Kettering Health restructures its post-implant heart failure care with new EHR integration
Overview
Kettering Health has deployed CardioMEMS, an implantable wireless sensor for monitoring pulmonary artery pressure in heart failure patients with recent hospitalizations. While the Ohio health system reports clinical success with the device's data collection for volume management decisions, the article signals an operational restructuring around EHR integration. This case illustrates a critical pattern in healthcare technology adoption: clinical efficacy alone doesn't guarantee operational efficiency. For independent practices evaluating remote patient monitoring (RPM) or implantable device programs, the integration architecture matters as much as the clinical outcomes.
Technical Details
CardioMEMS functions as an implanted sensor transmitting physiological data to external clinical systems. The restructuring indicates Kettering Health is addressing how this data flows into clinical workflows—specifically EHR integration. Remote monitoring devices like CardioMEMS generate continuous data streams that must be normalized, routed to appropriate care teams, and documented in compliance with HIPAA's access controls and audit requirements. The sensor's wireless transmission creates a technical stack spanning implant → patient home gateway → vendor cloud → health system infrastructure → EHR. Each handoff represents a potential compliance gap: BAA coverage, encryption standards, access logging, and minimum necessary data handling must be enforced across every layer.
Practical Implications
Independent practices considering RPM programs face similar integration challenges at smaller scale. When a device vendor's data doesn't integrate cleanly with your EHR, staff resort to manual data entry or create shadow systems outside your documented workflows. Both approaches create HIPAA exposure. Manual transcription increases error risk and creates undocumented access patterns. Shadow systems (spreadsheets, separate portals) may lack the audit logging and access controls your risk analysis assumes exist. The lesson from Kettering Health's restructuring: evaluate the technical implementation before the clinical promise. Ask vendors: Where does data transit? Which systems require BAAs? How are access logs generated? Can your current infrastructure handle the data volume and security requirements?
What This Means for Your Practice
If you're evaluating RPM tools, wearables, or any device that generates continuous patient data:
- Map the data flow end-to-end: Identify every system, vendor, and handoff between device and your final documentation system
- Verify BAA coverage: Ensure every third party with access to PHI—device vendor, cloud host, gateway provider—has a signed BAA specifying their security obligations
- Test audit logging: Confirm that every access to device data generates a logged event meeting HIPAA's 6-year retention requirement
- Document the integration: Your Security Rule risk analysis must account for these data flows, including how encryption, access controls, and breach detection apply to device-generated data
- Plan for failure modes: What happens if the device vendor's system goes down? If data doesn't transmit? Manual workarounds need documented procedures and logged exceptions
The average breach costs $9.8 million (IBM Security, 2024), and device integrations frequently create undocumented access pathways that aren't discovered until a breach occurs.
If you're evaluating RPM tools, wearables, or any device that generates continuous patient data: - Map the data flow end-to-end: Identify every system, vendor, and handoff between device and your final documentation system - Verify BAA coverage: Ensure every third party with access to PHI—device vendor, cloud host, gateway provider—has a signed BAA specifying their security obligations - Test audit logging: Confirm that every access to device data generates a logged event meeting HIPAA's 6-year retention requirement - Document the integration: Your Security Rule risk analysis must account for these data flows, including how encryption, access controls, and breach detection apply to device-generated data - Plan for failure modes: What happens if the device vendor's system goes down? If data doesn't transmit? Manual workarounds need documented procedures and logged exceptions The average breach costs $9.8 million (IBM Security, 2024), and device integrations frequently create undocumented access pathways that aren't discovered until a breach occurs..
How Patient Protect Helps
Patient Protect's Vendor Risk Scanner is built for this scenario—it tracks BAA status, security postures, and data handling agreements for every third-party vendor, including device manufacturers and cloud service providers. When you add an RPM tool to your practice, the scanner prompts you to document the data flow, verify BAA coverage, and assess vendor security controls. The ePHI Audit Logging feature captures every access to patient data across integrated systems, creating the immutable access trail HIPAA requires for device-generated data. The Autonomous Compliance Engine automatically updates your risk analysis when you add new devices, flagging integration gaps and generating remediation tasks. Patient Protect's Breach Simulator models attack scenarios specific to your device stack, showing where data flows create exposure. At $39-$99/month with no contracts, it's built for practices that need compliance automation without enterprise complexity. Start a free trial at hipaa-port.com or check your risk at patient-protect.com/risk-assessment.
This editorial was generated by AI from publicly available source material and is clearly labeled as such. It does not constitute legal, compliance, or professional advice. Inclusion of any entity does not imply wrongdoing. Patient Protect makes no warranties regarding accuracy or completeness. Verify all information with the original source before relying on it.

