PHIA: Difference between revisions

mNo edit summary
TOstryzniuk (talk | contribs)
mNo edit summary
Line 6: Line 6:
There are several security measures in place. First, a [[PDA password | strong password on the PDA]] that uses capitals, numbers and at least 7 digits.  <!--To enhance this security users are advised to not communicate this password and to frequently change it. --> The next layer of security is at the HanDBase program level.  Of the data collected on each patient any patient identifiers have been encrypted. This encryption extends to the backup files on the computer used for synchronization.  
There are several security measures in place. First, a [[PDA password | strong password on the PDA]] that uses capitals, numbers and at least 7 digits.  <!--To enhance this security users are advised to not communicate this password and to frequently change it. --> The next layer of security is at the HanDBase program level.  Of the data collected on each patient any patient identifiers have been encrypted. This encryption extends to the backup files on the computer used for synchronization.  


On the computer, the computer itself is password protected, and the Access application is also password protected. The computer used for this is located in a locked office with limited access. The data on the computer is dumped onto a folder on the regional. Only the data collectors of a specific hospital and the data managers have access to this folder.   
On the computer, the computer itself is password protected, and the Access application is also password protected. The computer used for this is located in a locked office with limited access.     The data on the computer is sent to onto a folder on the regional. Only the data collectors of a specific hospital and the data managers have access to this folder.
*NOTE:at the OAKS hospital due to renovations in progress the PDA itself is in a locked cabinet in an office in the Medical Records department itself.   
 


{{Discussion}}
* The computer at 7 Oaks is in a locked office, but the office is accessed by '''many''' other people. There have been attempts by local staff to use the computer. Is this secure? [[User:Ttenbergen|Ttenbergen]] 09:03, 11 June 2008 (CDT)
** Trish, I think due to the location we can probably assume that due diligence has been met at 7 Oaks. It might be worthwhile to discuss with the manager of the geographical area to inform their staff, again, not to touch that computer. Maybe a sign on the top of the monitor would also help. If you concur with this, take out the "locked" part above and we can take out this section. [[User:Ttenbergen|Ttenbergen]] 23:32, 12 March 2009 (CDT)


{{stub}}
{{stub}}
[[Category:IT Instructions]]
[[Category:IT Instructions]]
[[Category: Questions]]
[[Category: Questions_IT]]