5 concepts of security telemedicine

8
FRANCES MARIELLE M. OLIVA, RN 5 CONCEPTS OF SECURITY TELEMEDICINE

Transcript of 5 concepts of security telemedicine

Page 1: 5 concepts of security telemedicine

F RA N C E S M A R I E L L E M . O L I VA , R N

5 CONCEPTS OF SECURITY TELEMEDICINE

Page 2: 5 concepts of security telemedicine

SECURITY

• Is the degree of resistance to, or protection from harm.

Page 3: 5 concepts of security telemedicine

AUTHENTICATION

• Verifying the identity of the user or service• Involves trusting both

the authentication information and computer it is coming from• Verification is through:

User ID and PasswordFiltering of IP addressTokens and many more

Page 4: 5 concepts of security telemedicine

TRANSPORT SECURITY (ENCRYPTION)

• Process of encoding messages (or information) in such a way that only authorized parties can read it.• Keeps data safe and

confidential even if unauthorized access occurs.

Page 5: 5 concepts of security telemedicine

AUTHORIZATION

• Process of verifying if the user has rights/permission to access.

• It promotes hierarchy at how much a person can access at a given level.Ex. Patients are only

permitted to view their laboratory results but they are not permitted to view the Doctor’s notes.

Page 6: 5 concepts of security telemedicine

ACCESS CONTROL

• Users are granted access and certain privileges to the information or data.• Privileges to:

Read dataEdit dataDelete dataAdd data

Page 7: 5 concepts of security telemedicine

AUDIT CONTROL

• Logs or records of computer access.

• It is done to identify inappropriate or unauthorized access

• Recorded information include:User IP AddressPatientData TypeAccess TypeType of Access

Page 8: 5 concepts of security telemedicine

PHYSICAL SECURITY

• Addresses actions you can take to protect the data from intruders by: Housing all servers

containing valuable data in a main computer facility.

Staff should be present 24 hours per day,

Must be secured with biometric access controlled devices,

Installation of unauthorized software is prohibited.