Online Safety Community

Roger Steven
Share on Facebook Share on Facebook Share
 

Roger Steven's Page

Latest Activity

Roger Steven posted events
Apr 6
Roger Steven posted events
Mar 8
Roger Steven posted events
Feb 6
Roger Steven posted events
Jan 16
Roger Steven posted events
Dec 8, 2017
Roger Steven posted a blog post

Differences between Device and Drug Clinical Research

Medical devices and drugs clinical research have their differences in approach and methodology. It is necessary to have a clear understanding of these differences if one embarks upon a study involving either or both of these.Some of the major differences between device and drug clinical research include:Requirement for a study:One of the important differences between device and drug clinical research relates to the…See More
Nov 23, 2017
Roger Steven posted a blog post

HIPAA privacy and the social media

Misuse of social media is a critical area of HIPAA privacy. A random act of carelessness by a healthcare worker can result in a Protected Health Information (PHI) breach, inviting actions from the HHS. As is known, protection of patient health information is what HIPAA is essentially all about. Many safeguards and safety…See More
Nov 14, 2017
Roger Steven posted a blog post

An understanding of Federal-Wide Assurances

The Federal-Wide Assurance (FWA) is an assurance given by an institution that is carrying out NIH-funded studies. Through this written assurance, which is required to be filed with the Office for Human Research Protections (OHRP); the institution commits itself to compliance with the terms of requirements set out in the HHS Protection of Human Subjects regulations at 45 CFR part 46. It is the only type of assurance that the OHRP accepts and approves.The FWA must clearly outline the terms for…See More
Nov 13, 2017
Roger Steven posted events
Nov 8, 2017
Roger Steven posted a blog post

Assessing Risk in Human Research Protocols

While it is true that all researchers want their studies to be reviewed and approved quickly; it has to be borne in mind that risks in the study can slow the process. Evaluation of risks is a fundamental requirement as stated in DHHS and…See More
Oct 31, 2017
Roger Steven posted a blog post

Administering injectable and oral diabetic medications among cardiac patients

Hypertension is the silent killer of our times. Over thirty million Americans -one eleventh of the entire country’s population -suffer from this condition. It is rightly termed the silent killer because not only does it not show obvious symptoms; it works silently against the system when it is present. Neglected hypertension is a sure cause for strokes and heart attacks.There is a highly undesirable, but strong and almost irrefutable link between cardiovascular disease (CVD) and diabetes. CVD…See More
Oct 27, 2017
Roger Steven posted a blog post

Easing the complexity of HIPAA enforcement

In the dozen years from the time of its enactment, change in thinking has been one of the palpable aspects of HIPAA. The advising and counseling outlook that characterized the initial years of its existence is now history. HIPAA is today noted for its very stringent and arm-twisting attitude. Its methods of enforcement are dreaded, to put it mildly. The coaxing and wheedling method used by the Office of Civil Rights (OCR) is now passé. The OCR is extremely unrelenting in its expectations from…See More
Oct 25, 2017
Roger Steven posted a blog post

Working with Physician Extenders to increase efficiency and profitability

A Physician Extender is one who is not a physician, but is of a lesser qualification, who helps physicians by carrying out many activities usually carried out by physicians. As the name suggests, Physician Extenders work to supplement the functions of a physician and could take a considerable load off her shoulders. In…See More
Oct 18, 2017
Roger Steven posted a blog post

De-Identification of PHI under HIPAA

As health information grows, sharing it among healthcare providers and researchers is necessary for providing and advancing healthcare services and healthcare research. But the Health Insurance Portability and Accountability Act (HIPAA) of 1996 severely limits how Protected Health Information (PHI) can be shared. It also has…See More
Oct 13, 2017
Roger Steven posted a blog post

Medical records retention and disposition is a complex activity

In a scenario where today’s healthcare environment is fast paced, diverse and straddle many disciplines; retention and disposition of medical records -both paper and electronic -is fraught with complexities. There are different rules set out by the state agencies, as well as by HIPAA statutes and regulations, for the way in…See More
Oct 11, 2017
Roger Steven posted events
Oct 10, 2017

Profile Information

Where do you live (city, state, country)?
Fremont
What industry do you work in?
Mentorhealth
What is your job title?
Event Coordinater
What company do you work for or associate with?
www.mentorhealth.com
Do you currently use or recommend Personal Protective Equipment?
Not Sure
What best describes the role you play in the purchase of safety products?
Other

Roger Steven's Blog

Differences between Device and Drug Clinical Research

Medical devices and drugs clinical research have their differences in approach and methodology. It is necessary to have a clear understanding of these differences if one embarks upon a study involving either or both of these.

Some of the major differences between device and drug clinical research include:

Requirement for a study:

One of the important differences between device and…

Continue

Posted on November 23, 2017 at 6:17am

HIPAA privacy and the social media

Misuse of social media is a critical area of HIPAA privacy. A random act of carelessness by a healthcare worker can result in a Protected Health Information (PHI) breach, inviting actions from the HHS. As is known, protection of patient health information is what HIPAA is essentially all about. Many…

Continue

Posted on November 14, 2017 at 6:29am

An understanding of Federal-Wide Assurances

The Federal-Wide Assurance (FWA) is an assurance given by an institution that is carrying out NIH-funded studies. Through this written assurance, which is required to be filed with the Office for Human Research Protections (OHRP); the institution commits itself to compliance with the terms of requirements set out in the HHS Protection of Human Subjects regulations at 45 CFR part 46. It is the only type of assurance that the OHRP accepts and approves.

The FWA must clearly outline the…

Continue

Posted on November 13, 2017 at 5:45am

Assessing Risk in Human Research Protocols

While it is true that all researchers want their studies to be reviewed and approved quickly; it has to be borne in mind that risks in the study can slow the process. Evaluation of risks is a fundamental requirement as stated in DHHS and…

Continue

Posted on October 31, 2017 at 6:36am

Comment Wall (1 comment)

You need to be a member of Online Safety Community to add comments!

Join Online Safety Community

At 4:45am on June 28, 2016, Fariza said…

Greetings Beloved.

I picked interest on you after going through your short profile and deemed its necessary to write you immediately.

I have something very vital to disclose to you, but I found it difficult to express myself here, since it's a public site.

Could you please get back to me on (fariza_hazeem22@yahoo.fr) for the full details.

Have a nice day.

Fariza.

 
 
 

Take our poll!

Take our poll!

Latest Activity

swetha posted a blog post

Nebosh IGC Training course - Chennai

Nebosh course in Chennai can be obtained by the safety individual who is doing work, fresher or any engaged indiviuals. The Nebosh course period is 18 days. As we are offering both class room teaching as well as e-learning training with comprehensive of book resources. If you want to perceive a profession in Health and safety sector GWG will give you a best Nebosh training in Chennani.We are…See More
15 hours ago
Training Doyens posted events
16 hours ago
Tom Clark posted a blog post

5 Reasons Why Teens Get Addicted to Alcohol and Drugs

Teenage can be considered as the most difficult period of life. During the teenage years, boys and girls become so desperate that they can do anything they wish. It is basically a vulnerable time when teens try to navigate the bridge between adulthood and childhood. Teens are the most rebellious and as per the study, this is the reason why they get involved in anti-social activities. Not only that, they often become addicted to drug and alcohol because of their rebellious nature.Now this is not…See More
yesterday
Jam Blanco posted a blog post

Response to Marine Oil Spills

Oil spills can wreak havoc on the environment and cause irreversible damage if they aren’t controlled in a timely manner. However, emergency responders need to be trained to react to emergencies quickly and efficiently to prevent more damage. The type of training they receive should depend on their proximity to the spill and whether they need to stop, contain or recover oil from release.For instance, workers who are assigned as early responders to an oil spill should be given more training…See More
yesterday

Forum

Python Condition Objects Tutorial in 2018

If you have knowledge of other programming languages, then you would know the importance of conditional statements. Conditional statements are required for taking decisions. Whenever we operate the…Continue

Tags: course, certification, training, languages, programming

Started by Elena Lauren Apr 2.

Automation Anywhere. How do I pick a value from dropdown 1 Reply

Automation Anywhere. How do I pick a value from dropdown. I tried 'set text' from a copied variable. Its very slow, and also doesnt…Continue

Tags: anywhere, automation

Started by emmablisa. Last reply by venkatesh Mar 29.

Agile overcome common software security challenges

Paradoxically, security is a negative goal. To secure something, you must understand how insecure it is. Start by trying to break it or by figuring out how other people might break it. The same is…Continue

Tags: agile, scrum, security

Started by nicolewells Mar 23.

Understanding Data Parallelism in MapReduce

In order to understand the goals of MapReduce, it is important to realize for which scenarios MapReduce is optimized. The MapReduce programming model is created for processing data which requires…Continue

Tags: program, Implementation, Mapreduce

Started by gracylayla Mar 14.

TensorFlow serving vs TensorFlow service

I have a question regarding the difference between TensorFlow Serving versus TensorFlow service. (Sorry that I'm not familiar with this at all.)I found TensorFlow serving's definition, which is "…Continue

Tags: training, online, tensorflow

Started by emmablisa Feb 27.

Badge

Loading…

© 2018   Created by Safety Community.   Powered by

Badges  |  Report an Issue  |  Terms of Service