<<

Nuance® Clintegrity 360™ Installation Guide

14.4 Release Client Support

Phone: 800.892.5049 Fax: 877.238.2776 Web Portal: http://www.nuance.com/support/index.htm

Government Programs Support

Phone: 800.257.0512 Self-Service Support: gov.nuance.com/clintegrity360

Proprietary Statement This material constitutes proprietary and trade secret information and shall not be disclosed to any third party, nor used by the recipient except under the terms and conditions prescribed by Nuance Communications, Inc.

Copyright Statement © 2014 Nuance Communications, Inc. All rights reserved. Nuance, the Nuance logo, and Clintegrity 360 are trademarks and/or registered trademarks of Nuance Communications, Inc., and/or its subsidiaries in the United States and/or other countries. All other trademarks are properties of their respective owners. Table of Contents Clintegrity 360 Installation Guide Table of Contents

14.4 Release

About This Guide ...... ix

Chapter 1  Before Beginning Installation Steps ...... 1

Chapter 2  Installing Clintegrity 360 Before Installing Clintegrity 360 ...... 3 Installing the Clintegrity 360 Application...... 4 Install Clintegrity 360 with a SQL Database ...... 4 Installing the Database Only ...... 16 Installing Clintegrity 360 Databases on SQL Server ...... 16 Installing the EDM Process Manager Only...... 22 Install the Process Manager with an SQL Server Database ...... 22 Installing JReports Only ...... 26 How to … Install JReports Only ...... 26 Set Up a Clintegrity 360 | Abstracting Builder Workstation ...... 29

Chapter 3  Installing Database Software Installing SQL Server ...... 31 Installing Microsoft SQL Server 2008...... 31

i Clintegrity 360 Installation Guide

Chapter 4  Configuring Clintegrity 360 How to … Set Up Clintegrity 360 to Run as a Service...... 44 Configure Browser ...... 45 Configure ...... 46 Configure Flat Panel Monitors...... 49 Configure Ad-Hoc Report Designer ...... 49 Configure HL7 Server Reports ...... 50 Manually Install LeadTools ...... 52 Set Up Electronic Document Management Network Printers ...... 52 Install and Configure Scanners with QEDM ...... 53 Setup SSL with Clintegrity 360 ...... 55

Appendix A  Setting Up Clintegrity 360 in the Task Scheduler How to … Create Entry to Stop Clintegrity 360 ...... 57 Create Entry to Clintegrity 360 Application...... 61

Appendix B  Barcode and Form Specifications for Electronic Document Man- agement Form Specifications ...... 65 Barcode Specifications ...... 66 Barcode Prefix Recommendations ...... 67

Appendix  Barcode Specifications for Chart Completion and Chart Locator Types of Barcode Readers...... 69 Barcode Printers ...... 70 Detailed Hardware Specifications ...... 70 Web Vendors ...... 71 Stationary Scanners and Printers ...... 71

Index ...... 73

ii List of Figures List of Figures Figure 1: SQL Server Selection Window ...... 5 Figure 2: Registration Window ...... 5 Figure 3: Component Selection Window ...... 6 Figure 4: EDM Component Selection Window ...... 6 Figure 5: Path Selection Window ...... 7 Figure 6: Service Setup Window ...... 7 Figure 7: Optional Setup Window...... 8 Figure 8: Workflow License Entry Window...... 8 Figure 9: Workflow Host and Post Entry Window...... 9 Figure 10: VACC License Window ...... 9 Figure 11: Email Server and Email Address Entries Window...... 10 Figure 12: HL7 Entries Window ...... 10 Figure 13: Fax Server Path Window...... 11 Figure 14: Program Folder Window ...... 11 Figure 15: SQL Server Database Host and Fort Window...... 12 Figure 16: Path Selection for db Window ...... 12 Figure 17: Path Selection for Content Window...... 13 Figure 18: Start Copying Files Window ...... 13 Figure 19: Framework 2.0 Window...... 14 Figure 20: Setup Window ...... 14 Figure 21: Disk Space Window ...... 14 Figure 22: Installation Completion Window ...... 15 Figure 23: Registration Window ...... 17 Figure 24: Component Selection Window ...... 17 Figure 25: Path Selection Window ...... 18 Figure 26: Program Folder Window ...... 18 Figure 27: SQL Server Database Host and Port ...... 19 Figure 28: Path Selection Window ...... 19 Figure 29: Path Selection for Content Window...... 20 Figure 30: Start Copying Files Window ...... 20 Figure 31: Framework 2.0 Window...... 20 Figure 32: Setup Window ...... 21 Figure 33: Disc Space Window ...... 21 Figure 34: Installation Completion Window ...... 21

iii Clintegrity 360 Installation Guide

Figure 35: Registration Window ...... 22 Figure 36: Component Selection Window...... 23 Figure 37: Service Setup Screen ...... 23 Figure 38: Server Database Host and Port Window ...... 24 Figure 39: Select Program Folder Window ...... 24 Figure 40: Start Copying Files Window...... 25 Figure 41: Registration Screen ...... 26 Figure 42: Component Selection Window...... 27 Figure 43: Path Selection Window ...... 27 Figure 44: Select Program Folder Window ...... 28 Figure 45: Start Copying Files Window...... 28 Figure 46: SQL Server Window ...... 31 Figure 47: SQL Server Installation Center Planning Screen...... 31 Figure 48: SQL Server Installation Center Installation Screen ...... 32 Figure 49: SQL Server 2008 Setup Support Rules Screen...... 32 Figure 50: SQL Server 2008 Setup Product Key Screen ...... 33 Figure 51: SQL Server 2008 Setup License Terms Screen ...... 33 Figure 52: SQL Server 2008 Setup Support Files Screen ...... 34 Figure 53: SQL Server 2008 Setup Support Rules Screen...... 34 Figure 54: SQL Server 2008 Setup Role Screen ...... 35 Figure 55: SQL Server 2008 Feature Selection Screen ...... 36 Figure 56: SQL Server 2008 Installation Rules Screen ...... 36 Figure 57: SQL Server 2008 Instance Configuration Screen ...... 37 Figure 58: SQL Server 2008 Disk Space Requirements Screen ...... 37 Figure 59: SQL Server 2008 Server Configuration Screen...... 38 Figure 60: SQL Server 2008 Database Engine Configuration Screen ...... 38 Figure 61: SQL Server 2008 Error reporting Screen...... 39 Figure 62: SQL Server 2008 Installation Configuration Rules Screen ...... 39 Figure 63: SQL Server 2008 Ready to Install Screen...... 40 Figure 64: SQL Server 2008 Complete Screen ...... 40 Figure 65: SQL Server Installation Center Screen ...... 41 Figure 66: Internet Options Window ...... 48 Figure 67: Pop Up Blocker Settings Window ...... 48 Figure 68: ODBC Data Source Administrator Window ...... 50 Figure 69: Create a New Data Source to SQL Server Window ...... 50 Figure 70: Create a New Data Source to SQL Server Authenticity Window...... 51

iv List of Figures

Figure 71: Create a New Data Source to SQL Server Database Window ...... 51 Figure 72: Select Program to Schedule Screen ...... 57 Figure 73: Scheduled Task Wizard Daily Screen...... 58 Figure 74: Scheduled Task Wizard Start Time Screen ...... 58 Figure 75: Scheduled Task Wizard User Name Screen...... 59 Figure 76: Scheduled Task Wizard Successful Notification Screen...... 59 Figure 77: Daily Stop Window ...... 60 Figure 78: Select Program to Schedule Screen ...... 61 Figure 79: Scheduled Task Wizard Daily Start Screen ...... 61 Figure 80: Scheduled Task Wizard Daily Start Time Screen ...... 62 Figure 81: Scheduled Task Wizard User name Screen ...... 62 Figure 82: Daily Start Window ...... 63

v Clintegrity 360 Installation Guide

This page intentionally left blank

vi List of Tables List of Tables Table 1: Chapters and Descriptions ...... ix Table 2: Appendices and Descriptions ...... x Table 3: Fonts and Descriptions ...... xi Table 4: Installation Steps ...... 1 Table 5: Pre-Install Steps ...... 3 Table 6: Barcode Prefixes ...... 67 Table 7: Patient Encounter Identifiers ...... 68 Table 8: Additional Patient Encounter Identifiers ...... 68 Table 9: Detailed Hardware Specifications ...... 70

vii Clintegrity 360 Installation Guide

This page intentionally left blank

viii About This Guide About This Guide

This Clintegrity 360 Installation Guide provides instructions for new installations of Clintegrity 360.  If you are upgrading Clintegrity 360, please see the Clintegrity 360 Upgrade Installation Guide.

Audience and Assumptions The information in this guide is prepared on the assumption that you have experience working in the environment.

How to Use This Guide When performing a new installation, see the following chapters:

Table 1: Chapters and Descriptions

DETAILS ON CHAPTER DESCRIPTION PAGE

Before Beginning Use the checklist in this chapter to ensure you perform all (see page 1) the necessary steps.

Installing Clintegrity 360 Follow the steps in this chapter to install Clintegrity 360 (see page 3)

Installing Database Software Follow the steps in this chapter to install the database (see page 31) software.

Configuring Clintegrity 360 After installing Clintegrity 360, follow these steps to (see page 43) configure the application.

ix Clintegrity 360 Installation Guide

See these appendices if applicable:

Table 2: Appendices and Descriptions

DETAILS ON APPENDIX DESCRIPTION PAGE

Setting Up Clintegrity 360 in the Explains how to use the task scheduled to release any (see page 57) Task Scheduler locks on the database and re-initialize the log files.

Barcode and Form Specifications Contains barcode and form specification for  (see page 65) for Electronic Document Clintegrity 360 | Electronic Document Management. Management

Barcode Specifications for Chart Contains barcode specifications for  (see page 69) Completion and Chart Locator Clintegrity 360 | Chart Completion and  Clintegrity 360 | Chart Locator.

Related Documentation

In addition to this guide, the following documents you in using Clintegrity 360. PDF files are available on the Client Support Web site.

 Clintegrity 360 Upgrade Installation Guide – This guide provides instructions for upgrading an existing installation of Clintegrity 360. It is available as a PDF file and printed book.

 Clintegrity 360 System Administration Guide – This guide describes setup and maintenance of global elements, such as users, user groups, and privileges. It is available as a printed book, online help, and a PDF file.

 Quick reference cards – These cards provide shortcuts and brief procedural information. They are available as printed brochures and PDF files.

 User guides – These guides describe how to set up and use the application. They are available as printed books, Online help, and PDF files.

 Clintegrity 360 Ad-Hoc Reports Guide – This guide provides information about the  Clintegrity 360 database tables used for ad-hoc reporting.

x About This Guide

Conventions

Fonts and Typefaces This guide uses fonts and typefaces to connect what you read in this book to what you see on the screen or what you need to into the system. Of particular importance are the following:

Table 3: Fonts and Descriptions

FONT AND TYPEFACE DESCRIPTION

bold sans serif For text that appears in windows or dialog boxes (such as the Close and OK buttons, the File menu) and for file names (such as c:\control.ini, /etc/hosts) that appear within the text of paragraphs.

SMALL CAPITALS For keyboard key names, such as ENTER or TAB.

monospaced font Used for listing the contents of files and code samples.

bold monospaced Identifies actual characters you should type. For example: font … type the prompt …

means you should type the characters e, x, i, and t

Bold-italic Indicates that you should the text with the actual value appropriate for your system. For example: … locate the file d:\\control.ini … means you should replace d: and directory with the actual drive and of the file in question, when performing the task; for example, c:\windows\control.ini

xi Clintegrity 360 Installation Guide

This page intentionally left blank

xii Chapter 1 Before Beginning

Chapter 1  Before Beginning

Installation Steps Use the table below to guide you through the installation process. Some processes are different depending on the database software you are using with Clintegrity 360. See the instructions for the database software your facility is using.

Table 4: Installation Steps

WITH SQL  INSTALLATION PROCESS WHO NEEDS TO PERFORM THIS PROCESS SERVER DATABASE  Install database software All clients (see page 31)  Configure database software All clients (see page 31)  Review steps to be completed before All clients (see page 3) beginning the installation of the Clintegrity 360 software  Install OpenOffice and a purchased Clients using Correspondence Management or EDM must of WinZip install OpenOffice. Clients using EDM must install a purchased version of WinZip  Install Clintegrity 360 software All clients (see page 4)  Install Clintegrity 360 database only Clients installing the Clintegrity 360 (see page 4) database separately from other  Clintegrity 360 software  Install EDM Process Manager only Clients installing the EDM Process (see page 22) Manager separately from other  Clintegrity 360 software. The EDM Process Manager is used by Clintegrity 360 | Electronic Document Management  Install JReports only Clients installing JReports on a workstation (see page 26) separately from other Clintegrity 360 software  Set up a Clintegrity 360 | Abstracting Clients using Clintegrity 360 | Abstracting (see page 29) Builder workstation  Set Up Clintegrity 360 to run as a All clients (see page 44) service  Configure the browser All clients (see page 45)

1 Clintegrity 360 Installation Guide

WITH SQL  INSTALLATION PROCESS WHO NEEDS TO PERFORM THIS PROCESS SERVER DATABASE  Configure the browser security All clients (see page 46) settings  Configure the Ad-Hoc Report Clients who want to create ad-hoc reports (see page 49) Designer  Configure HL7 Server reports Clients using the HL7 Server interface with (see page 50) Clintegrity 360

 Install ActiveX controls on Clients using Clintegrity 360 | Electronic (see page 52) workstations Document Management in an environment where end users are restricted users (end-users cannot install programs).  Set up network printers Clients using network printing with (see page 52) Clintegrity 360 | Electronic Document Management.  Install the scanner driver and card Clients using Clintegrity 360 |Electronic (see page 53) Document Management need to install the scanner driver and optionally the scanner card.

2 Chapter 2 Installing Clintegrity 360

Chapter 2  Installing Clintegrity 360

CAUTION: If you have purchased Implementation Services, please contact a representative to schedule the installation of  Clintegrity 360. If you have not purchased Implementation Services, please contact Client Support for assistance.

For a split server installation, follow the steps in Installing the Database Only to install the database on another machine. Then follow the instructions to install the software application. Be sure to only install the Clintegrity 360 software and JReports Designer, if ad-hoc reporting was purchased.

After you install the server software, provide users with the URL for the Clintegrity 360 system so they can access and use the system.

Before Installing Clintegrity 360

CAUTION: Before beginning, create a backup of your system data and ensure that it will restore properly. Failure to do so may result in a loss of data.

Table 5: Pre-Install Steps

 DO THE FOLLOWING BEFORE INSTALLING

 Review the Clintegrity 360 to ensure that your system meets the minimum recommended system configuration.  Read the Release Notes shipped with the product.  If you are installing on Windows 2008 Server, disable on the server.  Ensure you have adequate to devote to the installation. A new installation of  Clintegrity 360 may take up to one and a half hours.  Install your database software.  If you are using a fax server with Electronic Document Management, install it before installing Clintegrity 360. Please note that you will need to enter the path to the fax server.  Close all applications on the machine on which you are installing Clintegrity 360.  Confirm that is not running.

3 Clintegrity 360 Installation Guide

 DO THE FOLLOWING BEFORE INSTALLING

 Confirm that you have 3.1 or higher installed. If Windows Installer 3.1 or higher is not listed in Start\Settings\\Add or Remove Programs, it can be installed from http://www.microsoft.com/downloads. Search for and install Windows Installer 3.1.

The installation program presents you with a series of screens in which you enter information about your particular system setup. At each screen, when you are satisfied with the information you provided, click Next. If at any time you need to make changes to a previous screen, click Back. To change information several screens back, click Back several times.

After the installation, check the log files for errors. The log files for the Clintegrity 360 installation are found in Quantim\logs\QuantimInstallversionhhmmss.log on the drive where Clintegrity 360 is installed. Version is the version you are installing and hhmmss is the time (hour, minutes, and seconds) of the installation. If the installation is aborted, the log file is found at the root directory level.

Installing the Clintegrity 360 Application Use the instructions for installing Clintegrity 360 with an SQL Server database. The installation should take approximately 90 minutes.

Install Clintegrity 360 with a SQL Server Database

1. Log on to the server as Administrator.

2. Ensure that you have downloaded the software files from the ESD (Electronic Software Document) link. Click Browse in the Run dialog box. Select the location where you downloaded the software files, and double-click setup.exe in the Disk1 folder. Click OK.

NOTE: Software and PDFs of guides and other documentation are available for download on the client support Web site. CDs and printed materials are available for purchase.

The installation program checks for an installation of Clintegrity 360:

 If the program finds Clintegrity 360 installed, then you are notified that you can only perform an upgrade or add components. See the Clintegrity 360 Upgrade Installation Guide for instructions on upgrading.

 If the program determines that a new installation is appropriate, then the License Agreement appears.

3. On the License Agreement screen, click Yes to accept the license agreement and to the next screen.

4 Chapter 2 Installing Clintegrity 360

4. The SQL Server Selection screen appears. Select the SQL Server that you want to use and click Next.

Figure 1: SQL Server Selection Window

5. On the Clintegrity 360 Registration screen, enter your name, company information, and serial number. Click Next.

NOTE: If you are reinstalling, you can the serial number in the license.topaz file in the ...\quantim\Topaz\Tomcat\webapps\topaz\WEB-INF\classes folder on the or backup tape. If you cannot access this file, call Client Support for the number.

Figure 2: Registration Window

6. On the Component Selection screen, choose the components that you want to install, then click Next.

NOTE: The EDM Process Manager component is only an option for Electronic Document Management installations.

5 Clintegrity 360 Installation Guide

 If you want to install a complete version of the application, then check all of the boxes.

 If you wish to install the software and its database on different machines, select  Clintegrity 360 Software, JReports Designer (if ad-hoc reporting was purchased), and EDM Process Manager (if applicable) here. After you complete the software installation, see Installing the Database Only to install the database.

Figure 3: Component Selection Window

7. In the EDM Components Selection screen, do not select any of the components; click Next.

Figure 4: EDM Component Selection Window

6 Chapter 2 Installing Clintegrity 360

8. On the Path Selection screen, accept the default location or click Browse to select a new destination path, and click Next.

Figure 5: Path Selection Window

9. If the installation includes the EDM Process Manager, then the following window appears. Enter the network domain name, user ID, password, and confirm the password. Then click Next.

Figure 6: Service Setup Window

10. Select the optional components that work with Clintegrity 360, and click Next.

CAUTION: The VACC option is only available to Veterans Affairs customers or Government VA customers. For information, contact your Client Support representative.

7 Clintegrity 360 Installation Guide

If WorkFlow is selected, enter the license key for each of the products selected. Then click Next.

Figure 7: Optional Setup Window

NOTE: If you select the Disable Report Engine option, after the installation, you need to manually add the Quantim.server.type=ApplicationOnly to edmConfig.properties if you have the EDM license. There is an additional property to display a message when reports are disabled, for example to tell users to use a different server for reporting. Contact Client Support if you would like to make use of this or need to change edmConfig.properties.

Figure 8: Workflow License Entry Window

8 Chapter 2 Installing Clintegrity 360

11. The Workflow Host and Port entry screen displays. Default values are populated, but confirm the information, and add any other relevant information.

Figure 9: Workflow Host and Post Entry Window

a. Enter the host or IP address for the Workflow server. Change the ports for the Workflow server, if required.

b. Enter the Workflow Administrator user name and password.

c. Click Next.

12. If you have selected VACC for installation, enter the Inpatient and Outpatient License keys on the following screen, and then click Next.

Figure 10: VACC License Window

9 Clintegrity 360 Installation Guide

13. If you plan to e- reports from Clintegrity 360, on the EMail Server and Email Address Entries screen, enter the e-mail server name and email address. If you will not deliver reports via e-mail, leave the field blank. Click Next.

NOTE: If you do not know the e-mail server name, contact your System Administrator.

Figure 11: Email Server and Email Address Entries Window

14. If you have checked to install HL7, then you set up the interface with Clintegrity 360 by completing the screen shown below.

Figure 12: HL7 Entries Window

a. Enter the User name and password.

b. Enter the URL for the HL7 server, such as http://HL7ServerName:8088/hl7server.do, where HL7ServerName is the name of the HL7 server.

10 Chapter 2 Installing Clintegrity 360

c. Enter an initial polling interval. We recommend that you initially enter 5 for 5 seconds. d. Click Next.

15. If your installation includes Electronic Document Management or Chart Completion, then the Enter Fax Server Path screen appears. Do the following:

a. Enter both the path and fax server program name. Separate each folder with two slashes, \\, for example, C:\\Program Files\\VSI\\FaxServer\\bin\\vfx.exe.

b. Click Next.

Figure 13: Fax Server Path Window

16. On the Select Program Folder screen, accept the default folder name, and click Next.

Figure 14: Program Folder Window

11 Clintegrity 360 Installation Guide

17. On the Enter SQL Server Database Host and Port screen, enter the SQL Server Database Host name where the Clintegrity 360 database is to reside, and enter the Port to be used. If you did not specifically create a named instance for the Clintegrity 360 databases, then enter 1433. This corresponds to the default instance SQL Server creates during installation. If you did create a named instance, then enter the port number for the instance you created. Click Next.

NOTE: It is critical that you supply the correct name of the database host machine, for example, VHAV16QMDSRV. If you do not know it, contact your System Administrator.

Figure 15: SQL Server Database Host and Fort Window

18. On the Path Selection for Clintegrity 360 database screen, accept the default destination folder for the Clintegrity 360 database or browse to a location you prefer, and click Next.

Figure 16: Path Selection for db Window

12 Chapter 2 Installing Clintegrity 360

19. On the Path Selection for Clintegrity 360 Content screen, accept the default destination folder or browse to one that you prefer, and click Next.

Figure 17: Path Selection for Content Window

20. Review the information on the Start Copying Files screen. If it is correct, then click Next to begin the installation.

Figure 18: Start Copying Files Window The Progress screens display while the following programs are installed:

 Clintegrity 360 in the directory you specified

 JReports Enterprise Server (if ad-hoc reporting was purchased)

 Reports Designer

 EDM Process Manager, if applicable

13 Clintegrity 360 Installation Guide

 A database, if you chose to install one.

NOTE: If the SQL Server Agent asks if you would like to proceed, click Yes. If this screen does not appear, it has automatically proceeded and you do not need to be concerned.

21. If you do not have Microsoft . Framework 2.0 installed, then the following screen appears, and the application is automatically installed.

Figure 19: Framework 2.0 Window If you do not have Windows Installer 3.1 installed, the following error appears. Install Windows Installer 3.1 (see www.Microsoft.com/downloads to download Windows Installer 3.1) and then restart the installation.

Figure 20: Setup Window

22. The installer checks for adequate disk space.

NOTE: If you wish to run an installation and by-pass the space check, type setup.exe SSC on the command line where setup.exe is located. This prevents the installation from checking if sufficient space is available to complete the installation process. A rollback due to error may not be possible if there is insufficient space, so a manual backup should be taken to ensure that the installation can be restored if necessary.

If you do not have enough disk space, then the following message appears. When you click OK, the installation aborts. You can restart the installation after you have made room for the installation. If you do have adequate disk space, then the disk space window appears for a few seconds and then the installation proceeds.

Figure 21: Disk Space Window

14 Chapter 2 Installing Clintegrity 360

23. On the Clintegrity 360 Finish screen, choose to restart the machine now or later, and then click Finish.

Figure 22: Installation Completion Window

24. If you installed the Clintegrity 360 database as part of the software installation, follow instructions to limit the amount of space the SQL Server uses on the server machine.

25. After the installation, check the log files for errors. The log files for the Clintegrity 360 installation are found in Quantim\logs\QuantimInstallversionhhmmss.log on the drive where Clintegrity 360 is installed. Version is the version you are installing and hhmmss is the time (hour, minutes, and seconds) of the installation. If the installation is aborted, the log file is found at the root directory level.

15 Clintegrity 360 Installation Guide

Installing the Database Only These instructions cover the installation of the database on a machine separate from the software.

The installation program presents you with a series of screens in which you to enter information about your particular system setup. At each screen, when you are satisfied with the information you provided, click Next. If you need to make changes to a previous screen, click Back. To change information several screens back, click Back several times.

Installing Clintegrity 360 Databases on SQL Server

NOTE: The server on which you are installing Clintegrity 360 should be restarted prior to beginning the installation procedure.

1. Log on to the server as Administrator.

2. Ensure that you have downloaded the software files from the ESD (Electronic Software Document) link. Click Browse in the Run dialogue box. Select the location where you downloaded the software files, and double-click the setup.exe in the Disk1 folder. Click Ok.

NOTE: Software and PDFs of guides and other documentation are available for download on the client support Web site. CDs and printed materials are available for purchase.

3. On Welcome screen, click Next.

4. On the License Agreement screen, review the terms, and click Yes.

16 Chapter 2 Installing Clintegrity 360

5. On the Clintegrity 360 Registration screen, enter your name, company information, and serial number, and click Next.

NOTE: If you are reinstalling, you can find the serial number in the license.topaz file in the ...\quantim\Topaz\Tomcat\webapps\topaz\WEB-INF\classes folder on the application server or backup tape. If you cannot access this file, call Client Support for the number.

Figure 23: Registration Window

6. On the Component Selection screen, check the Clintegrity 360 Database checkbox, and click Next.

Figure 24: Component Selection Window

17 Clintegrity 360 Installation Guide

7. On the Path Selection screen, accept the default location or click Browse to enter a new destination path, and click Next.

Figure 25: Path Selection Window

8. On the Select Program Folders screen, choose the program group for Clintegrity 360. You can accept the default name or supply the name of the Windows Program Group in which the shortcuts should be installed, and click Next.

Figure 26: Program Folder Window

18 Chapter 2 Installing Clintegrity 360

9. On the Enter SQL Server Database Host screen, enter the name of the machine on which your database will reside, and click Next.

CAUTION: It is critical that you supply the correct name of the database host machine, for example, VHAV16QMDSRV. If you do not know it, then contact your System Administrator.

Figure 27: SQL Server Database Host and Port

10. On the Path Selection for Clintegrity 360 db screen, accept the default destination folder for the database or browse to a location you prefer, and click Next.

Figure 28: Path Selection Window

19 Clintegrity 360 Installation Guide

11. On the Path Selection for Clintegrity 360 Content screen, accept the default destination folder or browse to one you prefer, and click Next.

Figure 29: Path Selection for Content Window

12. On the Start Copying Files screen, review the information. If it is correct, then click Next to begin the installation.

Figure 30: Start Copying Files Window

13. If you do not have Microsoft .Net Framework 2.0 installed, then the following screen appears, and the application is automatically installed.

Figure 31: Framework 2.0 Window

20 Chapter 2 Installing Clintegrity 360

14. If you do not have Windows Installer 3.1 installed, the following error appears. Install Windows Installer 3.1 (see www.Microsoft.com/downloads to download Windows Installer 3.1) and then restart the Clintegrity 360 installation.

Figure 32: Setup Window

15. The installer checks for adequate disk space. If you do not have enough disk space, the following message appears. When you click OK, the installation aborts. You can restart the installation after you have made room for the installation. If you do have adequate disk space, the disk space window appears for a few seconds and then the installation proceeds.

Figure 33: Disc Space Window

16. On the Finish screen, choose to restart the server now or later, and click Finish.

Figure 34: Installation Completion Window

17. Follow the steps to limit the amount of space the SQL Server uses on the server machine.

21 Clintegrity 360 Installation Guide

Installing the EDM Process Manager Only Use these steps to only install the EDM Process Manager. The EDM Process Manager is used by Electronic Document Management.

Install the Process Manager with an SQL Server Database

1. Log on to the computer as an Administrator.

2. Ensure that you have downloaded the software files from the ESD (Electronic Software Document) link. Click Browse in the Run dialogue box. Select the location where you downloaded the software files, and double-click the setup.exe in the Disk1 folder. Click Ok.

NOTE: Software and PDFs of guides and other documentation are available for download on the client support Web site. CDs and printed materials are available for purchase.

3. On the License Agreement screen, click Yes to accept the license agreement and move to the next screen.

4. On the Clintegrity 360 Registration screen, enter your name, company information, and serial number. Click Next.

NOTE: If you are reinstalling Clintegrity 360, you can find the serial number in the license.topaz file in the ...\quantim\Topaz\Tomcat\webapps\topaz\WEB-INF\classes folder on the application server or backup tape. If you cannot access this file, call Client Support for the number.

Figure 35: Registration Window

22 Chapter 2 Installing Clintegrity 360

5. The Component Selections screen appears. Choose EDM Process Manager; then click Next.

Figure 36: Component Selection Window

6. On the Process Manager service setup screen, please enter your Domain, User ID, and Password. Then click Next.

Figure 37: Service Setup Screen

23 Clintegrity 360 Installation Guide

7. On the Enter SQL Server Database Host screen, enter the name of the machine on which your database will reside. Click Next.

NOTE: It is critical that you supply the correct name of the database host machine. If you do not know it, contact your System Administrator.

Figure 38: Server Database Host and Port Window

8. On the Select Program Folder screen, accept the default folder name. Click Next.

Figure 39: Select Program Folder Window

24 Chapter 2 Installing Clintegrity 360

9. Review the information on the Start Copying Files screen. If it is correct, click Next to begin the installation.

Figure 40: Start Copying Files Window

10. A progress screens display while the program installs.

11. When the installation is complete, the Finish screen appears. You are asked to restart the computer. Check the appropriate checkbox to restart the computer now or later. Click the Finish button.

25 Clintegrity 360 Installation Guide

Installing JReports Only

How to ...

Install JReports Only Use these steps to only install JReports on a workstation.

1. Log on to the workstation as an Administrator.

2. Ensure that you have downloaded the software files from the ESD (Electronic Software Document) link. Click Browse in the Run dialogue box. Select the location where you downloaded the software files, and double-click the setup.exe in the Disk1 subdirectory. Click Ok.

NOTE: Software and PDFs of guides and other documentation are available for download on the client support Web site. CDs and printed materials are available for purchase.

3. On the License Agreement screen, click Yes to accept the license agreement to move to the next screen.

4. On the Clintegrity 360 Registration screen, enter your name, company information, and serial number. Click Next.

NOTE: If you are reinstalling, you can find the serial number in the license.topaz file in the ...\quantim\Topaz\Tomcat\webapps\topaz\WEB-INF\classes folder on the application server or backup tape. If you cannot access this file, call Client Support for the number.

Figure 41: Registration Screen

26 Chapter 2 Installing Clintegrity 360

5. On the Component Selections screen, choose JReports Designer and then click Next.

Figure 42: Component Selection Window

6. On the Path Selection screen, accept the default location and click Next.

Figure 43: Path Selection Window

27 Clintegrity 360 Installation Guide

7. On the Select Program Folder screen, accept the default folder name, and click Next.

Figure 44: Select Program Folder Window

8. Review the information on the Start Copying Files screen. If it is correct, then click Next to begin the installation.

Figure 45: Start Copying Files Window A progress screens display while the programs install.

9. When the installation is complete, the Finish screen appears. You are asked to restart the workstation. Check the appropriate checkbox to restart the machine now or later. Click the Finish button.

28 Chapter 2 Installing Clintegrity 360

Set Up a Clintegrity 360 | Abstracting Builder Workstation To set up a workstation as the Clintegrity 360 | Abstracting Builder workstation do the following:

 Install SQL Server client tools or server.

 Install the Clintegrity 360 software component on the workstation.

See the following for installation instructions. On the Component Selection screen, be sure to only select the Clintegrity 360 Software component.

 Install Clintegrity 360 with a SQL Server Database

 Verify that the Clintegrity 360 database, and SQL Server are installed on the server.

29 Clintegrity 360 Installation Guide

This page intentionally left blank

30 Chapter 3 Installing Database Software

Chapter 3  Installing Database Software

Before installing Clintegrity 360, install Microsoft SQL Server.

Installing Microsoft SQL Server The following section describes installing and upgrading the Microsoft SQL Server for  Clintegrity 360 applications:

Installing Microsoft SQL Server 2008

1. Insert DVD or browse to SQL Server Installation file location and double-click the setup.exe to begin the install.

Figure 46: SQL Server Window The SQL Server Installation Center screen displays.

Figure 47: SQL Server Installation Center Planning Screen

31 Clintegrity 360 Installation Guide

2. Click the Installation link on the left side of the screen and then click the New Installation or add feature to an existing installation link.

Figure 48: SQL Server Installation Center Installation Screen The System Configuration Checker runs automatically.

Figure 49: SQL Server 2008 Setup Support Rules Screen If any checks have failed, click the Show details button or View detailed report link to find out the cause, correct it, and then click the Re-run button to perform the checks again. If all the checks have passed, click the OK button. The Product Key screen displays.

32 Chapter 3 Installing Database Software

3. Enter the product key in the Enter the product key field and click Next.

Figure 50: SQL Server 2008 Setup Product Key Screen

4. Accept the License Terms and click Next.

Figure 51: SQL Server 2008 Setup License Terms Screen The Setup Support Files screen displays.

33 Clintegrity 360 Installation Guide

5. Click Install to start the installation of the SQL server.

Figure 52: SQL Server 2008 Setup Support Files Screen The Setup Support Rules screen displays.

6. Click Next to continue the installation.

Figure 53: SQL Server 2008 Setup Support Rules Screen The Setup Role screen displays.

34 Chapter 3 Installing Database Software

7. Select the SQL Server Feature Installation radio button and click Next.

Figure 54: SQL Server 2008 Setup Role Screen The Feature Selection screen displays.

8. Select the following standard features you want to install and click Next:

a. Database Engine Services:  SQL Server Replication  Full-Text Search

35 Clintegrity 360 Installation Guide

b. Shared Features:  Client Tools Connectivity  Client Tools Backwards Compatibility  Management Tools - Basic  Management Tools - Complete

Figure 55: SQL Server 2008 Feature Selection Screen The Installation Rules screen displays.

9. Click Next to continue the installation.

Figure 56: SQL Server 2008 Installation Rules Screen The instance Configuration screen displays.

36 Chapter 3 Installing Database Software

10. Select the Default Instance radio button and click Next.

NOTE: It is recommended that you use a default instance with Clintegrity 360. Contact Client Support if your facility has a need for using a named instance.

Figure 57: SQL Server 2008 Instance Configuration Screen The Disk Space Requirements screen displays.

11. Click Next to continue the installation.

Figure 58: SQL Server 2008 Disk Space Requirements Screen The Server Configuration screen displays.

37 Clintegrity 360 Installation Guide

12. Select NT AUTHORITY\SYSTEM and then click Next.

NOTE: No changes are required for Collation settings screen.

Figure 59: SQL Server 2008 Server Configuration Screen The Database Engine Configuration screen displays.

13. Select the Mixed Mode (SQL Server authentication and windows authentication) radio button, enter a password for system administrator, and confirm the password.

Figure 60: SQL Server 2008 Database Engine Configuration Screen

38 Chapter 3 Installing Database Software

14. On the Error Reporting screen, review the information and then click Next.

Figure 61: SQL Server 2008 Error reporting Screen The Installation Configuration Rules screen displays.

15. Click Next to continue the installation.

Figure 62: SQL Server 2008 Installation Configuration Rules Screen The Ready to Install screen displays.

39 Clintegrity 360 Installation Guide

16. Click Next to continue the installation.

Figure 63: SQL Server 2008 Ready to Install Screen The Complete screen displays.

17. Click Close to complete the installation.

Figure 64: SQL Server 2008 Complete Screen The SQL Server Installation Center screen displays.

40 Chapter 3 Installing Database Software

18. Click Close icon to close the SQL Server Installation Center screen.

Figure 65: SQL Server Installation Center Screen

41 Clintegrity 360 Installation Guide

This page intentionally left blank

42 Chapter 4 Configuring Clintegrity 360

Chapter 4  Configuring Clintegrity 360

This chapter details the configuration of the browser, the ad-hoc report designer, and how to set up ad-hoc reporting to add views and tables before using Clintegrity 360.

How to ...

 Set Up Clintegrity 360 to Run as a Service (see page 44)

 Configure Browser (see page 45)

 Configure Browser Security Settings (see page 46)

 Configure Flat Panel Monitors (see page 49)

 Configure Ad-Hoc Report Designer (see page 49)

 Configure HL7 Server Reports (see page 50)

 Manually Install LeadTools (see page 52)

 Set Up Electronic Document Management Network Printers (see page 52)

 Install and Configure Scanners with QEDM (see page 53)

 Setup SSL with Clintegrity 360 (see page 55)

 Enable SSL (see page 55)

43 Clintegrity 360 Installation Guide

Set Up Clintegrity 360 to Run as a Service If you would like to run Clintegrity 360 as a service, follow these steps. Running  Clintegrity 360 as a service enables you to leave the server logged off when running Clintegrity 360.

NOTE: Clintegrity 360 should be run from an account which has Administrator privilege.

If the application is already setup to run as a service and you need to modify the service, you may need to uninstall the service and set it up again. To uninstall the service, double-click the UninstallQuantimService.bat located in the...\Quantim\topaz\bin folder. Then follow these steps to setup the service again.

1. In Windows Explorer on the server, browse to the...Quantim\Topaz\bin folder.

2. If the RAM (physical memory) of the application server is equal to or greater than 1.5 GB proceed to step 4.

3. If the RAM (physical memory) of the application server is less than 1.5 GB, do the following:

a. In the...\Quantim\topaz\bin folder, locate InstallQuantimService.bat. Right-click on it and select Edit from the pop-up menu.

b. In the file, change the maximum amount of memory that should be available for the application based on the amount of RAM available for memory on the server. To do so, replace the 1024 default setting in three places (two in the rem Set extra parameters section and one in the rem More extra parameters section) with the setting for your facility.

NOTE: If the memory value is overset, performances issues could occur because virtual memory may be used.

For example, 512 MB of RAM for the application is generally a good setting if 1 GB RAM is typically available for memory on the server. In the file sample below, the maximum MB default has been changed from 1024 MB to 512 MB (changes are in boldface).

rem Set extra parameters %CATALINA_HOME%\bin\tomcat5.exe //US//%SERVICENAME% --JvmOptions "-Xms512M;-Xmx512M;-XX:MaxPermSize=256M;-Xss2M;-Dcatalina.base=%CATALINA_ HOME%;-Dcatalina.home=%CATALINA_HOME%;-Djava.endorsed.dirs=%CATALINA_ HOME%\common\endorsed" --StartMode jvm --StopMode jvm

rem More extra parameters set PR_STDOUTPUT=%CATALINA_HOME%\logs\stdout.log set PR_STDERROR=%CATALINA_HOME%\logs\stderr.log %CATALINA_HOME%\bin\tomcat5.exe //US//%SERVICENAME% ++JvmOptions "-Djava.io.tmpdir=%CATALINA_HOME%\temp" --JvmMs 128 --JvmMx 512 The service '%SERVICENAME%' has been installed.

c. Save and close the file.

4. In the...\Quantim\topaz\bin folder, locate InstallQuantimService.bat. Double-click it to run it.

5. Select Start\Settings\Control Panel. Double-click the Administrative Tools and then on Component Services. Under the tab, Services is selected by default.

6. Locate the Clintegrity 360 service. Right-click on it and select Properties from the pop-up menu.

44 Chapter 4 Configuring Clintegrity 360

7. Click the Log On tab and make one of the following selections:

 If Clintegrity 360 will be printing to a network printer, select This Account and set up the user log on for a user who has access to the network printer.

 If Clintegrity 360 will be printing to a local printer, select Local System account.

8. Click OK.

Configure Browser Clintegrity 360 uses Microsoft Internet Explorer as its Web browser. For Clintegrity 360 to function properly, you need to configure your browser to display the correct font size, use the proper settings and get updated pages every time it connects to the server.

NOTE: Verify that you are not signed in to Clintegrity 360 when configuring browser.

1. Start Internet Explorer.

2. Configure the Internet options as follows:

a. Select Tools\Internet Options.

b. On the General tab, in the or Browsing History section, click Settings.

c. From the Check for newer versions of stored pages, select one of the following radio buttons:  Every Visit To The Page or Every time I visit the – If you use Electronic Document Management or and the server is in a different time zone than the workstation, or if you use eSignature.  Automatic or Automatically – If the above conditions do not apply to your facility.

d. Click OK to close the Settings window and apply the change.

NOTE:

 For Compliance, click the Advanced tab and select Print background colors and images in the Printing section. This enables background color printing for post-audit worksheets.

 The setting Allow software to run or install even if the signature is invalid is enabled to allow the autoprint functionality to work without an error.

e. Click OK to close the Internet Options window.

3. Configure the text size by selecting View\Text Size\Medium.

4. Configure the encoding by selecting View\Encoding\Auto-Select.

5. For Correspondence Management, configure the page setup as follows:

a. Select File\Page Setup.

b. In the Headers and Footers section, delete any entries in the Header and Footer fields.

6. Restart your browser to apply all settings.

CAUTION: The use of supplemental browser toolbars such as Yahoo! Companion or is not recommended with Clintegrity 360. You should remove or disable these toolbars when using Clintegrity 360.

45 Clintegrity 360 Installation Guide

Configure Browser Security Settings Prior to running the application or integration, the following Internet Explorer settings must be set. These settings apply to any workstation that uses the application or integration, including both scan and view stations. There are many components that are loaded to the local machine when viewing images. If the Active X controls are not changed, then constant pop-ups appear while viewing images. The Clintegrity 360 server is added as a trusted site, so that these settings apply only to Clintegrity 360, but do not affect other Internet or intranet applications.

You can use the Internet Explorer Administration Kit (IEAK) provided by Microsoft to create and manage custom browser software packages with the Clintegrity 360 settings. When these packages are installed on clients’ desktops, they receive customized versions of Internet Explorer with the settings and options selected. After you deploy Internet Explorer, you can use the IEAK Profile Manager to change browser settings and restrictions automatically.

These settings apply only to Clintegrity 360, and do not affect other Internet or intranet applications you use from your browser.

1. Take note of the location of the Clintegrity 360 production server (and test server, if applicable). You can find the name of the location by opening the application and viewing the URL. The name appears after http:// and is followed by a colon.

2. In the Internet Explorer browser window, select Tools\Internet Options.

3. In the Internet Options window, click the Security tab.

4. Click the Trusted Sites symbol and then click the Sites button.

5. In the Trusted Sites window, enter the following:

a. In the edit box located at top of the window, enter http:// (replace the with the name of your Clintegrity 360 application server name). Then click the Add button. The name appears in the Web sites list.

b. Confirm that Require server verification… is unchecked. Uncheck if necessary.

6. Click OK or Cancel. From the Security tab with the Trusted Sites symbol selected, click the Custom Level button.

7. The Security Settings window opens. Make or verify the following selections:

a. Confirm that Medium is selected in the Reset to drop-down list and change if necessary.

b. In the ActiveX controls and plug Ins section, verify that the Enable radio button is selected for:  Allow Scriptlets (.0 or higher)  Automatic prompting for ActiveX controls (Internet Explorer 8.0 or higher)  Download signed ActiveX controls

46 Chapter 4 Configuring Clintegrity 360

In the Internet Options window, perform the following steps:  Initialize and script ActiveX controls not marked as safe for scripting (Internet Explorer 8.0 or higher)  Run ActiveX controls and plug-ins  Script ActiveX controls marked safe for scripting

c. For Clintegrity 360 | Electronic Document Management and Clintegrity 360 | File Manager, in the ActiveX controls and plug Ins section, verify that the Enable radio button is selected for the following:  Allow previously unused ActiveX controls to run without pop-ups (Internet Explorer 8.0 or higher)  Binary and script behaviors (Internet Explorer 8.0 or higher)  Only allow approved domains to use ActiveX without prompt (Internet Explorer 8.0 or higher)

d. Confirm that the Prompt radio button is selected for the Download unsigned ActiveX controls setting (enable if using Clintegrity 360 | Electronic Document Management or Clintegrity 360 | File Manager).

e. In the Miscellaneous section, select Enable for Allow script-initialized windows without size or position constraints (Internet Explorer 8.0 or higher).

f. For Clintegrity 360 | Electronic Document Management and Clintegrity 360 | File Manager, in the Miscellaneous section, select Enable for the following:  Access data sources across domains  Allow META REFRESH (Internet Explorer 8.0 or higher)  Allow scripting of Internet Explorer Web browser control (Internet Explorer 8.0 or higher)

g. For Clintegrity 360 | File Manager, in the Downloads section, select Enable for the Automatic prompting for file downloads setting (Internet Explorer 8.0 or higher).

8. Click OK to return to the Internet Options window.

9. You can disable the pop-up blocker only for Clintegrity 360 by entering your Clintegrity 360 application server name.

47 Clintegrity 360 Installation Guide

a. Click the Privacy tab and then click the Settings button next to the Block pop-ups checkbox.

Figure 66: Internet Options Window

b. In the edit box located at top of the window, enter the name of your Clintegrity 360 application server.

c. Click the Add button. The name appears in the Allowed sites list.

Figure 67: Pop Up Blocker Settings Window

10. Click Close to return to the Internet Options window.

11. Click OK.

48 Chapter 4 Configuring Clintegrity 360

 The window closes and you are returned to Internet Explorer.

 The settings now take effect.

NOTE: If you are using Internet Explorer 8.0 with the or , then turn off the User Account Control (UAC) setting under ControlPanel\User Accounts. This helps to avoid scripts errors during a scan save.

Configure Flat Panel Monitors Some flat panel monitors have settings that conflict with keyboard shortcuts. These monitors have hot keys available that allow the screen display to flip to a sideways view. If hot keys are enabled, you loose the ability to use keyboard shortcuts.

If you want to use keyboard shortcuts, you need to disable the Hot Keys settings. See your monitor user guide for instructions on changing hot key settings.

NOTE: Please consult with your IT department regarding these changes.

Configure Ad-Hoc Report Designer To create ad-hoc reports (if you purchased ad-hoc reporting), you must configure JReports Designer to connect to the correct database.

1. Double-click the JReports Designer icon.

2. Set the following options:

a. From the File menu, select Options.

b. On the Advanced tab, uncheck all the boxes. Click Apply.

c. On the Catalog tab, select Sort Ascending in the Sort Items section and Identify Critical Differences (the default setting) in the Merge Catalog Options section. Click Apply.

3. Click OK.

4. From the File menu, select Open Catalog.

5. Browse to JREntServer/JReports/AdHoc/AdHoc.cat, where AdHoc is Coding AdHoc, Abstracting AdHoc, or AdHoc for Compliance.

6. In the Catalog Browse window, the Data tab is selected by default. Expand Connection.

7. Set the connection properties as follows:

a. Right-click on the Clintegrity 360 connection listed under Connection and select Properties from the pop-up menu.

b. For the URL value, change the database host name, localhost, to the server name.  For an SQL Server database, the original value is: jdbc:inetdae7:localhost:1433:QuantimDB

8. From the File menu, select Save Catalog.

9. Close the Catalog Browse window.

49 Clintegrity 360 Installation Guide

Configure HL7 Server Reports If you are using the HL7 Server with Clintegrity 360, after you install HL7 Server, use these instructions to configuration the HL7 reports so that they are available from the application. If the HL7 interface engine is running on the application server, the data source is already set up and you do not need to perform these steps.

1. On the application server, select Start\Setting\Control Panel.

2. Double-click the Administrative Tools.

3. Double-click the Data Sources (ODBC).

4. Click the System DSN tab and then click Add.

Figure 68: ODBC Data Source Administrator Window

5. Select SQL Server and click Finish.

6. In the SQL Server window, perform the following steps:

Figure 69: Create a New Data Source to SQL Server Window

50 Chapter 4 Configuring Clintegrity 360

a. Enter QHL7 in the Name field.

b. Enter a description.

c. Choose Clintegrity 360 database from the Server drop-down.

7. In the Windows NT Authentication window, select the options as shown in the screen below, and click Next.

Figure 70: Create a New Data Source to SQL Server Authenticity Window

8. Retain the default settings for this window, and click Next.

Figure 71: Create a New Data Source to SQL Server Database Window

9. Click Finish.

10. In the topaz connectionpool.properties, make the following manual entries:

 hl7.db.type=MSSQL

 hl7.db.path.mssql=:1433

 hl7.mssql.username=AVWHGBZLY

 hl7.mssql.password=a7WH%b89

51 Clintegrity 360 Installation Guide

Manually Install LeadTools The following are the steps to manually update workstations to the new version of LeadTools that was shipped with Clintegrity 360 11.4. These steps should not be performed until the application server has been upgraded to 11.4. If you are on Clintegrity 360 11.4, or higher, this upgrade has already been performed.

NOTE: You must use an Administrative login to perform these steps.

1. Run RemoveLT_v13.bat. This may be run using a mapped network drive or a UNC path to the location of the Clintegrity 360 11.4 application server. The file is located in this directory: \Topaz\bin This bat file deletes the prior version of the LeadTools. 2. Run LTInstallerV14.5.msi to install the new version of LeadTools. This file is located in the same path as above. After running this file the LeadTools version is upgraded on the workstation and graphic or scanned documents display as usual. The workstation is now ready for use by the non-admin user.

Set Up Electronic Document Management Network Printers If you are using Electronic Document Management, use these steps to set up the network printers.

1. the Electronic Document Management server.

2. Log in to the computer that contains the Electronic Document Management server as a network user.

3. From Printers in Control Panel, add the printers under the domain user that is used to run the service.

4. Start the Electronic Document Management server.

52 Chapter 4 Configuring Clintegrity 360

Install and Configure Scanners with QEDM Scanner installation instructions may vary according to scanner model and card used. The steps below describe the basic configuration for the Fujitsu scanners. See the installation instructions provided with your scanner for further information.

Begin Install

1. If a Twain driver was previously installed, either disable or un-install it so that  Clintegrity 360 can recognize the Kofax driver.

2. Load the Kofax software.

a. Do not install the controller board or connect the scanner at this time to the USB port or any SCSI board.

b. Run the setup.exe file either from the or the setup.exe from the install directory on the server. If the software is located on the server, map a drive to this location and run the setup from the mapped drive. (When you run the setup from a network share, you may get errors during the install).

c. At each screen or prompt, accept all the default settings.

3. Connect the scanner to the SCSI card or connect the scanner to the USB port (whichever is appropriate to the configuration purchased).

4. Power on the PC and log in.

5. If you un-installed your Twain driver, the computer might give you a message that it cannot find a driver. Check the box that reads Do not prompt me again.

53 Clintegrity 360 Installation Guide

Install Software

1. Insert the CD for the ISIS driver. Or go to Fujitsu’s Web site and download the ISIS driver for the scanner model you are installing: www.fujitsu.com/global/support/computing/peripheral/scanners/drivers/index.#isis

2. Go to Control Panel and click the KSM (Kofax Source Manager). This launches a series of screens:

a. Click Next on the first screen, then click Create.

b. Give the device an alias name (such as the name of the scanner).

c. Click the drop-down arrow and select ISIS scanning without image processing. Click Next.

d. Select the scanner model from the drop-down menu.

3. Click OK and select the relevant scanner model from the drop-down entries. You can also check the entries under Compatible and Certified.

4. On the next screen click Set as Default.

5. Click Next and Finish.

6. Test the scanner:

a. Go to Start\Programs\Kofax Image Controls and select vcdemo32.

b. On the dialog box, from Source, select the scanner. The default scanner is displayed.

c. Select OK.

Licenses & Internet Settings

1. Copy the following three Kofax License files from the...Quantim\EDM folder on the  Clintegrity 360 server and place them in c:\windows\program files\kofax\imgtcls\bin. (If this is not done, you will get an error during scanning.)

 lc300s.lic

 lc300p.lic

 lc300g.lic

2. In Internet Explorer, go to Tools\Internet Options\Trusted Site Set up the server as a trusted site and refer to the Configure Browser section. (see page 45).

54 Chapter 4 Configuring Clintegrity 360

Setup SSL with Clintegrity 360 Clintegrity 360 now supports Secure Socket layer, SSL. The Secure Sockets Layer (SSL) is a commonly used protocol to manage the security of a message transmission on the Internet.

Steps to setup SSL with Clintegrity 360:

1. Generate key and insert it into the keystore on Clintegrity 360 server.

a. Navigate to \quantim\topaz\jdk\bin in Command Prompt.

b. keytool -genkey -alias quantim -keyalg RSA -keystore quantimsecurekey.bin -keysize 2048 -validity 1000 keystore password: ttadmin First/Last Name: server name used in URL (ie if mash-co is server name in URL put that. if mash-co-himoncall.com is used in URL put that) What is the name of your organizational unit?: servers What is the name of your organization? Nuance What is the name of your City or Locality? Burlington What is the name of your State or Province? Massachusetts What is the two letter country code for this unit?: US Confirm correct: yes Enter key password for : Press Enter to keep same password

NOTE: If a certificate signed by a third party Certificate Authority (such as Verisign or GoDaddy) is used, proceed to Step 2 otherwise skip to Step 7.

2. Generate *.csr on Clintegrity 360 server.

a. Navigate to \quantim\topaz\jdk\bin in Command Prompt.

b. keytool -certreq -alias quantim -keystore quantimsecurekey.bin -file .csr

3. Send *.csr to client so they can buy a certificate.

4. Copy the *.crt files to the Clintegrity 360 server once the certificates have been received.

5. Import intermediate certificate.

a. Navigate to \quantim\topaz\jdk\bin in Command Prompt.

b. keytool -import -alias intermed -keystore quantimsecurekey.bin -trustcacerts -file .crt

6. Import server certificate.

a. Navigate to \quantim\topaz\jdk\bin in Command Prompt.

b. keytool -import -alias quantim -keystore quantimsecurekey.bin -trustcacerts -file .crt

7. Copy created quantimsecurekey.bin with your self-signed certificate or copy your purchased certificate (*.bin, *.jks) named as quantimsecurekey.bin to \quantim\topaz\tomcat\conf.

8. Rename server.xml to server.old.

55 Clintegrity 360 Installation Guide

9. Rename server.xml_https to server.xml.

10. Rename web.xml to web.old.

11. Rename web.xml_https to web.xml.

12. Edit server.xml.

a. Add the truststorefile line below to the existing connector port:

maxThreads="150" scheme="https" secure="true"

clientAuth="false" sslProtocol="TLS"

keystoreFile="/conf/quantimSecureKey.bin" keystorePass="ttadmin" truststoreFile="/conf/quantimSecureKey.bin" truststorePass="ttadmin"/>Edit .

a. Add the below line to extra parameters line (Right after the endorsed" part)

13. Edit .

a. Add the below line to extra parameters line (Right after the endorsed" part)

;-Djavax.net.ssl.trustStore==%CATALINA_ HOME%\conf\quantimSecureKey.bin;-Djavax.net.ssl.trustStorePassword=ttadmin

14. Uninstall Clintegrity 360 Service.

15. Re-install Clintegrity 360 Service using InstallQuantimService.bat.

16. Restart Clintegrity 360. The new URL is https://:8443/topaz/main.do

56 Appendix A Setting Up Clintegrity 360 in the Task Scheduler

Appendix A  Setting Up Clintegrity 360 in the Task Scheduler

The procedures in this chapter are performed so that any locks on the database are released and log files are re-initialized.

NOTE: These steps only apply to server installations, not to standalone installations.

How to ...

 Create Entry to Stop Clintegrity 360 (see page 57)

 Create Entry to Start Clintegrity 360 Application (see page 61)

Create Entry to Stop Clintegrity 360

1. Open the Task Scheduler by selecting Start\Programs\Accessories\System Tools\Scheduled Tasks.

2. Double-click the Add Scheduled Task.

3. In the Scheduled Task Wizard window, click Next.

4. In the next window, click Browse.

5. In the Browse window, locate c:\windows\system32\net.exe, select net.exe and click Open.

Figure 72: Select Program to Schedule Screen

57 Clintegrity 360 Installation Guide

6. Enter the description for the task. In this case enter Quantim Daily Stop. Click the Daily radio button. Then click Next.

Figure 73: Scheduled Task Wizard Daily Screen

7. Set the time for the backup when it will not interfere, for instance 11:59 PM. Click Next.

Figure 74: Scheduled Task Wizard Start Time Screen

58 Appendix A Setting Up Clintegrity 360 in the Task Scheduler

8. Enter the password that Clintegrity 360 uses to run. This account must stay logged in at all times. The server maybe locked, however, click Next.

Figure 75: Scheduled Task Wizard User Name Screen

9. Check Open advanced properties for this task when I click Finish. Then click Finish.

Figure 76: Scheduled Task Wizard Successful Notification Screen

59 Clintegrity 360 Installation Guide

10. On the Task tab, type stop Clintegrity 360 after the net.exe path so that the Run field reads as follows: c:\windows\system32\net.exe stop Quantim. Then click OK.

Figure 77: Daily Stop Window

11. Again enter the password under which Clintegrity 360 was installed.

NOTE: There must be a considerable delay i.e. around five minutes, between Stopping and Starting of Clintegrity 360 application.

60 Appendix A Setting Up Clintegrity 360 in the Task Scheduler

Create Entry to Start Clintegrity 360 Application

1. Open the Task Scheduler by selecting Start\Programs\Accessories\System Tools\Scheduled Tasks.

2. Click Add Scheduled Task.

3. In the Scheduled Task Wizard window click Next.

4. In the next window, click Browse.

5. In the Browse window, locate c:\windows\system32\net.exe, select net.exe, and click Open.

Figure 78: Select Program to Schedule Screen

6. Enter the description for the task. In this case enter Quantim Daily Start. Click the Daily radio button. Then click Next.

Figure 79: Scheduled Task Wizard Daily Start Screen

61 Clintegrity 360 Installation Guide

7. Set the time for the backup when it will not interfere, for instance 12:05 AM. Click Next.

Figure 80: Scheduled Task Wizard Daily Start Time Screen

8. Enter the password that Clintegrity 360 uses to run. This account must stay logged in at all times. The server maybe locked, however, click Next.

Figure 81: Scheduled Task Wizard User name Screen

9. Check Open advanced properties for this task when I click Finish. Then click Finish.

62 Appendix A Setting Up Clintegrity 360 in the Task Scheduler

10. On the Task tab, type start Clintegrity 360 after the net.exe path so that the Run field reads as follows: c:\windows\system32\net.exe start Quantim. Then click OK.

Figure 82: Daily Start Window

11. Again enter the password under which Clintegrity 360 was installed.

63 Clintegrity 360 Installation Guide

This page intentionally left blank

64 Appendix B Barcode and Form Specifications for Electronic Document Management

Appendix B  Barcode and Form Specifications for Electronic Document Management

In Electronic Document Management (EDM), you can perform low volume scanning, such as the scanning used in Registration, and high volume scanning (batch type scanning process), such as scanning used in Health Information Management or back scanning projects. When scanning a high volume of documents, you can use barcode scanning which eliminates the need to manually index documents.

To use barcodes, a barcode coversheet can be produced from EDM, or barcodes can be pre-printed hospital-generated forms. A combination of EDM system generated coversheets and barcoded forms can also be used. When using forms with pre-printed barcodes, a sample of forms should be tested during EDM implementation to insure system compatibility. See Barcode Specifications for detailed barcode requirements.

If you need assistance with the process of barcoding and form redesign, contact a representative for referrals to third parties who can assist with this task.

Form Specifications The following are specifications for forms to be scanned into Electronic Document Management (EDM):

 All forms should be the standard size of 8.5 by 11 inches. Larger size forms can be used if the scanner supports it; however, switching between form sizes usually diminishes scanning productivity.

 We recommend that all forms be printed on 20# bond paper. Other weights can be accepted; however, thinner paper may result in bleeding through during scanning. In addition, lighter or heavier bonds may prove difficult to feed through the automatic document feeder of the scanner.

 White paper is recommended for all documents because it provides the best results. If colored paper is necessary, select a light color to provide contrast between the background and the text. To test a color of paper, make a copy on a standard copy machine and see if the copy is readable. If the copy is not readable, then it probably will not scan well.

 Booklets and fold-out forms should have a perforation at the bound or fold-out edges for ease of separation into 8.5 by 11 inch pages during scanner preparation. Jagged edges may cause misfeeds and diminish scanning productivity. Some fold-out forms have a data column in the fold, or handwritten text may be applied outside of the one-eighth inch boarder which would not be picked up in the scanning process. These forms must be redesigned so that the perforation or cut-line is not on the data fold. A minimum of a one-eighth inch boarder on either side of the perforation is recommended to insure data is not lost.

 Use black ink; however, if colored ink is necessary, dark shades are required.

65 Clintegrity 360 Installation Guide

 Documents that are printed in pads of tear-off paper should be avoided. The residue left where the form was torn off can have a negative impact on the scanning process and machinery.

 Small and/or narrow fonts should be avoided. For best results, a ten-point font is recommended for ease of reading on screen. A minimum of an eight-point font is recommended.

 If forms are collected in notebooks, such as in the nursing units, the 3-hole punch on the side or the 2-hole punch at the top of the page must be accounted for on all forms in order to avoid potentially punching through text or a barcode.

Barcode Specifications These specifications describe the physical characteristics of the barcode and its placement on a document. All barcodes on documents must conform to these specifications. Following these recommendations should provide a successful barcode read rate of 95%. Even under best of circumstances there are barcodes that fail to read for a variety of reasons.

 The amount of white space needed around a barcode depends on the quality of the barcode as well as the scanner and reader. Preliminary testing of a sample barcoded form is therefore required during implementation. The recommended borders are:

 One-eighth inch boarder between the edge of a barcode and the outer edges of the document.

 One-quarter inch border between the edge of a barcode and any adjacent object (text, graphic, or additional barcode).

NOTE: These requirements are for the standard Kofax specification to provide more reliability and consistency in reading the barcode.

 Narrow lines and documents containing graphs should be avoided. No lines should be located near the barcode.

 Do not use copies of barcodes.

 When printing a barcode, use a printer resolution of 600 DPI.

 Use the barcode Code 39 (also known as Code 3 of 9).

 We recommend that you use a commercially available barcode creation software program that can produce Code 3 of 9 barcodes. By using a barcode creation program, the Code 3 of 9 barcode dimension algorithm is properly applied to your newly created barcodes, ensuring that the proper height to length ratio is maintained.

 Barcode height must be a minimum of ½ inch. Barcode length must be a minimum of 3 characters and is variable, but the barcode and system generated barcodes (forms) should be a similar size. Note however that the ratio of height to length of Code 3 of 9 barcodes is 1 to 3. So for a barcode ½ inch high, you should expect a length of at least 1 ½ inches.

 Place barcodes in a similar position and orientation on all documents for quicker interpretation. On documents with a portrait orientation, we recommend placing the patient identifier barcodes in the upper-left corner of the document and the folder identifier barcodes in the upper-right corner of the document.

66 Appendix B Barcode and Form Specifications for Electronic Document Management

 A patient identifier and form identifier barcodes are required on the first page of every document to be scanned and indexed. This means:

 Patient identifier and form identifier barcodes must be on the front page (odd page) of documents.

NOTE: A unique barcode identifier must be present whenever a change in indexing occurs, otherwise the forms that do not contain a barcode will be indexed to the previously recognized barcode.

 Barcodes are not required on the back (blank) side of simplex (single-sided) documents.

 Before mass production, all forms and labels must be initially tested by NUANCE CORPORATION for readability.

Barcode Prefix Recommendations Below is a list of recommended barcode prefixes. Contact Support to discuss alternate barcode prefixes. When using barcodes other than Electronic Document Management (EDM) system generated barcodes, the barcodes should first be tested and approved by EDM Support or Implementations staff.

Table 6: Barcode Prefixes

FIELD BARCODE PREFIX

Patient Account Number AC or no prefix

Folder Name D-

Document Type (Document Security & Settings Type) T-

Enterprise # E-

Last Name (Patient Last Name) N-

Facility F-

MRN M-

Discharge Date I-

At a minimum, the following information is required in a barcode:

 Patient Encounter Identifier – Limited to a maximum of 15 alpha/numeric characters.

 The Patient Encounter Number Identifier can either have no prefix or can include an identifier type prefix of AC per HIBCC/ANSI healthcare standards. The identifier must be consistent. A combination of prefixes cannot be used to identify the same element. See examples below:

67 Clintegrity 360 Installation Guide

Table 7: Patient Encounter Identifiers

DESCRIPTION BARCODE EXAMPLE

Identifier for Account Number 192315

Identifier for Account Number preceded by AC AC192315

 If additional patient identifiers are desired, it is necessary to create a unique barcode for every additional identifier. The recommended secondary patient identifier is patient Last Name, First Name (up to 30 alpha/numeric characters). For example, a client using two identifiers, Account Number and Last Name, would supply one of the following sets of barcodes:

Table 8: Additional Patient Encounter Identifiers

DESCRIPTION BARCODE EXAMPLES

Identifier for Account Number and  Barcode 1: 192315 Identifier for Last Name preceded by N - Barcode 2: N-SMITH

Identifier for Account Number preceded by AC and Barcode 1: AC192315 Identifier for Last Name preceded by N - Barcode 2: N-SMITH

NOTE: Identifiers may not be concatenated into a single barcode.

 Folder Identifier – Limited to a maximum of 29 alpha/numeric characters.

 The folder name must be used for the barcode. In the future, Electronic Document Management (EDM) will support using a folder number rather than the folder name.

 We recommend coding each Folder name barcode with a similar number of characters so that the length of the barcode can be predicted and interpreted more quickly.

 Each Folder name barcode should be preceded by the identifier D-. For example, if the Folder name is Consents, the identifier should appear as D-Consents.

 Document Type (Doc Security & Settings) Identifier – Limited to a maximum of 29 alpha/numeric characters.

 The Document Type form number must be used for the barcode.

 We recommend coding each Document Type form number barcode with a similar number of characters so that the length of the barcode can be predicted and interpreted more quickly.

 Each Document Type barcode should be preceded by the identifier T-. For example, if the Document Type form number is Progress Note, the identifier should appear as T-Progress Note.

Should you wish to change the prefix of a barcode that is in use, please contact NUANCE Client Support to update your system’s internal barcode prefix configuration file.

CAUTION: A failure will result if a barcode does not contain a prefix identifier, unless it is a patient account number identifier. Identifiers may not be concatenated into a single barcode. The use of identifier prefixes must be consistent. Varying prefixes cannot be used to identify the same element.

68 Appendix C Barcode Specifications for Chart Completion and Chart Locator

Appendix C  Barcode Specifications for Chart Completion and Chart Locator

Using barcodes with Chart Completion and Chart Locator improves accuracy and productivity, because it eliminates the need to type information into your computer. Barcode technology is especially helpful in high volume Health Information Management departments.

Chart Completion and Chart Locator fully support Code 3 of 9 (also called Code 39) barcode symbology. Any data that can be entered from the keyboard can be entered by reading barcodes. Moreover, barcode label printing software is included with your Chart Completion and Chart Locator modules. This enables you to barcode labels as new incomplete charts are entered into the system or as records are checked out or checked in. While the barcoding software is built-in, the following considerations apply to barcoding hardware.

Types of Barcode Readers There are several types of barcode readers:

 Stationary Barcode Readers:

 Fixed Laser Reader – This reader consists of a laser gun, usually mounted on a stand, that attaches to a PC through the keyboard socket. The user simply passes the label through the beam to read the data. This is the easiest barcode reader to use.

 Wedge Reader – This reader contains a light pen or wand, which the user passes over the barcode to read the data. Because the user needs to hold the wand at the correct angle and move it with the appropriate speed over the label, wedge readers require more skill than do the laser gun types of readers. The wedge reader plugs directly into the keyboard socket of a PC and then the keyboard plugs into the wedge.

69 Clintegrity 360 Installation Guide

Barcode Printers Working in Clintegrity 360, you can customize barcode labels to include various barcode and human-readable data, depending upon the needs of your facility. You can format your barcode labeling during the Chart Locator implementation process.

You need a dedicated barcode printer to cost-effectively print high-quality barcode labels.  Clintegrity 360 software currently supports:

 Intermec 3400 printer, a thermal transfer printer. As with all thermal transfer printers, the Intermec 3400:

 Produces high quality labels that are very durable and permanent.

 Requires specific types of labels and ribbons to ensure compatibility with both your printer model and the software requirements.

 Zebra S600 printer.

Detailed Hardware Specifications All parts listed for each device type below are required except the scanner desk stand.

Table 9: Detailed Hardware Specifications

DEVICE MODEL DESCRIPTION Stationary Barcode Any that can support Code 3 of 9 Includes scanner, decoder, cable, desk Scanner symbology holder, and guides Optional scanner accessory

Barcode Printer with NIC– EasyCoder 3400e Direct thermal/thermal transfer label, ticket Ethernet Interface and tag printer (115 VAC power supply with US cord), NIC - ethernet interface, 128 KB (Must be a network printer) memory

Duratran II Coated Labels, 4 X 2.4, 1200/roll

Premium Ribbon, 4.10 X 6000, premium

NIC-Ethernet Card, For required network connection

3400 User’s Manual

Zebra S600

70 Appendix C Barcode Specifications for Chart Completion and Chart Locator

Web Vendors You can purchase stationary scanners, printers, and PDAs from a number of vendors including over the Internet.

CAUTION: Nuance makes no endorsement of these sites or their products.

Stationary Scanners and Printers The following are some Web site from which you can purchase stationary scanners and printers:

 Intermec Link For Printers http://intermec.com/eprise/main/Intermec/content/Products/Products

 Barcode Store http://www.barcodestore.com/

 Barcode Discounters http://www.barcodediscounters.com/index.html

 Scansmart http://www.scansmart.com/index.asp

71 Clintegrity 360 Installation Guide

This page intentionally left blank

72 Index Index

A Oracle 16 Installing JReports Only 26 ad-hoc reporting configure designer 49 installing JReports 26 J JReports B configuring Designer 49 installing 26 before installing Clintegrity 360 3 Microsoft SQL Server 41 P browser configuring 45 process manager, installing 22 configuring security settings 46 R C related documentation x Clintegrity 360 4 reporting installing with Oracle database 4 configure ad-hoc designer 49 installing, about 4 installing JReports 26 Clintegrity 360 Abstracting run Clintegrity 360 as service 44 installing builder workstation 29 Clintegrity 360 Electronic Document Management, installing process manager 22 S Clintegrity 360 with Oracle database 4 service, set up Clintegrity 360 to run as 44 Clintegrity 360 with SQL Server database 4 split server configuring installing on 3 ad-hoc report designer 49 browser 45 conventions, typographical xi T task scheduler 57 D typographical conventions xi database installing Oracle 16 W documentation, related x workstation installation, Clintegrity 360 Abstracting builder 29 F flat panel monitors, configure 49

H HL7 reports, configuring 50

I installing Clintegrity 360, about 4 Microsoft SQL Server 41 installing database only

73 Clintegrity 360 Installation Guide

This page intentionally left blank

74 This page intentionally left blank