Patient compliance in clinical trials – the elephant in the room

patient adherence

Clinical trials cost a fortune. When a patient is non-compliant during the run-in/washout period, he/she is dropped out of the study. This costs the sponsor 5X: site costs for 2 patients, recruitment costs for 2 patients and loss of time. In other words, retention is more important than recruitment. This raises the question: why is […]

The last mile in clinical trials

First mover advantage for clinical trials Although the notion of same day delivery seems to be recent, in fact, competitive advantage always went to those who can move quicker. Even if they are not the first. With fast communications, there is now a relentless trend towards increasing speed. We witness this trend in almost every […]

HIPAA compliance for your clinical trials

The golden rules of HIPAA compliance for your clinical trials Flask Data provides a one-stop cloud subscription for EDC, data management and statistics. Welcome to the 21st Century – cloud, on-demand, use as much as you need and eliminate project management overheads and vendor lock-in. As Flask Data customers progress through their clinical trial journey to FDA clearance […]

Use ML and AI to automate clinical trial operations

I’m always curious to learn new ideas from other disciplines and apply them for my own selfish purposes.   In this case – the AIOps model for providing observability in IT operations seems directly applicable to clinical trials operations. Use ML and AI to automate IT operations Gartner is the world’s leading research and advisory company for IT. […]

Auditing healthcare IT security and privacy with multiple threat scenarios

Is there a way to break out of the security checklist mentality? IT security auditors commonly use  standard/fixed checklists, often based on the compliance regulation being audited: the HIPAA Security Rule or  ISO 27001 for example; In this article we suggest considering an alternative approach based on generating and analyzing multiple threat scenarios for the […]

Cloud security assessment

A customer case study – cloud security assessment Faced with a steep bill for securing a new cloud application, a client asked us to help find a way to reduce their risk exposure at the lowest possible cost. By using the Business Threat Modeling methodology and PTA (Practical Threat Analysis) software, we were able to build a […]