Health IT Vendors Ponied-Up Political Cash to Both Parties

Join Our Mailing List

The Presidential Election 2012

This November saw healthcare executives pay big campaign money to both political parties.

Health IT vendors, however, upped the ante this election year, paying out some hefty donations of their own. Judith Faulkner, CEO of Epic, and Allscripts CEO Glen Tullman are among this year’s top spenders.



Your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.


Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact:

Our Other Print Books and Related Information Sources:

Health Dictionary Series:

Practice Management:

Physician Financial Planning:

Medical Risk Management:


Physician Advisors:

Product DetailsProduct DetailsProduct Details

Product Details  Product Details

Product Details

3 Responses

  1. 25% of data breach victims become fraud victims
    [Two years ago it was only 10%]

    On April 29 2013, three days after the Department of Homeland Security notified US citizens that Dentrix G5 electronic dental record system was vulnerable to hackers, and five days after Justin Shafer posted a YouTube video showing the step-by-step exploit which attracted Homeland Security’s attention, Clinical Innovation + Technology posted “Case study: Breach increases risk of fraud,” by Beth Walsh.

    Walsh writes:

    A case study examining the 2012 Utah Department of Health (UDH) data breach that compromised the protected health information of 780,000 individuals found a distinct association between healthcare data breaches and fraud.

    The case study, conducted by Pleasanton, Calif.-based Javelin Strategy & Research, found that in 2010, if an individual received a data breach notification, there was more than a one in 10 chance that individual also would be a victim of fraud. In 2012, the correlation jumped to one in four, officials say.

    The UDH data breach was a failure to manage IT assets correctly, and could easily have been avoided with proper systems lifestyle management, basic checklists and risk assessment. The $2 million to $10 million the breach cost the state is small compared to the total fraud cost of $406 million that researchers estimate will come as a result of the breach. Based on research projections, 122,000 cases of fraud will result from this breach, coming with a price tag of more than $3,000 per victim.

    D. Kellus Pruitt DDS


  2. Providers Are Held Accountable … Why Aren’t Technology Vendors?

    Health information technology (HIT) systems are able to track physician actions and measure outcomes down to the individual patient level and allow organizations to closely monitor the quality levels of a given physician.

    So, why can’t these same tools should be able to monitor the performance of the vendors who are there to support these clinicians?

    With patient engagement solutions, for example, vendors claim they can help improve HCAHPS scores, treatment adherence, patient outcomes, and reduce costs, but have no evidence to back it up.

    So, what’s up with quality control?

    Dr. Bostwicki


  3. 2011-2012 Health Information Systems Vendors by Revenue (in Millions)

    McKesson $3,200 $3,195
    Cerner $2,665 $2,200
    Siemens $1,800 $1,700
    Epic $1,500 $120
    AllScripts $1,466 $1,449
    GE Healthcare $850 $900
    Meditech $597 $545
    NetGen $375 $353
    CPSI $183 $174
    HMS $175 $110
    NTT Data $150 $160
    QuadraMed $85 $170
    Healthland $75 $70

    Source: Health Data Management, May 2013


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: