Government & Policy
Episode-based payment incentives must be aligned across other value-based models, CMS says.
When Vanderbilt University Medical Center turned over non-anonymized medical records to the state without patient consent, it pitted Tennessee state law against HIPAA and unleashed a federal investigation as well as a class action patient lawsuit.
The developer's Viz HCM algorithm can be used to assess electrocardiograms. When findings are suspicious of hypertrophic cardiomyopathy, the app alerts cardiology specialists to provide further triage.
New York's HEALTHeLINK and Boston Children's Hospital are recognized by HHS for their exploration of advanced FHIR capabilities and USCDI data quality improvement, respectively.
A new study looked at how AI and NLP could be used in a post-acute discharge patient engagement program to address factors beyond social determinants of health and address emotional, behavioral and other barriers to recovery.
With a cohort of health systems including Mayo Clinic, Kaiser, Stanford Health and others, its QHIN efforts are aimed at advancing information exchange at providers nationwide, says Matt Doyle, interoperability software development lead at Epic.
The Behavioral Health Information Technology Coordination Act would also direct ONC and SAMHSA to develop voluntary standards for mental health electronic health records and work with CMS to promote their adoption and interoperability.
"We will work with a variety of partners across government and industry to promote adoption and take steps to align incentives that address constraints limiting further progress," the agency said in its new strategic plan.
Sen. Mark Warner has questions for Alphabet CEO Sundar Pichai about Med-PaLM 2, a chatbot currently being piloted at the Mayo Clinic and elsewhere. "I worry that premature deployment of unproven technology could lead to the erosion of trust," he says.
The group – whose ransom note reportedly mimics a customer support ticket – may use a phishing attack to breach health systems' networks or drop payloads across compromised systems after first deploying Cobalt Strike or other frameworks.