February 2011: SOA for HIX Business Intelligence Technologies India Announces SOA(Service Oriented Architecture) for Health Information Xchange November 2009: MOU with KSPHC Business Intelligence Technologies India has signed an MOU with Karnataka State Police Housing Corporation (KSPHC) to roll-out Web Based Project Management and Monitoring System at Bruhat Bengaluru Mahanagara Palike (BBMP) May 2009: DSIR Certification Business Intelligence Technologies Pvt. Ltd. In-house R&D unit is now recognized by Department of Scientific & Industrial Research under Ministry of Science & Technology, Government of India Feb 2009: Integrated PMS BIT to distribute & support 3iCare PMS, a comprehensive, IHE certified PMS integrated with PACS. Jan 1 2009: OSDD - BIT CSIR-OSDD (Open Source Drug Discovery) student projects available at BIT's in-house R&D centre at Bangalore. Jan 1 2009: Bio-Suite Reseller BIT to distribute & support Bio-Suite, a Comprehensive, Integrated, Modular package of analytical tools for Computational Biology. Dec 18 2008: CSIR-OSDD (Open Source Drug Discovery) certified student projects available at BIT's in-house R&D centre at Bangalore. Nov 12-15 2008: Austrade Microsoft Healthcare Mission – Seattle, USA 15th May 2008: "Intelligent Document Management " (IDM) BIT announces solution for handling unstructured data. These are aimed at increasing data points within corporate dataset and enables mining of this data 17thApril, 2008: ICT Expo, Hong Kong BIT attends ICT Expo at Hong Kong as part of Victorian Delegation. 10thOctober, 2007: BIT attends CeBIT@ Shanghai New International Expo Centre (SNIEC),Shanghai,Asia 2007 International Trade Fair for Information Technology, Telecommunications, Software & Services for China and the Asian/Pacific Region.

The Risks and Benefits of Electronic Health Records – Risks and Benefits

As technology rapidly advances, there is a greater need to provide reliable data and greater accessibility of patient information across healthcare facilities.  This upward mobility in technology will ultimately increase the efficacy of intrinsic activity related to pharmacology, surgical procedures, new medical devices, and finally public health information as it relates to accessing medical data that will save a life or track medical data in a patient overtime.  Although the use of health information systems is on the rise, theoretically, the benefits may outweigh or in a sense balance the risks associated with electronic health information across the board.  This article will briefly analyze the risks and potential benefits of systematic collection of health care data.

Synchronization, Accessibility and Reliability

The benefits of implementing health information systems go well beyond the scope of this article. Collecting data will allow healthcare facilities to synchronize and archive health information overtime.  To be more specific, this system of health information exchange will create greater collaboration and health care cooperation. Additionally, this digital and social framework will allow doctors to track patient care, set up reminders for prescription renewals, and allow doctors to share information. There are many other benefits not mentioned here.

Health Information Systems can be easily accessed and this creates greater reliability within the system. If data is captured correctly, patient history is condensed into an electronic database. This eliminates the need to manually order patient data from various healthcare facilities.  The system also helps the healthcare firm verify and update information as it relates to patient care.

Privacy, Confidentiality & Costs

Privacy, confidentiality and costs should be evaluated in order to determine how these factors will affect how information is used. First, protecting the patient’s information is of major concern due to foreseen challenges such as: transfer of unauthorized information to unauthorized personnel, how data can be used or analyzed in scientific research, and protecting the privacy rights of the patient. These are the challenges that healthcare facilities (who implement health information technology) will face.  According to the National Research Council (2009): Health facilities should safeguard security of health data by using better encryption technology, alert patients when data has been breached, use data security experts, and use multiple security protection techniques to eradicate vulnerability within the system.

Change is Constant

As a final point, in correlation to health care information technology or systems, change is constant. Patient information may constantly change and require continuous updates.  Ultimately, human error will also play a larger role in accuracy, reliability and costs associated with duplication, and error (malpractice).  As technology takes on a life of its own, facilities must be able to adapt and grow in order to meet patient’s needs. How do we keep up? How do we adapt to the needs of patients without physically or psychologically harming them. Will the benefits outweigh the risks?  Factoring and weighing cost benefit is one way to determine how to change. However, there is one thing that is certain – change is constant. In dealing with issues associated with health IT. Change is necessary in order to protect the patient, health information, scientific research, and finally the facilities that control the information.




National Research Council. Beyond the HIPAA Privacy Rule: Enhancing Privacy, Improving Health Through Research. Washington, DC: The National Academies Press, 2009.


Raghu Iyer, MBA is a serial entrepreneur and ICT professional with interests in Business Intelligence, BigData, Analytics, Healthcare and Internet / Social Media applications to bring real value to users / customers.


Leave a comment

Want to express your opinion?
Leave a reply!

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>