How Inefficient Communications Technologies Cost U.S. Hospitals $8.3 Billion Annually

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Previous Next

Click through for an economic and productivity impact survey focused on IT security in the health care industry, conducted by Imprivata and the Ponemon Institute.

The transition from paper-based to electronic medical records continues to create challenges for the health care industry. While the implementation of new technologies is designed to improve efficiency and enhance patient care, it also has the potential to introduce risk. IT departments must ensure that these new systems meet security and regulatory compliance requirements to keep private information protected.

In practice, security, compliance and privacy requirements often create barriers to technology adoption, which sacrifices convenience and productivity, frustrates caregivers and, ultimately, detracts from patient care. For instance, clinicians are typically prohibited from using smartphones, text messaging and other modern forms of communication due to the perceived security risks. As a result, the use of pagers and other outmoded technologies continues as the status quo.

To quantify the economic and productivity impact of the continued use of outdated communication technologies in health care, the Ponemon Institute and health care IT security company Imprivata recently surveyed 577 health care professionals for a report titled “The Economic and Productivity Impact of IT Security on Healthcare.” Overwhelmingly, respondents agreed that communications tools currently in use decrease productivity, increase patient discharge time and limit the time doctors have to spend with patients, collectively costing U.S. hospitals more than $8.3 billion annually. Dr. Sean Kelly, chief medical officer at Imprivata and physician at Beth Israel Deaconess Medical Center in Boston, dissects the key findings of the Ponemon study and why U.S. hospitals are continuing to lose billions every year.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

BitSightProactiveRiskMgmt0x 5 Steps for Proactive Cyber Risk Management

Companies need to be more proactive and take steps to reduce their cybersecurity risks, as well as establish procedures should a breach occur. ...  More >>

CloudmarkPhishingScams0x Scammers Go Phishing: Business Email Compromise on the Rise

Tips for businesses and individuals on how to combat phishing attacks and prevent identity and tax fraud as financial losses. ...  More >>

SupplyChain1-290x195.jpg Security Risks in the Supply Chain

While the use of IoT technology enables retailers to better track their products from production through delivery in the supply chain, it also introduces a variety of security and data risks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.