Feeds

Tories would decentralise NHS IT

Want patient confidence and reined-in data

Secure remote control for conventional and virtual desktops

An incoming Conservative government would decentralise health service computing and extend competition between suppliers, according to a plan released at its party conference.

The party's NHS Improvement Plan, released on 29 September 2008 by shadow health secretary Andrew Lansley, says the party will replace "Labour's centrally determined and unresponsive national IT system".

Instead, a Tory government would "extend competition between suppliers, relate standards to user need, and ensure that healthcare providers take real ownership of their IT".

The document says that "a 21st century health service" is unimaginable without IT-supported facilities such as digital imaging, online appointment services and electronic patient records. It also praises public availability on the performance of NHS services.

But it adds: "The key is for technology to serve clinicians, not the other way around; and for patients to have confidence and more control over their data."

The document offers no detail, instead referring to the party's independent review of NHS IT, which it commissioned in August from a British Computer Society team chaired by Dr Glyn Hayes.

This article was originally published at Kablenet.

Kablenet's GC weekly is a free email newsletter covering the latest news and analysis of public sector technology. To register click here.

Beginner's guide to SSL certificates

More from The Register

next story
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.