Вы находитесь на странице: 1из 5

Re

RFP Question Response


f
XYZ has developed expertise in providing end to end solution for
clinical data management as a result of 25+ years of experience
in successfully implementing these solutions for number of
customers across the globe.

XYZ Operations Framework


XYZ has proposed the best of its innovation frameworks and levers
which are in line with the 21CE framework which focuses on
automation.

XYZ Clinical Data Management Services comprise of end-to-end,


centralized tools that cover the entire clinical trial lifecycle, from
data collection to report submission. We harmonize a unique
synergy between best-in-class business process services and
industry specific CDM technology.

As per XYZ belief whatever is automatable should be


automated. XYZ operation framework enables this belief by
leveraging Computer Assisted Coding (CAC) for providing
solution to cater to <<Customer Name>>s business
requirements as per the RFP.

Traditionally coding of clinical reports is done by specially trained


coders but XYZs proposes to incorporate computer-assisted
coding (CAC) systems for <<Customer Name>> considering the
number of codes to keep track of is enormous in case of
<<Customer Name>> due to vast network of hospitals, medical
institutions , specializations thus increasing the number of
patients and their respective claims

Introduction to COMPUTER-ASSISTED CODING (CAC)


SYSTEMS

CAC is an emerging paradigm leading to significant changes in


medical coding solutions. It involves the use of computers to
generate a set of medical codes for review, validation and use for
patient encounters and other forms of medical documentation.
This would allow coders to improve their productivity by primarily
validating generated code instead of generating it themselves. It
would also help them devote their knowledge / time to more
complex issues.

XYZs proposed approach for <<Customer Name>>

XYZ has developed CAC modules using natural language


processing algorithm tools and modules which will enable
<<Customer name>> to access products like include enterprise
scheduling, Web scheduling, medical necessity, insurance
verification, patient kiosk, and surgery management, smart
The extensive use of data to drive business has increased
the economic value of personal information. This results in every
instance of a data breach turning into a very stressful, expensive,
and time consuming affair. It can result in:
Loss of customers,
Loss of stakeholder confidence
Loss of shareholder value
Loss of brand equity.
Heavy fines on the organizations

XYZs extensive expertise and years of experience in managing


and preventing threats enables it to comprehend the evolving
security needs of customers across industries. This positions XYZ
as the perfect partner an organizations transformational
information security programs. Given below are XYZs
comprehensive range of services that will aid you in security of
data at rest and data in motion.

XYZ data security framework

XYZ has developed its own data privacy framework from inputs
derived from global privacy frameworks, industry best practices,
personal data protection and security legislations,
and sector-specific privacy requirements spanning the globe. This
framework enables XYZ to deliver superior data privacy services.
XYZs data privacy framework is intended to provide detailed
guidance and direction to businesses on common privacy issues
and their impact. It considers the various areas
associated with privacy at four different layers i.e. Strategic,
Tactical, Management, and Operational.
Each area has its own roles and functions across various levels in
the organization. Data/PI protection being the focus, it also takes
into consideration the entire IT ecosystem surrounding the data.
This includes the applications, systems, network, and the people
associated with various types of personal information. The
framework aims at striking a balance between information
privacy, business needs, and commercial interests.

XYZ Data Security Framework

Features Description

Identifying areas of an organizations


privacy program that requires improvement
IT Privacy and also areas of privacy compliance that
Audits/Assessm are vulnerable to IT related risk. This
ents includes conducting IT privacy audits,
performing gap assessments, and the
automation of privacy audit management.
Design and implementation of privacy
FAR Clause 52.222.17 : Non displacement of Qualified
Workers

Clause 52.222.17 of Federal Acquisition Regulation lays down


directives for safeguarding the employment of the employees /
workers of the organization whose job may be at stake due to
change in the Service Provider/contractor when an existing
contract ends.
Few Definitions regarding the same have been mentioned below.

Terminology of FAR Clause 52.222.17


Term Description

Predecessor Contractor and sub-contractor


Predecessor
is either the third party contractor who was
Contractor and
providing service to the organization i.e.
Sub Contractor
existing contractor/service provider

Successor Contractor and sub-contractor is


Successor
the new service provider who will be
Contractor and
providing the service and taking it over
Sub Contractor
from the predecessor contractor.
Service Employee is a person engaged in
the performance of a service contract who
Service has been hired just to fulfill the contract.
Employee Employees in executive, administrative
position do not fall into the category of a
Service Employee

The FAR provides below mentioned guidelines to the Successor as


well as Predecessor Contractor and Sub contractor for
safeguarding the employment of Service worker. The details of the
Clause 52.222.17 have been summarized in the below mentioned
points:

FAR Clause 52.222.17


Tracks Description
The Contractor and its subcontractors shall, offer
the Service Employees under the predecessor
contract a right of first refusal of employment.
The successor Contractor and sub-contractor will
not offer new openings under this contract without
offering first right of refusal of employment to the
Service Employees.
The Successor Contractor and Sub contractor
should make an offer of employment to all the
Right of first Service Employees stating the time within which
refusal to this offer should be accepted by the Service

Вам также может понравиться