EHR Integrations
EHR systems are the hub of clinical data and clinical workflows in healthcare today making EHR integrations, like HL7 and FHIR, an essential driver of healthcare transformation. We break it down for you here.
The Digital Health Success Framework (DHSF) is a simple guide for the makers of digital healthcare products.
The Internet is full of resources to help turn ideas into lean startups or businesses, but things are a little different in the wild wild west of digital health technology. There are considerations in healthcare not found in any other industry, and no one has time to learn them all.
We’ve simplified the unique complexities to help you get your digital health products from napkin scribble to market adoption with fewer surprises. You will leave with a better understanding of how to manage the challenges ahead.
It purposefully has a narrow scope, giving guidance around five main topics:
For better or worse, healthcare is a highly-regulated industry with HIPAA as the tentpole framework. Compliance is the place to start. To start your strategy anywhere else is a mistake. Your compliance strategy should come first.
HIPAA kicks in when a digital health product handles Protected Health Information (PHI). There are several different categories of PHI, like someone’s name, home address, or phone number. When a digital health product stores, processes, or transmits PHI, HIPAA asserts rules to how it should handle a multitude of security, privacy, and policy procedures, called “controls”. Demonstrating that a company and its digital health product meets all those controls is how it can call itself compliant.
For a digital health organization, you can organize HIPAA controls into three levels: infrastructure, application, and company.
At the infrastructure level, the organization needs to meet certain controls around encryption, backup and disaster recovery, OS hardening, and so on. It’s a robust list.
At the application level, the organization needs to do basic security and privacy best practice, i.e. don’t store plaintext passwords. Some products exist to help these controls, but for the most part, it’s up to the organization to do the right things and to coordinate an external audit to prove compliance at this level. There is also the broad concept of “access” that fits into this level: Does the product ensure that only authorized people have access to only certain sets of data? Oftentimes this is implemented using Access Control Lists, or ACLs. It’s a broad topic but is an important component to HIPAA compliance as well. Often a health organization—like a hospital trying to buy a digital health product—will do their own security audit to assess this level.
At the company level, it’s about implementing administrative policies. Some products exist to establish and then continuously administer these controls. Datica open sourced our company policies under a creative commons license, which hundreds of organizations have used as a starting point for their own company-level policies used in their own audits.
A quick note: Some digital health companies set about on a strategy to not use any PHI in an effort to skirt HIPAA entirely. Datica holds a controversial point of view about PHI that many digital health companies don’t want to hear: This story will not fly with Covered Entities, like hospitals or payers, who are the buyers of digital health. Their universal view is that all products they engage with have the possibility that they COULD have PHI, even if accidentally. Therefore if a digital health vendor comes to them and brushes off HIPAA compliance because of a story that they do not plan to handle PHI, the Covered Entity will almost always choose to not work with that vendor. Another way to think about it: There are almost no B2B business models that exist where a digital health product does not handle PHI.
So yes, HIPAA matters. Step one is devising a plan to satisfy all its rules, with the end goal demonstrating credibility that you have met them. That’s compliance.
For better or worse, healthcare is a highly-regulated industry with HIPAA as the tentpole framework. Compliance is the place to start. To start your strategy anywhere else is a mistake. Your compliance strategy should come first.
A Business Associate Agreement (BAA) is the contract that outlines risk between two healthcare organizations with a relationship. An organization called a Covered Entity, like a hospital or insurance company, might sign a BAA with an organization called a Business Associate, like a telemedicine solution. The BAA signed between the two will delineate who is ultimately responsible for certain parts of HIPAA compliance.
It’s funny to think about it this way, but a BAA genuinely is the definition of “compliance”. It outlines who is compliant where, and transfers risk around so that liability is defined should someone fail along the chain of compliance. With more health technologies and data leveraging the cloud and 3rd parties like APIs, BAAs are more relevant today than ever before.
One of the first exercises for a new digital health is to draft their own BAA which will be used when negotiating with customers or partners.
Included in Datica’s open source company policies is our BAA which we use as the foundation of all our customer relationships. The value of our BAA is it was written with cloud-first technology in mind. We were one of the first cloud-only technology firms to develop a BAA in this way that has subsequently been audited and HITRUST CSF Certified. Hundreds of digital health companies have used it as a starting point for their own BAA to great success.
For better or worse, healthcare is a highly-regulated industry with HIPAA as the tentpole framework. Compliance is the place to start. To start your strategy anywhere else is a mistake. Your compliance strategy should come first.
HITRUST is an industry-led initiative that defines a common, prescriptive framework, and associated requirements, for HIPAA compliance. The crazy thing about HIPAA is there does not exist an exact definition of what it means to be “compliant”. It’s one entity’s lawyer, or Privacy Officer, arguing with another. As you can imagine, this creates business inefficiencies as buyers (like a hospital) try to ensure that a seller (like a telemedicine solution) are compliant.
HITRUST aims to fix that. It lists hundreds of controls that map to HIPAA’s rules, as well as standards like NIST, a format they call a Common Security Framework, or CSF. Any company being audited by a third-party auditor, like Coalfire who audits Datica, can request the auditor use the HITRUST CSF as the basis of their audit. Results are then exchanged with the HITRUST Alliance, with the eventual outcome being a HITRUST CSF Certification, good for one year. (Datica has been HITRUST CSF Certified twice.)
The value of the HITRUST CSF Certification is that organizations can use it as a way to accelerate relationships with other healthcare organizations. Let’s take a basic example: Say you are a telemedicine solution and you want to sell to a giant healthcare system. Before, you’d spend months working with the health system who wants to audit your tech stack, controls, etc. It could take six months or more to get past that stage. But with a HITRUST CSF Certification, the compliance officer at the health system will oftentimes effectively sign off that you are indeed compliant in an accelerated fashion. An auditing process truncated from months down to weeks helps everyone involved, or even hours in some instances.
A neat thing about HITRUST is it now supports inheritance. Going back to the three buckets in the previous segment, an organization who wants to be HITRUST CSF Certified who is also a customer of Datica can effectively inherit all the infrastructure-level controls from the Datica platform. Therefore the cost and time requirements for their own HITRUST certification are greatly reduced.
It is important to remember that HITRUST is not a requirement for digital health companies. But, since time is money and digital health organizations are usually short on both, HITRUST can be a critical accelerant to success. Therefore the second step for a compliance strategy is devising a HITRUST story and plan.
For better or worse, healthcare is a highly-regulated industry with HIPAA as the tentpole framework. Compliance is the place to start. To start your strategy anywhere else is a mistake. Your compliance strategy should come first.
At some point, you will want to get audited. If you choose not to go down the path of HITRUST Certification, you can choose to have 3rd party auditor test your security and compliance posture against HIPAA. It is the mature way to demonstrate you take compliance seriously to the full extent. Vendors can help with a portion of it, but ultimately for an entire company scope, you must get your own audit done.
Be prepared for it to be painful. A typical audit can take around 100 full-time hours.
Direct costs typically hover around $20,000 but we’ve heard from others it get as high as $35,000, depending on your auditor. Gap Assessments can be found for as low as $10,000.
When finished, you’ll have materials to put in front of any relationship to prove your compliance. The one caveat to this is that audits, and 3rd party auditors, are not all created equal so you may find pushback if your audit is not done properly and lacks rigor. This lack of standardization was a driving force behind HITRUST.
For better or worse, healthcare is a highly-regulated industry with HIPAA as the tentpole framework. Compliance is the place to start. To start your strategy anywhere else is a mistake. Your compliance strategy should come first.
Compliance is never finished, which can be a challenging realization for digital health organizations. Even if you do become audited or HITRUST certified, it’s only good for one year and you must do it again.
Plus, risk is a 24/7 notion. For example, let’s say you get audited in February 2017, technically valid for one year. Six months later, in summer 2017, your technology team makes an update to their infrastructure that breaks encryption a certain way, and you get hacked with thousands of patient records stolen. Since encryption of PHI is a HIPAA control that you took on the risk per your BAA with all your customers, you are now not in compliance and liable to be sued.
Compliance is a 24/7/365 requirement. The more risk you take on, the more you are liable any time technology is changed. The last step of a compliance strategy is to understand how to manage compliance in a continuous fashion, along with identifying areas where you can offload risk to trusted partners or vendors.
The easiest starting point for continuous compliance is to develop and implement a process of doing regular risk assessments of your organization and technology. These are a bit like internal audits and ensure you are covering your bases as you org and product evolves. They are also helpful in proving to your customers that you take security and compliance seriously.
An infrastructure strategy can be best summarized as taking the unique and making it standard. HIPAA has many controls that are particular about certain infrastructure duties, like encryption or logging. Covered Entities like hospitals are looking to ensure a digital health product is achieving the highest quality in security and privacy. Managing the unique complexity and turning it into a standard approach to support scale is the objective of an infrastructure strategy.
There are many objectives at the infrastructure level for any company: Reduce waste and costs, the “abilities” of flexibility, adaptability, scalability, reliability, empowering teams to move quickly, and so on.
So why call out security and privacy?
We’ve consistently heard this list as the top areas of focus for enterprise healthcare CIOs:
The ultimate pressing need for Covered Entities (like hospitals) working with Business Associates (like digital health products) boils down to security. They will not work with anyone they deem to be a potential threat vector. Fears of hacks and ransomware are as high as they have ever been, and for good reason: It’s bad news in healthcare. The things hacked and stolen are people’s medical information—their very lives—that can’t be re-issued like a new credit card. Plus, media outlets don’t write stories about a hospital’s old infrastructure; when was the last time you read an article about inflexible tools for development teams? But the bad press never ends when they are hacked, and that translates to a tarnished brand, in revenue, and firings. A focus on security and privacy have both altruistic and selfish reasons for being priority number one when it comes to assessing external partnerships with digital health companies.
This step in an infrastructure strategy is all about highlighting how a digital health organization approaches security and privacy. Be prepared to tell, and prove, your story.
An infrastructure strategy can be best summarized as taking the unique and making it standard. HIPAA has many controls that are particular about certain infrastructure duties, like encryption or logging. Covered Entities like hospitals are looking to ensure a digital health product is achieving the highest quality in security and privacy. Managing the unique complexity and turning it into a standard approach to support scale is the objective of an infrastructure strategy.
Okay, so your product will manage PHI and you’re bought into the importance of complying with HIPAA. What options do you have? Let’s walk through the main service paradigms and how they fit into a digital health product.
Amazon Web Services (AWS), Microsoft Azure, IBM SoftLayer, Google Cloud, and Rackspace are example options. These vendors will sign a BAA with you, but will only take on the risk of a small portion of HIPAA’s requirements. Broadly, they take on the risk for the physical safeguards and the firewall. You can absolutely use one of these vendors to host your product, but the rest of the infrastructure controls are your obligation to satisfy.
Parse is the most popular example. A BaaS is a specific type of server technology that manages the entirety of a “backend”—meaning data storage and lookup, authentication, and files—and exposes the managed backend via APIs. Typically a BaaS is a great fit for mobile application products where the entirety of user experiences is contained within a mobile device. A BaaS vendor will sign a BAA with you and will take on the risk for the controls they manage in their backend. Often a BaaS product will be a great way to prototype or to manage an early-stage product but will become too restricting or limiting as a product matures for two reasons: First, the nature of the product is exposed APIs, and if done immaturely by the vendor, will require your product to conform to their data models. Lack of control at this level can be too limiting for mature products. The mature vendors will have flexible data models, however. Second, BaaS vendor business models often charge per API call, which doesn’t scale well. A BaaS partner can be a perfect fit for mHealth prototypes, but you will want to look for an enterprise-focused vendor to meet your scaling needs as you grow.
Heroku is the most famous example. A PaaS vendor exposes more development options than a BaaS vendor but is more “opinionated” about infrastructure-level components compared to an IaaS cloud. A PaaS can be extremely useful when trying to develop quickly, however. The key understanding with a PaaS vendor is you can only use technologies they will allow you to use, so it is important to confirm with a PaaS vendor that they can support your digital health product. For example, historically Heroku has only ever allowed Postgres databases by default, and couldn’t support MongoDB until 3rd-party add-ons allowed for it. Lastly, as with IaaS and BaaS vendors, a PaaS vendor will need to sign a BAA with you. In this case, take extra precaution to understand which controls they are agreeing to take on the risk because in some cases, if they don’t agree to take on the risk of a specific control (encryption in transit), but also don’t grant you access to make changes in that area by the nature of being a PaaS, you could inherently be setting yourself up to be consistently non-compliant.
Datica’s approach to infrastructure has proven to be compliant, cost-effective, and smart for our customers. Here’s how it works: Datica sits on top of the IaaS clouds like AWS, Azure, and IBM / SoftLayer. Those IaaS vendors agree to about 1/10th of the controls outlined by HIPAA. Datica satisfies the other 9/10ths to a PaaS-like offering that configures and automates the entirety of HIPAA controls at the infrastructure level. Customers sign one BAA with Datica and inherit the BAA of Amazon, Microsoft, IBM, etc., and offload the risk, expense, and attention paid to compliance requirements to our team. It has proven to be a great fit with development teams focused on building their product, not re-inventing the wheel of compliance.
Picking your service partners is an important step towards an infrastructure strategy because it will inform the types of BAAs you will sign, which in turn will inform your responsibilities, which in turn shape your internal resource distribution.
An infrastructure strategy can be best summarized as taking the unique and making it standard. HIPAA has many controls that are particular about certain infrastructure duties, like encryption or logging. Covered Entities like hospitals are looking to ensure a digital health product is achieving the highest quality in security and privacy. Managing the unique complexity and turning it into a standard approach to support scale is the objective of an infrastructure strategy.
As discussed in the HIPAA overview segment, the world is very different once Protected Health Information, or PHI, is involved.
At the highest level, infrastructure-centric HIPAA controls map to these broad topics:
The first step of a solid infrastructure strategy is to devise a plan on how you will satisfy each of these broad topics generally, and each of HIPAA’s controls specifically.
Utilizing AWS, Microsoft Azure, Heroku, or other infrastructure vendors is standard when PHI is not involved. But once you start managing PHI, know that none of those vendors will satisfy all controls required and it is on your shoulders to fill in the gap.
An infrastructure strategy can be best summarized as taking the unique and making it standard. HIPAA has many controls that are particular about certain infrastructure duties, like encryption or logging. Covered Entities like hospitals are looking to ensure a digital health product is achieving the highest quality in security and privacy. Managing the unique complexity and turning it into a standard approach to support scale is the objective of an infrastructure strategy.
There are many types of environments—physical, virtualized, and cloud—that a service provider might maintain in a compliant fashion. A large portion of service providers today offer their products to customers utilizing the cloud-based deployment model. There are multiple types of cloud environments to which an organization should become familiar. These cloud environments can be a private cloud, community cloud, or public cloud.
In a private cloud, the cloud infrastructure is operated for a single organization. It can be managed by the organization or by a third-party provider and may be on premise or off-premise. In a private cloud, the infrastructure is dedicated to the use of that one identified entity and the organization’s data is physically segmented from all other organizations using the provider.
In a community cloud, the infrastructure is shared by multiple organizations and supports a specific business community with shared requirements or similar concerns (i.e. by type of business model, security requirements, or compliance considerations). Similar to the private cloud, the community alternative may be managed by the organization or a third party and may be on or off-premise.
In a public cloud, the infrastructure is made available to the general public or a large industry group that is owned by the organization selling cloud services. The public cloud infrastructure exists solely on the premise of the cloud provider.
These cloud environments are important factors that an organization should consider when selecting a service provider that operates in the cloud. One important consideration that an organization needs to consider is the topic of multi-tenancy in the cloud, whether it is a private, community, or public. In a multi-tenant cloud environment, there are multiple customers or organizations that are sharing the same resources (i.e. infrastructure, data stores, virtual components, etc.) of the environment. An important note to remember about multi-tenancy in the cloud is that customers do not generally have any knowledge or insight into the customers with whom they are sharing resources. Additionally, customers do not have any knowledge or insight into the ways the other customer organizations are employing security of their internal environments used to access the cloud.
Compliance in the cloud is possible in any scenario as long as it addresses controls in the main five HIPAA Omnibus categories:
As well as additional security provisions within References 13402 of the HITECH Act.
Being on the cloud is critical today, and critical for the future. Cloud-enabled digital health products will be prepared for an interoperable future.
An infrastructure strategy can be best summarized as taking the unique and making it standard. HIPAA has many controls that are particular about certain infrastructure duties, like encryption or logging. Covered Entities like hospitals are looking to ensure a digital health product is achieving the highest quality in security and privacy. Managing the unique complexity and turning it into a standard approach to support scale is the objective of an infrastructure strategy.
As long as you are cloud-based, the basics of scaling are straight forward: spin up resources as needed; manage projected costs; maintain compliance.
Here are a few orthogonal considerations to contemplate in addition to the basics:
This section is not a guide for design best principles, advice on user experience, or even commentary on what makes a good product. Instead, it’s an outline of the under-the-hood considerations that a digital health application must manage if it doesn’t expect to falter during an audit process, or when engaging with healthcare customers.
The concept of access or availability to an application can be taken for granted in today’s technology climate. As is the theme throughout, healthcare is not the same as other industries. It’s not as simple as listing an application in the Apple App Store, or one-click installs on Google Play. The interface isn’t necessarily commodity hardware like an iPhone, Sony PlayStation, or Windows home PC. It’s likely legacy, locked-down PCs or specialty consoles. If you are a mobile app, chances are iOS or Android won’t be available; instead, you’ll be dealing with old Java-based middleware, obsolete Blackberries, or Symbian.
The value of a digital health product is the personal experience bestowed upon each user. That can’t happen without authentication and authorization.
Access Control Lists, or ACLs, are a concept that manage what data can be seen by which users. ACLs are enormously complicated because there are many variables: People, roles, geography, employment, BAAs, and more factor into who should see what when. It’s such a tricky thing to manage that is also disastrous when uncalibrated by even the smallest degree either way: On one side, you might get angry people who are upset they are blocked from seeing some data they should see. On the other side, if too much data is exposed, you violate HIPAA compliance and those people are even more angry.
ACLs are an application-level concern, and a central part of the design of the app.
Continuous auditing at the infrastructure and application levels is a requirement for compliance. At the infrastructure level, it’s things like process logging. At the application level, it’s things like tracking which authenticated user saw what data when.
This section is not a guide for design best principles, advice on user experience, or even commentary on what makes a good product. Instead, it’s an outline of the under-the-hood considerations that a digital health application must manage if it doesn’t expect to falter during an audit process, or when engaging with healthcare customers.
Never forget the customers of digital health are most often behemoth organizations who have instituted endless processes and controls for every anticipated scenario—the definition of bureaucracy. A digital health application will be more successful if it understands how to align with basic processes put upon its users.
We spend all this time thinking about what happens when users use our digital health product. What what happens when they don’t or can’t use it?
It’s a provocative thought, but one that enterprises think about. Those processes all wrap up into a “contingency plan”, or more formally what’s called Business Continuity, which is a way of summarizing what happens when the application is unavailable, and the path to take to make it available again. One important consideration with digital health in particular is how to deal with data loss.
Training and onboarding are so fundamental an entire industry exists with billion dollar consultancies focused on managing the process. Your product will be no different: You must have a plan to train new users of the application.
Starting with a blank slate with an application is difficult, especially for complex patients or situations where longitudinal data matters (e.g. Pediatrics). Backloading past patient data is typically a requirement to adoption of the product. Without it, users won’t find value.
This section is not a guide for design best principles, advice on user experience, or even commentary on what makes a good product. Instead, it’s an outline of the under-the-hood considerations that a digital health application must manage if it doesn’t expect to falter during an audit process, or when engaging with healthcare customers.
“Lock-in” doesn’t happen as much as one would guess with healthcare software. Because of the complexity of landing a deal with a hospital or similar enterprise, the assumption is that once you’re in, you’re in. The truth is software turnover in those settings is quite common. Even EHRs, which can take years to implement and cost upwards of $20 million, have been known to be ripped out and replaced if they expose a critical failure or are deemed too cost inefficient.
A similar metaphor are sports teams. A common practice is once a new coach is hired, he or she prefers to bring in players that are “his or her” players, often cutting existing athletes from the team. A very common similar scenario exists within healthcare: When a new CIO or CTO is hired at, say, a hospital, it’s common that all old technology is “on watch” since it’s not his or her preferred choice.
Thus, this step of the application strategy is important for continued plan use: collect user data and outcomes data on a continuous basis so it can be demonstrated that there is successful impact on patient care and successful reduction in costs the product is delivering. If the digital health application is not collecting this data to help tell that story, then it is at risk of being replaced, which is more often than you might think: The average tenure of a CIO at a hospital is around three years.
This section is not a guide for design best principles, advice on user experience, or even commentary on what makes a good product. Instead, it’s an outline of the under-the-hood considerations that a digital health application must manage if it doesn’t expect to falter during an audit process, or when engaging with healthcare customers.
If the digital health product is a Software-as-a-Service application where the delivery and access model is wholly owned, then upgrading is simple. In fact, it’s one of the main selling points of SaaS, and a reason SaaS as a paradigm has taken the world by storm.
The bigger concern is if the digital health product is deployed on-premises (“on-prem”) on technology where you, as the owner of the digital health application, don’t have control over its delivery or access. Upgrade cycles become an ongoing issue.
Hardware-based digital health products are another story altogether. Repairs, returns, replacements are all things software-only products don’t have to consider. It’s an ongoing concern that is also a cost center: shipping, new parts, and labor for repairs are all unpredictable costs software doesn’t have.
The point is understanding how updates and fixes to the digital health product will be administered is the key last step of an application strategy before you are off and running towards market adoption.
B2B digital health products will likely fail without an educated integration strategy. Data exchange with hospitals, payers, or other systems becomes a central component to a successful digital health product because often so much of the value derived from the product is how it fits into the existing health system data and workflows. The challenge is in completing integrations, which are not straightforward. A magic API will not create interoperability like it might integrating into a CRM or Facebook. Instead, the path towards integration is filled with dozens of obstacles, with the crux being authorization and power: You can’t complete an integration until your customer—like a hospital—gives you the okay to do so. EHRs, by and large, are silos, so integrating to each one involves a project and a process. Integrating to a middleware API is trivial; integrating to an EHR, or multiple EHRs, is the hard part.
There are a lot of industry terms of art flying around within the world of interoperability, a.k.a. integration. Let’s walk through them.
B2B digital health products will likely fail without an educated integration strategy. Data exchange with hospitals, payers, or other systems becomes a central component to a successful digital health product because often so much of the value derived from the product is how it fits into the existing health system data and workflows. The challenge is in completing integrations, which are not straightforward. A magic API will not create interoperability like it might integrating into a CRM or Facebook. Instead, the path towards integration is filled with dozens of obstacles, with the crux being authorization and power: You can’t complete an integration until your customer—like a hospital—gives you the okay to do so. EHRs, by and large, are silos, so integrating to each one involves a project and a process. Integrating to a middleware API is trivial; integrating to an EHR, or multiple EHRs, is the hard part.
“Integration” is a broad term. There are many forms and formats of integration. As step one of an integration strategy, the key is to understand what integration needs your business model demands.
For example, let’s say you are a telemedicine product, and you desire to integrate into EHRs, like Epic. It is wise to understand where within Epic’s interface your data will exist. Similarly, you’ll want to know the workflows within Epic that your product will fit, which can dictate the types of interfaces you’ll read from and write to.
There is no one-size-fits-all to digital health. Each product, each solution, each idea mixes and matches different requirements for integration. Step one is to ensure you understand what data requirements exist for your business model to be successful.
One additional important business model consideration is how you price your product. If you price it very low per provider or per facility, then the revenue you generate may actually be lower than the cost, in time and technology, to do an integration. We’ve seen this play out with multiple prospects. If integration is a requirement for your product, you need to plan for that with your pricing model. Our biggest recommendation would be to not add integration as a line-item expense. Selling integrations as a line-item expense has two negative impacts: first, it puts a price on an integration which can create an apples to oranges situation in pricing. Second, it doesn’t communicate the value of the integration well. Here’s an example. If a telemedicine or patient portal product wants to roll out e-visits, this is functionality that definitely requires integration. However, selling the e-visits and the integration separately creates a strange product situation in which a customer could not understand that these concepts or the value of this functionality is not mutually exclusive. The value of having e-visits isn’t the integration; it’s the fact that you can now serve patients for non-acute reasons outside your walls. It just so happens that you need integration to make this work. Baking the price of the integration into the “e-visits” module will increase the likelihood of success of selling integrations (and by proxy, your product).
B2B digital health products will likely fail without an educated integration strategy. Data exchange with hospitals, payers, or other systems becomes a central component to a successful digital health product because often so much of the value derived from the product is how it fits into the existing health system data and workflows. The challenge is in completing integrations, which are not straightforward. A magic API will not create interoperability like it might integrating into a CRM or Facebook. Instead, the path towards integration is filled with dozens of obstacles, with the crux being authorization and power: You can’t complete an integration until your customer—like a hospital—gives you the okay to do so. EHRs, by and large, are silos, so integrating to each one involves a project and a process. Integrating to a middleware API is trivial; integrating to an EHR, or multiple EHRs, is the hard part.
Typically, the hardest problem with integrations is going from 0 to 1. It’s a lot like having your first baby… before the baby’s born you read all the books and think you’re ready. Then the baby’s finally here and you realize that there is a whole lot you truly didn’t know. Just as in parenting, the learning curve in integrations going from 0 to 1 is steep.
Going from 0 to 1 is a very different problem than end-game planning. The sole focus of the product should be landing its first integration instead of planning for the future.
A simple data point to paint a story:
Many digital health organizations start out thinking how to scale to hundreds, or thousands, of integrations. But scaling secure connectivity in healthcare is non-trivial, and non-repeating. For example, a Fortune 100 enterprise is one of the smartest companies we’ve met in healthcare. We know they have less than 2,000 total unique secure integrations across all of healthcare, a number that is shockingly low. What’s more shocking is it’s by far the highest we’ve ever encountered from a non-EHR organization, so for a digital health product team to plan for more than one integration at an early stage is a waste of focus.
Instead, at this stage of an integration strategy, it is all about completing that first integration, going from 0 to 1, to support proving out the product. Throw all your weight behind landing that first deal, or succeeding at your first pilot.
B2B digital health products will likely fail without an educated integration strategy. Data exchange with hospitals, payers, or other systems becomes a central component to a successful digital health product because often so much of the value derived from the product is how it fits into the existing health system data and workflows. The challenge is in completing integrations, which are not straightforward. A magic API will not create interoperability like it might integrating into a CRM or Facebook. Instead, the path towards integration is filled with dozens of obstacles, with the crux being authorization and power: You can’t complete an integration until your customer—like a hospital—gives you the okay to do so. EHRs, by and large, are silos, so integrating to each one involves a project and a process. Integrating to a middleware API is trivial; integrating to an EHR, or multiple EHRs, is the hard part.
Okay, so you’ve gone from 0 to 1, and are now scaling. That’s great! What does scaling integrations look like?
Well, it’s not what it seems. Sadly, “integrations don’t scale” is this framework’s drumbeat, and for good reason. Scalability within healthcare is a myth. There is no magic bullet for scale. There is no magic API for EHRs. There is no Easy button.
Instead, since connections are point-to-point, scaling integrations takes on a different meaning. Scaling integrations means making the internal aspects of your integration infrastructure as repeatable as possible.
“Scale” of integrations does not mean integrating once to an API and expecting to be plugged into every hospital.
Scaling integrations means ensuring your resources are aligned so the process of an integration can match the speed at which you land and implement new business deals.
Pilots are a big deal. Almost all transactions with a hospital or health system won’t happen unless a pilot has happened first, so understanding how the pilot game works is crucial to success. Simply landing a pilot isn’t enough, though: there is an entire strategy around setting it up for success. Put a lot of thought into your first pilot target, but don’t put all your eggs in one basket. Landing Kaiser for a pilot sounds like a dream path, but then you run the risk of spending all your time and money trying to land a massive organization like Kaiser, which can take months or years. Be smart and go after pilot organizations that can ideally move quickly while providing you with a case study if successful.
Universal feedback says finding an internal champion is priority number one in order to lend credibility to the product. Without a champion, a pilot probably won’t happen.
Everything talked about in the other strategy tracks matter here:
The goal is building credibility so the IT team, and especially the CIO and/or CTO, are willing to work with you.
Looking for more ways to demonstrate credibility and create IT buy-in?
Pilots are a big deal. Almost all transactions with a hospital or health system won’t happen unless a pilot has happened first, so understanding how the pilot game works is crucial to success. Simply landing a pilot isn’t enough, though: there is an entire strategy around setting it up for success. Put a lot of thought into your first pilot target, but don’t put all your eggs in one basket. Landing Kaiser for a pilot sounds like a dream path, but then you run the risk of spending all your time and money trying to land a massive organization like Kaiser, which can take months or years. Be smart and go after pilot organizations that can ideally move quickly while providing you with a case study if successful.
Oftentimes, in order to land a pilot, digital health products will be marketed for free or highly reduced prices. While this makes sense in some cases, most healthcare organizations know that there is no such thing as “free”. Even if the product is free, it will take resources to help implement, train, and use the digital health product. Don’t get burned by presenting your pilot as “free” and no cost to your customer. There is always a cost.
Also, if you highly discount your price you run the risk of creating a chasm between the value proposition of your product and the cost somebody has to pay for it. You can quickly lose credibility if this chasm is too wide.
It’s certainly OK and often smart to discount your product to land your first pilot. But, be careful not to devalue your product and don’t devalue the time and resources of your customer.
Pilots are a big deal. Almost all transactions with a hospital or health system won’t happen unless a pilot has happened first, so understanding how the pilot game works is crucial to success. Simply landing a pilot isn’t enough, though: there is an entire strategy around setting it up for success. Put a lot of thought into your first pilot target, but don’t put all your eggs in one basket. Landing Kaiser for a pilot sounds like a dream path, but then you run the risk of spending all your time and money trying to land a massive organization like Kaiser, which can take months or years. Be smart and go after pilot organizations that can ideally move quickly while providing you with a case study if successful.
Pilots are a big deal. Almost all transactions with a hospital or health system won’t happen unless a pilot has happened first, so understanding how the pilot game works is crucial to success. Simply landing a pilot isn’t enough, though: there is an entire strategy around setting it up for success. Put a lot of thought into your first pilot target, but don’t put all your eggs in one basket. Landing Kaiser for a pilot sounds like a dream path, but then you run the risk of spending all your time and money trying to land a massive organization like Kaiser, which can take months or years. Be smart and go after pilot organizations that can ideally move quickly while providing you with a case study if successful.
Hopefully, you have been collecting data throughout the pilot. Now be prepared to present it to demonstrate the pilot matched the outcomes needed to prove its success.
Don’t get caught in “pilot purgatory” where you bounce from one pilot to the next. That can be death for the product. You need to know if the pilot was successful and there will be a business engagement or if the prospect will pass. Sometimes metrics are so-so or buy-in was inflated, and the engagement will be repositioned in another pilot. Be wary!
Pilots are a big deal. Almost all transactions with a hospital or health system won’t happen unless a pilot has happened first, so understanding how the pilot game works is crucial to success. Simply landing a pilot isn’t enough, though: there is an entire strategy around setting it up for success. Put a lot of thought into your first pilot target, but don’t put all your eggs in one basket. Landing Kaiser for a pilot sounds like a dream path, but then you run the risk of spending all your time and money trying to land a massive organization like Kaiser, which can take months or years. Be smart and go after pilot organizations that can ideally move quickly while providing you with a case study if successful.
A rollout plan is more than just scaling technology, although having technical resources available to scale as necessary is important.
Often a solid rollout plan is more than just scaling servers. It can also mean scaling process, which is even harder once humans get involved.
Take training, for example. If the digital health product is a telehealth solution meant to be used by nurses in a certain workflow, training all the nurses in the system on the new tool and new workflow is a critical requirement of transitioning from pilot to go-live.
Or, consider billing. Perhaps the pilot focused on proving out the design and value of the use case, and it passed with flying colors. But now a mechanism by which the hospital can bill for your product is a requirement to go-live. This is just one example of a potential additional technical requirement you must manage if you plan to transition to adoption.
Digital therapeutics, and more broadly digital health, needs to embrace and develop strategies around evidence if it is going to gain widespread adoption amongst clinician users and health delivery systems. While consumers are taking more of a lead around their health data, services, and decisions, care providers and care delivery organizations play a significant role in how digital health is used.
The strategies outlined here will help you gain a better understanding and plan for leveraging evidence in your digital health strategy. This guide attempts to weave a fine line between what is considered medical evidence and what is considered marketing collateral. For the purposes of digital health success and adoption, we view the two distinct bodies of content as largely the same.
There are a lot of things broken in healthcare and few areas where you can say that care is optimized for patients, let alone providers. The challenge is that there are some strong industry debts, or ingrained impediments, that make some improvements in care unrealistic, especially on aggressive timelines.
Because of this, the first step in a digital health evidence strategy is to engage with an expert, typically a care provider, champion, or administrator. The outcome of this engagement should be either 1) feedback to adjust the idea and assumptions underlying the digital health product or 2) an expert opinion, ideally in the form of a quote that can be used publicly, in support of the digital health product. If feedback is given, adjustments should be made and this process should be repeated in an iterative fashion until you get an expert opinion.
It’s important to note that clinical expert opinions, even in the form of a quote, go a long way to de-risking a technology for a potential healthcare customer. There are companies that have been successful at scaling sales by getting one expert opinion and using that to secure pilots and significant funding. Taking this expert opinion one step further and having an expert agree to participate in marketing events such as webinars is another great result of getting validation and more reason to spend the time upfront.
As future points convey, an expert opinion is the lowest level of medical evidence. But, the purpose of evidence at this early stage is two fold, 1) to validate and refine the idea, making sure there aren’t any major blockers that only users on the ground would know, and 2) to add credibility to secure a pilot. Both of those purposes can be accomplished with this an expert opinion.
Digital therapeutics, and more broadly digital health, needs to embrace and develop strategies around evidence if it is going to gain widespread adoption amongst clinician users and health delivery systems. While consumers are taking more of a lead around their health data, services, and decisions, care providers and care delivery organizations play a significant role in how digital health is used.
The strategies outlined here will help you gain a better understanding and plan for leveraging evidence in your digital health strategy. This guide attempts to weave a fine line between what is considered medical evidence and what is considered marketing collateral. For the purposes of digital health success and adoption, we view the two distinct bodies of content as largely the same.
There are various kinds of medical evidence. For the purposes of this guide, we’ve mapped traditional marketing collateral into the established rankings, or levels, of medical evidence. The goal here is not to ensure readers can cite what is Level 2c vs Level 3b evidence but to give an appreciation of the breadth of available evidence to ideally inform an evidence roadmap for your digital health product. If you work in healthcare, it’s also not bad to have an informed conversation with a clinician about evidence, whether for your digital health product or not.
Below is a table of two different scoring systems for medical evidence, one from the AMA and one from The Oxford Centre for Evidence-Based Medicine (OCEBM).
Grade of Recommendation | Level of Evidence | Type of Study |
A | 1a | SR (with homogeneity) of RCTs and of prospective cohort studies |
1b | Individual RCT with narrow confidence interval, prospective cohort study with good followup | |
1c | All or none studies, all or none case series | |
B | 2a | SR (with homogeneity) of cohort studies |
2b | Individual cohort study | |
2c | Outcomes research, ecological studies | |
3a | SR of case control studies, SR of 3b and better studies | |
3b | Individual case control study, nonconsecutive cohort study | |
C | 4 | Case series/case report, poor quality cohort studies |
D | 5 | Expert opinion, bench research |
SORT | OCEBM | |
A | Recommendation based on consistent and good quality patient-oriented evidence | Consistent level 1 studies |
B | Recommendation based on inconsistent or limited-quality patient oriented evidence | Consistent level 2 or 3 studies or extrapolations from level 1 studies |
C | Recommendation based on consensus, usual practice, disease-oriented evidence, case series for studies of treatment or screening, and/or opinion | Level 4 studies or extrapolations from level 2 or 3 studies |
D | Level 5 evidence or troublingly inconsistent or inconclusive studies of any level |
Source: AMA Journal of Ethics
Regardless of the type of digital health solution, the path to building a body of evidence is from bottom to top, or lowest level of evidence to the highest level of evidence. The highest levels of evidence take a lot of time and money to achieve, and time and money are at a premium for any digital health offering.
Not all digital health product categories are created equal when it comes to evidence. Digital therapeutics, at one end of the spectrum, has a high bar when it comes to evidence. It’s why we see the most successful digital health therapeutics companies like Omada Health and Propeller Health build clinical evidence into the core of what they do. But, telemedicine solutions or other digital health solutions, like those for scheduling, have a lower bar to cross when it comes to evidence.
The important thing to understand at this stage is how the different kinds of evidence apply to you product. If your product is integrated into care, like a digital therapeutic or a care management platform, then moving towards peer reviewed evidence in support of the way your product improves outcomes, is necessary. If your product helps to fill empty slots in schedules, you likely won’t ever need to worry about peer reviewed evidence, but you will need to build a body of evidence from real customer data to support your claims of spots filled or recovering of lost revenue. Getting a pilot with a health system and getting quote from a clinical leader or a case study is a great universal starting point regardless of what your digital health product does.
It’s at this point that you want to roughly map out your evidence roadmap, which is simply a timeline of when you expect, or hope, to have different levels of evidence. Like a product roadmap, it’s going to be goal-oriented in that you need to back into timelines based on your goal delivery dates for different kinds of evidence.
Digital therapeutics, and more broadly digital health, needs to embrace and develop strategies around evidence if it is going to gain widespread adoption amongst clinician users and health delivery systems. While consumers are taking more of a lead around their health data, services, and decisions, care providers and care delivery organizations play a significant role in how digital health is used.
The strategies outlined here will help you gain a better understanding and plan for leveraging evidence in your digital health strategy. This guide attempts to weave a fine line between what is considered medical evidence and what is considered marketing collateral. For the purposes of digital health success and adoption, we view the two distinct bodies of content as largely the same.
It would be nice to have a NEJM or JAMA article in support of your product, but that’s highly unlikely at time: , let alone thistime: mark. The goal at the time: stage in creating collateral is to empower your customer facing teams with clear and concise data about the benefits of your product from real world applications.
At this stage, you should have real market data. This data should be crafted into collateral that is easy to understand, with clarity on the inputs that created the outcomes you’re reporting. Oftentimes companies will document outcomes and data sources that are unclear. What we’ve seen be most successful is to have clear summary outcomes with links back to where and how the data was sourced.
It’s extremely beneficial to have some knowledge of, and application of, statistics. This will be very helpful in thinking about data and visualization of data in support of your digital health product.
One additional thing to consider at this stage is customizing evidence collateral for your intended audiences. Maybe you only have one buyer but it’s likely there are other people involved in the buying process, especially if you’re selling to enterprises. Think about ways you can tailor the data, maybe even just the data you highlight, for different audiences.
Digital therapeutics, and more broadly digital health, needs to embrace and develop strategies around evidence if it is going to gain widespread adoption amongst clinician users and health delivery systems. While consumers are taking more of a lead around their health data, services, and decisions, care providers and care delivery organizations play a significant role in how digital health is used.
The strategies outlined here will help you gain a better understanding and plan for leveraging evidence in your digital health strategy. This guide attempts to weave a fine line between what is considered medical evidence and what is considered marketing collateral. For the purposes of digital health success and adoption, we view the two distinct bodies of content as largely the same.
Healthcare economics is focused, at a high level, on the efficiency and effectiveness of healthcare—everything from prevention to delivery through collections. Wikipedia has a good primer, though you could get a PhD in healthcare economics because it’s that big of a subject. Not to mention healthcare economics is incredibly complex, opaque, and oft-missed by digital health innovators when they consider the broader implications of their products.
The thing that’s hard about healthcare economics is that what seems like a perfectly logical reason to implement a digital health solution, namely because it would result in better care, less expensive overall costs, and clear ROI, doesn’t always make sense.
If you’re selling a digital health solution for say, digestive disorders like Crohn’s disease, and you have good data to show that it reduces the number of visits and complications, that’s a great start. To attach numbers to the example, let’s say you charge $100/year/patient and you have data that shows, controlling for other factors like resources needed to manage your product, you reduce costs for users by $50; that’s a net savings of $50/year/patient. But why would a hospital, one that today still largely operates in a fee for service world, pay you $100/year/patient when the $50/year/patient savings go to the insurance company and not to the hospital? Sadly the patient is left in the middle.
The above example illustrates the need to understand where and how economic benefits are realized. Many digital health solutions, especially those that target improving outcomes, benefit payors and not health care delivery organizations. This is changing with models that pay for value and not volume, things like readmission penalties and ACOs, but healthcare today largely operates on volume and not value.
Digital therapeutics, and more broadly digital health, needs to embrace and develop strategies around evidence if it is going to gain widespread adoption amongst clinician users and health delivery systems. While consumers are taking more of a lead around their health data, services, and decisions, care providers and care delivery organizations play a significant role in how digital health is used.
The strategies outlined here will help you gain a better understanding and plan for leveraging evidence in your digital health strategy. This guide attempts to weave a fine line between what is considered medical evidence and what is considered marketing collateral. For the purposes of digital health success and adoption, we view the two distinct bodies of content as largely the same.
By this time, you should have traction and will be looking to add new customers and implementations for you digital health product. That’s great! It’s been some time since you initially created some collateral specifically about the evidence in support of your product. Now you should be thinking about how to add credibility to that collateral.
The best way is getting something published on your evidence. This doesn’t have to be in a peer reviewed clinical journal but could be an online publication. Think of health management publications like Health Affairs. Or, it could simply be joint collateral with one of your customers.
Healthcare is risk averse, and there are good reasons for this, but frequently health system buyers don’t want to be the first to try something. With some proof from colleagues, those conversations with potential buyers change quickly. There’s an adage in medicine that if you want a physician to change behavior, get their residency director as an advocate. This doesn’t scale but it does speak to the respect clinicians have for the opinions of their trusted colleagues.
If you started with case studies, consider expanding those to be a case series. If you started with a case series, consider how you can expand that to longer timelines and ensure representation across multiple patient populations. The idea is to find ways to increase your level of evidence or statistical significance.
The guide will be constantly evolving. Developing new articles and strategies are an on-going effort as Datica continues to have rich conversations with the market.
If you have any feedback, send an email to hello@datica.com. We love community input, but more importantly, we love to hear your story.
Don’t mistake the DHSF as an all-encompassing guide to successful company-building. A successful business succeeds along innumerable dimensions, outside of compliance, infrastructure, or integration. This framework is not those ingredients:
That’s what incubators like YCombinator or Gener8tor do, or programs like Cedars-Sinai+TechStars, focus on.
Specific to healthcare, this framework does not go deep into FDA regulations or life science particulars like GxP. While there is significant overlap with our expertise in compliance, we aren’t yet experts in those arenas to provide a detailed guide on navigating the FDA or meeting GxP requirements. We will furnish helpful external resources to learn more elsewhere, however.
Over the last 4-plus years, Datica has engaged with thousands of digital health organizations, from single-founder startups to groups within Fortune 100 companies like Johnson & Johnson or UnitedHealthcare. We often chat with them as they are figuring out how to deal with HIPAA compliance or data exchange. Some were far enough along with their idea to become customers, but many did not as they first searched for traction.
Over the course of several thousand conversations, we started to see clear patterns emerge around topics like technology, infrastructure, compliance, and interoperability. This framework is the distillation of what matters to the success of digital health products.
Datica is not going to pretend we know the entire scope of what it takes to make a successful business—things like capitalization strategies or Lean Startup advice—or the best methodologies for product development—like debating waterfall vs. agile, or outcome-driven innovation. But we do have one of the most credible points of view on the technological underpinnings of digital health. Companies and teams, ideas and innovations, can look to this framework to obtain a stronger handle on an intelligent way to manage the underlying burdens unique to digital health products.