How Inefficient Communications Technologies Cost U.S. Hospitals $8.3 Billion Annually

Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Previous Next

Click through for an economic and productivity impact survey focused on IT security in the health care industry, conducted by Imprivata and the Ponemon Institute.

The transition from paper-based to electronic medical records continues to create challenges for the health care industry. While the implementation of new technologies is designed to improve efficiency and enhance patient care, it also has the potential to introduce risk. IT departments must ensure that these new systems meet security and regulatory compliance requirements to keep private information protected.

In practice, security, compliance and privacy requirements often create barriers to technology adoption, which sacrifices convenience and productivity, frustrates caregivers and, ultimately, detracts from patient care. For instance, clinicians are typically prohibited from using smartphones, text messaging and other modern forms of communication due to the perceived security risks. As a result, the use of pagers and other outmoded technologies continues as the status quo.

To quantify the economic and productivity impact of the continued use of outdated communication technologies in health care, the Ponemon Institute and health care IT security company Imprivata recently surveyed 577 health care professionals for a report titled “The Economic and Productivity Impact of IT Security on Healthcare.” Overwhelmingly, respondents agreed that communications tools currently in use decrease productivity, increase patient discharge time and limit the time doctors have to spend with patients, collectively costing U.S. hospitals more than $8.3 billion annually. Dr. Sean Kelly, chief medical officer at Imprivata and physician at Beth Israel Deaconess Medical Center in Boston, dissects the key findings of the Ponemon study and why U.S. hospitals are continuing to lose billions every year.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

UtimacoEVMTokenization0x What's Next After the EMV Migration? Tokenization

Security controls need to be put in place to protect cardholders' confidential information all the way through the transaction process. ...  More >>

ZixCorpDataLeaks0x Top Data Leak Vulnerabilities and How to Secure Them

All companies have sensitive data that is vulnerable to theft, and hackers will continue to explore new ways to profit off of valuable data. ...  More >>

SysAidIoTSecurity0x Beware the Hidden Dangers of the Internet of Things

It finally feels as though we're about to hit the point of no return with IoT. IT departments must now consider and address the security implications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date