ANA2019 Grant Submission Form

Deadline: Friday, March 8,  2019
Chair
Co-Chair
Session
Type of Session
Please provide the official title of the presentation. This will be copied exactly as typed here for use with marketing materials and brochures.
Please provide a description of this session, specifically why this topic is timely or important. Please include anything you think is important for the grant writer to include in the proposal ( 150-word count minimum)
Proposed Speakers

Please list the speakers that you propose for this session and any information that is relevant to their background or experience that will strengthen the grant proposal.

Speaker 1
Speaker 2
Speaker 3
Speaker 4
Pharma/Medical Device Companies
Please provide the names, and contact information if known, of any pharmaceutical or medical device companies that relate to your session that we should submit a grant application to.
Gap Analysis

All grant-funded CME activities must be designed around a Professional Practice Gap, and we must be able to derive data from learners that outlines the degree to which we were able to close the gap in practice as outlined below.

What is the problem we need to solve? EXAMPLE: Technology and access to data continues to increase. Healthcare providers are not aware of how their actions may put them at risk of liability for a breach and consequences from HIPAA.
What would it look like if that problem was gone? EXAMPLE: Healthcare providers have complete confidence in their practice of protecting PHI to avoid any liability stemming from a data breach.
Summarize the difference between the current state and the desired state. Why does this gap exist? What are the factors contributing to this gap? This can include things we can change with our education (e.g., new techniques and skills) and also things we cannot change (e.g., government regulation). EXAMPLE: Healthcare is a target for identity thieves, and unfortunately the easiest avenue to access PHI is through Healthcare providers. Criminals have sophisticated systems for stealing information and tricking good people into providing information to help the criminal steal data. There are a few tips and tactics healthcare providers can employ to avoid falling victim. This will help reduce the ease of theft of PHI and the associated consequences for the patients, providers, and organizations.
Gap Cause
Gap Cause
Please check off why this gap exists. (Please check all that apply)
Educational Needs that Underlie the Gap ( i.e. Learning Objectives)

Please describe what your learners need to do differently, do better, or stop doing to close this gap/achieve the desired state. Please keep in mind we will need to measure changes in those things you identify here, so these should be changes for which we are able to gather data that can be used to draw correlations.

EXAMPLE: Following this session, learners will be better prepared to avoid comprising PHI by applying a few tactics; 1) encrypting the hard drive of their computer/laptop and/or devices, 2) using a passphrase that is more than 8 characters, 3) recognizing and reporting "phishing" emails

For tips on how to write Learning Objectives, please click here.

References/Evidence-Based Resources

Please describe the data sources used to derive the gap listed above (e.g., expert opinion, learner feedback, recent research, regulations or legal changes, etc.) and how you synthesized this data to derive the gap. EXAMPLE: Ponemon Internet Security in Healthcare Study 2015, https://www2.idexpertscorp.com/fifth-annual-ponemon-study-on-privacy-security-incidents-of-healthcare-data

Not To Use
What is the problem we need to solve? EXAMPLE: Technology and access to data continues to increase. Healthcare providers are not aware of how their actions may put them at risk of liability for a breach and consequences from HIPAA.
What would it look like if that problem was gone? EXAMPLE: Healthcare providers have complete confidence in their practice of protecting PHI to avoid any liability stemming from a data breach.
Summarize the difference between the current state and the desired state. Why does this gap exist? What are the factors contributing to this gap? This can include things we can change with our education (e.g., new techniques and skills) and also things we cannot change (e.g., government regulation). EXAMPLE: Healthcare is a target for identity thieves, and unfortunately the easiest avenue to access PHI is through Healthcare providers. Criminals have sophisticated systems for stealing information and tricking good people into providing information to help the criminal steal data. There are a few tips and tactics healthcare providers can employ to avoid falling victim. This will help reduce the ease of theft of PHI and the associated consequences for the patients, providers, and organizations.
Please provide a description of this session. Information provided here will also be used on all ANA2019 marketing materials.
Please provide the names, and contact information if known, of any pharmaceutical or medical device companies that relate to your session that we should submit a grant application to.