Andrea Fox
Through bidirectional integration with Epic, the Chicago-based health system will trial Suki's AI assistance across workflows in 30 specialties, which could achieve a 72% reduction in time spent on clinical documentation, the company said.
Citing compliance strains on providers and others, and the need to maintain patient care continuity, more than 200 virtual care stakeholders urged the agency to release its regulatory scheme for the prescribing of controlled substances through telehealth.
Now that participation among multiple QHINs is allowed under TEFCA, The Sequoia Project addresses how cybersecurity requirements apply to all entities exchanging protected health data.
The Rewards for Justice program seeks information leading to the identification or location of any ALPHV BlackCat-linked cyber actor. The group claimed credit for the destabilizing Feb. 21 Change Healthcare ransomware attack.
In healthcare, larger hospitals, all critical access hospitals, essential drug manufacturers and Class II and Class III devices would fall under the draft mandatory reporting rules, but health IT developers and others would not.
Washington, Maryland and New Mexico have leveraged funding opportunities and regulatory tools to ease the burden on providers still struggling to operate with claims payments disrupted.
Because a high-risk flag had been inactivated in the hospital’s new Oracle electronic health record, clinicians did not evaluate a veteran's mental health and medication restart request, contributing to an overdose seven weeks after a missed appointment.
In an update on several looming regulatory deadlines, the HIMSS Electronic Health Records Association said it asked ONC for enforcement discretion on a December 1 deadline.
Emergency medical response information isn't used enough in healthcare. Agencies are looking to align with TEFCA, seeking partners to improve interoperability with state EMS systems and to build out technical resources for bidirectional exchange.
U.S. and international agencies are advising all critical-sector IT leaders to bolster against vendor risks and defend against live-off-the-land techniques stemming from PRC state-sponsored cyber activity.