Eliminating inappropriate telemetry monitoring: An evidence-based implementation guide

Raymond Y. Yeow, Garth W. Strohbehn, Calvin M. Kagan, Christopher M. Petrilli, Jamuna K. Krishnan, Karli Edholm, L. Scott Sussman, Jaime F. Blanck, Remus I. Popa, Amit K. Pahwa

Research output: Contribution to journalArticlepeer-review

Abstract

In-hospital continuous electrocardiographic monitoring, commonly referred to as telemetry, has allowed for rapid recognition of life-threatening conditions, including complex arrhythmias andmyocardial ischemia. However, inappropriate use can lead to unnecessary downstream testing from "false alarms," which in turn affects clinician efficiency and increases health care costs without benefiting patients. For these reasons, the Society of Hospital Medicine's Choosing Wisely campaign recommended use of a protocol-driven discontinuation of telemetry. The American Heart Association (AHA) developed a set of Practice Standards for the appropriate use of telemetry monitoring in 2004, which they updated in 2017. Unfortunately, the AHA Practice Standards have not been widely adopted-with as many as 43%of monitored patients lacking a recommended indication for monitoring. Thus, we created an overview discussing the safety and efficacy of incorporating the AHA Practice Standards and a review of studies highlighting their successful incorporation within patient care workflow. We conclude by outlining an "implementation blueprint" for health system professionals and administrators seeking to change their institution's culture of telemetry use. As the health care landscape continues to shift, enacting high-value initiatives that improve patient safety and efficiency of care will be critical.

Original languageEnglish (US)
Pages (from-to)971-978
Number of pages8
JournalJAMA internal medicine
Volume178
Issue number7
DOIs
StatePublished - Jul 2018

ASJC Scopus subject areas

  • Internal Medicine

Fingerprint Dive into the research topics of 'Eliminating inappropriate telemetry monitoring: An evidence-based implementation guide'. Together they form a unique fingerprint.

Cite this