Adverse Event Management System Features

By: Ccd Systems  09-12-2011
Keywords: Event Management, data collection, Event Management System

AEMS Features Overview

AEMS, is an enterprise-level incident and unusual event management system designed to administer all aspects of the data collection process. AEMS fully supports multiple site locations both in terms of branch-based data collection elements as well as reporting on a hierarchical and functional basis. AEMS includes an extensive set of features and functions that make incident reporting and management intuitive for users. Our system will support both ‘anonymous’ report creation and ‘identity reporting’.

Browser-based Incident Reporting: AEMS runs as a web application so all staff may have access using their Internet Explorer browser. The AEMS application is usually installed onto a regional or branch in-house web site thereby protecting it from public access. The application can also be installed using SSL certification in order to apply an additional level of encryption to the data moving between the server and workstations.

Phase Driven Process Flow: The underlying feature that allows AEMS to parallel an organization’s existing processes is its capability of separating the incident reporting workflow into distinct phases; similar to the handling of a multipart form. As the event enters each pre-defined phase, different management levels become involved and questions relevant to the current phase are presented for answers.

The phases that an event enters can be tailored by a number of factors including branch, type of incident and severity. AEMS supports unlimited levels of management review and follow-up phases.

 Incident Questions: Each type of incident that might occur within your company requires that specific questions be answered in order to properly follow up on the direct cause or perform long-term trending of patterns. AEMS allows clients to display questions along with choices for alternatives. These questions are grouped into sets and placed on web pages using a host of formatting options. Initial form loading will be performed in order to deliver a turnkey solution.

Context sensitive help: At all times while entering or reviewing incidents, users have access to help pages that guide them through the data entry process.

Unlimited incident notes: Throughout all phases of the information gathering process, participants can enter any number of comments. All comments are stored with the User’s name and date/time stamp. During the review process, comments are displayed in chronological order and can only be modified by the original submitting user.

Role based security: AEMS  was developed from the ground up to support legislated security requirements. Role based permissions allow users to perform selected tasks. Rights to view and edit events are assigned to users according to their branch, department and confidential status of the event.  Every action can be recorded and audit reports help Safety Managers monitor Employee privacy.


Pre-defined Collection Tables:  To expedite initial configuration, AEMS ships with several Collection Lists (Pre-defined tables) that can be enabled to prompt for specific information. The following items can be easily loaded and assigned to display when specific event types are entered. The added benefit of using CCD created collection lists allows for standardized data entry and reporting.
 Participants
 Locations
 Contributing Factors
 Basic & Direct Causes
 Outcomes
 Standard Operating Procedures
 Follow-up Actions

De-identification Option: In order to support long-term quality improvement, historical data analysis and root cause analysis; a de-identification capability is included –allowing the viewing of events by non-emergency staff while maintaining employee confidentiality. To support complete de-identification of incidents, all personal information that refers to management and staff can be flagged for removal during the de-identification process.


Security & Privacy Protection: AEMS was developed from the ground up to support legislated security requirements. Role-based permissions allow users to perform selected tasks. Rights to view and edit events are assigned to users according to their branch, department, and confidential status of the event.  Every action can be recorded and audit reports help Safety Managers monitor employee privacy.


Detailed Audit Trail: Various levels of auditing have been incorporated into AEMS to provide Safety Management staff with the necessary tools to protect incident information collected. When enabled, all user activity is logged, including when they logged on and what menu selections were performed. Details about who saw or edited each event are also stored and can be reported on using one of several audit reports.

AEMS also tracks which Users saw personal information about employees participating in the event and thereby collect the specific demographic information viewed. AEMS also tracks changes made to previously entered incident data by saving a snapshot of the old data into an audit log where privileged users can later view it.

Connection to 3rd-party Database: In larger organizations, it is sometimes easier to locate employees through existing sources. Interfaces can be purchased to connect with (1) central employee repositories, (2) human resource information systems. In addition AEMS supports users logging in with their authenticated Windows username & password.
Confidential Event Handling: Individual incidents or all incidents within a specified category (such as psychiatric events) can be flagged as confidential. Confidential events may advance through the workflow process according to separate criteria. For example you may want to skip phases in order to limit management involvement.

Reporting: AEMS ships with over 25 standard reports, this will allow users to set custom criteria prior to running. Criteria selection permits limiting the report to certain departments, event types or changing the type of data requested. By changing select criteria, thousands of report combinations are available. 

Real-time Status: Also available to privileged users is access to an ‘Info Center’ Web page that provides an overview of event counts within their hierarchal department jurisdiction. Dashboard-like graphics provide a visual overview of key indicators. Users can ‘drill down’ to display the event listing and then the individual incident details.

For information on customization using the AEMS  Configuration Manager, please contact your CCD representative.

Keywords: data collection, Event Management, Event Management System, Report Creation

Other products and services from Ccd Systems

09-12-2011

Introduction to AEMS Health Care

CCD’s Adverse Event Management System supports the accurate recording, management and resolution of adverse events and patient complaints within healthcare facilities. The set-up module is a Windows® application that is used to define the workflow and data collection requirements for your event categories and types.


09-12-2011

AEMS - Incident Analyst

All of the products in CCD’s Adverse Event Management Suite support the accurate recording, management and resolution of incidents, unusual events and complaints across various industry sectors. Products include an extensive set of features and functions that make incident reporting and management intuitive for users while allowing complete customization without programming.


09-12-2011

Frequently Asked Questions about AEMS

AEMS requires no manual installation of components on the client (any required components, such as the CrystalReports Viewer, are deployed by IIS as needed). The AEMS Notification Utility may be hosted on any server that can connect to the database server over a network connection. Which need to be hosted from the Web server tier. The SQL database - hosted on the database tier.


09-12-2011

AEMS Detailed Description

If Anonymous reporting is permitted, the main start screen provides Users with the opportunity to report an incident without logging on. Events can be created and managed through Internet Explorer, assuming the user has been assigned the appropriate permissions. Supervisors and Managers that wish to view or follow up on an incident must logon in order to validate their permissions.