- Procurement Options
- Case Studies
The New Jersey Innovation Institute has received a $2.9 million grant from the Office of the National Coordinator for Health Information Technology to help the Department of Health ensure the sharing of quality data through its New Jersey Health Information Network.Health Information Exchange (HIE)
New legislation introduced Thursday by Republican North Carolina Rep. Renee Ellmers provides relief from the government's meaningful use requirements -- and puts Stage 3 on hold indefinitely.
The bill received kudos from the American Medical Association and the College of Health Information Management Executives, which represents more than 1,400 CIOs and health IT professionals.Meaningful Use
The WEDI Summer Forum on ICD-10 July 28-29 could be accurately referred to as "Everything You Ever Wanted to Know About ICD-10 (But Were Afraid to Ask)."
Over the course of two days, an assembly of providers, payers, vendors, government officials, consultants and association representatives covered as many aspects of ICD-10 as possible within the time allotted, placing the sharpest focus on the Oct. 1 deadline, provider readiness, claims adjudication, testing results and financial implications.ICD-10 & Coding
Back in the old days – say, a whole 10 years ago – thieves had to be physically inside a healthcare facility to steal patient information. How times have changed.Privacy & Security Security needs to be a top priority for health care leaders Back in the old days – say, a whole 10 years ago – thieves had to be physically inside a health care facility to steal patient information. How times have changed. Healthcare IT News blog/security-needs-be-top-priority-health-care-leaders
As it happens, it appears that the smallish contract awarded to Cerner to replace the Military Health System's anatomic pathology lab technology earlier this month was a hint, after all.Interoperability
The dangers of data breach make for great headlines: data held for ransom, financial fraud, and medical identity theft, to name a few. But despite the many risks of data breach, from a business standpoint, the most immediate threat in most security incidents is failure to comply with regulatory requirements. The vast majority of security incidents don't turn into data breaches, and not all breaches result in theft or other damages. But failure to report or meet other regulatory requirements can result in stiff penalties regardless.Privacy & Security When a cyber attack hits: Who's in charge? The dangers of data breach make for great headlines: data held for ransom, financial fraud, medical identity theft. But despite the risks of a breach, the most immediate threat in most security incidents is failure to comply with regulatory requirements. Healthcare IT News blog/when-cyber-attack-hits-whos-charge
When Defense Department officials briefed reporters prior to announcing that the Cerner, Leidos and Accenture team won its EHR modernization contract, they were adamant that so much speculation about the DoD’s ability to share patient information with the Department of Veterans Affairs had been unfounded.Interoperability
CVS Health, with 7,800 pharmacies and more than 1,000 walk-in medical clinics across the country, and Watson, IBM's cognitive computing platform, are joining forces to take on chronic diseases. The plan? Eradicate conditions such as diabetes, hypertension, heart disease and obesity before they even take hold.Analytics
The US Department of Defense handed down the largest and most-anticipated electronic health record system contract in history late Wednesday.Electronic Health Records
Ponemon’s recently published 2015 Study on Privacy & Data Security of Healthcare Data makes one point crystal clear: healthcare organizations must do more to protect sensitive patient informatiPrivacy & Security 4 takeaways from Ponemon’s 2015 healthcare security report Ponemon’s recently published 2015 Study on Privacy & Data Security of Healthcare Data makes one point crystal clear: healthcare organizations must do more to protect sensitive patient information from the wide variety of data breach threats. Healthcare IT News blog/4-takeaways-ponemon’s-2015-healthcare-security-report
Medsphere, an open source electronic health record company whose technology is based on the U.S. Department of Veterans Affairs' VistA EHR, is partnering with contractor ProSphere Tek to work on a new VA project.
The work calls for developing File Manager – known as FileMan – version 23. VA VistA’s core data management utility, enables the operation of VistA applications and modules, all working with integrated data.Interoperability
I was recently at a meeting where a colleague described a recent interaction with BIDMC.
She had a traumatic injury on a weekend afternoon and suspected a fracture. Rather than visit an emergency department filled with high acuity patients, she visited the BIDMC Urgent Care center, knowing they could do imaging and place a cast if necessary.Patient Engagement When the healthcare system works As we envision the next generation of electronic tools, support for team-based care with handoff management and closed-loop communication among the stakeholders will be the most important new features. Healthcare IT News blog/when-healthcare-system-works
The Office of the National Coordinator for Health IT is disbursing about $38 million in grants to 20 organizations, working to drive better information exchange for care coordination and population health.
The grants build on programs funded 2009 HITECH Act, and aim to help health data be more widely exchanged among providers, vendors and consumers.Health Information Exchange (HIE)
The arrival of a new Microsoft operating system does not exactly bring the same excitement that it once did.
Indeed, since about the time Windows Vista launched, subsequent operating systems have come – and in the odd case of Windows 9 essentially vanished – without the fanfare of Windows 95, XP or even 2000.
[See also: IE flaw ushers risky new era for XP use.]Population Health
The Bipartisan Policy Center has issued a set of recommendations to Congress that it says will speed up medical cures and innovation.Policy and Legislation
If you've been looking for any set of official guidelines for mobile device security or best practices on keeping medical data safe, there's finally some serious movement on that front – a standards handbook with reams of valuable insight on the topic.
The National Institute of Standards and Technology, the federal agency charged with developing tech standards, has unveiled its long-awaited mobile security guide, specifically written for safeguarding medical data.Privacy & Security
Earlier this year, the Centers for Medicare and Medicaid Services (CMS) announced increased 2016 rates to Medicare Advantage (MA) – changes that will continue to strengthen this growing industry program. Some are saying that this change is a result of the lobbying efforts of payers.Policy and Legislation Why Medicare Advantage is more potent than meaningful use for driving reform I'll give you a hint: MA is the only national program that engages payers, providers and consumers to support all three elements of the Triple Aim. Healthcare IT News blog/why-medicare-advantage-more-potent-meaningful-use-driving-reform