recommended reading

VA Kicks Off Contracting for New Electronic Health Records System

kozirsky/Shutterstock.com

The Veterans Affairs Department has released the first procurement for its next-generation electronic health record system, with a focus on support services for the Health Systems Informatics division of the Veterans Health Administration.

The “sources sought” notice for the new version of Veterans Health Information Systems and Technology Architecture EHR, dubbed VistA Evolution, makes it clear that the Health Systems Informatics division will drive development in cooperation with the VA Office of Information and Technology.

VHA plans to contract for VistA Evolution “workgroup coordinators” to help manage, among other things, development of new interfaces to replace the aging VistA Web and other EHR viewers. These coordinators will also work with the moribund Defense Department/VA Interagency Program Office, which is “is programmatically responsible for managing and delivering the seamless sharing of interoperable health data between the departments.”

The planned coordination contract, which has one base year and two option years, calls for “standing up numerous EHR functional capabilities related to the VistA Evolution Program,” including updates to the decades-old VistA software and development of new EHR software products.

The contract also requires support of VA project teams which will work with Defense and the IPO to ensure interoperability of health records between the two departments. Congress provided the VA with $251.9 million for VistA Evolution in the 2014 omnibus budget signed by President Obama Jan. 17, but limits spending to 25 percent of Funds allocated until 25 percent of the VistA Evolution budget until the VA describes to Congress how it will adhere to data standards defined by IPO, which has lacked a full time director since last fall.

VHA wants a fast response from industry, with replies due Feb. 6, eight business days after it was  posted.

Get the Nextgov iPhone app to keep up with government technology news.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.