recommended reading

Pentagon Pegs Cost of New Electronic Health Record at $1.5 Billion

everything possible/Shutterstock.com

The Pentagon plans to spend $1.5 billion procuring a new, commercial electronic health record system from 2017 through 2019, new budget documents disclosed.

The Defense Health Agency said in January that it planned to field the new EHR in phases, starting with a test site at Fort Lewis, Wash., in 2016 and full deployment to 57 hospitals, 364 medical clinics, 282 dental clinics, 225 vet clinics and 321 ships by 2019.

DHA also requested a budget of $723 million -- up $70 million from 2014 -- to operate and maintain its current EHR systems, including the Armed Forces Health Longitudinal Technology Application, or AHLTA, and the Composite Health Care System, or CHCS, which manages clinician order entry. DHA kicked off a procurement last month for a sustainment contract that could be awarded by the end of this month to keep the legacy EHRs -- which serve 9.7 million patients and 230,000 clinical personnel -- in operation through 2018.

The budget documents also show Defense plans to change the focus of its integrated electronic health record program, a decade-old project to develop a joint record with the Veterans Affairs Department that was ditched in February 2013 after costs spiraled to $28 billion.

Congress directed the two departments to develop a plan for EHR data sharing in the 2014 National Defense Authorization Act. DHA said the iEHR program will be renamed the Defense Medical Information Exchange and focus developing information infrastructure and data interoperability capabilities to securely and reliably exchange health information with the VA and all other health care providers.

DHA projected it will spend $16 million to develop the information exchange over the next three years. The agency forecast spending $12.5 million over the five years on the Theater Medical Information Program-Joint which provides EHR systems to deployed units.

Get the Nextgov iPhone app to keep up with government technology news.

(Image via everything possible/Shutterstock.com)

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.