GEHRIMED Technical Requirements
GEHRIMED Technical Requirements
GEHRIMED is a cloud-based software service, which makes it available to users on demand so long as they are connected to the internet. Utilizing cloud-based servers allows GEHRIMED to enhance its security levels, as well as maintain its cost-effective scalability as the platform and its base of users continues to grow.
To access GEHRIMED, users need to install software on the devices they intend to use to access the EHR platform. This simple software installation identifies the type of device the user is operating and completes the proper access security validation and optimization protocols so they can use GEHRIMED successfully every time they log in.
GEHRIMED-supported devices include desktop computers, laptops and iPads, with the current third-party software requirements and hardware recommendations defined below. Both the web-based software and client software are frequently upgraded to align with evolving software architecture and security standards, which may require users to update their devices in order to maintain adequate security and HIPAA compliance. If these requirements change, the GEHRIMED team notifies users as quickly as possible so they can upgrade any of their software and hardware as needed. If users encounter a problem with GEHRIMED relating to their own software or hardware, they are expected to consult a third-party service for additional support and service.
OPERATING SYSTEM REQUIRED | SOFTWARE REQUIRED* | HARDWARE / SERVICE REQUIRED* |
---|---|---|
Windows (PC) | Windows 10 or 11 |
|
iOS (iPad) | iOS 13.6 or later |
|
MacOS | Catalina or later |
|
*Required for minimum performance and functionality of the GEHRIMED app. If a user experiences technical difficulty with GEHRIMED and their device doesn’t meet the specifications listed above, the GEHRIMED technical support team may recommend that the user upgrade their hardware in order to experience the full functionality of the GEHRIMED software.
Netsmart is committed to protecting sensitive data and providing a secure and reliable EHR platform for its clients. Please be aware that Microsoft officially ended support for Windows 7 on February 14, 2020. Therefore, Windows 7 devices will no longer receive updates or important security patches that protect these systems. Netsmart strongly recommends that GEHRIMED users follow Microsoft’s advice and upgrade their devices to ensure proper support and security within the EHR platform.
GEHRIMED requires internet connectivity to remain active, although occasional short disconnections are tolerated. Internet connectivity may be maintained via a wired (for Windows) or wireless network or through a cellular network card. We do not recommend using a hotspot for connectivity due to the inconsistency of the connection they typically provide. For users with a monthly speech recognition subscription, we recommend a high-speed wireless or 4G LTE connection. If a GEHRIMED problem occurs and is isolated to the user’s internet connectivity, the user is expected to consult a third-party service for additional support and service.
The Dragon Medical SpeechKit can function with virtually any network connection, but it does rely on both network bandwidth and network latency to perform optimally. See Nuance’s minimum network requirements for the ideal user experience.
The Dragon Medical Speech Kit requires a microphone, which records audio data with a depth of 16 bit and a sampling rate of at least 16 kHz. We recommend testing the microphones that your users will work with before you deploy the Dragon Medical Speech Kit. See Nuance’s website for a list of recommended microphones.
GEHRIMED assumes that customers use encrypted hard drives to protect all PHI. Data downloaded to customer devices is encrypted by password entry. All GEHRIMED user accounts are password protected, and each user account has a set of uniquely configured access rights. Additionally, double authentication is used to ensure that the user’s access has not been compromised. Authentication methods used for double authentication include SMS messaging and encrypted keys on detached USB drives. Automatic session timeouts are also implemented to help protect the equipment from unauthorized access.