recommended reading

Senator Slams Pentagon for Its Electronic Health Record Strategy

 Sen. Patty Murray, D-Wash.

Sen. Patty Murray, D-Wash. // Ted S. Warren/AP

Sen. Patty Murray, D-Wash., opened today’s Senate Budget Committee hearing on the Defense Department’s 2014 spending plan with sharp criticism over the Pentagon’s decision not to develop an integrated electronic health record with the Veterans Affairs Department.

The Pentagon pursued the iEHR for four years, but on May 16, Defense Secretary Chuck Hagel opted out of that strategy and said Defense plans to acquire its own commercial health record software.

In her opening statement, Murray told Hagel she did not back that decision.

“Clearly the best option would have been a single joint electronic health record system that is open-source. This would have been the most effective solution and would have revolutionized the market, but the Department has backed away from that goal,” Murray said.

She also slammed Defense for wasting money and resources on the iEHR before deciding to acquire commercial software. “I think everyone in this room is concerned you spent hundreds of millions of tax dollars -- and thousands of staff hours over the last few years -- trying to create an integrated IT platform with the VA only to announce you were unable to come to a solution.”

Murray told Hagel, “I know there are significant questions about how to move forward, but I expect that you and [VA] Secretary [Eric] Shinseki will clearly define a plan and ensure leadership remains behind this important project.”

“The lack of seamless integration between our two largest departments is one of the most critical areas to address in order to reduce costs, increase efficiencies, and ensure our service members and their families get the care they need and deserve,” she said.

This is the latest Congressional blow to Hagel’s commercial health record software plan. On May 14, the House Appropriations Committee provided $344 million in development funds for the iEHR in the VA’s 2014 budget on the condition that no funds be expended on any electronic health record project unless it  has an open architecture that serves both Defense and VA.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.