Where Can You Hide Once You Begin Public Reporting?

April 11, 2013
In a conversation generated by a discussion on the Patient Centered Primary Care Collaborative’s (PC-PCC) weekly conference call, a comment was made

In a conversation generated by a discussion on the Patient Centered Primary Care Collaborative’s (PC-PCC) weekly conference call, a comment was made to me about SETMA’s impressive Public Reporting. If only that behavior was widespread! Someday. In response, I said:

“That behavior will be the norm – it will be slow, but gradually everyone will discover:

1. “Where you are is not as important in quality as where you are going and your relentless pursuit of ‘getting there.’

2. “Shame is not attached to current performance only to the refusal to ask, ‘How am I doing?’ and not to being willing to change.

3. “The ultimate solution to clinical inertia is the Cortez Policy, which is defined by ‘scuttle your ships by telling everyone how you are doing, and relentless pursue your goal of excellence.’”

The truth is, once you “open your books on performance” to public scrutiny, the only safe place you have in which to hide is excellence.”

James (Larry) Holly, MD

Sponsored Recommendations

A Cyber Shield for Healthcare: Exploring HHS's $1.3 Billion Security Initiative

Unlock the Future of Healthcare Cybersecurity with Erik Decker, Co-Chair of the HHS 405(d) workgroup! Don't miss this opportunity to gain invaluable knowledge from a seasoned ...

Enhancing Remote Radiology: How Zero Trust Access Revolutionizes Healthcare Connectivity

This content details how a cloud-enabled zero trust architecture ensures high performance, compliance, and scalability, overcoming the limitations of traditional VPN solutions...

Spotlight on Artificial Intelligence

Unlock the potential of AI in our latest series. Discover how AI is revolutionizing clinical decision support, improving workflow efficiency, and transforming medical documentation...

Beyond the VPN: Zero Trust Access for a Healthcare Hybrid Work Environment

This whitepaper explores how a cloud-enabled zero trust architecture ensures secure, least privileged access to applications, meeting regulatory requirements and enhancing user...