Health Innovation

Improving the Submission of Quality Data to CMS Quality Reporting Programs

By Kate Goodrich MD, MHS – At the Centers for Medicare & Medicaid Services (CMS), we are working to build a health care delivery system that is better, smarter and healthier – a system that delivers improved care, spends health care dollars more wisely, and supports healthier communities. The use of health information technology (IT), such as electronic health records (EHR), and data are critical pieces in building this health care delivery system.


2016 Predictions for Health IT from John Halamka

By John Halamka MD – As the year ends and we archive the accomplishments and challenges of 2015, it’s time to think about the year ahead. Will innovative products and services be social, mobile, analytics, and cloud (SMAC)? Will wearables take off? Will clinicians be replaced by Watson? Here are my predictions:


Healthcare Technology Trends for 2016

By Mark Ott – Make no mistake, a lot can happen in a year – even in an industry as large as healthcare technology. Trends about where an industry is headed, especially one as complex as healthcare technology, should best be thought of as trajectories rather than binary “did/did not happen” events. Here are five trends you can expect to see unfold in 2016.


Finding a New Security Framework

By Steve Spearman – In a recent article titled How One Hospital Made a Security Framework Work for Them, security consultant Brian Evans says that it is common for organizations in the healthcare industry to have such a hard time compensating for the weaknesses of its current security framework, that it does not have the time needed to select a new one.


IBM Says that 2015 is the “Year of the Healthcare Breach”

By Jonathan Krasner – At the end of the year all kinds of publications and organizations publish yearly summaries to review the events of the past 12 months. Much of the time this can be positive publicity for a celebrity, firm, organization or industry. In this case, for healthcare, it is decidedly negative. Why has IBM made this proclamation? According to a company report just released, over 100 million records were compromised in the first half of 2015.


The State of Information Security 2015

By John Halamka MD – When I wrote about the most important healthcare IT stories of 2015 (such as ICD-10 and Meaningful Use), I did not include a discussion of Information Security. That’s because security deserves its own post. Increasingly complex threats and an array of new security technology, policy, and education projects consumed us all in 2015.



When Does the HIPAA Conduit Exception Rule Apply?

By Gene Fry – The HIPAA conduit exception rule is only applicable to providers of purely conduit services who do not have access to protected health information (PHI) other than infrequently or randomly. For this reason, conduit providers do not have to sign a Business Associate Agreement (BAA). But what exactly is a conduit service, and when does the HIPAA conduit exception rule apply?