Sony Pixel Power calrec Sony

Treating the Old Wounds of Transition to Advance Value-Based Care by Michelle Urban

14/02/2017

ARRA. HIPAA. Meaningful Use. Value-based Care. MACRA. And so it goes The only thing certain about today's healthcare industry is that it will continue to evolve. In the last few years we've seen the industry navigate through the challenges of achieving meaningful use, pivot to value-based care and now enter the ever-intimidating, somewhat ambiguous world of MACRA. Only the strong survive. Merger and acquisition is pervasive. And, somewhere, under all of it, still lies the heart and purpose of the transformation the patients. The patients who for so long, have so desperately hoped that after all the talk of change and all of the chaos of transition, they would ultimately be able to consistently access timely, high quality care at an affordable price.

Unfortunately, nothing about any of this is simple. While providers move to deliver on value-based care and, now, MACRA requirements, they must also continue to tackle the multitude of symptoms and ailments created by the speed of transition. First and foremost, change is not cheap - particularly when you consider the fact that providers are still working to optimize reimbursements under the new value-based care model. The cost of doing business for healthcare providers is increasing while the reimbursements realized are declining. That means in order to roll out the process and system enhancements required to shift to value-based care and deliver on MACRA reporting requirements, providers must employ strategies to free up and reallocate large sums of resources and budget from other areas of the business.

Additionally, there are significant improvements to be made in the space of data integrity and usability. Keep in mind, only a few years ago the industry made the mass move to the EMR. The transition happened in a short period of time given the complexity of the feat. Data capture processes where not standardized and EMR systems were not fully mature. So while providers might have made the transition deadline, they are now stuck managing the errors and efficiencies that are inherent in the adoption of any new process or technology. This is specifically apparent in the Enterprise Master Patient Index (EMPI), which lies as the heart of effectively reporting on value based care initiatives. Like any manual process, the capture of patient information is subject to human error. Something as simple as a name change due to marriage or divorce could result in the creation of a duplicate patient record. Inconsistencies also emerge when changes to patient information are made in a single system but are not propagated or replicated across all systems. In either scenario, providers are left with incomplete or inaccurate information - and this challenge is only further compounded by merger and acquisition activity. According to a study done by AHIMA, the average duplicate rate hovers around 8% while in MPI databases with more than 1 million records the rate increases to 9.4%. Considering MPI errors inhibit a provider's ability to track a patient's treatment across the continuum of care, negatively impact the reliability of the information and, in turn, increase the risk of unnecessary treatment and test duplication, these error rates are highly concerning. In short, EMPI errors drive up the cost of care and down the quality of patient outcomes which is the opposite of the intent of value based care. So, while the expense of clean-up might be high, doing nothing is far more costly - and risky.

Unfortunately EMPI, though used as an example, is just one of many foundational elements wherein gaps, inaccuracies or inefficiencies have emerged as a result of or throughout the transition process. The full spectrum of processes that govern the integrity, accessibility,usability andsecurity of data across all critical information sources and types needs to be addressed. Yet, due to the resource constraints of today's environment, many providers succumb to the pressure to simply bandage these gaps and press forward, foregoing the deployment of a proactive, enterprise-wide governance strategy . This is approach is short sighted. As you know, you can bandage up a cut but if you haven't treated the source of the infection; you've only compounded the problem. Similarly, the untreated wounds left in the information governance framework of many providers will result in an infection that becomes increasingly more pervasive, painful and costly to treat as the years progress. This puts us right back to where we started. Nothing about any of this is simple. In this case, however, it seems the best approach mirrors the advice providers so often give their patients, for optimal outcomes practice preventative care and early intervention.

Join the pledge to #makeHITcount. Share your story, thought or prediction about how you and others make a difference in Health IT with a tweet, FB, LI or Insta post and let's #makeHITcount together. Stop by our booth 5453 at #HIMSS17 for a special treat on us.
LINK: http://blogs.ironmountain.com/2017/industry/healthcare-information-man...
See more stories from ironmountain

More from Iron Mountain Entertainment Services

14/06/2017

HIMs in the Driver Seat: Accelerating Data Integrity Efforts by Michelle Urban

Early on in EMR implementation it was all about getting up and running to realize the incentive payments offered by the government. How could legacy information...

14/06/2017

SMB Tax Season: Would Your Business Pass an IRS Audit? by Melissa Cantarow

If you run or work at a small business, you know there are many perks. From the close relationships to the opportunities to take on new skills and roles, there&...

14/06/2017

Are You Looking for Custom Kitting Solutions? Then Look No Further by Leslie Barton

Custom kitting can be viewed as the process by which your business touches pro...

29/03/2017

Leading the way to data quality by Karen Snyder

This year's Healthcare Information and Management Systems Society (HIMSS) Annual Conference had another record-setting year for attendance, with over 40,000...

28/03/2017

Leading the Way to Quality Data by James White

Having worked in Health Information for over 39 years, I recently had an opportunity to speak with Health Information students at Cuyahoga Community College. Th...

09/03/2017

AWS Outage Shows How Little Control Cloud Users Have by Nadine Dias

On Tuesday, February 28th, Amazon Web Services (AWS) had a service disruption that affected its Simple Storage Service (S3) which supports over 150,000 websites...

07/03/2017

Custom Kitting and Booklets: Cut the Clutter and Make a Good Impreion by Leslie Barton

I don't know about you, but I'm just way too busy these days. When I ask...

01/03/2017

What ds Trump s Dodd-Frank Reform mean for Banking and Financial Services? by Shawn A. Brazeau

The Dodd-Frank Act is currently being reviewed by the Trump administration in an...

28/02/2017

Do Your Point of Purchase Displays ATTRACT Customers? by Leslie Barton

In a competitive retail environment, creative use of point of purchase displays can set you apart from the dull roar of conventional installations. Manufacturer...

16/02/2017

Join the ranks of Heal IT profeionals standing up to #makeHITcount every day! by Elia Robins

Imagine a seamlessappointment with your health provider: Even with a last-minut...

14/02/2017

Treating the Old Wounds of Transition to Advance Value-Based Care by Michelle Urban

ARRA. HIPAA. Meaningful Use. Value-based Care. MACRA. And so it goes The only th...

09/02/2017

Meaningful Use and MACRA-Positive Change by James White

As a Healthcare Information management (HIM) professional for the past 40 years, I have experienced the transition of the paper medical record to today's mo...

08/02/2017

IG Solutions - It s A New Day for Records Retention Schedules! by Craig Grimestad

Companies often struggle with numerous issues when developing and administrating...

06/02/2017

Ds Healcare Care About Clinical Quality Improvement? by John Lynn

We face a big challenge in healthcare. A doctor's success is largely not dependent on the quality of care they provide a patient. We won't dive into the...

03/02/2017

Holy MACRA! by Karen Snyder

A lot has been written about the Medicare Access and CHIP Reauthorization Act, better known as MACRA, since it was published in October 2016. The intent of this...

31/01/2017

Destination: Value-Based Care by Nancy Twombly

Despite all predictions on the future of our healthcare delivery system, healthcare is - and will continue to be - one of the key drivers in our economy. While ...

27/01/2017

Data privacy in the IoT Era by Paul Gillin

It's appropriate that this year's Data Privacy Day (January 28) takes place just three weeks after the giant Consumer Electronic Show (CES). CES is an a...

13/01/2017

5 Top IT Predictions for 07: Which Technology Trends will Impact You? by John Boruvka

This is certainly the time of year for predictions, forecasts, and trends, so we...

05/01/2017

Are you using our Escrow Management Center to your Advantage? by Nadine Dias

As an Iron Mountain technology escrow customer, you have access to our online portal in Iron Mountain Connect called the Escrow Management Center. We hope all ...

05/01/2017

Retention Schedules To Purge or Not to Purge and When? by Linda Joshua

When developing a retention schedule and looking at the legal research that supports it, there are laws and regulations that set minimum periods that must be ad...

30/12/2016

What happens when your Source Code is released from Escrow? by Nadine Dias

You may know that technology escrow (also known as software escrow) is a best practice for safeguarding your software source code in case there is ever an issue...

23/12/2016

The Psychology of Records Management: Energize Compliance with Technology by Craig Grimestad

This is the last of a 7 part series on energizing compliance. The last? I though...

29/11/2016

Mergers, Acquisitions & Divestitures: Managing Information and Risk by Mark Emery

Mergers, Acquisitions and Divestures (MA&D) happen for many reasons - to create ...

18/11/2016

Concerned with Busine Continuity? Understand Software Licensing Risks. by John Boruvka

If you're concerned with business continuity in your company, it's impor...

18/11/2016

Evaluating Your Storage Options: Tape or Cloud by John Sharpe

Over the past few years or so, data protection has trended towards the Cloud. But that doesn't mean tape is dead-far from it. Today's forward-thinking o...

04/11/2016

A Millennial s Impreion: My first Gartner Conference by Nadine Dias

I was the oddball millennial at the recent Gartner IT Financial, Procurement & Asset Management Summit in Grapevine, Texas. As one of the few millennials at th...

21/10/2016

Managing Cyber Security reats to Personal Heal Information by John Lynn

One of the challenges that keeps healthcare leaders up at night more than any other is managing cyber security threats to health data management. Unfortunately,...

17/10/2016

The consequences of data hoarding by Paul Gillin

At some point during the past decade, storage costs crossed a threshold that made it cheaper and easier for organizations to keep data than to throw it away. Th...

08/10/2016

Why Hackers Love Small Businees

Typically, when a data breach makes the headlines it involves a well-known brand with deep pockets which might give you a sense that hackers are only interested...

05/10/2016

Records management best practices: In 40 characters or le by Karen Guglielmo

Records management is a complicated job. RIM professional work hard every day to take their company's R and I and M the heck out it. So we took to Twi...

30/09/2016

Building a Framework for the Future of Federal Information Management by Lisa De Luca

The information landscape is constantly changing, especially for government. Fed...

30/09/2016

Care Continuum And the Internet of ings by Simon Morrell

I was once part of the Internet of Things. A sensor on my sneaker linked to a tiny computer on my wrist. When I plugged the computer into my laptop the battery ...

30/09/2016

Is Your Busine Prepared for a Cyberattack? by Eileen Sweeney

September is National Preparedness Month and a good time to think about whether your company is ready. Companies can improve preparedness by being proactive - r...

28/09/2016

The Psychology of Records Management: Energize Compliance with Forcing Functions by Craig Grimestad

With what? Never heard the term Forcing Functions used in Records Management (...

16/09/2016

A Virus Backup Plan: Responding to a Terrible, Horrible, No Good, Very Bad Day by John Sharpe

Extortion. Ransom. International crime syndicates. No, this isn't a descript...

16/09/2016

How can procurement help an organization master information risk? by Amy Perras

There is a tendency for discussions about information risk to focus exclusively on the dangers organizations find themselves exposed to and potential disasters ...

15/09/2016

Why is procurement so critical to minimizing information risk? by Amy Perras

In today's business environment, no organization can afford to ignore information risk. The consequences of an information related catastrophe, whether it&#...

23/08/2016

The 4 Levels of Verification: Verify Your Developer s Compliance by Nadine Dias

Once you have made the decision of whether or not you need technology escrow, ha...

22/08/2016

The Standard is the Standard: ISO 700 & Law Firms by Brianne Aul

This past June, our Pittsburgh ARMA chapter toured Heinz Field, home to the Super Bowl LI Champion (you heard it here first!) Pittsburgh Steelers. Directly out...

18/08/2016

Pre- Vs. Post-Claification For Records Metadata by Juerg Meier

I recently watched a demo of the IBM Watson natural language processing (NLP) tool that showed how it was used by police for criminal investigations at a Record...

15/08/2016

Closing the Gap by Lisa De Luca

Empowering Federal Professionals with Next-Generation Information Management Skills As anybody who has been paying attention to federal headlines or budgets ca...

10/08/2016

Putting information privacy first by John JT Tomovcsik

There is a lot more to protecting customer privacy than locking down facilities and enforcing strong passwords. It's about getting the entire organization a...

09/08/2016

A Licensee s Guide to Technology Escrow [Free eBook] by Nadine Dias

Investing in technology is not a decision that is made lightly. In today's technology-driven world, companies are competing to be the best of the best and t...

05/08/2016

Disposing of IT ts: eBay, You Found What on ose Hard Drives? by Michele Hope

Some organizations dispose of their IT assets by recycling what they can and discarding the rest. For others, this process involves reselling parts that still h...

05/08/2016

How to Reduce Data Storage Costs by John Sharpe

In the age of big data, IT managers are increasingly tasked with taking more comprehensive views of their organizations' data. This requires them to evaluat...

05/08/2016

Uncovering the Hidden Risk wiin Federal Information Management Programs by Lisa De Luca

Identifying and addressing the burgeoning skills gap issue The federal governm...

04/08/2016

My First 6 Mons as an IG Project Coordinator by Jeica Bundy

I recently checked in with Karen, the project coordinator for the Records and Information Governance Group at a large healthcare corporation in Missouri. Karen ...

28/07/2016

Customer Care by Day, Rock Star by Night by Megan OKeefe

Friendliness, patience, and determination are qualities that make for a remarkable customer service agent, and Kim possesses all three. As a member of Iron Mou...

22/07/2016

Top Benefits of Outsourcing Print and Fulfillment by Leslie Barton

You have to spend money to make money, as the old adage goes. But, when it comes to print and fulfillment, most companies would prefer to spend less and make mo...

21/07/2016

6 Bad Habits of Data Management- Part by John Sharpe

In my last blog, 6 Bad Habits of Data Management- Part 1, I covered three bad habits many IT departments across the globe are guilty of committing. Here are 3 m...