fbpx Skip to main content

09280_20180711_0161Connecting Clients to Optimal Care

Circle of Care’s in-house client management platform, EasyCare©, was created with the specific goal of facilitating more integrated, higher-quality care for clients. Our most recent strides in innovation underscore this continued focus.

Safer EasyCare©’s safety and risk reporting function can now automatically identify and score risks based on information within case notes. The system is able to immediately flag and escalate heightened risks (e.g., falls) to managers for proactive intervention. Previously, a more manual process meant a greater potential for missed flags.

Client-centred In 2017, Circle of Care became one of the few home care organizations to launch ConnectingOntario – the provincially funded initiative that provides health professionals with real-time, secure access to critical patient information. By integrating ConnectingOntario viewer into EasyCare©, social workers and other key members of our home services team can efficiently access relevant health history, such as hospital admissions and lab reports, to develop appropriate care plans.

Efficient A proprietary algorithm developed within EasyCare© is making it possible to schedule client visits within minutes, which can save coordinators up to an hour when scheduling clients with complex visit requirements. The algorithm is able to search and assign visits based on a number of client factors including training requirements, gender, language, and continuity of care. In addition, changes to the referral process within EasyCare©, and automation of assessment forms for clients in our Holocaust program, have resulted in significantly reduced wait times for new clients.

Secure While the move toward electronic health information makes sense from a client-centred approach to more seamless care, it also creates potential challenges around client privacy and security of information. In our ongoing commitment to safeguarding client information, we have implemented stronger security measures including two-factor authentication, leading endpoint protection, and penetration testing.