Beyond EHR
eBook - ePub

Beyond EHR

Using Technology to Meet Growing Demands and Deliver Better Patient Care

Jeffery Daigrepont, EFPM, CAPPM

  1. 198 Seiten
  2. English
  3. ePUB (handyfreundlich)
  4. Über iOS und Android verfügbar
eBook - ePub

Beyond EHR

Using Technology to Meet Growing Demands and Deliver Better Patient Care

Jeffery Daigrepont, EFPM, CAPPM

Angaben zum Buch
Buchvorschau
Inhaltsverzeichnis
Quellenangaben

Über dieses Buch

Today, it is not uncommon for practices and hospitals to be on their second or third EHR and/or contemplating a transition from the traditional on-premise model to a cloud-based system. As a follow-up to Complete Guide and Toolkit to Successful EHR Adoption (©2011 HIMSS), this book builds on the best practices of the first edition, fast-forwarding to the latest innovations that are currently leveraged and adopted by providers and hospitals. We examine the role that artificial intelligence (AI) is now playing in and around EHR technology. We also address the advances in analytics and deep learning (also known as deep structured or hierarchical learning) and explain this topic in practical ways for even the most novice reader to comprehend and apply.

The challenges of EHR to EHR migrations and data conversions will also be covered, including the use of the unethical practice of data blocking used as a tactic by some vendors to hold data hostage. Further, we explore innovations related to interoperability, cloud computing, cyber security, and electronic patient/consumer engagement.

Finally, this book will deal with what to do with aging technology and databases, which is an issue rarely considered in any of the early publications on healthcare technology. What is the proper way to retire a legacy system, and what are the legal obligations of data archiving?

Though a lot has changed since the 2011 edition, many of the fundamentals remain the same and will serve as a foundation for the next generation of EHR adopters and/or those moving on to their second, third, fourth, and beyond EHRs.

Häufig gestellte Fragen

Wie kann ich mein Abo kündigen?
Gehe einfach zum Kontobereich in den Einstellungen und klicke auf „Abo kündigen“ – ganz einfach. Nachdem du gekündigt hast, bleibt deine Mitgliedschaft für den verbleibenden Abozeitraum, den du bereits bezahlt hast, aktiv. Mehr Informationen hier.
(Wie) Kann ich Bücher herunterladen?
Derzeit stehen all unsere auf Mobilgeräte reagierenden ePub-Bücher zum Download über die App zur Verfügung. Die meisten unserer PDFs stehen ebenfalls zum Download bereit; wir arbeiten daran, auch die übrigen PDFs zum Download anzubieten, bei denen dies aktuell noch nicht möglich ist. Weitere Informationen hier.
Welcher Unterschied besteht bei den Preisen zwischen den Aboplänen?
Mit beiden Aboplänen erhältst du vollen Zugang zur Bibliothek und allen Funktionen von Perlego. Die einzigen Unterschiede bestehen im Preis und dem Abozeitraum: Mit dem Jahresabo sparst du auf 12 Monate gerechnet im Vergleich zum Monatsabo rund 30 %.
Was ist Perlego?
Wir sind ein Online-Abodienst für Lehrbücher, bei dem du für weniger als den Preis eines einzelnen Buches pro Monat Zugang zu einer ganzen Online-Bibliothek erhältst. Mit über 1 Million Büchern zu über 1.000 verschiedenen Themen haben wir bestimmt alles, was du brauchst! Weitere Informationen hier.
Unterstützt Perlego Text-zu-Sprache?
Achte auf das Symbol zum Vorlesen in deinem nächsten Buch, um zu sehen, ob du es dir auch anhören kannst. Bei diesem Tool wird dir Text laut vorgelesen, wobei der Text beim Vorlesen auch grafisch hervorgehoben wird. Du kannst das Vorlesen jederzeit anhalten, beschleunigen und verlangsamen. Weitere Informationen hier.
Ist Beyond EHR als Online-PDF/ePub verfügbar?
Ja, du hast Zugang zu Beyond EHR von Jeffery Daigrepont, EFPM, CAPPM im PDF- und/oder ePub-Format sowie zu anderen beliebten Büchern aus Business & Information Management. Aus unserem Katalog stehen dir über 1 Million Bücher zur Verfügung.

Information

Jahr
2020
ISBN
9781000258509

Chapter 1

The Current State of the Healthcare IT Market

According to the Office of the National Coordinator (ONC), the term “health information technology” (health IT) refers to the electronic systems healthcare professionals – and, increasingly, patients – use to store, share and analyze health information. Health IT includes electronic health records (EHRs), but it can be much more comprehensive.1 For these reasons, it will be helpful first to understand the current state of the healthcare IT (HCIT) market and how it drives new applications that go beyond the way we use EHRs today.
The most notable state of our current HCIT market has to do with incentives and penalties for the use and adoption of certified EHRs. This matter will be covered in more detail later in the book. Still, for a quick contrast and comparison, the original EHR incentive program started under the American Recovery and Reinvestment Act of 2009 during the Obama administration. Our economy was teetering on the brink of a second Great Depression, and we desperately needed incentives to stimulate the economy. One of the largest benefactors of this bill was the healthcare IT sector. Over $20 billion in incentive money was allocated to encourage the adoption of a certified EHR.2
Prior to Obama, the Stark Laws were relaxed under the Bush administration during his second term to allow hospitals to subsidize the cost of EHRs for their medical staff. These combined, back-to-back efforts jumpstarted the adoption of EHRs. The program developed under the Affordable Care Act was mostly based on adoption and selecting a vendor with certified features and functions. (Note: The Patient Protection and Affordable Care Act, also the Affordable Care Act or colloquially known as Obamacare, is a United States federal statute enacted by the 111th United States Congress and signed into law by President Barack Obama on March 23, 2010.) To be eligible, doctors and hospitals only had to pick a certified vendor and attest to using the basic features of the EHR. There were no major conditions or attempts to verify. This created a mass explosion of new vendors rushing to get their share of these funds. At the apex, there were over 600 certified EHRs in the market. Most of these vendors no longer exist and/or have since merged with other vendors to remain viable.
Today, the incentive programs are more comprehensive and require some demonstrated outcomes. Table 1.1 gives a quick side-by-side comparison of the incentives. Figures 1.1 and 1.2 recap the first calendar year for which the EP receives an incentive payment.
Table 1.1 Original and Current Incentives Compared
Original EHR Incentives
Current EHR Incentives
  • The vendor must be certified by the Certification Commission for Healthcare Information Technology (CCHIT).
  • The Certification Commission for Healthcare Information Technology (CCHIT).
  • Meet Meaningful Use (MU) standards
MU was based on five main objectives, according to the Centers for Disease Control and Prevention. They were:
  1. (1) Improve quality
  2. (2) Safety
  3. (3) Efficiency
  4. (4) Reduce health disparities
  5. (5) Increase patient engagement
  • Meaningful Use +++
MU has now shifted to a Merit-Based Incentive Payment System and is combined with the Medicare Access and CHIP Reauthorization Act (MACRA); the Medicare EHR Incentive Program, commonly referred to as Meaningful Use, was transitioned to become one of the four components of the new Merit-Based Incentive Payment System (MIPS), which itself is part of MACRA.
MIPS harmonizes existing CMS quality programs (including Meaningful Use), the Physician Quality Reporting System and Value-Based Payment Modifiers. MIPS consolidates multiple quality programs into a single program to improve quality care.
  • Compensation
The payout was over 5 stages with phase one starting with 15 core requirements and 10 menu requirements. All core requirements are mandatory. Additional core requirements were added each year by CMS. There were two payout tracks.
  1. 1. Medicare Track: Eligible providers could receive up to $44,000 if all stages for all years were met. (See Figure 1.1.)
  2. 2. Medicaid Track: Eligible providers could receive up to $63,750. The only requirement for phase one was a signed contract with a certified vendor. The requirements for Medicaid were lower because Medicaid practices have less access to capital. To qualify for the Medicaid track, the provider would have to have a minimum of 30% Medicaid patients. (See Figure 1.2.)
  • Compensation as an up or down adjustment to the provider’s Medicare payments.
The first year started at a plus or minus of 4%, and it is set to go up to plus or minus 9% by 2021. Additional incentives can be gained through alternative payment models, but the risk is higher.
Figure 1.1 Original MU payout – Medicare. Source: CMS.
Figure 1.2 Original MU Medicaid payout. Source: CMS.
Fast forward to 2020, MIPS and MACRA have replaced Meaningful Use, and there is increased scrutiny and auditing of both vendors and providers who benefited from the former incentive programs. Most notably, three major vendors were hit with major false claim violations from the DOJ, resulting in a multimillion-dollar settlement with the government. Providers and hospitals are being asked to submit documentation demonstrating they complied with all the conditions sworn to during the attestation process. (Note: Attestation is a process of making a claim/statement without the requirement of submitting supporting documentation to validate these claims/statements. The government accepts these statements without verification but reserves the right to audit at any time to ensure the statements are accurate.)
Those who cannot produce the documentation are forced to return the incentive money. CMS will deduct the funds from future reimbursement and/or may impose additional fines for failing to comply. One of the conditions most frequently missed is the security risk analysis (SRA).3 (Note: Measure: Conduct or review a security risk analysis in accordance with the requirements under 45 CFR 164.308(a)(1), including addressing the security (including encryption) of data created or maintained by CEHRT in accordance with requirements under 45 CFR 164.312(a)(2)(iv) and 45.)
This SRA is a pass/fail measure, so it is a manageable condition for HHS to audit. Practices that do not produce evidence of performing an annual SRA are generally asked to return the incentive money. The practice, to pass an SRA, must have all its HIPAA privacy and security policies current and provide evidence of staff training and TESTING of their knowledge. Table 1.2 outlines instructions to help you conduct a risk analysis that is appropriate for your organization. Extensive information is available at www.hhs.gov/hipaa/for-professionals/security/index.html.
Table 1.2 Checklist for Conducting a HIPAA Security Rule Risk Analysis
Task
Completed
Define the scope of the risk analysis and collect data regarding the ePHI pertinent to the defined scope.
Identify potential threats and vulnerabilities to patient privacy and to the security of your practice’s ePHI.
Assess the effectiveness of implemented security measures in protecting against the identified threats and vulnerabilities.
Determine the likelihood a particular threat will occur and the impact such an occurrence would have on the confidentiality, integrity and availability of ePHI.
Determine and assign risk levels based on the likelihood and impact of a threat occurrence.
Prioritize the remediation or mitigation of identified risks based on the severity of their impact on your patients and practice.
Document your risk analysis, including information from the steps above, as well as the risk analysis results.
Review and update your risk analysis periodically.

Conducting a HIPAA Security Rule Risk Analysis

The first requirement of the HIPAA Security Rule is a risk analysis (updated in 2013 by the Omnibus Rule). Per 164.308(a)(1)(ii)(A), a CE or BA must “conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information (ePHI) held by the covered entity or business associate.”3
While there is no preferred approach, most risk analysis and risk management processes have steps in common. In concurrence with CMS, Table 1.2 is a checklist of recommended actions....

Inhaltsverzeichnis

  1. Cover
  2. Half-Title
  3. Title
  4. Copyright
  5. Contents
  6. Foreword
  7. Preface
  8. About the Authors
  9. Acronyms
  10. Introduction
  11. 1 The Current State of the Healthcare IT Market
  12. 2 Cloud Computing
  13. 3 Cybersecurity Threats beyond EHR
  14. 4 Health Information Technology Compliance
  15. 5 Using Artificial Intelligence in Healthcare
  16. 6 Improving Patient Engagement with Technology
  17. 7 EHRs and Telemedicine
  18. 8 Advanced Analytics and Dashboard Reporting
  19. 9 Interoperability
  20. 10 Vendor Contracting and Negotiations
  21. 11 Implementation and Project Management
  22. 12 Future Healthcare Information Trends and the Internet of Things
  23. 13 Tools and Policies
  24. Index
Zitierstile für Beyond EHR

APA 6 Citation

Daigrepont, J. (2020). Beyond EHR (1st ed.). Taylor and Francis. Retrieved from https://www.perlego.com/book/1899932/beyond-ehr-using-technology-to-meet-growing-demands-and-deliver-better-patient-care-pdf (Original work published 2020)

Chicago Citation

Daigrepont, Jeffery. (2020) 2020. Beyond EHR. 1st ed. Taylor and Francis. https://www.perlego.com/book/1899932/beyond-ehr-using-technology-to-meet-growing-demands-and-deliver-better-patient-care-pdf.

Harvard Citation

Daigrepont, J. (2020) Beyond EHR. 1st edn. Taylor and Francis. Available at: https://www.perlego.com/book/1899932/beyond-ehr-using-technology-to-meet-growing-demands-and-deliver-better-patient-care-pdf (Accessed: 15 October 2022).

MLA 7 Citation

Daigrepont, Jeffery. Beyond EHR. 1st ed. Taylor and Francis, 2020. Web. 15 Oct. 2022.