Rebecca Addington Portfolio 1 This portfolio is presented as an example of work. It is not to be distributed without written persmission from Rebecca Addington. All proprietary information has been removed from examples. If any proprietary information is found within pleasse contact me so that I can remedy the oversight and then delete Portfolio 1 from your computer.. Contact: [email protected]
RFI Cover Examples This portfolio is presented as an example of work. It is not to be distributed without written persmission from Rebecca Addington. All proprietary information has been removed from examples. If any proprietary information is found within pleasse contact me so that I can remedy the oversight and then delete Portfolio 1 from your computer.. Contact: [email protected]
Logo Address, Suite 111, Tampa, FL 11101 Response to Request for Information (RFI) OCIO INTEGRATION PROJECT U.S. Department of Agriculture Office of the Chief Information Officer Integration Project (OCIOIP) RFI ID: AG-3144-I-16-0059 September 7, 2016 Attention: Tracy Lynn Jackson, Contracting Officer This response includes data that shall not be disclosed outside the Government and shall not be duplicated, used, or disclosed - in whole or in part - for any purpose other than to evaluate this response. If, however, a contract is awarded to Company, LLC as a result of - or in connection with - the submission of this data, the Government shall have the right to duplicate, use, or disclose the data to the extent provided in the resulting contract. This restriction does not limit the Government’s right to use information contained in this data if it is obtained from another source without restriction. The data subject to this restriction are contained in the following pages of this response.
Logo Address, Suite 111, Tampa, FL 11101 GSA IT Schedule 70 General Purpose Commercial Information Technology Equipment, Software and Services Solicitation Number : FCIS-JB-980001-B Refresh Number : 40 SECTION I Administrative/Contract Data This response includes data that shall not be disclosed outside the Government and shall not be duplicated, used, or disclosed - in whole or in part - for any purpose other than to evaluate this response. If, however, a contract is awarded to Company, LLC as a result of - or in connection with - the submission of this data, the Government shall have the right to duplicate, use, or disclose the data to the extent provided in the resulting contract. This restriction does not limit the Government’s right to use information contained in this data if it is obtained from another source without restriction. The data subject to this restriction are contained in the following pages of this response.
Capabilities Statement 1 page double sided This portfolio is presented as an example of work. It is not to be distributed without written persmission from Rebecca Addington. All proprietary information has been removed from examples. If any proprietary information is found within pleasse contact me so that I can remedy the oversight and then delete Portfolio 1 from your computer.. Contact: [email protected]
Logo Company Name is a pioneer and leader in enterprise architecture platforms, point-of-service data capture, data management, and federation solutions. CLASSIFICATION: Small Business < $25MM, < 50 people Company Name ’s unique approach to both enterprise architecture and solutions development demonstrates a proven track record of DUNS: 012345678 successfully delivering interoperable technologies that (i) integrate NAICS: 541511, 541512, 541519, 541690 seamlessly across enterprise platforms and point-of-service data CAGE: 1AA11 reconciliation systems (ii) offer disruptive new capabilities empow- CONTRACT VEHICLE ACCESS: ering industry-leading End User (UX) and Patron (Patient) Expe- Stars II, MOBIS, SeaPort-e, T4NG, Alliant, SEWP, eFAST riences (PX) (iii) support the full spectrum of disparate enterprise OASIS, GSA Schedule 70, CIO-SP3, ITES-2S, VETS, Eagle II shared services (iv) deliver scalable, extensible, and configurable technologies which are designed to evolve over time to support changes in customer workflows and business processes. Our ongoing innovative research & development (R&D) activities CONTACT: and the resulting technologies can be utilized throughout numer- First & Last Name ous industry verticals and domains. Title Office: 123-456-7899 [email protected] DIFFERENTIATORS Company takes an “out-of-the-box” approach to many persistent Patron/patient-facing solutions that provides a uniquely custom- problem areas confronting healthcare enterprise systems such as ized visual representation of personal, service, and health related interoperability, data capture at the point of care, data federation data and data management in support of higher level data analytics Telehealth solutions which facilitate remote patient-provider en- Successful delivery of solutions which provide the gateway for counters in context, but with clinically-contextual UXs for the cli- bridging the interoperability gap between federal healthcare sys- nician and the patient tems and among commercial electronic health record platforms, delivering pragmatic interoperability for targeted, semantically Development and delivery of domain agnostic, generative platforms linked environments providing rapid deployment of services and applications on layered architectures Enhancement of low-level data with context and semantic metada- ta to allow sharing across multiple systems regardless of operating Primary emphasis on usability at the inception of development (at system of platform the code level) to ensure targeted functional objectives along with end user expectations are monitored throughout the development Dynamically generated user interfaces capturing individual work- life cycle of all projects flows and sub-workflows that manage data from disparate sys- tems, sources, devices and records (e.g. storytelling) Contract Vehicle Access Company prides itself in successfully developing and maintaining strategic partnerships with large and small businesses that, as a team, produce the highest quality innovative solutions and capabilities in the market place. 8(a), STARS II, Alliant EAGLE II OASIS T4NG CIO SP3 CHESS ITS-2S SeaPort-e eFAST SEWP V VETS, MOBIS, IT Schedule 70 *The logos represent the Contract Vehicles for which Company has active relationships with the Prime Contract holders. Company Name, LLC. www.websiteaddress.net Copyright, 2016
CAPABILITIES & EXPERTISE Platform-Agnostic Enterprise Integration & Interoperability Polyglot Software Development Company is a pioneer in successfully developing complex software solutions that Company’s software developers are technology agnostic with extensive experi- orchestrate the bi-directional exchange of data between disparate enterprise ence in a wide variety of software development languages, frameworks, architec- systems of record as well as the full spectrum of enterprise shared services (ESS). tures, and approaches. Our R&D methodology provides an array of options for de- Our innovative solutions are at the forefront in achieving targeted interoperability veloping software that delivers flexible, configurable, customizable and extensible goals not only between the federal health systems, but also with private sector solutions to most efficiently solve your key business challenges. Company team electronic health record platforms. This capability is relevant and capable of being members are actively at the forefront of a number of ongoing efforts to expand migrated to other domains within the federal community such as transportation/ and extend many widely used Open Source and proprietary technologies. aviation, intelligence, defense, homeland security and virtually any platform that uses various architectures and data repositories for their critical operations. Analytics & Informatics Company believes in an integrated team approach to solving customer problems. Company’s enterprise data federation platforms facilitate and manage the or- Often times, technology is only part of the overall solution. Company has one of chestration of enterprise needs with respect to data capture, data management the deepest clinical informatics teams in the industry, which works in an integrat- and data federation among any number of internal or external systems of record ed manner with our Enterprise Architects and Software Development teams to as well as supporting the full spectrum of the business needs in support of the ensure our technologies not only deliver the targeted functionality, but that they entity’s ESS. also support the necessary workflows to best meet identified customer needs. Enterprise System Architecture Enterprise Data Warehousing Company’s unique approach to enterprise platform development targets custom- Company Trademarked™ product offers a pioneering approach to big data man- er needs to ensure responsive and efficient data capture and data management agement and storage. solutions. Company is a pioneer in designing and delivering enterprise platforms which not only support current customer needs, but which are inherently flexible DevOps Configuration Management to evolve over time as customer operations become more efficient and sustain- Company’s Agile DevOps Configuration Management practice ensures an open able as its workflows change over time. line of communication and collaboration between software developers, configu- ration managers, usability experts, software quality assurance analysts, security experts, viability experts, and project managers, from inception through delivery. Structured Data Capture Solutions (Documentation Management Company utilizes a systematic agile approach of rapidly building, testing, and re- as a Service) leasing high quality enterprise-grade software, ensuring continuous integration Company delivers technologies that empower customers to perceptively analyze and configuration management throughout the software development life cycle. data for a variety of clinical, research, and business intelligence purposes. The associated “synoptic reporting” can provide near-real-time insights into business Merger and Acquisition Integration operations through data evaluation and prediction. Company offers innovative solutions to mitigate traditional business disruption resulting from the merger of one or more business entities. Company offers a Workflow-driven, point-of-service digital documentation/ seamless data migration and IT transition among the companies and IT systems records management involved. Our interoperability solutions will get the communication flowing be- Copany utilizes a proprietary approach to generating scenario-specific UXs and tween the various and typically incompatible systems, integrating and preserv- PXs at the point of service which enable the End User to identify critical knowl- ing both legacy data and institutional knowledge in the process, to keep the edge gaps in the patient record. Company’s technologies empower the clinician combined businesses running smoothly from Day One. This process maintains and patient to work in a collaborative manner to address the identified knowledge the established governance and view for the acquiring entity regardless of the gaps supporting the desired clinical workflow in the most unobtrusive manner data source thereby maintaining compliance with applicable laws with the least possible. Our technologies eliminate the need to replicate the same information, amount of transitional disruption. multiple times, on a variety of forms, enabling organizations to be more efficient and cost effective. PHILOSOPHY AND TECHNICAL VISION Company believes that its technologies, whether proprietary or Open Source, should not only meet current customer needs and workflows, but it is imperative that these technologies be configurable, extensible and customizable to allow them to evolve over time in support of customers becoming more efficient and their workflows and business processes. Our technologies are designed with this objective in mind, rather than designed with the traditional shelf life that foreshadows future obsolescence. Company believes that true success is achieved with active and full CORPORATE OFFICES: participation of the customer and other contractors. Company prides Tampa, FL. (HQ) itself on its ability to engage and listen to the customer’s stakehold- ers and constituents to help quantify true pain points and business Albuquerque, NM. objectives. OPERATIONAL PRESENCE IN: Company’s proven approach to large enterprise solution and applica- U.S. (14 States) tion development powers a reinforcing “cycle of excellence” by cre- ating an architectural platform experience (AX) that drives the patron United Kingdom experience (PX) which in turn improves the end-user experience (EX) Asia which collectively leads to better technologies and outcomes. Australia Company Name, LLC. www.Websitename.net Copyright, 2016
Bios 1 page double sided This portfolio is presented as an example of work. It is not to be distributed without written persmission from Rebecca Addington. All proprietary information has been removed from examples. If any proprietary information is found within pleasse contact me so that I can remedy the oversight and then delete Portfolio 1 from your computer.. Contact: [email protected]
Logo Leadership Bios Full Name, Chief Executive Officer, (Founder) Full Name began his career on Capitol Hill, serving as a senior staff member on the House Veterans’ Affairs Committee. In this role, Mr. Last Name had primary staff oversight responsibility for the VA’s health care system as well as budget oversight for the VA’s health care programs. During his tenure on Capitol Hill, Mr. Last Name was a key participant in a wide spectrum of health policy initiatives, including serving on the White House Health Care Reform Task Force. Mr. Last Name also worked at The Pentagon, Office of the Secretary of Defense, as a Senior Health Policy Advisor advising on the transition of the DOD’s CHAMPUS program to a managed care model under TriCare. Since leaving federal employment, Mr. Last Name has had a distinguished career in the field of Mergers & Acquisition and Private Equity, including founding and managing several successful IT companies. Full Name, Chief Architect & Lead Developer (Co-Founder) Mr. Last Name is a seasoned enterprise architect and a proven software innovator with over 20 years of financial services, retail, and healthcare industry experience. Mr. Last Name is a certified expert in multiple programming languages, having worked productively in over a dozen programming environments and platforms as diverse as C++, Delphi, Ada, Java, .NET (C#, VB), JavaScript, LISP, Clojure, Scala, Smalltalk, Ruby and others. He excels at designing and implementing hybrid solutions, because of his extensive experience and talent with languages have given him a strong sense of the relative strengths and weaknesses of the various mainstream and esoteric platforms in use today. Mr. Last Name was the primary visionary and architect for the Name of Platform within the Government Agency, including its current utilization of open source technologies to fulfill specific platform functions . Full Name, MD, Chief Medical Informatics Officer (Co-Founder) Dr. Last Name joined Company in February, 2013 as its CMIO. Dr. Last Name has over 40 years of experience using, developing and implementing electronic medical record (EMR) systems. He is a nationally recognized expert on ambulatory care information systems and applied medical informatics. In 1971, Dr. Last Name began his career as a United States Public Health Service (USPHS) Medical Officer in the Indian Health Service (IHS). He served as Title of the Sells Indian Hospital and San Xavier Indian Health Center in southern Arizona and was also assigned to the IHS Office of Research and Development in Tucson, AZ. Dr. Last Name was on the founding development team of the IHS’ comprehensive health information system, now known as, the Resource and Patient Management System (RPMS). He was also title for the Query Manager (QMan) and PCC-Plus packages still utilized by IHS today. Dr. Last Name was a recipient of the Name of Award and Name of Medal. Dr. Last Nameretired from IHS in year holding the rank of Captain (O-6). Dr. Last Name is a service-disabled veteran and receives all of his care from the VA Medical Center in Albuquerque, NM. Full Name, Global DevOPs Manager In January 2015, Mr. Last Name joined the Companyteam as their Global DevOps Manager. In this role First Name manages and supports a team of global developers and is responsible for assuring Company’s DevOps infrastructure and services are delivered to meet the needs of business and clients. Mr. Last Name is an experienced management professional with more than 15 years working for large government, commercial and independent organizations in senior change management, strategic & operational roles. With a strong background in IT strategy, operational improvement and project management, Mr. Last Name has successfully designed and delivered large transformational change strategies with a focus on innovation, new and established technologies, and implementing change in meaningful and productive ways. Mr. Last Name worked in senior technical management roles in Welsh Public Sector organizations where he led and delivered many sector leading Open Source developments and innovative large scale infrastructure projects. In 2010, Mr. Last Name led program & project management, strategic planning, thought leadership, transformational change & IT operational improvement consultancy commissions in Europe and EMEA. The commission’s delivered transformational change projects and subject knowledge specialist for Global companies such as Apple, Google and Samsung. Full Name, Controller Ms. Last Name was a founder of Company Technologies, Inc., a DoD government contractor primarily focused on the development of unmanned vehicle control software solutions. Ms. Last Name successfully managed the financial and human resources functions of the $7 million, 50 Employee Company for 13 years. Ms. Last Name worked extensively with DCAA and DCMA to ensure compliance with federal regulations, developed budgets and pricing for projects, negotiated and established various financing agreements and managed all outside service providers. Ms. Last Name obtained her bachelor’s degree in Business Administration, Accounting (BBA) from Name University in City, St in 1989 and obtained a Certified Public Accountants certificate in 1995 from the state of Virginia. Ms. Carlton has over 25 years of progressive accounting and human resource experience and has worked with government entities for over 20 years. Company Name www.website address.net Copyright, 2016
Full Name - Senior Solutions & Infrastructure Architect Mr. Last Name has been an employee with Company since its conception. He manages Company’s global office in Sydney, Australia and is in charge of the company’s software development initiatives from an infrastructure architecture and R&D perspective. In particular, he is an integral part of the Name.js software development project. Mr. Last Name is an accomplished technologist with over 18 years professional experience. Throughout his career, he has delivered on a number of high profile projects, including (i) designing and building the first ETL solution for POSC (now Energistics), the Petrotechnical consortium (ii) managing and developing a large scale IT Infrastructure at Coleg Meirion-Dwyfor where he pioneered the use of Linux based Open Source solutions within education, helping the team gain outstanding recognition from ESTYN Her Majesty’s Inspectorate for Education and Training in Wales (iii) designing and delivering the technical infrastructure for the £27M Longfield Academy capital build project, as result of these developments, Longfield Academy ICT Capital Build Project won a national ICT award from the National Education Business Awards. Full Name, VP of Business Intelligence and Analytics Mr. Last Name is a highly skilled and creative software development leader with over 20 years of Information Technology experience, focused on Business Intelligence and Medical Informatics during the past 15 years. Mr. Last Name previously worked with commercial health plans by designing and building operational and clinical data warehouses to support analytics and enable automation of business processes. His prior projects include the expansion of the largest Informatics database in the world that collects data for over 100 million members. Mr. Last Name also has extensive experience in building and maintaining clinical rules engines, groupers, custom analytics, clinical decision support tools, and even led the development of a proprietary business intelligence platform that includes a columnar database engine and visualization user interfaces. Mr. Last Name holds a Bachelor of Science in Electrical Engineering. He started his programming career with assembly language for microcontrollers, then shifted focus onto commercial software and developed numerous applications that include inventory control systems, contact management, complex decision support systems, and even social networking applications. Full Name, Director of Portfolio Management & Open Source Initiatives As Director Portfolio Management & Open Source Initiatives, he is responsible for leadership and guidance in executing product delivery projects and contracts, and for the development and execution of strategies for Company’s open source products. Mr. Last Name comes to Company from the VA, where he spent his first two years in the VA as Title and then Title of OIT’s Access to Care Major Initiative. Most recently he led the enterprise wide VistA Standardization program and established the VistA Intake Program for VistA enhancements. After retiring as a Naval Aviator, Mr. Last Name spent a decade in the private sector building and managing healthcare IT program offices as well as serving a four year term as Commandant of Florida Air Academy. Mr. Last Name has a Bachelor of Science in Industrial Management from Georgia Tech, a Master of Science in Information Systems Management from Naval Post Graduate School, Monterrey. He also has various private sector, Federal Program, Project Manager and Federal Acquisition certifications. His in service experiences include a tour as Operations Officer, Polar Mission Commander in support of the National Science Foundation’s Antarctic Program, and the CIO role at the National Defense University. Full Name – Managing Counsel As General Counsel, Ms. Last Name oversees legal, compliance and contract matters on behalf of the company. Prior to joining Company, Ms. Pinto served as managing counsel by providing legal support to the Healthcare Solutions and Cyber Solutions business operations and contract function at Big Corporation. Prior to joining Cig Corp, she served as associate general counsel to Co. Name, a product brokerage company. Ms. Last Name earned a bachelor’s degree with honors in French and Psychology from the University of North Carolina, a law degree from Mercer University, and a MBA with high honors from the University of Miami. She is admitted to practice in Georgia, North Carolina and Florida. Ms. Last Name is a member of the Florida, Georgia, and North Carolina Bar Associations, the American Bar Association, and the Association of Corporate Counsel. Full Name, Director of Human Resources Ms. Last Name is helping to accelerate Company’s strategic growth initiative through leadership, differential talent models, attracting and developing the best talent and building a culture of engagement, agility, and innovation. As a member of the Company eadership team, Ms. Last Name actively collaborates with executive leadership by providing vision, strategic HR planning, and business process improvement protocols to meet organizational goals. She has a proven track record of planning and developing HR best practices that support accountability, transparency and create a positive work environment. Ms. Last Name’s areas of responsibility include talent acquisition, workforce solutions, organizational development, performance management, employee relations, and Total Rewards (compensation & classification, health & wellness plans and benefits). Ms. Last Name is an SPHR- certified human resources executive with 25 plus years of experience encompassing organizations within both Fortune 100 and non-profit sectors. Ms. Last Name earned a Master’s degree in Education & Human Development and an undergraduate degree in Organizational Management. In addition, she is a certified Florida Workforce Development professional. LOGO Logo www.websiteaddress.net Company Name, LLC. www.websiteaddress.net Copyright, 2016
Quarterly Newsletter 20 pages This portfolio is presented as an example of work. It is not to be distributed without written persmission from Rebecca Addington. All proprietary information has been removed from examples. If any proprietary information is found within pleasse contact me so that I can remedy the oversight and then delete Portfolio 1 from your computer.. Contact: [email protected]
Intentionally left blank. The following page is the cover to the Quarterly newsletter as would be viewed as an interactive book by personnel.
Logo Quarterly News
CONTENT Letter from the Steering Committee The topics for this newsletter were selected by the Company Steering Committee. This It all starts here committee is comprised of a group of employees within different departments who are tasked with ensuring that each department works cohesively with each other to help Company Data Solutions reach its goals. The Company Steering Committee meets once per month to discuss solutions, approve policy and implement changes. The Committee has a T op 10 list comprised of solutions, policies and changes they are currently working on and they will provide updates in upcoming newsletters. In this first edition, they have provided Company Data Solutions’ Corporate Overview for all employees to review at their leisure. Corporate Overview Company Data Solutions is a pioneer and leader in enterprise architecture plat- forms, point-of-service data capture, data management, and federation solu- tions. Company’s unique approach to both enterprise architecture and solutions development demonstrates a proven track record of successfully deliver- ing interoperable technologies that (i) integrate seamlessly across en- terprise platforms and point-of-service data reconciliation systems (ii) off disruptiv ne capabili empow industry Patr (Patien E (P (iii s disparat ent shar ser deliver sc exte configur technologies w are designed to evolve over time to support changes in customer workflows and business processes. QUARTERLY ong innovativ resear & developmen an th resulting tec can utilized Updates throughout numerous industry verticals and domains. Cycle of Excellence 3 Contributors Project Time 4 Editors: Rebecca Addington & Name2 In the Media 5 Design & Layout: Rebecca Addington Human Resources 6 Article Writers: Me expe quas ant, Legal Corner 7 officie ndiatis essimporeris dolor auta Security: What you need to know. 8 con nobit ut molo berumendes pore, tori tem fugita exeror rempo- Bean Counting & Other Thrills 9 rehenim sedipit ionsedi blac Capture: Everyone is in Sales 10 Thank You Everyone!
CONTENT Letter from the Steering Committee The topics for this newsletter were selected by the Company Steering Committee. This It all starts here committee is comprised of a group of employees within different departments who are tasked with ensuring that each department works cohesively with each other to help Company Data Solutions reach its goals. The Company Steering Committee meets once per month to discuss solutions, approve policy and implement changes. The Committee has a T op 10 list comprised of solutions, policies and changes they are currently working on and they will provide updates in upcoming newsletters. In this first edition, they have provided Company Data Solutions’ Corporate Overview for all employees to review at their leisure. Corporate Overview Company Data Solutions is a pioneer and leader in enterprise architecture plat- forms, point-of-service data capture, data management, and federation solu- tions. Company’s unique approach to both enterprise architecture and solutions development demonstrates a proven track record of successfully deliver- ing interoperable technologies that (i) integrate seamlessly across en- terprise platforms and point-of-service data reconciliation systems (ii) off disruptiv ne capabili empow industry Patr (Patien E (P (iii s disparat ent shar ser deliver sc exte configur technologies w are designed to evolve over time to support changes in customer workflows and business processes. QUARTERLY ong innovativ resear & developmen an th resulting tec can utilized Updates throughout numerous industry verticals and domains. Cycle of Excellence 3 Contributors Project Time 4 Editors: Rebecca Addington & Name2 In the Media 5 Design & Layout: Rebecca Addington Human Resources 6 Article Writers: Me expe quas ant, Legal Corner 7 officie ndiatis essimporeris dolor auta Security: What you need to know. 8 con nobit ut molo berumendes pore, tori tem fugita exeror rempo- Bean Counting & Other Thrills 9 rehenim sedipit ionsedi blac Capture: Everyone is in Sales 10 Thank You Everyone!
Our Cycle Of Excellence AX Architecture PHILOSOPHY AND TECHNICAL VISION Platform Company believes that its technologies, whether proprietary or Open Source, should not only meet current customer needs and workflows, but it is imperative that these technologies be configurable, extensi- ble and customizable to allow them to evolve over time in support of customers becoming more efficient and their workflows and business processes. Our technologies are designed with this objective in mind, rather than designed with the traditional shelf life that foreshadows future obsolescence. Company believes that true success is achieved with active and full participation of the customer and other contractors. Company prides itself on its ability to engage and listen to the customer’s stakehold- ers and constituents to help quantify true pain points and business PX EX objectives. Patron End-User Experience Experience Company’s proven approach to large enterprise solution and applica- tion development powers a reinforcing “cycle of excellence” by cre- ating an architectural platform experience (AX) that drives the patron experience (PX) which in turn improves the end-user experience (EX) which collectively leads to better technologies and outcomes.
Our Cycle Of Excellence AX Architecture PHILOSOPHY AND TECHNICAL VISION Platform Company believes that its technologies, whether proprietary or Open Source, should not only meet current customer needs and workflows, but it is imperative that these technologies be configurable, extensi- ble and customizable to allow them to evolve over time in support of customers becoming more efficient and their workflows and business processes. Our technologies are designed with this objective in mind, rather than designed with the traditional shelf life that foreshadows future obsolescence. Company believes that true success is achieved with active and full participation of the customer and other contractors. Company prides itself on its ability to engage and listen to the customer’s stakehold- ers and constituents to help quantify true pain points and business PX EX objectives. Patron End-User Experience Experience Company’s proven approach to large enterprise solution and applica- tion development powers a reinforcing “cycle of excellence” by cre- ating an architectural platform experience (AX) that drives the patron experience (PX) which in turn improves the end-user experience (EX) which collectively leads to better technologies and outcomes.
Thank you for your patience and consideration in this process. The VA is currently implementing a new process that should add some transparency. For a process overview , tips, and phone numbers please reference the LINK. PECT Communication e 2 is ROJ The #1 T op 10 Solutions the Steering Committee is working on is Communication. N a m I the lead on this effort. Her and her team members have made great headway in setting up a frame-work for improved program communication as well as working with M Company’s Director of Communications Name to develop more communication avenues including this newsletter. E Teamwork including MRAR and JLV Now with the effort to move Name.js into produc-tion, connections with Name.js — it is really important to ensure cross program teamwork. T eamwork has always been good overall but Onboarding greater progress has been made in project teams working together: better, smarter and more Huge progress has been made using the new re- efficiently. Thank you for your efforts to make our source at the VA to support getting access. Both teams more cohesive. Name 1 and Name 2 have been working with the VA to help our team, including subcontactors, get Coaching cleared to work for the VA. With this new support, several personnel have been able to gain access. As part of the research for solving the communication problems, Name 1 has been For those of you still waiting for access, please be conducting coaching sessions to help her vigilant and complete all tasks as soon possible. Turning in the correct paperwork or answering become more informed and created an avenue for her team to ad-dress future problems head- questions, is key to moving the process forward. For those of you with access and who may be hav- on, identify solutions, and create action plans. This is great news for the team in learning more ing problems, knowing who to call is key. about each other and solving program issues. All problems should be reported to the National Service Desk (NSD) at 855-NSD-HELP (855-673- 4357). Within the options list, it helps to know FOR MORE INFORMATION your domain. For example, VHAMASTER is part of Contact Name for more information Tuscaloosa so select the option with Tuscaloosa to help solve your problem. If you have problems at regarding Project Time News. AITC, you will want to select AITC for your option. [email protected]
Thank you for your patience and consideration in this process. The VA is currently implementing a new process that should add some transparency. For a process overview , tips, and phone numbers please reference the LINK. PECT Communication e 2 is ROJ The #1 T op 10 Solutions the Steering Committee is working on is Communication. N a m I the lead on this effort. Her and her team members have made great headway in setting up a frame-work for improved program communication as well as working with M Company’s Director of Communications Name to develop more communication avenues including this newsletter. E Teamwork including MRAR and JLV Now with the effort to move Name.js into produc-tion, connections with Name.js — it is really important to ensure cross program teamwork. T eamwork has always been good overall but Onboarding greater progress has been made in project teams working together: better, smarter and more Huge progress has been made using the new re- efficiently. Thank you for your efforts to make our source at the VA to support getting access. Both teams more cohesive. Name 1 and Name 2 have been working with the VA to help our team, including subcontactors, get Coaching cleared to work for the VA. With this new support, several personnel have been able to gain access. As part of the research for solving the communication problems, Name 1 has been For those of you still waiting for access, please be conducting coaching sessions to help her vigilant and complete all tasks as soon possible. Turning in the correct paperwork or answering become more informed and created an avenue for her team to ad-dress future problems head- questions, is key to moving the process forward. For those of you with access and who may be hav- on, identify solutions, and create action plans. This is great news for the team in learning more ing problems, knowing who to call is key. about each other and solving program issues. All problems should be reported to the National Service Desk (NSD) at 855-NSD-HELP (855-673- 4357). Within the options list, it helps to know FOR MORE INFORMATION your domain. For example, VHAMASTER is part of Contact Name for more information Tuscaloosa so select the option with Tuscaloosa to help solve your problem. If you have problems at regarding Project Time News. AITC, you will want to select AITC for your option. [email protected]
in the media Interoperability “Healthcare Interoperability: Market Driven Standards” discusses the leadership role successes in the marketplace can take. “Healthcare Interoperability: Emerging Successes & Market Influence” describes the influence Name.js is having as a leader in interoperability. Name.js Makes the 2016 Conference Scene Company’s Name1 presented an overview of Name.js to the 33rd Name Community conference by World Name in Washington DC in late May to an inquisitive audience of long time Name developers, leaders, and provider users. The Q&A period indicated significant interest from long term Name experts, in the capabilities Name.js brings to the Name world. Company’s Name 1will also be presenting at the upcoming OSEHRA Summit in late June, as well as participating as a panel member in the Interoperability Round Table with our own Dr. First and Last Name and other industry leaders. OSEHRA Launches First Corporate Sponsored Work Group Under OSEHRA’s new policy of promoting corporate sponsorship of working groups, design to stimulate corporate involvement and leadership in the community, the first of these has been chartered. The Name.js Work Group sponsored by Company leads the way as the first of these corporate sponsored groups. Work Group contributors are industry leaders from the private sector and the government includinge physicians, developers, business development professionals and senior government leaders. This diverse group reflects the potential impact VistA.js can have in the healthcare environ- ment. Written by First and Last Name Director, Portfolio Management & Open Source Initiatives
in the media Interoperability “Healthcare Interoperability: Market Driven Standards” discusses the leadership role successes in the marketplace can take. “Healthcare Interoperability: Emerging Successes & Market Influence” describes the influence Name.js is having as a leader in interoperability. Name.js Makes the 2016 Conference Scene Company’s Name1 presented an overview of Name.js to the 33rd Name Community conference by World Name in Washington DC in late May to an inquisitive audience of long time Name developers, leaders, and provider users. The Q&A period indicated significant interest from long term Name experts, in the capabilities Name.js brings to the Name world. Company’s Name 1will also be presenting at the upcoming OSEHRA Summit in late June, as well as participating as a panel member in the Interoperability Round Table with our own Dr. First and Last Name and other industry leaders. OSEHRA Launches First Corporate Sponsored Work Group Under OSEHRA’s new policy of promoting corporate sponsorship of working groups, design to stimulate corporate involvement and leadership in the community, the first of these has been chartered. The Name.js Work Group sponsored by Company leads the way as the first of these corporate sponsored groups. Work Group contributors are industry leaders from the private sector and the government includinge physicians, developers, business development professionals and senior government leaders. This diverse group reflects the potential impact VistA.js can have in the healthcare environ- ment. Written by First and Last Name Director, Portfolio Management & Open Source Initiatives
Things you can do to be ready for Hurricane Season. Disruptive weather patterns can occur anywhere within the United States. Tropical Storm Colin just reminded us how the severity of a storm can impact communications and travel. Our ability to confirm the safety and well-being of all of our team members is paramount and having open communication during inclement weather is key. Hurricane Season To ensure that there is open communication between Headquarters HR department during inclement weather, please make certain that your personal and emergency contact informa- Written by tion is current. First & last Name Director of Human Resources Phone Numbers Please make sure that HR has your current cell phone and/or landline phone number. If your number changes while employed at Company, please notify HR as soon as possible. This will ensure that HR can call or text you about possible office closings, changes in work hours, etc. Address Please keep your address up-to-date with HR. During severe weather, it can be a helpful tool in determining if you will be available to work (power outtages, flooding, etc.). Email Address Providing your personal email address to HR will ensure that we have multiple ways to reach you in an emergency situation. Team members may also monitor the National Hurricane Center http://www.nhc.noaa.gov/.
Things you can do to be ready for Hurricane Season. Disruptive weather patterns can occur anywhere within the United States. Tropical Storm Colin just reminded us how the severity of a storm can impact communications and travel. Our ability to confirm the safety and well-being of all of our team members is paramount and having open communication during inclement weather is key. Hurricane Season To ensure that there is open communication between Headquarters HR department during inclement weather, please make certain that your personal and emergency contact informa- Written by tion is current. First & last Name Director of Human Resources Phone Numbers Please make sure that HR has your current cell phone and/or landline phone number. If your number changes while employed at Company, please notify HR as soon as possible. This will ensure that HR can call or text you about possible office closings, changes in work hours, etc. Address Please keep your address up-to-date with HR. During severe weather, it can be a helpful tool in determining if you will be available to work (power outtages, flooding, etc.). Email Address Providing your personal email address to HR will ensure that we have multiple ways to reach you in an emergency situation. Team members may also monitor the National Hurricane Center http://www.nhc.noaa.gov/.
The Intellectual Property For emails that contain proprietary information, include the and have racked up more than 10,000 such incidents since 2011, a ProPublica analysis of VA data shows. following paragraph before the content: Trade Secrets and confidential or proprietary information are two of the most important assets of an IT business. As stewards of Company Data This e-mail message and any attachments are only for the Privacy violations committed by Business Associates are also Solutions assets, it is important that we be able to identify and appropri- Legal ately mark, safeguard and protect them. The purpose of this article is to: use of the intended recipient and contains information that on the rise. During the first quarter of 2013, 40% of all HIPAA is privileged, confidential or exempt from disclosure under breaches involving the exposure of PHI that affected more applicable law. If you are not the intended recipient, any dis- than 500 individuals were the result of the actions of business • Detail a summary of the laws that apply to these assets, • Expound upon the definitions of confidential information and trade se closure, distribution or other use of this e-mail message or associates of HIPAA covered entities. The problem appears to attachments is prohibited. If you have received this e-mail be growing, as over the previous four years BA’s caused 30% Corner crets, and message in error, please delete and notify the sender imme- of all reported HIPPA security breaches. Safeguards demand- • Provide methods to protect it diately. Thank you. ed under HIPPA include securing the data center, servers and Most states have adopted the Uniform Trade Secret Act addressing the Avoid marking all documents and emails as confidential or computers on which the data is stored. It is essential that no unauthorized individuals can gain access to the physical de- By First & Last Name, elements and remedies for trade secret misappropriation. Use of a trade proprietary as this could jeopardize legitimate proprietary in- vices where the data is stored. Administrative measures must Managing Counsel secret belonging to another does not always constitute misappropriation; formation ownership. For example, if the above statement is also be employed, which include conducting staff training on however, where a trade secret is acquired through improper means or incorporated in your email signature line, be sure to delete it data security and HIPPA regulations, implementing data pro- where it involves a breach of confidence, there is a violation of trade secret if the content you are sending is not proprietary information. tection policies, conducting risk assessments and auditing law. Misappropriation of a trade secret is considered a form of Be sure to address any questions you have regarding this sub- procedures. unfair competition. Most recently, the Federal Government es- ject matter to Company Data Solutions’ legal counsel. tablished the Defend Trade Secrets Act of 2016 (DTSA) creating Below are the Top 10 HIPAA Violations – click on the link for a Federal civil cause of action for trade secret misappropria- 6 Traits Of Leaders Who Successfully Manage Remote Em- the complete article that includes examples and how to pre- tion. Remedies under the DTSA include monetary damages, in- ployees vent the violations: http://www.nuemd.com/blog/top-10- junctive relief and in certain circumstances, attorney fees and hipaa-violations- prevent-them up to two times monetary damages. HIPAA – PHI/PII 1. Lost or Stolen Devices A trade secret is defined as any information, regardless of its The following people are the HIPAA representatives for Com- 2. Hacking form that: (i) has independent economic value, (ii) is not gen- pany Data Solutions: 3. Employee dishonesty erally known to others, (iii) who would benefit from its knowl- 4. Improper disposal edge or use, (iv) and reasonable efforts are used to maintain its • HIPAA Official - Name 1 5. Third-Party Disclosure secrecy. A trade secret can also be called proprietary informa- • IT Security Official -Name 2 6. Unauthorized Release tion or confidential information; however, not all confidential • VP, Business Intelligence & Analytics – Name 3 7. Unencrypted Data or proprietary information is necessarily a trade secret. In de- 8. Lack of training termining whether information is proprietary or confidential, HIPAA violations are expensive. The penalties for noncom- 9. Unsecured Records it is important to keep these questions in mind: pliance are based on the level of negligence and can range 10. Loud Mouths from $100 to $50,000 per violation (or per record), with a • Is this information known outside of Company? maximum penalty of $1.5 million per year for violations of an FOR MORE INFORMATION • What measures are taken to protect its secrecy? identical provision. Violations can also carry criminal charges Contact Michelle, Gil, or Shelley for more information regard- • Is this information valuable to Company or its competitors? that can result in jail time. Some of the largest violations and ing Intellectual Property and PHI/PII Name@Companyname. penalties include: net Confidential Information can be in any form, i.e., written, elec- [email protected] tronic, oral or visual, and can include information in many • CIGNET ($4,300,000) – Online database application error [email protected] categories including financial, technical, marketing, employee • Alaska DHHS ($1,700,000) – Unencrypted USB hard drive or personnel and AOP or Strategic plans. There is no exhaus- stolen, poor policies and risk analysis tive list as to what could be deemed confidential information • Blue Cross Blue Shield of Tennessee ($1,500,000) – 57 un Legally or a trade secret so it is important to walk through the three encrypted hard drives stolen above-referenced questions each time. • New York Presbyterian Hospital and Columbia University LOL ($4,800,000) – personal server deactivation resulted in ePHI It is also important to indicate on the front page of Company being accessible on Google documents whether there is information contained therein is proprietary. An appropriate marking would read: Privacy violations continue to rise at Veteran Affairs Medical Facilities. In 2015, an average of 833 veterans had their pri- vacy violated each month. The privacy and security incidents Portions of this document contain Company Data Solutions Proprietary Information and have been marked accord- were often serious enough to warrant the provision of credit ingly. All information marked Company Data Solutions Proprietary Information must be handled, transmitted and monitoring services to address risk. Employees and contrac- dispositioned in accordance with Company policies and any applicable non-disclosure agreements. tors at VA medical centers, clinics, pharmacies and benefit centers commit thousands of privacy violations each year
The Intellectual Property For emails that contain proprietary information, include the and have racked up more than 10,000 such incidents since 2011, a ProPublica analysis of VA data shows. following paragraph before the content: Trade Secrets and confidential or proprietary information are two of the most important assets of an IT business. As stewards of Company Data This e-mail message and any attachments are only for the Privacy violations committed by Business Associates are also Solutions assets, it is important that we be able to identify and appropri- Legal ately mark, safeguard and protect them. The purpose of this article is to: use of the intended recipient and contains information that on the rise. During the first quarter of 2013, 40% of all HIPAA is privileged, confidential or exempt from disclosure under breaches involving the exposure of PHI that affected more applicable law. If you are not the intended recipient, any dis- than 500 individuals were the result of the actions of business • Detail a summary of the laws that apply to these assets, • Expound upon the definitions of confidential information and trade se closure, distribution or other use of this e-mail message or associates of HIPAA covered entities. The problem appears to attachments is prohibited. If you have received this e-mail be growing, as over the previous four years BA’s caused 30% Corner crets, and message in error, please delete and notify the sender imme- of all reported HIPPA security breaches. Safeguards demand- • Provide methods to protect it diately. Thank you. ed under HIPPA include securing the data center, servers and Most states have adopted the Uniform Trade Secret Act addressing the Avoid marking all documents and emails as confidential or computers on which the data is stored. It is essential that no unauthorized individuals can gain access to the physical de- By First & Last Name, elements and remedies for trade secret misappropriation. Use of a trade proprietary as this could jeopardize legitimate proprietary in- vices where the data is stored. Administrative measures must Managing Counsel secret belonging to another does not always constitute misappropriation; formation ownership. For example, if the above statement is also be employed, which include conducting staff training on however, where a trade secret is acquired through improper means or incorporated in your email signature line, be sure to delete it data security and HIPPA regulations, implementing data pro- where it involves a breach of confidence, there is a violation of trade secret if the content you are sending is not proprietary information. tection policies, conducting risk assessments and auditing law. Misappropriation of a trade secret is considered a form of Be sure to address any questions you have regarding this sub- procedures. unfair competition. Most recently, the Federal Government es- ject matter to Company Data Solutions’ legal counsel. tablished the Defend Trade Secrets Act of 2016 (DTSA) creating Below are the Top 10 HIPAA Violations – click on the link for a Federal civil cause of action for trade secret misappropria- 6 Traits Of Leaders Who Successfully Manage Remote Em- the complete article that includes examples and how to pre- tion. Remedies under the DTSA include monetary damages, in- ployees vent the violations: http://www.nuemd.com/blog/top-10- junctive relief and in certain circumstances, attorney fees and hipaa-violations- prevent-them up to two times monetary damages. HIPAA – PHI/PII 1. Lost or Stolen Devices A trade secret is defined as any information, regardless of its The following people are the HIPAA representatives for Com- 2. Hacking form that: (i) has independent economic value, (ii) is not gen- pany Data Solutions: 3. Employee dishonesty erally known to others, (iii) who would benefit from its knowl- 4. Improper disposal edge or use, (iv) and reasonable efforts are used to maintain its • HIPAA Official - Name 1 5. Third-Party Disclosure secrecy. A trade secret can also be called proprietary informa- • IT Security Official -Name 2 6. Unauthorized Release tion or confidential information; however, not all confidential • VP, Business Intelligence & Analytics – Name 3 7. Unencrypted Data or proprietary information is necessarily a trade secret. In de- 8. Lack of training termining whether information is proprietary or confidential, HIPAA violations are expensive. The penalties for noncom- 9. Unsecured Records it is important to keep these questions in mind: pliance are based on the level of negligence and can range 10. Loud Mouths from $100 to $50,000 per violation (or per record), with a • Is this information known outside of Company? maximum penalty of $1.5 million per year for violations of an FOR MORE INFORMATION • What measures are taken to protect its secrecy? identical provision. Violations can also carry criminal charges Contact Michelle, Gil, or Shelley for more information regard- • Is this information valuable to Company or its competitors? that can result in jail time. Some of the largest violations and ing Intellectual Property and PHI/PII Name@Companyname. penalties include: net Confidential Information can be in any form, i.e., written, elec- [email protected] tronic, oral or visual, and can include information in many • CIGNET ($4,300,000) – Online database application error [email protected] categories including financial, technical, marketing, employee • Alaska DHHS ($1,700,000) – Unencrypted USB hard drive or personnel and AOP or Strategic plans. There is no exhaus- stolen, poor policies and risk analysis tive list as to what could be deemed confidential information • Blue Cross Blue Shield of Tennessee ($1,500,000) – 57 un Legally or a trade secret so it is important to walk through the three encrypted hard drives stolen above-referenced questions each time. • New York Presbyterian Hospital and Columbia University LOL ($4,800,000) – personal server deactivation resulted in ePHI It is also important to indicate on the front page of Company being accessible on Google documents whether there is information contained therein is proprietary. An appropriate marking would read: Privacy violations continue to rise at Veteran Affairs Medical Facilities. In 2015, an average of 833 veterans had their pri- vacy violated each month. The privacy and security incidents Portions of this document contain Company Data Solutions Proprietary Information and have been marked accord- were often serious enough to warrant the provision of credit ingly. All information marked Company Data Solutions Proprietary Information must be handled, transmitted and monitoring services to address risk. Employees and contrac- dispositioned in accordance with Company policies and any applicable non-disclosure agreements. tors at VA medical centers, clinics, pharmacies and benefit centers commit thousands of privacy violations each year
Security: What you need to know Written by Internal Company Links First & Last Name sanimus, sequat. Exerio illa vit di accae ime volup- Senior Security Manager tam nonsequi denima dendelis aut etur? Lestem. Nam quae. Nem faces eum fuga. Il id mol- oratia volor aspiendis magnamus aut la Security Implementation Plan I am in the process of implementing Securi- External Resource Links ty processes and procedures within Compa- Ipsanimus, sequat. Exerio illa vit di accae ime ny. This will include: 1. Gap Assessment voluptam nonsequi denima dendelis aut etur? 2. Risk assessment Lestem. Nam quae. Nem faces eum fuga. Il id 3. Data Categorization moloratia volor aspiendis magnamus aut la 4. Development of Policies and Procedures 5. Auditing of the processes I will be posting more in the future regard- ing security policies and procedures. Government Furnished Equip- ment (GFE) Checklist In an effort to keep track of our GFE, I will be reaching out to every- one who has GFE to ensure owners Company Rules of Behavior understand their responsibilities re- Next month I will be sending out the Company Rules of Be- garding the safety of the device, the havior. This document will be for you to read and sign. This data allowed to reside on the device, document allows us to ensure contract compliance and sets authorized activates, and encrypted the tone for how to behave with your personal devices. e-mail. BYOD: “And I didn’t Say BYOB” Another item the Steering Committee is working on is Bringing your own device. Right now many of you, including myself are using your personal devices to attend meetings, conduct business, read e-mails, and potentially looking at drawings, etc. that could contain Intellectual Phishing property and/or sensitive data. More to come next month here are some There have been some reports of possible phishing occurring within Company. basics: 1. Encrypt your personal device What is Phishing you say? 2. Use a Pin code or your fingerprint to lock the phone “Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card 3. Do not share data with others or show others your Company infor- details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy mation entity in an electronic communication”If you receive e-mails stating that you need to change your pass- 4. Be mindful of your surroundings word, provide money or more information and you did not initiate such a task, do the following: 5. Do not conduct meetings where sensitive data may be discussed. 6. Maybe get a screen cover 1. Notify your Security Manager, Name 1 2. Do not click on the link, answer the questions, provide your private information, money, passwords, etc. 3. Delete e-mails, hang up the phone.
Security: What you need to know Written by Internal Company Links First & Last Name sanimus, sequat. Exerio illa vit di accae ime volup- Senior Security Manager tam nonsequi denima dendelis aut etur? Lestem. Nam quae. Nem faces eum fuga. Il id mol- oratia volor aspiendis magnamus aut la Security Implementation Plan I am in the process of implementing Securi- External Resource Links ty processes and procedures within Compa- Ipsanimus, sequat. Exerio illa vit di accae ime ny. This will include: 1. Gap Assessment voluptam nonsequi denima dendelis aut etur? 2. Risk assessment Lestem. Nam quae. Nem faces eum fuga. Il id 3. Data Categorization moloratia volor aspiendis magnamus aut la 4. Development of Policies and Procedures 5. Auditing of the processes I will be posting more in the future regard- ing security policies and procedures. Government Furnished Equip- ment (GFE) Checklist In an effort to keep track of our GFE, I will be reaching out to every- one who has GFE to ensure owners Company Rules of Behavior understand their responsibilities re- Next month I will be sending out the Company Rules of Be- garding the safety of the device, the havior. This document will be for you to read and sign. This data allowed to reside on the device, document allows us to ensure contract compliance and sets authorized activates, and encrypted the tone for how to behave with your personal devices. e-mail. BYOD: “And I didn’t Say BYOB” Another item the Steering Committee is working on is Bringing your own device. Right now many of you, including myself are using your personal devices to attend meetings, conduct business, read e-mails, and potentially looking at drawings, etc. that could contain Intellectual Phishing property and/or sensitive data. More to come next month here are some There have been some reports of possible phishing occurring within Company. basics: 1. Encrypt your personal device What is Phishing you say? 2. Use a Pin code or your fingerprint to lock the phone “Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card 3. Do not share data with others or show others your Company infor- details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy mation entity in an electronic communication”If you receive e-mails stating that you need to change your pass- 4. Be mindful of your surroundings word, provide money or more information and you did not initiate such a task, do the following: 5. Do not conduct meetings where sensitive data may be discussed. 6. Maybe get a screen cover 1. Notify your Security Manager, Name 1 2. Do not click on the link, answer the questions, provide your private information, money, passwords, etc. 3. Delete e-mails, hang up the phone.
Bean Counting and Other Thrills Written By: Name 1 In this section, we’ll relate some of the common questions the accounting department Fourthly, even non-project positions need to track their time, as appropriate allocation encounters and provide some insight and answers to those questions. This first edition of their time and costs indirectly affect the project margins of our contracts as well. is about timekeeping… Do I use PTO if I am not going to work 8 hours one day? Why is accurate timekeeping important? Firstly st requiremen Feder Stat ag tha w keep Here at Company, we want to know when and how you actually work. Always record good records of your time. your actual hours on the actual day you worked. Secondly, in the flexible work environment especially here at Company it is Your supervisor determines your work schedule week-to-week based on the company important for supervisors to have a reliable record of what project/task/contract you and project needs. So, if your supervisor requires 5 extra hours at the beginning of are working on. Company is active in monitoring the effort of our team members the week to meet a deadline, but is able to let you leave Friday 5 hours early, then and caring for our team members in the challenging IT work pace. These time nothing more is required on your time-sheet than the actual hours worked and a records help supervisors review the effort level of our team and ensure no one is Note that the early day was per your supervisor’s approval. carrying more than what is necessary. Same for the rare need to step out for a couple hours with your supervisor’s full Thirdly, we are a professional services company. Having accurate record of the effort approval. There is no need to use PTO for just 2-3 hours. you spend on each project is critical in order to bill our clients correctly. Our projects are priced with specific margins. If we have accurate records of the true costs, we can make sure we stay within that pricing model.
Bean Counting and Other Thrills Written By: Name 1 In this section, we’ll relate some of the common questions the accounting department Fourthly, even non-project positions need to track their time, as appropriate allocation encounters and provide some insight and answers to those questions. This first edition of their time and costs indirectly affect the project margins of our contracts as well. is about timekeeping… Do I use PTO if I am not going to work 8 hours one day? Why is accurate timekeeping important? Firstly st requiremen Feder Stat ag tha w keep Here at Company, we want to know when and how you actually work. Always record good records of your time. your actual hours on the actual day you worked. Secondly, in the flexible work environment especially here at Company it is Your supervisor determines your work schedule week-to-week based on the company important for supervisors to have a reliable record of what project/task/contract you and project needs. So, if your supervisor requires 5 extra hours at the beginning of are working on. Company is active in monitoring the effort of our team members the week to meet a deadline, but is able to let you leave Friday 5 hours early, then and caring for our team members in the challenging IT work pace. These time nothing more is required on your time-sheet than the actual hours worked and a records help supervisors review the effort level of our team and ensure no one is Note that the early day was per your supervisor’s approval. carrying more than what is necessary. Same for the rare need to step out for a couple hours with your supervisor’s full Thirdly, we are a professional services company. Having accurate record of the effort approval. There is no need to use PTO for just 2-3 hours. you spend on each project is critical in order to bill our clients correctly. Our projects are priced with specific margins. If we have accurate records of the true costs, we can make sure we stay within that pricing model.
I’m sure all of you have heard the comment that, “Everyone is in sales!” As cliché These are just a few , but they really are actionable to We are developing an entire stack of capabilities and as it sounds, it’s really true. The reality is, the most important “sales people” we everyone regardless of role in the company. We are a products that will service all of our intended target mar- have are those that execute on our captured work (projects /programs) every day. very open company with no borders or closed doors, kets with fresh and unique technologies that will invig- It’s not just up to those of us that are breaking down barriers to other markets and so please feel free to send any kind of information you orate customers. having capability discussions with that next customer hopeful. Our ability to per- happen upon to myself or Rebecca Addington. form on our contracts leads to other business. In this day of information overload, Now, something fun! most customers go back to the adage ‘that historical performance and value is a great indicator of future performance and value’. This makes everything we do in A quick status on our growth vision and path we are To help you understand what drives people in their deci- all customer interactions critical to our future successes. Everyone that talks with heading. sion making, interpersonal relationships, problem solv- our customer day-to-day is in a unique position to “capture” all kinds of relevant ing and other critical actions. I have historically not been everyoNe information that can make or break future business with that customer, agency, or We are clearly performing Yeoman’s work on our cur- a fan of personality tests and activities that categorized me in a particular way, or put me in a box for others to rent work, be it the VA contract or in the informatics/ whoever. analytics IR&D efforts. The intent is to continue to make “try and figure out.” Everyone on this team not only has to win the business, but also keep the business; these areas a good producer of revenue for the com- is iN to continue to earn that next Optional Task, change order, or even new work that is pany. Within the federal (public) sector, we are also That’s because we all change every day. positioned to grow in the Defense Health domain with attributable to what we are doing now. This is only accomplished when all roles in sales! the company are focused on the customer. Clearly, there are things that everyone several current and planned opportunities that we are That said, a former colleague of mine offered a person- targeting. Due to some of the relationships we have, ality test that would help to explain ourselves so that can do to help the BD and Capture people with collecting business intelligence that will be used in framing continued discussions around our existing and potential domain knowledge, we are also positioning for some customers. branching from internal people to external contacts and we could approach others in a similar light and still have fun with various role play results. It was a good experi- potential opportunities within the HHS superstructure ment, and although I still don’t put significant credence There are articles that go into this at great detail, but the following are the ones to include CMS, IHS, CDC and other Operational Divi- in these types of tests, this one proved to be quite en- that tend to yield the highest results via feedback when you hear about things your sions. There are plenty of other federal agencies that we tertaining and actually did explain some “things” pro- customer values, discover priorities, anticipate events and happenings, etc. Here’s are targeting, but for now we are focused on some near viding a thoughtful and fun result. Feel free to take the just a set of questions that we try to answer in every customer engagement: term successes that will drive growth and be an enabler test at the link below and share your results with your of the other domains that we’d like to penetrate as a coworkers if you choose. • What are their priorities? change agent. Written by • What trade-offs do they anticipate? And lastly, the domain that we are building the momen- Name and funny quip. • What is most meaningful in terms of value? Name • What problems and changes do they anticipate? tum to penetrate and create the largest change and im- Capture & Advanced • If they could do anything differently, what would it be? pactful results is the commercial (private) sector. This Programs (Dcap) • Who are the influencers in decision making? sector has all the opportunities for explosive growth • Do they already have a budget for something in particular? with the health domain, financial services, banking, and • Are there any important dates coming up that would be good to know about? the niche market of Mergers and Acquisitions (M&A).
I’m sure all of you have heard the comment that, “Everyone is in sales!” As cliché These are just a few , but they really are actionable to We are developing an entire stack of capabilities and as it sounds, it’s really true. The reality is, the most important “sales people” we everyone regardless of role in the company. We are a products that will service all of our intended target mar- have are those that execute on our captured work (projects /programs) every day. very open company with no borders or closed doors, kets with fresh and unique technologies that will invig- It’s not just up to those of us that are breaking down barriers to other markets and so please feel free to send any kind of information you orate customers. having capability discussions with that next customer hopeful. Our ability to per- happen upon to myself or Rebecca Addington. form on our contracts leads to other business. In this day of information overload, Now, something fun! most customers go back to the adage ‘that historical performance and value is a great indicator of future performance and value’. This makes everything we do in A quick status on our growth vision and path we are To help you understand what drives people in their deci- all customer interactions critical to our future successes. Everyone that talks with heading. sion making, interpersonal relationships, problem solv- our customer day-to-day is in a unique position to “capture” all kinds of relevant ing and other critical actions. I have historically not been everyoNe information that can make or break future business with that customer, agency, or We are clearly performing Yeoman’s work on our cur- a fan of personality tests and activities that categorized me in a particular way, or put me in a box for others to rent work, be it the VA contract or in the informatics/ whoever. analytics IR&D efforts. The intent is to continue to make “try and figure out.” Everyone on this team not only has to win the business, but also keep the business; these areas a good producer of revenue for the com- is iN to continue to earn that next Optional Task, change order, or even new work that is pany. Within the federal (public) sector, we are also That’s because we all change every day. positioned to grow in the Defense Health domain with attributable to what we are doing now. This is only accomplished when all roles in sales! the company are focused on the customer. Clearly, there are things that everyone several current and planned opportunities that we are That said, a former colleague of mine offered a person- targeting. Due to some of the relationships we have, ality test that would help to explain ourselves so that can do to help the BD and Capture people with collecting business intelligence that will be used in framing continued discussions around our existing and potential domain knowledge, we are also positioning for some customers. branching from internal people to external contacts and we could approach others in a similar light and still have fun with various role play results. It was a good experi- potential opportunities within the HHS superstructure ment, and although I still don’t put significant credence There are articles that go into this at great detail, but the following are the ones to include CMS, IHS, CDC and other Operational Divi- in these types of tests, this one proved to be quite en- that tend to yield the highest results via feedback when you hear about things your sions. There are plenty of other federal agencies that we tertaining and actually did explain some “things” pro- customer values, discover priorities, anticipate events and happenings, etc. Here’s are targeting, but for now we are focused on some near viding a thoughtful and fun result. Feel free to take the just a set of questions that we try to answer in every customer engagement: term successes that will drive growth and be an enabler test at the link below and share your results with your of the other domains that we’d like to penetrate as a coworkers if you choose. • What are their priorities? change agent. Written by • What trade-offs do they anticipate? And lastly, the domain that we are building the momen- Name and funny quip. • What is most meaningful in terms of value? Name • What problems and changes do they anticipate? tum to penetrate and create the largest change and im- Capture & Advanced • If they could do anything differently, what would it be? pactful results is the commercial (private) sector. This Programs (Dcap) • Who are the influencers in decision making? sector has all the opportunities for explosive growth • Do they already have a budget for something in particular? with the health domain, financial services, banking, and • Are there any important dates coming up that would be good to know about? the niche market of Mergers and Acquisitions (M&A).
Search
Read the Text Version
- 1 - 35
Pages: