In August 1989, Chicago Congressman Daniel Rostenkowski, then Chairman of the “powerful” House Ways and Means Committee, narrowly escaped an angry mob of seniors in his own district who attacked his car with umbrellas. His crime: eliminating the gaping patient financial exposure built into the Medicare program in 1965 by raising taxes on the “high income” elderly. In November, 1989 Congress rescinded the so-called Catastrophic Coverage Act, a bipartisan reform signed into law by Ronald Reagan just sixteen months earlier.
In the spring of 1994, Bill and Hillary Clinton abandoned their famously arcane health reform plan and months later, forfeited control over Congress in the 1994 mid-term elections. Health reform was a major factor giving Newt Gingrich’s House Republicans control for the first time in forty years. Twenty five years later, Barack Obama succeeded, with huge Democratic majorities, in passing the Affordable Care Act and . . . lost control of the House less than eight months later in the largest Republican landslide since 1938, due in major part to voter backlash against “ObamaCare”.
What was the common denominator of all these political events? The answer: powerful voter retribution for tinkering with the healthcare system, successfully or not. Why is health reform such risky business for politicians?
The adoption of electronic health records (EHRs) has increased substantially in hospitals and clinician offices in large part due to the “meaningful use” program of the Health Information Technology for Clinical and Economic Health (HITECH) Act. The motivation for increasing EHR use in the HITECH Act was supported by evidence-based interventions for known significant problems in healthcare.

The world is reeling from the massive ransomware attack on at least a hundred nations’ computer systems. The unprecedented malware spasm infected hundreds of thousands of computers, and would have infected millions more but for a 22-year old computer science student who found a vulnerability in the malware that he used to curtail the infection. He found it looked for a non-existent URL, so he a set up that URL and found he could stop it spreading. Of course, now the hackers know that, it is an easy matter to update the malware to use other URLs and other techniques. Clearly, this iconic malware attack is not going to be the last.