recommended reading

VA’s Convoluted Patient Scheduling Starts with a ‘Helpline’ Call

Ross D. Franklin/AP

Veterans trying to schedule medical appointments in the Veterans Affairs Department’s Phoenix Health Care System entered a Kafkaesque world where they had to call a “helpline” to provide demographic information to an official who would type the data into a computer and then take a screenshot and send it to a printer in another department. Those printouts would languish for an average of 115 days before personnel in that department would then re-enter the data into an electronic scheduling system. At that point, months after a veteran first called for an appointment, VA’s misleading record-keeping system would officially start the clock to measure the number of days patients had to wait to see a doctor.     

That bureaucratic process, in place from February 2013 through March 2014, is detailed in the VA Inspector General’s interim report on systemic problems with patient scheduling throughout the Veterans Health Administration.

The Phoenix hospitals and clinics didn’t install electronic wait list software until 2012 to help manage appointments.

According to the IG, “HAS personnel told us there were often delays and backlogs in adding the veterans from the printouts to the [electronic wait list]. In addition, HAS personnel said they held the printouts for a 1-2 month period during the beginning of this process before adding them to the EWL.”

Personnel in Phoenix told the IG they destroyed the screenshot paper printouts after they scheduled an appointment, placed the veteran on the electronic wait list, or determined he or she was not a new patient. “Because of this, we could not identify these veterans or confirm that they were ever provided an appointment,” the IG reported.

In March, Health Administration Service personnel began creating PDF documents from the screen shots and transferring the data electronically to personnel who then transfer it into the electronic scheduling system. That hasn’t expedited the process, the IG reported. “We obtained PDF screen prints from March 24 through April 25, 2014, and identified about 400 veterans who were waiting for an appointment and were not on the [electronic wait list],” the IG said.

The IG identified 1,700 veterans waiting for a primary care appointment in Phoenix who were not on the wait list. “Until that happens, the reported wait time for these veterans has not started. Most importantly, these veterans were and continue to be at risk of being forgotten or lost in Phoenix HCS’s convoluted scheduling process.”

The IG recommended VA Secretary Eric Shinseki identify those veterans at greatest risk from delayed care and “initiate a nationwide review of veterans on wait lists to ensure that veterans are seen in an appropriate time, given their clinical condition.”

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.