How Inefficient Communications Technologies Cost U.S. Hospitals $8.3 Billion Annually

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Previous Next

Click through for an economic and productivity impact survey focused on IT security in the health care industry, conducted by Imprivata and the Ponemon Institute.

The transition from paper-based to electronic medical records continues to create challenges for the health care industry. While the implementation of new technologies is designed to improve efficiency and enhance patient care, it also has the potential to introduce risk. IT departments must ensure that these new systems meet security and regulatory compliance requirements to keep private information protected.

In practice, security, compliance and privacy requirements often create barriers to technology adoption, which sacrifices convenience and productivity, frustrates caregivers and, ultimately, detracts from patient care. For instance, clinicians are typically prohibited from using smartphones, text messaging and other modern forms of communication due to the perceived security risks. As a result, the use of pagers and other outmoded technologies continues as the status quo.

To quantify the economic and productivity impact of the continued use of outdated communication technologies in health care, the Ponemon Institute and health care IT security company Imprivata recently surveyed 577 health care professionals for a report titled “The Economic and Productivity Impact of IT Security on Healthcare.” Overwhelmingly, respondents agreed that communications tools currently in use decrease productivity, increase patient discharge time and limit the time doctors have to spend with patients, collectively costing U.S. hospitals more than $8.3 billion annually. Dr. Sean Kelly, chief medical officer at Imprivata and physician at Beth Israel Deaconess Medical Center in Boston, dissects the key findings of the Ponemon study and why U.S. hospitals are continuing to lose billions every year.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security117-190x128.jpg 5 Steps to Protect Executives from a Whale-Phishing Attack

Whaling is a type of spearphishing targeting "big fish" in an organization with access to sensitive, highly-valuable information. ...  More >>

Security116-190x128.jpg 5 Common Failures Companies Make Regarding Data Breaches

Five common failures companies make when preparing for, and responding to, a data breach, as well as guidance for companies on how they can tackle these issues. ...  More >>

Security115-290x195 Data-Centric Approach Starves Data-Hungry Cybercriminals

Incorporating security capabilities such as encryption, better control and management and a data security framework will help alleviate the burden breaches place on the organization and people's lives. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.