Feeds

NHS IT cost doubled to £12.4bn

'But it's not over budget'

SANS - Survey on application security programs

The £6.2bn National Programme for IT will henceforward be known as the £12.4bn National Programme for IT, after a long-awaited National Audit Office report into the ambitious NHS IT scheme revealed the full extent of its costs to date.

But the Department of Health always knew it was going to cost as much as £12.5bn, it said today, even in those days when it said the programme was going to cost half as much.

Moreover, it insisted today, that the doubled price tag did not mean that the Programme has gone over-budget.

Speaking at the launch of the NAO report this morning, Chris Shapcott, director of health value for money studies, said there were "appraisals" done by the Department of Health "prior to the contracts being let" to the major suppliers in 2003.

These were documented and accounted for the £12.4bn cost of the programme that the Department's IT body, Connecting for Health, has now been forced to admit by the publication of the NAO report.

"They always recognised there would be more spending," he said.

Health minister Lord Warner said that the Programme, "despite what some people say, is on budget."

"The NAO has confirmed the cost has not overrun," he said. And anyway, the costs were not important.

"We need to talk more about the benefits. In the long term this project will pay for itself," he added.

The vastly inadequate cost estimates touted by Connecting for Health since the inception of the programme (once £2.3bn) have been ridiculed by independent scrutiny before. It had forced the Programme to admit that its £6.2bn cost estimate did not include the cost of implementing the systems, only developing them.

The same story was given again today by Richard Granger, boss of Connecting for Health, with some elaboration. It is normal in the IT industry, he claimed, for people to disregard the cost of implementing a system when estimating its price. It must be a little like budgeting for the cost of a new house, but only accounting for the land and materials - the cost of the builders is irrelevant, apparently.®

3 Big data security analytics techniques

More from The Register

next story
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.