improve patient outcomes, reduce costs, and enhance overall efficiency in the healthcare system. This data can come from a variety of sources, including electronic…

Health Data

Health data refers to information related to an individual's medical history, diagnosis, treatment, and outcomes. This data is typically collected and stored by healthcare providers, such as hospitals, clinics, and doctors' offices, as well as by health insurance companies and…

Health Information Exchange (HIE)

Health Information Exchange (HIE) is the electronic sharing of health-related information among organizations according to nationally recognized standards. This exchange allows healthcare providers, patients, and other stakeholders to access and securely share a patient's medical information electronically. HIEs play a…

Health IT

Health IT: Health Information Technology (Health IT) refers to the use of technology in the healthcare industry to manage and exchange health information electronically. This includes a wide range of technologies such as electronic health records (EHRs), telemedicine, mobile health…

Healthcare Integration

Healthcare integration refers to the process of combining different healthcare services, systems, and resources to provide a more coordinated and seamless experience for patients. This approach aims to improve the quality of care, enhance patient outcomes, and reduce costs by…

Healthcare IT

Healthcare IT, also known as Health Information Technology, refers to the use of technology in the healthcare industry to manage and exchange health information. This includes electronic health records (EHRs), telemedicine, mobile health applications, and other digital tools that help…

HIPAA

HIPAA stands for the Health Insurance Portability and Accountability Act, which was enacted by the U.S. Congress in 1996. The primary goal of HIPAA is to protect the privacy and security of individuals' health information. This law sets national standards…

HIPAA (Health Insurance Portability and Accountability Act)

HIPAA, which stands for Health Insurance Portability and Accountability Act, is a federal law enacted in 1996 to protect the privacy and security of individuals' health information. The law includes provisions that regulate the use and disclosure of protected health…

HL7

HL7, which stands for Health Level Seven, is a set of international standards for the exchange, integration, sharing, and retrieval of electronic health information. These standards are developed by the HL7 International organization, which is a not-for-profit, ANSI-accredited standards developing…

HL7 (Health Level Seven)

HL7 (Health Level Seven) is a set of international standards for the exchange, integration, sharing, and retrieval of electronic health information. It is a non-profit organization that develops standards for the exchange of electronic health information among healthcare providers, payers,…
I

ICD-10

ICD-10 stands for the International Classification of Diseases, Tenth Revision. It is a medical classification list created by the World Health Organization (WHO) to categorize diseases, injuries, symptoms, and other health-related conditions for the purpose of medical coding and billing.…

Identity Management

Identity Management refers to the process of managing and controlling the digital identities of individuals within an organization. This includes the creation, maintenance, and deletion of user accounts, as well as the assignment of permissions and access rights based on…

Informatics

Informatics is a multidisciplinary field that involves the study of information processing, including the collection, storage, retrieval, and analysis of data. It combines elements of computer science, information technology, and data science to develop solutions for managing and utilizing information…

Integration Engine

An Integration Engine is a software application that enables the integration of various systems, applications, and data sources within an organization. It acts as a central hub for connecting different technologies and facilitating the seamless exchange of information between them.…

Interoperability

Interoperability: Interoperability refers to the ability of different systems, devices, or applications to communicate, exchange data, and work together seamlessly. It is essential for ensuring that various technologies can work together effectively, regardless of their differences in design, architecture, or…

IoT (Internet of Things)

The Internet of Things (IoT) refers to the network of physical devices, vehicles, home appliances, and other items embedded with sensors, software, and connectivity that enables them to connect and exchange data. These devices are able to collect and share…

IT Infrastructure

IT infrastructure refers to the collection of hardware, software, networks, and facilities that are required to operate and manage an organization's information technology environment. This infrastructure is essential for the functioning of an organization's IT systems and services, providing the…
L

Lab Integration

Lab integration refers to the process of combining various laboratory systems, instruments, and processes to work together seamlessly. This integration allows for the efficient sharing of data, resources, and workflows across different laboratory departments or even different laboratories within an…

Laboratory Information System (LIS)

A Laboratory Information System (LIS) is a software system specifically designed to manage and store data from clinical laboratories. This system is used to track samples, manage workflows, and store test results in a secure and organized manner. LIS is…

Laboratory Integration

Laboratory integration refers to the process of combining various laboratory systems, instruments, and processes to work together seamlessly and efficiently. This integration allows for the automation of tasks, sharing of data, and streamlining of workflows within a laboratory setting. By…
M

Machine Learning

Machine learning is a subset of artificial intelligence that focuses on the development of algorithms and statistical models that enable computers to learn and make decisions without being explicitly programmed. In other words, machine learning allows computers to analyze and…

Managed Services

Managed services refer to the practice of outsourcing certain IT functions and responsibilities to a third-party provider. These services are typically delivered on a proactive basis and are designed to improve the efficiency and effectiveness of an organization's IT operations.…

Medplum

Medplum is a term used in the healthcare industry to refer to a digital platform that helps healthcare providers manage patient information, streamline workflows, and improve patient care. This platform typically includes features such as electronic health records (EHR), patient…

Mirth Connect

Mirth Connect is an open-source integration engine that enables healthcare organizations to efficiently exchange health information between different systems. It is a robust platform that facilitates the seamless flow of data across various applications, allowing for improved interoperability and streamlined…

Mobile Health (mHealth)

Mobile Health (mHealth) refers to the practice of medicine and public health supported by mobile devices, such as smartphones, tablets, and wearable technology. This technology enables healthcare providers to deliver medical services and information remotely, allowing for greater accessibility and…
N

Network Security

Network security refers to the practice of securing a computer network infrastructure from unauthorized access, misuse, or disruption. It involves implementing various measures to protect the integrity, confidentiality, and availability of data and resources within a network. Network security is…

NLP (Natural Language Processing)

NLP, or Natural Language Processing, is a branch of artificial intelligence that focuses on the interaction between computers and humans using natural language. The ultimate goal of NLP is to enable computers to understand, interpret, and generate human language in…
O

Open Source Software

Open Source Software: Open source software refers to computer software that is released with a license that allows users to freely use, modify, and distribute the software's source code. This means that the code is open for anyone to view,…
P

Patient Access

Patient Access: Patient access refers to the process by which patients are able to obtain healthcare services from a healthcare provider. This includes everything from scheduling appointments to checking in at the front desk, to accessing medical records and test…

Patient Data

Patient data refers to the information collected about an individual during the course of their healthcare treatment. This data includes a wide range of information, such as medical history, current symptoms, test results, medications, allergies, and demographic details. Patient data…

Patient Engagement

Patient engagement refers to the active involvement of patients in their own healthcare journey. It encompasses a range of activities and strategies aimed at empowering patients to take control of their health and well-being. This can include providing patients with…

Patient Portal

A patient portal is a secure online website that gives patients convenient 24-hour access to personal health information from anywhere with an internet connection. These portals allow patients to interact with their healthcare providers, view medical records, schedule appointments, request…

Patient Privacy

Patient privacy refers to the right of an individual to keep their personal health information confidential. This includes medical records, test results, treatment plans, and any other information related to their healthcare. Protecting patient privacy is essential for maintaining trust…

Predictive Analytics

Predictive analytics is the practice of using data, statistical algorithms, and machine learning techniques to identify the likelihood of future outcomes based on historical data. This process involves analyzing current and historical data to make predictions about future events or…

Protected Health Information (PHI)

Protected Health Information (PHI) refers to any information in a medical record or other health-related information that can be used to identify an individual and that was created, used, or disclosed in the course of providing a healthcare service, such…

Protocol

Protocol refers to a set of rules or guidelines that govern the communication and interaction between different devices or systems. In the context of networking, protocols are essential for ensuring that data is transmitted accurately and efficiently between devices. These…
Q

Quality Reporting

Quality reporting refers to the process of collecting and analyzing data on the quality of healthcare services provided by healthcare organizations. This data is then used to measure and track the performance of healthcare providers, identify areas for improvement, and…
R

Real-Time Data

Real-time data refers to information that is constantly updated and available immediately as it is collected. This type of data is often used in various industries to make quick decisions based on the most current information available. Real-time data is…

Remote Monitoring

Remote Monitoring: Remote monitoring refers to the process of monitoring and managing systems, networks, or devices from a remote location. This technology allows users to keep track of various parameters and performance metrics without physically being present at the location…

Reporting Dashboard

A reporting dashboard is a visual representation of key performance indicators (KPIs) and other important metrics that provide a snapshot of an organization's performance. It is a centralized platform that allows users to monitor and analyze data in real-time, enabling…

Risk Assessment

Risk Assessment: Risk assessment is the process of identifying, analyzing, and evaluating potential risks that could affect an organization's operations, projects, or activities. It involves assessing the likelihood and impact of various risks to determine the level of risk exposure…
S

SaaS (Software as a Service)

SaaS, or Software as a Service, is a software delivery model where software is hosted on a cloud and accessed via the internet. This means that users do not need to install or maintain the software on their own devices,…

Scalability

Scalability refers to the ability of a system, network, or process to handle a growing amount of work or its potential to accommodate growth. In the context of technology, scalability is crucial for ensuring that a system can handle increased…

Scheduling System

A scheduling system is a software tool or application that helps businesses and organizations manage and organize their appointments, tasks, and resources efficiently. It allows users to create, view, and update schedules for various activities, such as meetings, events, projects,…

Security Protocols

Security protocols refer to a set of rules and procedures that are designed to ensure the security of data and information in a networked environment. These protocols are put in place to protect sensitive information from unauthorized access, modification, or…

SMART on FHIR

SMART on FHIR is a healthcare standard that combines the SMART (Substitutable Medical Applications, Reusable Technologies) platform with FHIR (Fast Healthcare Interoperability Resources) to enable the development of healthcare applications that are interoperable, secure, and scalable. SMART on FHIR allows…

Standardized Coding

Standardized coding refers to the practice of using a consistent set of rules and conventions when writing code for software development. This ensures that the code is structured in a uniform way, making it easier to read, understand, and maintain…

System Interoperability

System interoperability refers to the ability of different systems or components to work together seamlessly, exchanging and using information in a way that is efficient and effective. In other words, it is the ability of different systems to communicate with…
T

Telehealth

Telehealth is a broad term that encompasses the use of digital information and communication technologies to provide healthcare services remotely. This can include video conferencing, remote monitoring, mobile health apps, and other forms of technology that allow patients to receive…

Telemedicine

Telemedicine refers to the practice of providing healthcare services remotely using telecommunications technology. This can include video calls, phone calls, text messaging, and other forms of communication to diagnose, treat, and monitor patients. Telemedicine allows patients to receive medical care…

Terminology Services

Terminology Services: Terminology services refer to the management and standardization of terminology within a specific domain or industry. This includes the creation, maintenance, and dissemination of terminology resources to ensure consistency and accuracy in communication. Terminology services play a crucial…

Third-Party Integration

Third-Party Integration: Third-party integration refers to the process of incorporating external software or services into an existing system or platform. This integration allows for the seamless exchange of data and functionality between different applications, enabling them to work together efficiently.…

Tokenization

Tokenization is the process of replacing sensitive data with unique identification symbols that retain all the essential information about the data without compromising its security. This technique is commonly used in the field of cybersecurity to protect sensitive information such…

Training and Support

Training and Support Training and support refer to the resources and assistance provided to individuals to help them develop the knowledge, skills, and abilities necessary to perform their job effectively. Training typically involves formal instruction, either in a classroom setting…
U

Unified Data

Unified data refers to the process of combining and integrating data from various sources into a single, cohesive dataset. This unified dataset can then be used for analysis, reporting, and decision-making purposes. By bringing together data from different sources, organizations…

User Interface (UI)

User Interface (UI): User Interface (UI) refers to the point of interaction between a user and a digital device or software application. It encompasses everything that a user may interact with, including screens, pages, buttons, icons, and any other visual…
V

Value-Based Care

Value-Based Care: Value-based care is a healthcare delivery model in which providers are paid based on patient health outcomes rather than the quantity of services they provide. This approach aims to improve the quality of care while reducing costs by…

Virtual Care

Virtual Care: Virtual care refers to the use of technology to provide healthcare services remotely. This can include video consultations, phone calls, secure messaging, and remote monitoring of patients. Virtual care allows patients to receive medical attention without having to…

VPN (Virtual Private Network)

A Virtual Private Network (VPN) is a technology that allows users to create a secure connection over a less secure network, such as the internet. This technology enables users to send and receive data across shared or public networks as…
W

Web Services

Web Services: Web services are software systems designed to support interoperable machine-to-machine interaction over a network. They are a set of standards and protocols that allow different software applications to communicate with each other over the internet. Web services provide…

Workflow Optimization

Workflow optimization refers to the process of improving and streamlining the sequence of tasks, activities, and processes within an organization to enhance efficiency, productivity, and overall performance. By analyzing and reorganizing workflows, businesses can identify bottlenecks, eliminate redundancies, and automate…