Behavioral Health Standard 1.J – Technology

1.J.1.a-b

To identify gaps and opportunities in the use of technology, leadership supports ongoing assessment of:

  1. The organizations current use of technology and data, including:
    1. Hardware.
    2. Software.
    3. Communication technologies.
    4. Sensitive data.
    5. Services purchased or contracted.
  2. Input on the organizations use of technology from:
    1. Persons served.
    2. Personnel.
    3. Other stakeholders.
  • ???

1.J.2.a-e

The organization implements a technology and system plan that:

  1. Is based on:
    1. Its current use of technology and data.
    2. Identification of gaps and opportunities in the use of technology.
  2. Includes:
    1. Goals.
    2. Priorities.
    3. Technology acquisition.
    4. Technology maintenance.
    5. Technology replacement.
    6. Resources needed to accomplish the goals.
    7. Time frames.
  3. Supports:
    1. The business processes of the organization.
    2. Protection of sensitive data.
    3. Efficient operations.
    4. Effective service delivery.
    5. Access to services.
    6. Performance improvement.
  4. Aligns with the organizations strategic plan.
  5. Is reviewed and updated as needed.
  • ???

1.J.3.a-d

The organization implements policies and procedures in the following areas:

  1. Acceptable use.
  2. Backup / Recovery.
  3. Business continuity / Disaster recovery.
  4. Security, including:
    1. Access management.
    2. Audit capabilities.
    3. Data export and transfer capabilities.
    4. Decommissioning of physical hardware and data destruction.
    5. Protections from malicious activity.
    6. Remote access and support.
    7. Updates, configuration management, and change control.
  • ???

1.J.4.a-c

A test of the organizations procedures for business continuity / disaster recovery:

  1. Is conducted at least annually.
  2. Is analyzed for:
    1. Effectiveness.
    2. Areas needing improvement.
    3. Actions to be taken.
    4. Results of performance improvement plans.
    5. Necessary education and training of personnel.
  3. Is evidenced in writing, including the analysis.
  • ???

1.J.5.a-c

The organization provides documented training to personnel:

  1. On cyber security.
  2. On the technology used in performance of their job duties.
  3. Including:
    1. Initial training.
    2. Ongoing training.
  • ???

1.J.6.a-b

The organization implements written procedures:

  1. That address:
    1. Consent of the person served.
    2. Audio recording, video recording, and photographing the person served.
    3. Decision making about when to use information and communication technologies versus face to face services.
  2. To confirm that all necessary technology and / or equipment is available and functions:
    1. Prior to the start of service delivery.
    2. As needed throughout services.
    3. At the:
      1. Originating site.
      2. Remote site.
  • ???

1.J.7.a-g

As appropriate, personnel who deliver services via information and communication technologies receive competency-based training on equipment:

  1. Features.
  2. Set up.
  3. Use.
  4. Maintenance.
  5. Safety considerations.
  6. Infection control.
  7. Troubleshooting.
  • ???

1.J.8.a-b

As appropriate, instruction and training and training provided:

  1. To:
    1. Persons served.
    2. Members of the family / support system.
    3. Others.
  2. On equipment:
    1. Features.
    2. Set up.
    3. Use.
    4. Troubleshooting.
  • ???

1.J.9.a-b

Service delivery includes:

  1. Personnel to provide assistance with accessing services provided by the organization.
  2. Based on identified need:
    1. An appropriate facilitator at the site where the person served is located.
    2. Modification to:
      1. Treatment techniques / interventions.
      2. Equipment.
      3. Materials.
      4. Environment of the remote site, including:
        1. Accessibility.
        2. Privacy.
        3. Usability of equipment.
  • ???

1.J.10.a-b

Prior to the start of each session:

  1. All participants in the session are identified, including those at:
    1. Originating site.
    2. Remote site.
  2. The organization provides information that is relevant to the session.
  • ???

1.J.11

The organization maintains equipment in accordance with manufacturers recommendations.

  • ???

1.J.12.a-b

Emergency procedures address the unique aspects of service delivery via information and communication technologies, including:

  1. The provider becoming familiar with the emergency procedures of the remote site, if the procedures exist.
  2. Identification of local emergency resources, including phone numbers.
  • ???