Difference between revisions of "System Security"

From Clinfowiki
Jump to: navigation, search
 
(One intermediate revision by one user not shown)
Line 1: Line 1:
'''Proxy Access'''- allows patients to give others access to their EHR and e-messaging, on their behalf. Proxy access is common among pedi areas. Pediatric Proxy access provides parents and minor children joint access to the child's EHR and e-messaging capabilities. This is potential to engage the child more effectively in self-care of chronic diseases, such as asthma and obesity. It also gives parents the convenience of (for example) printing their child's immunization record rather than having to make a trip to the doctor's office to get a copy. <ref name="Proxy Access"> James M. Walker, Eric J. Bieber, Frank Richards. Implementing an Electronic Health Record System. Springer Science & Business Media, Jun 28, 2006 - Medical, p.158 Part 3. Retrieved from https://books.google.com/books?id=oyBV-f9ZnMUC&pg=PA158&lpg=PA158&dq=ehr+proxy+access+definition&source=bl&ots=L9bXzFca0h&sig=_3csuUcnA0ex0ZeckTpgkUr7rGM&hl=en&sa=X&ei=q1olVeXLFILjsAXzyYGgBw&ved=0CEcQ6AEwBg#v=onepage&q=ehr%20proxy%20access%20definition&f=false</ref>
+
'''System Security'''- The totality of safeguards including hardware, software, personnel policies, information practice policies, disaster preparedness, and oversight of these components.
 
+
 +
Security protects both the system and the information contained within from unauthorized access from without and from misuse from within.
 +
 +
Security enables the entity or system to protect the confidential information it stores from unauthorized access, disclosure, or misuse, thereby protecting the privacy of the individuals who are the subjects of the stored information.<ref name="System Security">Suzy A. Buckovich , Helga E. Rippen , Michael J. Rozen. Driving Toward Guiding Principles A Goal for Privacy, Confidentiality, and Security of Health Information. Journal of the American Medical Informatics Association Mar 1999, 6 (2) 122-133; DOI: 10.1136/jamia.1999.0060122 Retrieved from http://jamia.oxfordjournals.org/content/6/2/122</ref>
  
 
== References ==
 
== References ==
 +
<references/>
 +
 +
== Second Review ==
 +
 +
The National Institute of Standards and Technology (NIST), the federal agency responsible for developing information security guidelines, defines information security as the preservation of data confidentiality, integrity, availability, which is commonly referred to as the “CIA” triad.
 +
<ref name ="Laurinda 2012"> Laurinda, 2012. AMA Journal of ethics. September 2012, Volume 14, Number 9: 712-719. http://journalofethics.ama-assn.org/2012/09/stas1-1209.html</ref>
 +
 +
== Reference ==
 +
 
<references/>
 
<references/>

Latest revision as of 10:09, 20 November 2015

System Security- The totality of safeguards including hardware, software, personnel policies, information practice policies, disaster preparedness, and oversight of these components.

Security protects both the system and the information contained within from unauthorized access from without and from misuse from within.

Security enables the entity or system to protect the confidential information it stores from unauthorized access, disclosure, or misuse, thereby protecting the privacy of the individuals who are the subjects of the stored information.[1]

References

  1. Suzy A. Buckovich , Helga E. Rippen , Michael J. Rozen. Driving Toward Guiding Principles A Goal for Privacy, Confidentiality, and Security of Health Information. Journal of the American Medical Informatics Association Mar 1999, 6 (2) 122-133; DOI: 10.1136/jamia.1999.0060122 Retrieved from http://jamia.oxfordjournals.org/content/6/2/122

Second Review

The National Institute of Standards and Technology (NIST), the federal agency responsible for developing information security guidelines, defines information security as the preservation of data confidentiality, integrity, availability, which is commonly referred to as the “CIA” triad. [1]

Reference

  1. Laurinda, 2012. AMA Journal of ethics. September 2012, Volume 14, Number 9: 712-719. http://journalofethics.ama-assn.org/2012/09/stas1-1209.html