to achieve the improvement of computer network security HIPAA


Image : http://www.flickr.com

secure computer networks are an essential part of the strategy to completely rebuild the national patent HIPAA medical records in electronic format, such as health care, insurance administrators providers can be easily exchanged between agencies. As a result of health facilities able to efficiently manage the documentation process and in a short time with a better service for patients. But today the computer system is vulnerable to hackersand virus attacks that destroy or steal important data. To protect patient health information, there is no network security rules to be followed in order, the organization respect the situation is that to achieve HIPAA.

There are two major sections of HIPAA that relate to security and computer network are:

Administrative measures:

To achieve this HIPAA, requires the provider to identify and protect against the damaging reportsoftware program in the system. bring e-mail infected with the ', worms and trojan viruses, and should be a security system that will stop this invasion. To manage the computer networks without any problems, you must keep a vigil with the installation of any underlying collateral:

used gateway and desktop anti-virus products.
The security gateway must be able to perform deep-packet-entry, inspection, and appropriate Web FilteringNetwork capacity.
signature files, the update for every 30 minutes should be used as the best form of defense against fast-moving worms.
All services and safety subsystem must proactively with IPS (Intrusion Protection System), instead of IDS (Intrusion Detection System). This is necessary in order to protect the network from virus infection.
The firewall should be installed to protect the top-50-known DoS and DDoS attacks. L 'security software should record the number of attacks were made against them and time effectively.

Safety measures:

computer network to reach for a HIPAA information for the organization of health policy or security framework within which the staff of selected software to access the protected programs.

The establishment of security should support a native form of authentication. For Web applications, TransparentAuthentication (TA) should be used so that the user to various security applications need to access does not move, your user name and password each time he or she jumps.
The security system is to support e-content filtering with keywords and regular expressions string functions.
To prevent unauthorized access or intercept patients' health information when they want to travel between the transmitter and receiver, the appropriate encryption techniques are used. L 'PHI to the public transport network encryption should be done loudly and received from authenticated users to decipher the codes should have the necessary.
The security system must be constantly monitored for suspicious or unwanted deviation from standard procedures and report unusual activity immediately to IT managers.
Special security features such as e-mail application content filtering, and digital signatures to be added to the system to prevent transmissionconfidential information to persons not verified.

In the end it is necessary that all companies incorporated in the health field as professionals, insurance companies, transcription services, taxpayers, laboratories, Internet service providers, hospitals and billing services to a chain of trust involved in each patient health information out of each other are strictly confidential. This can be done strictly on a network of computer systemsHIPAA standards to facilitate responsible, secure transmission of health information on the public network.

October 8, 2010. Tags: , , , , . computer network. Leave a comment.

Telemedicine – the improvement of network security to meet HIPAA

Telemedicine is a branch of modern medicine, where patients' health information is exchanged over a great distance, through a series of local and wireless networks. The remote setting of patients, make the exchange of health information with providers of health services, highly vulnerable to ward off enemy attacks.

The HIPAA regulations make it mandatory that all relevant institutions such as hospitals, clinics, compensation, doctors, hospitals and other health servicesproviders use to protect computer network systems, codes of follow strict safety precautions. Failure to part of HIPAA in the healthcare provider, is certainly based on strict regulatory measures in the form of heavy fines and criminal penalties.

The settings of nomadic or remote patients make it a challenging task for health service providers, privacy of patient health to be maintained. A number of wireless local area networks and make the system vulnerable toHacker. attracting more lack of supervision on the proper remote settings of the two hostile penetration, hackers and viruses. To enhance the telemedicine network from unauthorized access, providers of health services should take the network security features in close and are:

All e-mail communications should be encrypted. The email contents are encrypted strings of codes and transmitted over the network. On the receiving side, the encodingThe message is reassembled in its original form, with the help of a key. Even if somebody manages to illegally access during the transfer of the encrypted message does not make sense, the hacker.

Face Detection helps the service provider to uniquely identify the patient on the network, particularly in the case of videoconferencing.

Digital ID cards are made available to patients at a distance of verifying the identity of the authorities. The encryption feature andPatient signature tab authenticates the user and allow them access to e-health.

Access to all point-of-service computers, users must be authenticated to ensure that only authorized persons access to the system.

The computer network will be protected by firewalls and constantly monitored to detect any problems. There should be a control system that will record the time, frequency and type of questionsenemy attacks made through the network.

The security features allow the network to which health professionals to provide patients with quality healthcare services at a distance safely. The health of the patient privacy is protected and this is consistent with HIPAA standards. Telemedicine and EMR can provide healthcare solutions for remote communities to provide individually.

June 7, 2010. Tags: , , , . computer network. Leave a comment.

Design a site like this with WordPress.com
Get started