Feeds

Transparency a problem for NHS IT

And suppliers still in the dark after five years

Intelligent flash storage arrays

If there was one lesson that should be drawn from the controversial National Programme for IT and applied to other projects it would be a need for transparency, according to the National Audit Office (NAO), which published its enquiry into the £12.4bn NHS modernisation programme on Friday.

NAO assistant auditor general Anna Simons said: "The key lesson is how we engage the staff - how to get them on side."

"Transparency" is what is needed, she said, though the NAO report uses the less loaded term, "clarity".

The first recommendation of the report is that Connecting for Health "should provide greater clarity to organisations and staff in the NHS".

Right on cue, on the day the NAO report was published, but arguably three years late, health minister Lord Warner admitted he had started telling NHS staff, "we all need to work together".

"We should have worked harder at the beginning at staff engagement," he said.

This is not news for the programme, however. Secrecy has been a deliberate ploy designed to get the system railroaded against all the known principles of good systems engineering.

The roots of troublesome IT systems are usually stuffed precariously in shallow soil because of a lack of transparency and consultation - not just with users and administrators, but suppliers as well. This is because computer systems are one element of a programme of organisational change. Change requires the co-operation of the plebs, who are only too willing if they are not treated like plebs; and an open relationship with the designers for obvious reasons.

Yet Connecting for Health is still trying to justify its secrecy, even as it admits it was wrong. "If you tell people too much too early, they get their hopes up," said Professor Mike Pringle, a clinical wonk for Connecting for Health.

But the programme has broken its promise to open to scrutiny before. IT suppliers were told in 2003, after two years of living in the dark, that the programme was ready to include them. This was important not only because their livelihoods were threatened by the programme, but because they knew more than anyone else what there was to know about NHS IT. The programme told suppliers it recognised this and had learned to value transparency.

This spring, however, suppliers were being given the same reassurances again, after another three years pulling their hair out without a clue what was going on. They are as hopeful that things have changed now as they were in 2003, which is naively so.

Looking back, suppliers think the programme directors had no idea what was going on either. They where making it up on the hoof. Not the best way to run a multi-billion pound IT project. But there was a political timetable to meet and political reputations to maintain.

There are a few suppliers who have been let into the programme's inner sanctum, but they are contractually bound to the utmost secrecy. So they all toe the party line.

Suppliers consequently survive on a diet of "misinformation and gossip" they can scrape from between whatever official line they are told, said one prominent health IT provider. Suppliers can't talk openly about the programme for fear of having their livelihoods taken away, so there is no healthy debate.

"Suppliers try to help themselves by sharing information. In the absence of formal information that's all we can do," said the source.

There are those who argue for public scrutiny as well, and not just opposition politicians. Last month's Accounting, Auditing and Accountability Journal published a paper that described how the Australians came to ban secrecy from public projects because they discovered it encouraged waste, inefficiency, mistakes and corruption.

As expected, the NAO has found that the NHS project, late and over budget as it is, has proved a lesson in how not to run an IT project. Yet it only considered this key failing from the perspective of the users. Granted consultation with the users is more likely to "increases the likelihood of a successful implementation", but so is wider transparency.

That does not bode well for another risky project, ID cards, which has secrecy written into its parliamentary bill. ®

Internet Security Threat Report 2014

More from The Register

next story
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Yes, yes, Steve Jobs. Look what I'VE done for you lately – Tim Cook
New iPhone biz baron points to Apple's (his) greatest successes
Lords take revenge on REVENGE PORN publishers
Jilted Johns and Jennies with busy fingers face two years inside
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots
We know what the Doctor does, stop going on about it already
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.