Home / Technology / ‘Meaningful Use’ Final Definition Sent to OMB for Review

‘Meaningful Use’ Final Definition Sent to OMB for Review

drown-in-paperThe Department of Health and Human Services sent a copy of the final rule of meaningful use requirements Monday to the Office of Management and Budget. The long-awaited definition of meaningful use for electronic health records will give providers a clear set of guidelines to follow to qualify for EHR certification.

The certification deems the healthcare providers eligible for federal funding as long as they fall under the meaningful use requirements, a set regulatory metrics established under the The Health Information Technology for Economic and Clinical Health Act that was passed in 2009.

However, providers have found it difficult to follow the guidelines due to the fact that they were not officially established and remained indefinite, according to a recent survey of 120 CIOs and health IT executives. One of the main obstacles holding providers back from fully implementing EHRs was their confusion of what constitutes meaningful use.

Now that the OMB is reviewing the standards, implementation and certification criteria, healthcare providers will be able to clearly see how they can demonstrate meaningful use of EHRs to qualify for federal incentive payments and move forward towards certification.

Requesting OMB approval is typically the last step before rules are published in the Federal Register. The Centers for Medicare and Medicaid Services expects the rules will be available sometime this summer.

Check Also

DHS Reports Increasing Agency Compliance With Email Security Directive

Thomas McDermott, the Department of Homeland Security’s deputy assistant secretary for cyber policy, recently said that more and more federal agencies are complying with the requirements of Binding Operational Directive 18-01, Federal News Network reported Tuesday. The DHS issued BOD 18-01 on Oct. 16, 2017, requiring government agencies to implement a variety of cybersecurity policies including Domain-Based Message Authentication, Reporting and Conformance, an email security protocol.

Leave a Reply

Your email address will not be published. Required fields are marked *