RESUMO
We've touched on many aspects of IT security in this overview. The most important thing to remember is that security starts with the user. Keeping your password safe and difficult to decipher is a good start. Awareness of social engineering techniques is another easy way to apply security measure. This means not only being very skeptical of anyone asking for your logon credentials but also for things such as if you know the password to the patient monitoring system or any other place where patient data is stored. There are many references available at your local bookstore or on the web about social engineering and all the security topics discussed in this installment of IT World. Our recommended resources are listed in the bibliography sidebar.
Assuntos
Segurança Computacional/normas , Sistemas de Informação Hospitalar , Sistemas Computadorizados de Registros Médicos , Medidas de Segurança , Segurança Computacional/classificação , Dicionários como Assunto , Humanos , Armazenamento e Recuperação da Informação , Medidas de Segurança/classificação , Estados Unidos , Interface Usuário-ComputadorRESUMO
The DICOM committee added the section "Security Profiles" to the DICOM standard, in order to provide the opportunity of safe communication between health care system partners. Data complying with the DICOM standard--e.g. pictures, signals or reports of examinations can be provided with one or more digital signatures. Attention should be paid to the fact that these possibilities of the DICOM standard are available or can be supplied subsequently by new acquisitions of radiological modalities. The required information to check these prerequisites are given.
Assuntos
Segurança Computacional , Sistemas Computadorizados de Registros Médicos , Sistemas de Informação em Radiologia , Algoritmos , Redes de Comunicação de Computadores/normas , Segurança Computacional/classificação , Segurança Computacional/normas , Humanos , Armazenamento e Recuperação da Informação/classificação , Armazenamento e Recuperação da Informação/normas , SoftwareRESUMO
In the wake of the Internet, E-commerce, and particularly the Health Insurance Portability and Accountability Act, data security has risen to the top of health care information technology priorities. What is the correct mix of data security tools, policies, and technologies for the doctor, the hospital, the insurer, the vendor, and everyone else who does business in the health care industry?
Assuntos
Segurança Computacional/classificação , Setor de Assistência à Saúde/organização & administração , Gestão da Informação/organização & administração , Medidas de Segurança/classificação , Biometria , Sistemas Computacionais , Health Insurance Portability and Accountability Act , Estados UnidosRESUMO
Dental office computers are increasingly used to store critical financial and clinical data. That data is subject to loss or alteration from a number of possible sources. Secure communications, security of the computer system from outside attacks, and data back-up are discussed.