what is required by the va in order to ensure you are covered under the federal tort claims act?
Attention A T users. To access the menus on this page please perform the post-obit steps. one. Please switch machine forms style to off. ii. Hit enter to expand a main bill of fare option (Wellness, Benefits, etc). 3. To enter and actuate the submenu links, hit the down pointer. You will now exist able to tab or arrow up or down through the submenu options to admission/activate the submenu links.
VA Technical Reference Model v 22.three
Claims Administration and Management System (eCAMS) HealthBeat
Technologies must exist operated and maintained in accordance with Federal and Section security and privacy policies and guidelines. More information on the proper employ of the TRM can be institute on the TRM Proper Use Tab/Section.
Website: | Go to site |
Clarification: | The eCAMS HealthBeat is a business activity monitoring framework which uses automation to excerpt, analyze, and study data from multiple business systems. Through routine monitoring of business processes this applied science has the capability to access nearly current workload and organisation performance information. Additionally, this technology has the ability to piece of work with other Claims Assistants and Management Organization products, such as the eCAMS Health Intendance Engine (HCE) and eCAMS RuleIT. Information collected by this software is stored in an Oracle database. |
Engineering/Standard Usage Requirements: | Users must ensure their use of this technology/standard is consequent with VA policies and standards, including, but non limited to, VA Handbooks 6102 and 6500; VA Directives 6004, 6513, and 6517; and National Institute of Standards and Technology (NIST) standards, including Federal Information Processing Standards (FIPS). Users must ensure sensitive data is properly protected in compliance with all VA regulations. Prior to employ of this technology, users should bank check with their supervisor, Information Security Officer (ISO), Facility Master Information Officer (CIO), or local Office of Information and Engineering (OI&T) representative to ensure that all deportment are consistent with current VA policies and procedures prior to implementation. |
Department 508 Information: | This engineering has non been assessed past the Section 508 Office. The Implementer of this engineering has the responsibility to ensure the version deployed is 508-compliant. Department 508 compliance may exist reviewed past the Department 508 Office and appropriate remedial action required if necessary. For boosted information or assistance regarding Section 508, please contact the Department 508 Part at Section508@va.gov. |
Decision: | View Decisions |
| |
Determination Source: | TRM Mgmt Grouping |
Decision Procedure: | One-VA TRM v20.4 |
Decision Engagement: | 04/23/2020 |
Introduced By: | TRM Request |
Vendor Name: | CNSI |
The Vendor Release table provides the known releases for the TRM Technology, obtained from the vendor (or from the release source).
Version | Release Date | Vendor End of Life Date | Vendor Desupport Appointment |
---|---|---|---|
4.x | 06/thirty/2017 |
Users must ensure their use of this engineering/standard is consistent with VA policies and standards, including, just non limited to, VA Handbooks 6102 and 6500; VA Directives 6004, 6513, and 6517; and National Establish of Standards and Technology (NIST) standards, including Federal Information Processing Standards (FIPS). Users must ensure sensitive information is properly protected in compliance with all VA regulations. Prior to employ of this applied science, users should check with their supervisor, Information Security Officer (ISO), Facility Chief Data Officer (CIO), or local Office of Information and Engineering science (OI&T) representative to ensure that all deportment are consistent with current VA policies and procedures prior to implementation. | ||||||||||||
The VA Conclusion Matrix displays the current and hereafter VA Information technology position regarding unlike releases of a TRM entry. These decisions are based upon the all-time data available every bit of the most current date. The consumer of this data has the responsibility to consult the organizations responsible for the desktop, testing, and/or product environments to ensure that the target version of the technology volition be supported. Any major.modest version that is non listed in the VA Conclusion Matrix is considered unapproved for apply. | ||||||||||||
Legend: | ||||||||||||
| ||||||||||||
Release/Version Information: | ||||||||||||
VA decisions for specific versions may include a '.x' wildcard, which denotes a decision that pertains to a range of multiple versions. | ||||||||||||
For case, a technology approved with a decision for 7.x would cover whatsoever version of vii.(Annihilation) - seven.(Annihilation). However, a 7.iv.10 decision would cover any version of vii.iv.(Anything), but would not encompass any version of seven.5.x or 7.6.x on the TRM. | ||||||||||||
VA decisions for specific versions may include '+' symbols; which denotes that the decision for the version specified as well includes versions greater than what is specified only is non to exceed or affect previous decimal places. | ||||||||||||
For instance, a technology approved with a decision for 12.six.4+ would comprehend any version that is greater than 12.6.4, but would non exceed the .vi decimal ie: 12.half dozen.401 is ok, 12.half dozen.five is ok, 12.six.nine is ok, however 12.7.0 or xiii.0 is non. |
<By | CY2021 | CY2022 | CY2023 | Future> | |||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Release | Q1 | Q2 | Q3 | Q4 | Q1 | Q2 | Q3 | Q4 | Q1 | Q2 | Q3 | Q4 | |||||||||||||||||||||||
4.10 | Approved due west/Constraints [2, iv, 5, 6] | Canonical w/Constraints [2, four, five, six] | Approved w/Constraints [2, iv, 5, 6] | Approved w/Constraints [two, 4, 5, 6] | Approved w/Constraints [two, 4, 5, 6] | Approved w/Constraints [two, 4, v, six] | Canonical w/Constraints [ii, 4, five, 6] | Approved due west/Constraints [2, 4, v, 6] | Approved w/Constraints [two, 4, 5, 6] | Approved westward/Constraints [ii, iv, 5, 6] | Approved w/Constraints [2, iv, v, half dozen] | Approved w/Constraints [2, 4, 5, vi] | |||||||||||||||||||||||
Decision Constraints
| |||||||||||||||||||||||||||||||||||
Annotation: | At the time of writing, the most current version is 4.0 released in June 2017. |
Type | Name | Source | Clarification | |
---|---|---|---|---|
There are no references identified for this entry. |
Name | Description |
---|---|
No components have been identified for this entry. |
- Red Hat Enterprise Linux (RHEL) - Approved west/Constraints
- Windows Server - Approved w/Constraints
Adoption Benefits
-
This is a mature technology.
-
This applied science provides an enterprise view based on federal standards, such as the Eye for Medicare and Medicaid Services Medicaid Information technology Architecture (CMS MITA) initiative.
-
This technology uses workflow-based analytics to provide feedback on potential bottlenecks and business functioning issues.
-
This technology provides an interface to Maintenance Management Data System (MMIS) and other systems for gathering and compiling data, which may allow for real-time access to workload and system performance data.
-
At the time of writing, no National Found of Standards and Technology (NIST) vulnerabilities had been reported and no VA Network Security Operations Center (NSOC) bulletins had been issued for the latest versions of this engineering.
Adoption Risks
-
System scans signal that this applied science is no longer in use within the VA network.
-
This technology can integrate with and change database technologies.
-
This technology has the potential to collect, store, or transmit Personally Identifiable Information (PII), Protected Health Data (PHI), or other sensitive VA data.
-
Due to the rapid release schedule of this engineering, the VA may be unable to update to the most recent patch and may require a deployment model requiring the employ of specific versions.
Architectural Benefits
-
This engineering is portable to multiple operating systems.
-
This technology can use a VA-preferred database.
- The information contained on this page is authentic as of the Determination Date (04/23/2020).
Source: https://www.oit.va.gov/Services/TRM/ToolPage.aspx?tid=11708
Belum ada Komentar untuk "what is required by the va in order to ensure you are covered under the federal tort claims act?"
Posting Komentar