Professional Documents
Culture Documents
Communication Deck Data Architecture Workshop Olmsted Medical Center
Communication Deck Data Architecture Workshop Olmsted Medical Center
Communication Deck Data Architecture Workshop Olmsted Medical Center
Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.
Info-Tech’s products and services combine actionable insight and relevant advice with
ready-to-use tools and templates that cover the full spectrum of IT concerns.
© 1997-2013 Info-Tech Research Group Inc. Info-Tech Research Group 1
Document Contents
Agenda
1. Introduction........................................................................................................
3
2. Data Architecture Overview .............................................................................7
3. Data Architecture Framework & Processes…...............................................13
4. Data Architecture Action Plan & Next Steps.................................................35
Appendix I: Supporting Research..................................................................40
Appendix II: Exercise Slides/Discussion Notes............................................48
Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.
Info-Tech’s products and services combine actionable insight and relevant advice with
ready-to-use tools and templates that cover the full spectrum of IT concerns.
© 1997-2013 Info-Tech Research Group Inc. Info-Tech Research Group 3
Situation Summary
Situation
The Olmsted Medical Center provides healthcare to communities in southern Minnesota. Services are
delivered by both a centralized 40-bed hospital and 13 clinical locations throughout the geographical
region.
Data management has been recognized as a key strategic initiative to improve overall governance of
the hospital’s information and a means to improve its operational processes.
Challenges
Patient data is collected from various systems and stored accordingly. OMC has recently
implemented an Electronic Health Record, replacing manual process, as well as an AS/400 solution.
The hospital is looking to combine the clinical and ambulatory data to give one consistent vision of
patient information as they are serviced by various OMC services.
3. Combined Ambulatory & Hospital Data for a consistent vision of the data
Day 1 Perform a Current Establish the organization’s • Data Asset Management Assessment Tool
State Assessment approach to data and its • Heat Map Tool
perceived data maturity • Data Context Diagram
level. • Data Audit Interview Schedule
Day 2 Perform the Data Provide an overview of data • Data Interview Guide
Audit audits and an audit • Data Source Inventory
framework to follow for • Root cause analysis
successful results.
Day 3 Develop a Data Create a target data • Data Architecture Principles
Architecture architecture. • Data Architecture Worksheets
Day 4 Plan Establish initiatives, taking • List of prioritized initiatives
cost and value into • Strategic roadmap
consideration.
Day 5 Communicate Identify benchmarks to track • Metric Tracking
initiative success and create • Communication Plan
a communication plan.
Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.
Info-Tech’s products and services combine actionable insight and relevant advice with
ready-to-use tools and templates that cover the full spectrum of IT concerns.
© 1997-2013 Info-Tech Research Group Inc. Info-Tech Research Group 7
Why is data architecture important?
• Data has a cost associated with it: collection, entry, validation, cleansing, management.
• Data has value associated with it: used to improve decision making by unlocking insights in the data
through analysis.
• Data is historically the least governed asset: lack of accountability, lack of common definitions,
rampant duplication.
• Data is subject to regulatory compliance: HIPAA, SOX, FIPA, SEC, PIPEDA, etc.
• Data that is of poor quality damages company reputation, results in bad decisions, and can result in
reduced revenues.
Inputs Outputs
A review of the current state found the organization was stronger in the areas of
Technology & Expertise, with challenges in Policy & Process, Understanding &
Awareness, Governance, and Communication.
Results: Data Asset Management Maturity Assessment
Understanding &
Policy & Process Expertise Technology Governance Communication
Awareness
Use of external data expertise Data governance steering External best practices, and use
Best external data policies and Advanced forward looking Extensive optimized use of data
5 and industry leaders for committee has set of leading techniques are used
process practices applied understanding impacts on data technology exists
guidance organizational wide policies to communicate data changes
Ad hoc approach to policy & Lots of one-off solutions, no set Sporadic communications on
1 Recognition
process standards data issues
Current State
Info-Tech Research Group 11
Data Issues within the Olmsted Medical Center Environment
The Olmsted Medical Center has recognized the need to improve overall data
management. The team identified issues as follows:
Communica General
Data Quality Availability Governance Technology
tions Issues
Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.
Info-Tech’s products and services combine actionable insight and relevant advice with
ready-to-use tools and templates that cover the full spectrum of IT concerns.
© 1997-2013 Info-Tech Research Group Inc. Info-Tech Research Group 13
Olmsted Medical Center Will Use a Standard Data Architecture
Process to Capture, Evaluate, and Manage Data Issues
3.
1. Assess 2. Audit 4. Action
Analyze
• Assign priorities
• Determine the root
Processes & Steps
Retention Perform
P1 Data Stewards P2 P3 Define SLAs P3 Regular
Policies
Security &
Identify Data Data Archiving Compliance
P1 Owners
P2 Policy P3 Data Cleansing
Audits
Processes
Confirm Define Data Perform
P1 Participants P2 P3 Regular Data
Quality
Thresholds Audits
Confirm Group
P1 Members
Confirm
P1 Project Charter
Conduct a value and risk assessment to determine value creation and risk
minimization opportunities for each business process/application being
audited.
Results: Value and Risk Assessment
• Olmsted Medical Center is
performing well in managing See the chart below to interpret the results.
its data as an asset, but a - The red bar represents your organization's current state, and the blue bar represents your organization's target state.
- The left end of the chart indicates the level of value creation, and the right end of the chart indicates the level of risk minimization
few areas that could be your organization is currently achieving with your data.
Policy/Process, 2
Similar/common policies and
process emerge, largely intuitive
Awareness Common data tools emerging
Data owners identified; data
quality and policy initiatives are
Communication on the overall
data issues and needs
Understanding/
ad-hoc
Awareness, Governance, 1
Ad hoc approach to policy &
process
Recognition
Lots of one-off solutions, no set
standards
Sporadic communications on
data issues
Compliance
Availability
Security
Quality
Technology
• Compliance and Governance had
6.2 9.2 3.4 5.2 smaller gaps, but could also provide a
Governance great deal of value to help improve the
9.3 6.9 5.1 3.9 quality of data.
Communication
18.6 6.9 10.2 3.9
• Technology, Expertise and Security were
generally not an issue.
Develop an initial Data Context diagram to understand the source and usage
of data within a defined process.
Charges/
Registration Scheduling
Payments
Manual Entry
• Sources can be manual or
automated. Registration,
Manual Entry (Appt related) Manual Entry
(Demographics (Diagnosis procedures, quantities,
insurance) dollars, performing physicians
Scan driver’s license /
insurance cards
Internal
Lab/Radilogy/Coderyte/Lynx Scheduling and
Demographics Lab
Charges/Payments directly enter
information into the Practice
Scheduling / Appts Radiology
Text File
Data Practice Management Kiosk
(Oracle) E-Scription
Reporting /
Finance
Demographics Charges
Charges
Lynx
EMPI Management system.
Lab Results Scheduling / Appts
Visit Summaries
Alergies to Cerner
Docs /
Text File
EMPI
Ambulatory EMR systems
exchange information with a
Immunizations from
Cerner
Cerner
Text File
Results to IEHR
Orders to/from IEHR variety of hospital systems such
Text File Results to
Manual Entry
Patient Info
as Lab, Radiology, EMPI, etc.
IEHR
Orders to/
Radiology
from IEHR
Determine the Determine which Complete the Data Discuss the results of
audit’s scope. data sources are Source Inventory the audit with key
Select an auditor. used on a regular with insights stakeholders.
Communicate with basis and record gathered during the Identify gaps and
stakeholders and them in the Data interviews and from weaknesses based on
request background Source Inventory. the IT reports. these results.
information. Conduct Brainstorm possible
Request IT reports. interviews with solutions.
Validate the scope. audit participants
Identify data to gain valuable
owners, stewards, information on
and end users and data use.
schedule interviews
to take place during
the audit period.
Use the data source inventory tool to record actual issues identified on each
data source, and add new data sources uncovered to the context diagram
Putting each issue on a sticky and attaching it to the data source that has the
problem provides a visualization of issues across data sources.
• Use a different color for each of
the categories of issues
identified:
◦ Quality
◦ Availability
◦ Security
◦ Compliance
• If issues occur on more than
one data source, put the issue
on all of them to highly the size
of the issue.
Use fishbone diagrams to help reveal the root causes of data issues
identified in the interviews and audit reports.
Policy and
Process
Understanding Expertise • Contributing factors
to weaknesses in
Lineage (Better
Missing Information (not
knowing)
Inaccurate information
(not knowing)
each input area
security definition – Missing Information
who can enter info) (no process) were identified.
Inaccurate Information
(not knowing)
• Revisit these
Inaccurate
Duplication (do not Information (no Duplication (not
know where to put process to handle) knowing where to get /
information)
place) contributing factors
DATA
QUALITY after selecting data
Information not passed
architecture building
‘Free Text’ (some process
both ways between
systems.
to handle differently).
Missing information (not
told). blocks and planning
initiatives.
Lineage (add
Duplication (do not
additional elements –
know all data
store in different
sources) Duplication.
places – Audit).
Develop underlying general rules and guidelines for developing the data
architecture framework for Olmsted Medical Center.
Once the building blocks have been identified, reconcile the actions to each
of the identified issues to ensure at least one task is assigned to each
challenge.
Policy and
Understanding Expertise
Process
Lineage (Better
Missing Information (not
knowing)
Inaccurate information
(not knowing)
In building the plan
security definition – Missing Information
who can enter info) (no process)
and analyzing the
Inaccurate Information
(not knowing)
building blocks, the
Duplication (do not know
where to put
Inaccurate
Information (no
Duplication (not knowing
Olmsted Medical
process to handle)
information) where to get / place)
Center team
DATA
QUALITY determined the
Information not passed
both ways between
‘Free Text’ (some process
Missing information (not
appropriate activities
to address the
to handle differently).
systems. told).
Lineage (add
identified issues.
Duplication (do not
additional elements –
know all data
store in different
sources) Duplication.
places – Audit).
Utilize the Initiative Definition Template to document the goals and objectives
of each initiative.
Data Quality - Standards / Roles
• Each initiative should have a Goal of the initiative Who benefits?
business related goal
Define the organization's Standards and Users. Patients. Management.
associated with it. Roles. Government.
•
Define the Roles, Responsibilities and
Identify who benefits from the accountabilities. Business Analysts, Data
Stewards, Data Owners, Data Policy
Employee time – employees won’t be
spending time entering the same data
initiative, and the business Administrator, Data Auditors, Data Scientist,
Service providers.
numerous times. Data is trusted, less
time needed to validate (reduction in
value derived. redos). Right people have right data
at right time to make decisions
Define the Data Entry Standards
• Estimate costs and/or effort
(clinical and administrative).
Years
1 2 3
Start
Initiative Period Duration H1 H2 H1 H2 H1 H2
1 Data Quality - Standards / Roles 1 3 1 1 1
2 Governance 1 1 1
3 Data Quality - Audit / Refresh 2 3 1 1 1
4 Communications 2 5 1 1 1 1 1
5 Availability 3 3 1 1 1
6 Security 1 6 1 1 1 1 1 1
Perform the data value/risk and maturity assessments with the end-state in
mind to determine if any hot or warm spots still exist.
If the heat map ends up having areas that still need attention, go back into the
architecture exercise to look for gaps that were missed.
Compliance
Compliance
Availability
Availability
Security
Security
Quality
Quality
Policy & Process Policy & Process
Asset Management Maturity
Understanding Understanding
18.6 6.9 10.2 4.5
1.68 1.05 1.26 0.21
Expertise Expertise
7.44 5.52 4.08 1.8
2.4 3 1.8 0.3
Technology Technology
7.13 10.58 3.91 6.9
1.56 3.9 1.17 0.78
Governance Governance
9.3 6.9 5.1 4.5
0.36 0.45 0.27 0.09
Communication Communication
17.36 6.44 9.52 4.2
1.92 1.2 1.44 0.24
Use a project planning tool to detail each initiative. Use the prioritization
(H/M/L) of each building block to plan activities.
Depende Depende
Each building block is an actionable Code Building Block Status Priority
ncies ncies
component of the plan. QP1
Develop data validation
processes
Selected High
blocks QE3
Identify business
analysts
Informal Low
Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.
Info-Tech’s products and services combine actionable insight and relevant advice with
ready-to-use tools and templates that cover the full spectrum of IT concerns.
© 1997-2013 Info-Tech Research Group Inc. Info-Tech Research Group 35
What’s next: Continue Performing Data Audits and Refining
Data Architecture
80/20 rule
We confined the scope of the workshop to a
single business unit or business function.
However, the underlying assumption is that the
Entire organization results of the modules should be replicable for
the entire organization. That is, we may have
looked only at 20 percent of the organization,
Scope of workshop:
but the results could solve 80 percent of issues.
Single business
unit/function
Sales
Regular data audits
An Info-Tech survey found that nearly half of
Results from the project should be companies only perform data audits when
applicable to the entire organization problems arise, and a third of organizations
were performing data audits annually. However,
it has been found that performing data audits
on a semi-annual basis produces the best
success rates.
These six initiatives were laid out in a roadmap, taking into account building
block dependencies and resource requirements.
Years
1 2 3
Start
Initiative Period Duration H1 H2 H1 H2 H1 H2
1 Data Quality - Standards / Roles 1 3 1 1 1
2 Governance 1 1 1
3 Data Quality - Audit / Refresh 2 3 1 1 1
4 Communications 2 5 1 1 1 1 1
5 Availability 3 3 1 1 1
6 Security 1 6 1 1 1 1 1 1
• As data quality was the primary gap identified, implementation of data quality building blocks (standards
and roles) should begin immediately.
• Overlapping governance building blocks will be started in parallel with the quality and the security
building blocks while the rest of the building blocks will be implemented over the next couple of years.
• The remaining data quality items (audit and refresh) will begin after the initial quality work has started.
• The communications items will start once Governance is in place and last throughout the three-year
timeframe.
• Security will continue to be worked on throughout the initiative to maintain appropriate due diligence.
Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.
Info-Tech’s products and services combine actionable insight and relevant advice with
ready-to-use tools and templates that cover the full spectrum of IT concerns.
© 1997-2013 Info-Tech Research Group Inc. Info-Tech Research Group 40
Use data architecture to improve data quality, integrity and
security, now and into the future
Develop a data architecture for today and tomorrow’s IT disruptors.
• The Cloud is not just new technology, it
introduces new policies, processes,
expertise, and governance models.
• Mobile computing is allowing for access
to corporate data from anywhere at any
time, requiring new policies and security
mechanisms in your corporate
infrastructure.
• Trusting goes beyond data quality,
knowing where it came from, how it has
changed, and how to use it requires
better metadata management.
• Data virtualization technology is
changing data integration, warehousing
and reporting.
• Big Data is a big deal and it will impact everything in your data architecture, from how data is used
and analyzed through to how it is stored and managed.
Data architecture provides a holistic view of enterprise data repositories, the technology that
enables and manages them, the governance processes that are over them, the people that manage
them, and it sets the principles, policies and guidelines relevant to an organization’s business and
IT goals.
Info-Tech Research Group 41
1.1 Bad, insecure and non-compliant data assets are the result
of poor policies, processes, technology and governance
Data assets provide value to the organization, but only if they are of high
quality, secure available and compliant. Poor value from data assets is a
symptom of deeper problems- you get out of it what you put into it.
Data policies, processes, technology, training and Data quality initiatives provide clean,
governance used effectively will improve data accurate, reliable and consistent data
quality. sets to any user and any given time.
Data policies, processes, technology, training and Comply with organizational policies to
governance are all used to improve the levels of improve data quality and security.
internal and external compliance. Comply with external regulations to
avoid penalties and protect reputations.
Data Quality
Data quality is not a matter of
“excellent” vs. “poor.” An
organization may excel in some
areas of data quality, but not in
others. Duplicate Data Incomplete Data
“We have a lot of security policies around our data. Any data stored on laptops must be encrypted, and
you cannot download to thumb drives. We have checks in our email, and a lot of what gets sent out is
automatically turned into confidential content. In addition, we have different masking roles in different
systems. “
- Systems Development Coordinator, Insurance Services
Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.
Info-Tech’s products and services combine actionable insight and relevant advice with
ready-to-use tools and templates that cover the full spectrum of IT concerns.
© 1997-2013 Info-Tech Research Group Inc. Info-Tech Research Group 48
Exercise 1.1.5 Risk and Value Assessment
The Data Management Maturity Heat Map will be used to help understand and
prioritize what Outputs need to be addressed, and the Input levers leading to
the issues.
Compliance
Availability
Security
Quality
Communication
18.6 6.9 10.2 4.5
Context diagrams will help to understand the source and usage of data
within a defined process.
Charges/
Registration Scheduling
Payments
Manual Entry
Manual Entry (Appt related) Manual Entry
(Demographics (Diagnosis procedures, quantities,
insurance) dollars, performing physicians
Scan driver’s license / Internal
insurance cards Lab/Radilogy/Coderyte/Lynx
Demographics Lab
Scheduling / Appts Radiology
Text File
Data Practice Management Kiosk
(Oracle) E-Scription
Reporting / Lynx
Finance Charges
EMPI
Demographics Charges
Lab Results Scheduling / Appts
Visit Summaries
Manual Entry
Text File Results to Patient Info
IEHR
Orders to/
Radiology
from IEHR
Lineage (add
additional Duplication (do
elements – store not know all data
in different sources) Duplication
places – audit)
Add additional
resources to
Specific resolve technical
New data needed information needs hurdles
(joint replacement). to be entered.
AVAILABILITY
Information needed
Mapping/Location/ (requirements
Accessibility change) – diagnostic Specific data
codes not known Let people know needs to be
New Data what is available. entered
(connect Vendor ability to
systems – make solution ‘HA”. Mapping (where to
automate) Inform people out data).
Performance (how what to connect
fast to get
information).
Why do you
collect what Why do you
you collect? collect what you
collect?
What information
do you collect? What information
do you collect?
COMPLIANCE
Who is the
Automated appropriate Who is the
Need
validation – person to send appropriate
accountability
today very and receive person?
reactive the
information? Frequency of
communications to
staff about new
changes to
regulations
Overview
• What is your role with respect to managing / using the data?
• What is the process flow for this data?
• What other systems does it connect to?
• What is the primary business use of this data?
• What are your concerns with respect to data?
Data Maturity
• Process & Policy – What organizational policies are you aware and which ones are followed?
• Governance – Who is responsible for managing the data used?
• Expertise – Who are the users who enter data?
What Works:
• Clinical data
o Direct access to all tables
o Familiar with data
o Meet government requirements (with OT)
• Financial DB in place since 2008
o Consistent, defined structures/formats
• Good historical (new requests)
• Good access
• Good working relationships
• Not well structured
Notes:
• Awareness of data there and not there
o Manual load – Ambulatory (not complete set))
o Missing diagnosis
• Diagnosis comes to HER late (3-4 weeks delay)
• Lab data
o Sent to all different places, includes changes – Where is source of truth? – Where pull data from?
o Results is how much billed.
Notes:
• Clinical vs. Financial
• Need to define one place where to find data
• Challenge is access
Pain Points:
• Improve process (input to get out)
• Improve consistency on what is input
• Need to add more information
• Unstructured data
• Hard to reproduce the gathering of the information
• Reason different sources of data management
• Need more coordination
• EHR – a lot of information, no place to put it (need a warehouse)
• Very manual extraction process
• Tactical quick hits
• Easier way of doing ETL
• Determine where to go (time strategy – short term /// long term (warehouse)
• Determine where everything is Bring silos into farm
• Need time and resources (team is backlogged)
Info-Tech Research Group 60
Expectations Discussion
• Reporting repository
• Better data
• Lots of time spent looking for good data
• No access to Cerner database
• Extract to reporting warehouse
• Need in a useable form
• Integrate better with other sources of data
• Want to report on hospital data
• Get patient encounters out of hospital records
• Get to point before – replace old reports
• Quality data warehouse – quality of data – knowing what it is
• Data governance
• Data warehouse instead of production
• Quality/integrity on data
• Source of truth (data view)
• Define organizational structure
• Determine duplicate data
• Find source of truth
Overall Goal
• Centralized data
• Consistency of data (similar results)
• One source of truth
• Increase access/availability (improves performance)
• Move off production systems
• Lower level – technical perspective – need consensus
• Look at data across organizations
o Total view of ‘Patient’
o Total view of ‘Population’
Next Steps
• Create Project Charter
• Arrange Info-Tech Advisory Call