The Vendor is required to provide burn care management system (BCMS) with the EHR solution used by county's department
- The BCMS solution includes a 3D burn surface map, automated TBSA calculations, fluid resuscitation tools, nutrition requirements and procedural documentation.
- The system leverages SMART on FHIR for embedded and standalone Single Sign-On (SSO) interfaces for image and PDF transfer into the EHR.
- The solution will enable clinicians across the County to document, manage, and track burn care more efficiently while ensuring compliance with documentation standards.
- The implementation will follow the structured phases defined in this document, beginning with project administration and management, system integration, client system implementation, super users and administrative training, and final acceptance by the County.
- Provide technical staff for Cerner integration, networking, security, and clinical validation.
- Secure Authentication: The importance of utilizing secure authentication, including proper management of authentication credentials (login name and password) and multi-factor authentication.
- Social Engineering Attacks: Identifying different forms of social engineering including, but not limited to, phishing, phone scams, and impersonation calls.
- Handling of County Information: The proper identification, storage, transfer, archiving and destruction of County Information.
- Causes of Unintentional Information Exposure: Provide awareness of causes of unintentional exposure of Information such as lost mobile devices, emailing Information to inappropriate recipients, etc.
- Identifying and Reporting Incidents: Awareness of the most common indicators of an Incident and how such indicators should be reported within the organization.
- Network access to both internal and external networked services shall be controlled, including, but not limited to, the use of industry standard and properly configured firewalls;
- Operating systems will be used to enforce access controls to computer resources, which shall include without limitation multi-factor authentication, use of virtual private networks (VPN), authorization and event logging;
- Contractor will conduct regularly, no less frequently than semi-annually, user access reviews to ensure that unnecessary and/or unused access to County Information is removed in a timely manner;
- Applications will include access control to limit user access to County Information and application system functions.
- Contract Period/Term: 5 years
- Questions/Inquires Deadline: September 17, 2025
Set up free email alerts and get notified when new government bids, tenders and procurement opportunities match your industry and location. Choose daily or weekly delivery.