“Distracted doctoring”

In behalf of patients and with the concern of a drop in productivity levels in public and private hospitals, and doctors’ clincis here in Malaysia and elsewhere, I am sharing this rather amusing new phenomenon and catch-phrase I picked up this morning from some newsfeeds I am monitoring. I thought I shall share this phenomenon with you as Health Information Management (HIM) / Medical Records (MR) practitioners who in all earnestness and  probability, you must also be witnessing in your local public or private hospital in Malaysia.

“Distracted doctoring” is a new phenomenon in America (and maybe not the exception in Malaysian healthcare settings already, and a worldwide phenomena as well) has become a hot topic in medical schools, hospitals and clinics sweeping through operating rooms and clinical settings across the US when doctors and nurses are seen as not always doing work but become more focused on the screen of computers for instant access to patient data, drug information and case studies, use smartphones and other devices – and thus not the patient, even during moments of critical care, leaving patients in jeopardy of serious injury or death.The situation is increasingly acute as more and more computers are being invested in hospitals and doctors’ offices, hoping to curb medical error and as the trend of BYOD surges.

Examples of use of smartphones and other devices include a neurosurgeon making personal calls during an operation, a nurse checking airfares during surgery and when doctors and nurses text during a procedure.

It is a common scene in hospitals to see nurses, doctors and other staff members glued to their phones, computers and iPads while at work.

Perhaps it is fine and justifiable to carry devices around the hospital to do medical records if you work with EMR systems for example but not fine when staff surf the Internet or do Facebook.

Dr. Peter J. Papadakos, an anesthesiologist and director of critical care at the University of Rochester Medical Center in upstate New York who recently published an article on “electronic distraction” in Anesthesiology News, a journal shared his deep concern on this phenomenon when he said “My gut feeling is lives are in danger,” and “We’re not educating people about the problem, and it’s getting worse.”

A peer-reviewed survey of 439 medical technicians published this year in Perfusion, a journal about cardio-pulmonary bypass surgery, found that :

  1. 55 percent of technicians who monitor bypass machines acknowledged to researchers that they had talked on cellphones during heart surgery
  2. half said they had texted while in surgery
  3. about 40 percent said they believed talking on the phone during surgery to be “always an unsafe practice”
  4. about half said they believed texting during surgery to be “always an unsafe practice”

The study’s authors concluded that “Such distractions have the potential to be disastrous”.

We acknowledge that doctors are busy people, they always face interruptions from beepers and phones, and are normally expected to proficiently multitask on their jobs in order to diagnose and treat their patients in a timely and effective manner. Their multitasking tasks are made easier assisted by Information Technology.

However younger doctors tend to interact with their devices even more simply because they have grown up being constantly connected and due to the pressure caused by a mantra of modern medicine with the notion that patient care must be “data driven,” and they need to be informed by the latest, instantly accessible information.

How are some doctors reacting to this phenomenon?

Information technology “offers great potential in health care,” but doctors’ “first priority should be with the patient” declares Dr. Peter W. Carmel, president of the American Medical Association, a physicians group.

Another doctor, Dr. Abraham Verghese, also professor at the Stanford University Medical Center and a best-selling medical writer says “The computer has become a good place to get a result, communicate with other people in the interest of preventing medical error, it’s a good friend.” At the same time, he said, the wealth of data on the screen — what he frequently refers to as the “iPatient” — gets all the attention. “The iPatient is getting wonderful care across America,” Dr. Verghese said. “The real patient wonders, ‘Where is everybody?’ ”

Dr. Stephen Luczycki, an anesthesiologist and medical director in one of the surgical intensive care units at Yale-New Haven Hospital had observed the following :

  • “I’ve seen texting among people I’m supervising in the O.R.”
  • he had also seen young anesthesiologists using the operating room computer during surgery
  • “It is not, unfortunately, uncommon to see them doing any number of things with that computer beyond patient care including checking e-mail and studying or entering logs on a separate case”
  •  “Amazon, Gmail, I’ve seen all sorts of shopping, I’ve seen eBay,” he said. “You name it, I’ve seen it.”, when he uses computers in the intensive care unit and regularly sees what his colleagues were doing before him.

Dio Sumagaysay, administrative director of 24 operating rooms at Oregon Health and Science University hospitals, heard several complaints that doctors or nurses were using their phones to check or send e-mails even though they were part of a team intubating a patient before surgery, sometime in early 2010.

What did most doctors never did before this phenomenon?

One real fact I know too, is as when Dr. Stephen Luczycki  confessed that when he was in training, he was admonished to not even study a textbook in surgery, so he could focus on the rhythm and subtleties of the procedures.

What have been done to curb this phenomenon?

Mr. Sumagaysay established a policy to make operating rooms “quiet zones,” banning any activity that was not focused on patient care. He later had to reprimand a nurse he saw checking airline prices using an operating room computer during a spinal operation.

At Stanford Medical School, for example, all medical students now get iPads, which they use to read medical texts and carry with them in hospitals but are being reminded to focus on patients and patient care instead of focusing on the screens of the gadgets they are given to do their jobs. “Devices have a great capacity to reduce risk,” Dr. Charles G. Prober, senior associate dean for medical education at the school, said. “But the last thing we want to see, and what is happening in some cases now, is the computer coming between the patient and his doctor.”

To prevent distracted doctoring, some medical facilities have chosen to limit the use of electronic devices in critical settings.

How does one US lawyer view this phenomenon?

Scott J. Eldredge, is a medical malpractice lawyer in Denver. He recently represented a patient who was left partly paralysed after surgery. The neurosurgeon was distracted during the operation, using a wireless headset to talk on his cellphone.

“He was making personal calls,” Mr. Eldredge said, at least 10 of them to family and business associates, according to phone records. His client’s case was settled before a lawsuit was filed.

While doctors and nurses are blamed for “distracted doctoring”, I think you are also aware of the perils from distractions caused by computers and mobile devices which are causing productivity levels at your HIM/MR departments to take a dip, when your staff engross themselves with those gadgets while at work.

Abridged, from the original articles from AARP, “Texting During Surgery?! The Risks of ‘Distracted Doctoring’,” by Candy Sagon, published Dec. 15, 2011 and by Matt Richtel, published December 14, 2011 in The New York Times

Image credit : stlouisinjurylawblog.com

Video Explaining the Difference, CT scan and MRI

CT Scan, MRI are two acronyms you as Health Information Management(HIM) / Medical Records(MR) practitioners have surely encountered in managing your medical records and radiology images.

I felt today I shall post on CT scan and MRI, in behalf of HIM/MR practitioners wanting to make the difference between merely executing and/or supervising basic routine functions of filing and retrieving radiology images as compared to HIM/MR practitioners who build on their knowledge base to be informed managers or able assistants.

Pals, I have had a real life experience when I had a fall, and had a MRI done on my right arm. I had no fractures but a muscle tear, which has since healed but I try not to strain my right arm.

I found a nice video (below) to share that explains all the different types of scans –  ultrasound, PET scan, CT scan and MRI. However, I queued up this video to begin at the point where it explains CT scans and MRIs, by editing the original video using a video editor (Avidemux 2.5.6), and set to play at the point where it explains MRIs  and CT scans.

The original video was made at the London Oncology Clinic, now known as Leaders in Oncology Care (www.theloc.com).

A CT – the acronym for Computerized Axial Tomography and a MRI – the acronym for Magnetic Resonance Imaging scans are different in the way they work, levels of harmful radiation, the equipment used, their cost and in the situations they are best suited for.

It’s scarring to get into a MRI scanner but usually a skilled operator is around to assure you. My experience was not so assuring as the operator did not explain things clearly. I was lucky as I was mentally prepared but imagine if it was a lay person or someone with a faint heart. I reprimanded politely to the head of the radiology department, as I think some standard operating procedures were compromised, from the viewpoint of a quality management person and certainly as an informed patient!

Maurice Slevin of MRI & CT Scan differences post

Dr. Maurice Slevin MD FRCP, Honorary Consultant Medical Oncologist Barts And The London NHS Trust
Image credit: The Times, United Kingdom

Video credit : The concept and script of this video were produced by Dr. Maurice Slevin, video production by Ted Mikulski and creation of scanners by Brenda Holder.

13 security tips as part of a data breach response plan to combat mobile device threats in the BYOD era @ your HIM/MR office

I took you on a rendezvous about the Bring-Your-Own-Device(BYOD) phenomenon especially talking about mobile devices that can wreak havoc on a hospital in my two previous posts, The perils BYOD bring to healthcare – but before that, what is a mobile device exactly? and Patient data breaches in the BYOD and BYOC era.

Here are some pointers I picked up while fact-finding on BYOD and some 13 security tips as part of a data breach response plan to combat mobile device threats to a healthcare setting like at a hospital, and in essence as a focus of this website-blog, at your Health Information Management(HIM)/Medical Records(MR) Department backyard especially if you work with Electronic Medical Records(EMR).

  1. Get help from the IT department of your hospital to install and advice on USB locks for a low cost solution to easily plug ports and offer an additional layer of security when encryption or other software is installed on computers, laptops or other devices that may contain protected health information(PHI) or sensitive information, to prevent unauthorised data transfer (uploads or downloads) through USB ports and thumb drives
  2. Lost or stolen computing or data devices are the number one reason for healthcare data breach incidents. Consider geolocation tracking software or services for mobile devices that can immediately track, locate, or wipe the device of all data
  3. Brick the mobile device when it is lost or stolen
  4. All mobile devices including USB drives, should be encrypted if they will be used remotely and if there is a possibility sensitive data will be stored on those devices. Require the use of company owned and encrypted portable media
  5. Laptops put in “sleep” mode, as opposed to shutting them down completely, can render encryption products ineffective.
  6. Once a password is entered, a laptop is unencrypted (and unprotected) until the laptop is booted down. Simply putting the laptop into “sleep” mode does not cause the encryption protection to kick back in. A laptop that is lost or stolen while in “sleep” mode is therefore completely unprotected. Employees should be clearly advised to completely shut down their laptops before removing them from the workplace (e.g. when taking them home for the evening) and to only use the full shut down function, rather than “sleep” mode, when traveling or leaving their laptop unattended in an unsecure environment. This policy should be strictly enforced and audited.
  7. Limit the inappropriate use of personal devices (such as strong policies, training, and sanctions for noncompliance). To further reduce the risk, consider the root cause of the problem—what benefits are personal devices offering to employees that the organization’s systems are lacking. For example, if clinicians are texting PHI from personal devices because a hos­pital does not offer a similarly convenient means of communicating, then the hospital may want to consider whether it can offer a secure alternative to texting.
  8. Don’t permit access to PHI by mobile devices without strong technical safeguards: encryption, data segmentation, remote data erasure and access controls, VPN software, etc.
  9. Educate employees about the importance of safeguarding their mobile devices by not downloading applications and free software from unsanctioned online stores that may contain malware, turning off security settings, not encrypting data in transit or at rest, and not promptly reporting lost or stolen devices that may contain confidential and sensitive information
  10. As Electronic Protected Health Information (EPHI) can be accessed from a multitude of mobile devices, risks of contamination of systems by a virus introduced from a mobile device used to transmit EPHI, significantly increases.  Thus, implement an EPHI security by purchasing cyber liability insurance
  11. Ensure that the BYOD mobile devices(the user owns and is primarily in control of the device—not IT) coming offline are adequately secured and checked before disposal or donation. So once a user upgrades to a new smartphone or mobile device, the devices coming offline are almost always overlooked. Such smartphone and other devices are typically given to children to play with, donated to various charity organization or handed down to other family members—in many cases with­out confirmation that they’ve been sufficiently wiped and potentially leaving sensitive, confidential and other data intact. The result is a constant stream of devices going offline and posing significant data breach risks
  12. Have a proactive data management strategy to protect critical patient data and to allow access to patient data on an as needed basis, a stragety adopted from data protection concepts of the financial industry when for example, credit cards are now increasingly sent using tokenization technology. This technology can be adopted for the healthcare industry
  13. Transparency and End User Consent Opt-In when smartphone companies collect, share and/or store personal information; conduct a thorough technical review/risk audit of new technologies before implementation for use by patients and/or employees

I have visual!

There are many infograhics on BYOD but I like this one because it relates quite closely to all the above I have posted about.

The infographic below is a summary of findings from a study commissioned  by ESET, an IT security company founded and headquartered in Bratislava, Slovakia in 1992, which develops leading-edge security solutions against cyber threats. The study was to help companies gain a better understanding of the scale and scope of risks identified with BYOD when companies adopt a BYOD mindset, but should make sure to implement a BYOD policy, as it is no laughing matter.


Source : vbridges.com/

References:
Largely from ID Experts, idexpertscorp.com/, with cross-references from:

Elizabeth B., International Perspectives in Health Informatics, 2011, IOS Press BV, Netherlands

Karen A. W, Frances W.L and John P.G, Managing health care information systems : a practical approach for health care executives, 1st ed, 2005, Jossey-Bass, A Wiley Imprint, San Francisco, USA

Kenneth C.L and Jane P.L, Management Information Systems Managing The Digital Firm, 12 ed, Prentice Hall, 2012, New Jersey, USA

Keri E.P and Carol S.S, Managing and Using Information Systems A Strategic Approach, 2010, John Wiley & Sons, New Jersey, USA

Paying the high price for ICD-10 compliance when using EMR systems in US hospitals

Lucky for us in Malaysia, our hospitals with EMR systems with technology already incorporating the ICD-10 code set, are not up against paying the high price of implementing ICD-10 unlike in the US where hospitals using EMR/EHR systems are gearing up for the October 2013 ICD-10 dateline (which is likely to be delayed again to October 2014).

One example of an US hospital system that encompasses 14 hospitals, is the North Shore Long Island Jewish Health System, N.Y. They estimate the price tag will be about US$50 million (about RM158 million) including project management, I.T. remediation(some 90 applications), training and other areas.

Sutter Health which runs 24 hospitals across northern California, is another example which provided an even higher price tag–well over $100 million (about RM316 million), including $60 million (about RM190 million) for technology remediation (some 146 applications will need to be remediated) and $25 million (about RM79 million) for a computer-assisted coding program

Both these organizations are said to well ahead of the rest of the industry in their ICD-10 planning in the US. However, they are being cautious and concerned with  long-term financial impact on their revenue when converting past billing claims to ICD-10 and also estimating where documentation would need to be enhanced to support the more granular codes in ICD-10.

In the US, ICD-9 codes have been used mainly for billing, historically. It seems every clinical encounter that gets billed to an insurance payor includes diagnosis designations, encoded as ICD-9 codes.

Thus, I can understand the profound impact of paying the high price of implementing ICD-10 in the US when changing the fundamental method of encoding diagnoses to a whole new system .

The rationale for making such a change (given the disruption that will occur) is that the ICD-10 code set is more detailed and extensible, allowing for more than 155,000 different codes, and permits the tracking of many new diagnoses and procedures (a significant expansion on the 17,000 codes available in ICD-9).

As we know ICD-10 was developed by the WHO and released in 1992, soon after the ICD-10 system was adopted relatively swiftly in most of the world including in Malaysia.

Abridged, from the article The High Price of ICD-10 by Gary Baldwin, June 26, 2012, Health Data Management reporting  from the HFMA conference June 24-27 2012 in Las Vegas, where panelists shared the above estimates.

With additional references from:
practicefusion.com/, Website
ehrscope.com, Blog
pdmanesthesia.com/, Blog for the image in this post

The perils BYOD bring to healthcare – but before that, what is a mobile device exactly?

In the earlier post Patient data breaches in the BYOD and BYOC era, it is evident that risks to patient data are growing as mobile devices pose significant risks for privacy incidents for healthcare organisations, providers and entities responsible for safeguarding protected health information (PHI), such as medical records

Further to that post, I wish to expand and take this subject of risks to patient data into more than one post, continuing with this second post on the BYOD and BYOC era – but this time in this post, on what is a mobile device exactly.

But before that, I have no doubt and you would probably or even agree with me with me that mobile devices like smartphone and tablet increase personal.productivity and mobility as you can discover from this image.

Source: cropped with Adobe Photoshop, from an infographic found at ClickSoftware Enterprise Workforce Mobility
(view a larger image in a new tab of the current window when you click this image)

This trend will only continue given the continuous influx of increasingly powerful, inexpensive smartphones, tablets and other mobile devices. The Bring Your Own Device (BYOD) phenomenon is posing a direct and significant challenge for IT everywhere and in particular healthcare providers.

So what is a mobile device exactly?

Mobile devices include familiar things you carry with you(portable) like thumb drives, smartphones, external hard drives, tablets and laptops. Does this list end here?  Researching on mobile devices for this post, the list does not end there as the term “mobile devices” is still a non-definitive term, due to the rapid expansion and evolution of portable devices connected to the Internet.

Smura, Kivi, and Toyli (2009) believe a mobile device must meet three criteria:

  1. ability to make voice calls
  2. physical size of device
  3. the operating system.

Smura et al.’s definition however already appears to be outdated as mobile voice telephony has been decreasing in volume and duration since 2007 (Thompson, 2010), as we instead increasingly use our mobile devices for text messaging (SMS), emailing, and accessing Internet-enabled apps or sites. Some of us also use the immensely popular iPod Touch, which allows users to interact with Internet content but does not offer the ability to make phone calls.

The other criterion by Smura et al. is size, the smaller the size the greater the portability and ease of access in multiple environments. What entails being “mobile” is then their relative size, since mobile devices are smaller in size, more portable, and can be accessed with ease and flexibility. This is the core difference between mobile devices and other portable, Internet-enabled devices such as laptops and netbooks.

So can digital cameras, e-readers, and game consoles be also called mobile devices?

Devices like digital cameras, e-readers, and game consoles support one core functionality (i.e., photography, reading, or gaming), while mobile devices, on the other hand are portable computing devices running multiple software.

Hence, the inclusion of operating system(OS) by Smura et al. as a defining trait is not a central characteristic. The OS helps distinguish between devices like digital cameras, e-readers, and game consoles that are “limited, for specific purpose” versus mobile devices that are mufti-functional. The key difference between them is single versus multiple functionality.

One other place I looked at, was into Wikipedia. We usually run to Wikipedia for answers to anything we wish to know. I ran up to Wikipedia too and looking up Wikipedia’s definition, a mobile is “small, hand-held computing device, typically having a display screen with touch input and/or a miniature keyboard and less than 2 pounds (0.91 kg)”. Wikipedia lists calculators, digital cameras, and MP3 players as mobile devices. This definition seems to entail pretty much any portable electronic device, as even Glen Farrelly blogged in his blog Webslinger.

We looked at how voice telephony, portability and accessibility due to size, computing power, operating systems, Internet connectivity, and functionality increasingly blur distinctions between mobile devices.

It is obvious there are overlaps across technologies and Internet access, appears now to be the defining point in distinguishing mobiles which are portable computing devices running multiple software (e.g., contacts, calendars, document processing, file management, etc.) and offering a range of mufti-modal inputs and outputs, including text/SMS, email, instant messaging/chat, voice telephony, photography, video, applications, and mobile Web browsing.

Glen Farrelly offers the definition of a mobile device which includes smartphones (e.g. BlackBerry, iPhones, Androids, Nokia.), tablets, (e.g. iPad, PlayBook, etc..) and networked portable media player and personal digital assistants (e.g. iPod) as a device that has:

  • the ability to connect to the Internet
  • supports user input and interaction,
  • offers multiple functionality
  • and has the physical size of a tablet computer or smaller

References:
Webslinger, glenfarrelly.blogspot.com
Wikipedia, en.wikipedia.org/wiki/Mobile_device