Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Upcoming SlideShare
Hayley McCarthy LO1
Next
Download to read offline and view in fullscreen.

2

Share

Download to read offline

Telemedicine

Download to read offline

Related Books

Free with a 30 day trial from Scribd

See all

Related Audiobooks

Free with a 30 day trial from Scribd

See all

Telemedicine

  1. 1. Telemedicine Protecting patient’s security by: Noemi
  2. 2. what is telemedicine  -it is the use of telecommunication and medical informatics to provide electronically delivered health care services.
  3. 3. What is home telemedicine  It involves communication between healthcare providers and patients in their home.
  4. 4. approaches of home-based telemedicine
  5. 5. SECURITY CONCEPTS OF HOME TELEMEDICINE  1. Authentication  2. Transport Security  3. Authorization  4. Access Control  5.Auditing  6. Physical Security
  6. 6. Authentication USER ID AND PASSWORD
  7. 7. Transport Security IP ADDRESS VIDEO CALL VITAL SIGNS / BLOOD SUGAR READING
  8. 8. Authorization 1. Patient has an existing relationship to CPMC. 2. Patient’s primary doctor was credentialed. 3.Patient’s NCM was an employee.
  9. 9. Access control The system supports access controls by patient, patient list, patient class and data type. Patient can be flagged as “VIP” which is done for celebrities and employees.
  10. 10. Auditing Audit logs of computer access to clinical data. Record information includes ; User, IP address, patient, data type, access type and time of access.
  11. 11. Physical Security All servers containing clinical and evaluation data are housed in the main computer facility. It is physically secured with biometric access controlled locks.
  12. 12. Computer security is never absolute. It is always a matter of relative risk and relative benefit. As clinical computing continues to move out of the hospital and into the home, security solution will need to continue to evolve.
  • MamathaRaghava

    Jan. 28, 2018
  • wholx

    Feb. 15, 2015

Views

Total views

957

On Slideshare

0

From embeds

0

Number of embeds

2

Actions

Downloads

53

Shares

0

Comments

0

Likes

2

×