The invention relates to a system that collects infection prevention data from a set of sensor packages distributed throughout an organization. Sensor package data includes a variety of specific sensor types that measure both contamination, cleaning and sterilization activities within the organization.
Healthcare-acquired infections (HAI) result in over 100,000 deaths every year in North America, making it one of the leading causes of death. Most of these infections occur because of the transfer of infectious agents through shared human contact with contaminated surfaces, devices and tools within the healthcare facility. While infection control practices and processes exist to reduce the spread of infection, they are often ineffective because of a lack of compliance and simple human error.
Many pathogenic organisms have adapted to antibiotic medications and disinfectants to the point that it is very difficult to kill or contain them—especially in healthcare facilities. Examples of such organisms include Methicillin-resistant Staphylococcus Aureus (MRSA) and Clostridium Difficile (C Diff), both of which have become deadly problems in hospitals.
In an effort to contain outbreaks of infections caused by these pathogenic organisms, technology has been developed to provide early detection of infections. U.S. Pat. No. 7,230,529 (Ketcherside et al) describes a computer program that interfaces a clinical information system with an expert system to determine when infections are occurring within a healthcare facility. For example, the program scans examination notes entered by an attending physician, pharmaceutical orders, and a patient's vital statistics, which it then correlates using an expert rule set to determine if an infection is indicated. Often, these types of computer programs can detect an infection outbreak before a human can, saving time, money, and human suffering.
While these early detection solutions have important value, they can only help after an infection has already occurred. A better approach would be to stop the infection from happening in the first place. Many of these infections occur because of the transfer of pathogenic organisms through shared human contact with contaminated surfaces, devices and tools within the facility. Facilities have established infection prevention procedures aimed at reducing or eliminating the spread of the organisms. Unfortunately, these policies are not always effective due, in part, to a lack of compliance and simple human error.
Many studies have shown the spread of infectious disease can be caused by hand-born pathogens. One of the most effective activities in combating Hospital-Acquired Infections is simple hand washing. Further studies have shown compliance to hand washing policies is below 40% in most healthcare facilities. Yet other studies have shown a much higher rate of compliance with the process is actively monitored. It follows, then, that an automatic hand hygiene monitoring solution would be beneficial.
U.S. Pat. No. 7,293,645 (Harper) describes a simple system wherein a device containing hand sanitizer is worn by the user and a record is kept each time the user cleans their hands using the device. When the device is returned for refill of hand sanitizer, the data is stored and thus a record of compliance of each user is established. The system improves compliance by first, making it convenient to clean hands, and second, by assigning accountability to the user. The solution described by Harper is simple and low-cost. However, there is a delay in detecting non-compliance, which means the spread of an infection can occur before non-compliance is detected.
U.S. Pat. No. 7,770,782 (Sahud) describes an active monitoring system, which allows healthcare providers to monitor hand hygiene compliance that includes a data reader adapted to be worn by a healthcare provider. The system includes a portal trigger disposed at each door portal of a patient room, which activates the reader to record an entrance event when the provider enters the patient room. The system includes a dispenser trigger disposed at each cleaning dispenser having cleanser in or at the entrance of each patient room which activates the reader to record a dispensing event when the provider causes the dispenser to dispense cleanser, the reader having a display which displays a number of dispensing events and a number of entrance events. This approach provides real-time data and warnings when non-compliance occurs, thus reducing the risk of the spread of infection.
US Patent Application No. 20120112883 (Wallace) describes a similar system that uses a real-time location system (RTLS) to monitor the movement of staff and equipment through a hospital, and correlates that to infection control and infection prevention activities. The purpose of the system is to assess the risk of contracting an infection or the risk of exposure to an infection posed to an Entity (eg. Patient), such as, for example a person. Tracking risk is not the same as tracking compliance to infection prevention policies, which, if followed, inherently reduce risk.
There is significant value in infection prevention as compared to infection detection and control. The cost in time, money, and human suffering is significantly lower if an infection is prevented rather than treated. The many solutions described hereto are oriented either toward detecting and tracking an infection that has already occurred, or measuring compliance to one particular infection prevention activity only (i.e. hand washing). There is a need for a more comprehensive system that monitors and reports on all infection prevention activities.
The present invention is a centralized system for the automated monitoring and reporting of compliance to infection prevention policies. It is focused on the proactive reduction (elimination) of pathogenic organisms causing infection within the facility by enforcing best practices for infection prevention.
It collects, summarizes and applies policy rules to data from a collection of sensor packages distributed throughout a healthcare facility. A sensor package is a hardware device consisting of one or more sensor types (eg. touch, vibration, chemical, temperature, fluid, pressure, particulate and others) with independent power and communication capabilities. Some sensor packages have additional capabilities for interacting with human operators, providing both human input and display functions.
For example, a checklist representing an infection prevention work flow is presented on a tablet computer. The user performing the infection prevention activities marks them as completed on the tablet computer and such information is immediately transferred to the centralized system. Portions of the checklist may be pre-filled by the system for activities that can be automatically monitored by sensors. For example, a room recently vacated by a patient in a hospital must be thoroughly cleaned and disinfected. The work flow for cleaning the room involves mopping the floor, wiping surfaces with a disinfectant, and changing the bed sheets. Sensors embedded in the floor and a computer keyboard found in the room automatically report to the system when they have been cleaned and those items are automatically checked as completed on the work flow checklist. The changing of the bed sheets, however, has no sensor to detect when it has been completed and must therefore be entered manually by the user performing the task. All these activities are reported in real-time to the centralized system.
The integration of both automatic and manual tracking of a work flow provides the opportunity for analytics to determine if the manually-entered data is reasonable. For example, the changing of the bed sheets is to take place between wiping the surfaces and mopping the floor in the room-cleaning work flow. The time stamps of wiping the surfaces and mopping the floor are automatically stored, with the latter being subtracted from the former. If there wasn't reasonable time allowed between these steps for the changing of the bed sheets then the system will detect that the changing of the bed sheets could not have occurred (even if a user manually entered the data saying it did).
Policy is enforced through use of a policy rule engine. The policy rule engine is an infection prevention expert system that uses a variety of artificial intelligence techniques including: a production rule engine, an automated learning system, and a business process management (work flow) engine. Policy rules are applied to collected sensor data to identify potential contamination events, issue notifications and initiate response protocols. It identifies long term trends within the facility, learning what the optimal responses are to contamination events based on human feedback to previous responses. Responses vary in complexity from simple notifications (alerts, messages, alarms etc.) to complex work flows that involve multiple resources and multiple steps to complete.
The system provides multiple levels of reporting detail to users operating in several different roles. As the system focuses on the facility, all reporting has both a spatial (location) and temporal (time) coordinate. Sensor packages and human participants (staff, patients, visitors) may be continually tracked for location within the facility. The system seeks to direct response actions to resources in the specific location of occurrence in minimal time.
Preferred and alternative examples of the present invention are described in detail below with reference to the following drawings:
The sensors 100 connect to a network via a network interface 105. Data from the sensors is communicated to a network storage device 115 located in network (or “cloud”) 110. The network 110 may be closed or open. Sensor data is accessed by human interface devices 125 (eg. Desktop computer, notebook computer, tablet, smartphone, personal digital assistant, and so on) which connect to the network 110 via a network interface 120. Software running on the human computer interface devices 125 performs analysis of the sensor data.
Organization-specific Policies 222 reside at the Monitor Tier level. These policies define the infection prevention activities that must be conducted within an organization, and are customizable. These Policies feed into the Remote Monitoring Service 221, which is where the analysis of the sensor data takes place. Remote Web Client(s) 231 are located on the Web Clients layer 230. Here, the data may be remotely viewed and policies edited. A more detailed description of the three hierarchical levels follows.
Multiple Tenant Central Monitoring Service
The service is provides support for multiple “tenant” organizations, each with their own independent operating environment, security zone and data. Tenants are not visible to each other or to any external agency other than themselves. Each tenant appears to be an independent operating, standalone instance of the ICMS Monitor application service.
The service can be run in a centralized Software-as-a-Service mode or in Enterprise mode. Software-as-a-Service mode executes the Monitor in an Internet-wide accessible location, supporting multiple owner organizations each with their own tenant configuration. Enterprise mode executes the Monitor within the confines of the owner organization facility and a single tenant configuration. Enterprise mode installations are generally isolated from the general Internet and are not publicly visible or accessible.
The monitor provides the following capabilities:
Collection of contamination and infectious agent data from a variety of remote sensor devices deployed throughout a monitored site.
Presentation of summarized monitoring data via Web based user interface.
Automated issuance of alerts and notifications based on rules, key performance indicators (KPI) and parametric thresholds.
Automated initiation of contamination and infection resolutions actions and work flows.
Presentation of summarized sensor data via embedded “dashboard” interface.
Detection of (potential) contaminants based on collected sensor values.
Detection of cleaning activities and quality based on policy rules.
Policy Compliance Monitoring
Policy compliance monitoring makes use of a sophisticated policy rule engine that applies policy rules in priority order to collected sensor data as it is received by the monitor. Other embodiments may choose to process collected data after it has been received on a scheduled or periodic basis.
Policy rules are maintained and stored on an independent basis. They are assembled into one or more policy definitions that are applied to data in a priority order. One or more policy definitions may be enabled for processing for any type of data. For example two independent policy definitions are applied to input sensor data, three independent policy definitions are applied to contamination events.
Policy rules and definitions may include parameters. Parameters identify values referenced in the policy used in comparisons, expressions or limits. For example, a “threshold” parameter may define an integer value that when compared to an input sensor data value causes the rule to assert true and be applied by the rule engine.
The system supports authoring, managing and applying policy definition based on catalogues of policies defined as best practices. Catalogues provide support for government or regulator body policy compliance in the form of a published policy.
Spatial and Temporal Reporting
The system maintains a hierarchical spatial mapping (geospatial) system that ties graphical location images (maps, pictures) to specific spatial coordinates. It also provides the means to assign SensorPackage and SensorAgent devices to specific locations for notification and response action processing.
The system maintains a central time clock used to synchronize data collection and response action processing. Response actions to potential infection events are very time critical and require the ability to re-route actions based on time expiration policies.
The system provides an integrated location/time reporting capability that allows multiple events and associated responses to be displayed graphically to management role uses.
Participant Focused Work Flows
The system supports initiation of complex work flow (business processes) activities in response to any policy generated event type. Work flows include both automated and manual (human) activities, applied in a specific order.
Policy, Procedure and Compliance Training Management
The system records, directs and manages the training of personnel in infection prevention and monitoring processes.
Sensor Package Decoupling
The system provides support for loose coupling of SensorPackage devices to the set of managed devices. SensorPackages implement a mandatory probe function in their communications interface that allows SensorAgent software to probe for and identify SensorPackage devices within their operating range. The interface is independent of the underlying physical communications technology in use between SensorPackage and SensorAgent devices e.g. wireless (IEE 802.11, Zigbee, Bluetooth), USB, serial and others. Providers of SensorPackage devices must also provide a SensorAgent Probe implementation which is dynamically loaded and used by the SensorAgent software to identify and communicate with the SensorPackage.
Studies have shown that common-touch surfaces, such as computer keyboards, are among the most contaminated surfaces in healthcare facilities. It follows then, that common-touch surfaces could have sensors built-in that detect compliance to cleaning policies and thus become one of many sensors reporting data in the system of the present invention. The apparatus shown in
If the contamination threshold has been exceeded, the process moves to block 4120 where it outputs an alert according to administrator-defined policy. The alert can take many forms including, but not limited to: visual indicator displayed on the visual output 340 (e.g., display device or device configured to illuminate the touch surface) of the device 300, an audible alert output on the speaker 350, a haptic alert output by the vibrator 335, or data that is sent via the communication interface 315 to external monitoring devices or software.
After issuing an alert, the process moves to block 4130 (
The system then watches for a wiping motion in block 4310. In one embodiment, the CPU 310 determines when the surface has been cleaned by a wiping action.
Wipe detection is particularly useful when a user initiates cleaning the surface but has forgotten to pause it first. If the system detects touches that are indicative of a wiping action, it can automatically suspend or pause the operation of the device. In one embodiment, the device has an explicit method for the user to select pause mode, which disables functionality to allow the surface to be cleaned. A user may forget or choose not to activate this mode before cleaning. To accommodate this circumstance, the CPU 310 detects a wiping motion as a moving cluster of adjacent touches occurring simultaneously. As that cluster of touches begins to move, the CPU 310 determines the action to be a wiping motion and functionality of the device is temporarily disabled, allowing the wiping motion to take place without the pause mode being manually activated.
If a wiping motion is not detected, the process exits at block 4315. If a wiping motion is detected, the system suspends operation of the device in block 4320. In block 4325 the CPU 310 determines if wipe coverage was adequate. For example, if only half of the touch surface was wiped, the CPU 310 automatically ascertains this and judges this wiping action to be an incomplete wipe.
In infection sensitive environments, the contamination on the surface may not be visible to the naked human eye. In fact, the most harmful pathogens are almost always invisible. In this circumstance, the user doesn't have the benefit of seeing where they have or haven't wiped by simply looking at the presence or absence of contamination. Further, many cleaning liquids are clear again making it difficult for a user to know if they have cleaned the entire surface adequately.
To assist with this problem, an embodiment of the cleanable surface incorporates a virtual visual representation of the surface on a display (either attached to the surface or on the screen of a connected computer (the visual output 340)). This visual representation, sometimes referred to as a “heat map”, changes the color of the virtual surface (or touch surface) wherever a touch occurs. Over time, the more the surface is touched, the more the virtual surface (or touch surface) becomes colored. As the user wipes the cleanable surface, the virtual surface representation provides feedback whereby the colorization is removed corresponding to where the wiping takes place. In effect, the user “erases” the coloring on the virtual surface by wiping the real surface. In this way, they are provided immediate visual feedback as to the adequacy of their wiping action.
Once the CPU 310 determines the wiping coverage is adequate, it increments a cleaning “score” in block 4330. The process continues to block 4335 where the CPU 310 compares the capacitive sensor values right after the wipe is completed with the baseline values retrieved in block 4305. A uniform difference between all the sensors as determined by the CPU 310 indicates the presence of a liquid on the surface as determined in block 4340. If no liquid is found to be present, the process adjusts the cleaning score accordingly in block 4341 and then proceeds to block 4380 where the cleaning score is compared with stored policy data. Policy data is typically defined by a facility administrator in which the device is being used. For example, a hospital may choose to have a policy that the surface must be cleaned with a liquid. If no liquid was used then the process would determine that the cleaning was not adequate. The policy data may reside onboard the device 300 in the data memory 382, or it may be stored external to the device and communicated via the communication interface 315
If liquid is detected in block 4340 the process moves to block 4345 where the CPU 310 measures the rate of evaporation of the liquid from the cleanable touch surface. It does this in an effort to determine the type of liquid used to clean the surface. Some policies, for example, may dictate that a certain type of cleanser or disinfectant be used while others may allow only water. The CPU 310 ascertains, to the extent possible, what type of liquid was used during the wiping action.
In one embodiment, the CPU 310 uses data from the capacitive sensors in the surface to determine the presence of moisture on the surface. Moisture changes the capacitance of the surface, and can therefore be detected using the touch capacitive sensors in the surface.
Further, as the liquid evaporates from the surface, the capacitance on the surface changes accordingly and can be detected by a change in capacitance of the surface's capacitive touch sensors. By measuring this change, the rate of evaporation is determined and correlated to various known cleaning liquids (such as water and alcohol). For example, the evaporation rate of alcohol is faster than that of water, and so the surface can tell the difference between water and alcohol. Thus, using the evaporation rates of the cleaning liquid, the CPU 310 can determine what type of liquid was used to clean its surface. The rate at which a liquid evaporates is stored as “evaporation signatures” in the data memory sensor database 381.
The rate of evaporation can vary even for the same liquid from environment to environment. For example, most liquids will evaporate slower in a humid, cool environment than they will in a dry, hot environment. To accommodate for this variability, an embodiment of the present invention allows the user to calibrate the surface for the liquid being used and the environment in which it is being used. They do this by putting the device into a “learn” mode and then coat the surface with the liquid. The system then records the rate of evaporation of that liquid in that environment and stores it in the sensor memory 370 for reference in block 4350 of
In another embodiment, a local humidity value is retrieved from a local or remote (e.g., website) source via the communication interface 315. The retrieved humidity value is then used by the CPU 310 to alter the stored evaporation rates.
The process determines whether or not the liquid is a known cleanser in block 4355 of
The process continues to block 4380 where the cleaning score is compared with policies stored in user preferences data 382, or alternatively retrieves the policy data from an external device via the communication interface 315. It should be noted that the term “cleaning score” is used simply for illustrative purposes, and that in reality a more complex set of rules make up the algorithm that determines whether or not the cleaning has been adequate and meets the requirements of the stored policies. The process then exits at block 4385.
While the preferred embodiment of the invention has been illustrated and described, as noted above, many changes can be made without departing from the spirit and scope of the invention. Accordingly, the scope of the invention is not limited by the disclosure of the preferred embodiment. Instead, the invention should be determined entirely by reference to the claims that follow.
This application claims the benefit of U.S. Provisional Application Ser. No. 61/589,293, filed Jan. 20, 2012, the contents of which are hereby incorporated by reference.
Number | Date | Country | |
---|---|---|---|
61589293 | Jan 2012 | US |