Download - Hi security in telemedicine
![Page 1: Hi security in telemedicine](https://reader037.vdocument.in/reader037/viewer/2022110120/55865122d8b42a32698b458d/html5/thumbnails/1.jpg)
Security in Telemedicine
![Page 2: Hi security in telemedicine](https://reader037.vdocument.in/reader037/viewer/2022110120/55865122d8b42a32698b458d/html5/thumbnails/2.jpg)
Objectives
Define what is telemedicine
What are the security used in Telemedicine
Recommendations
![Page 3: Hi security in telemedicine](https://reader037.vdocument.in/reader037/viewer/2022110120/55865122d8b42a32698b458d/html5/thumbnails/3.jpg)
Telemedicine
"use of telecommunications medical informatics to provide delivered health care services"
![Page 4: Hi security in telemedicine](https://reader037.vdocument.in/reader037/viewer/2022110120/55865122d8b42a32698b458d/html5/thumbnails/4.jpg)
Security in Telemedicine
Authentication
Transport Security
Authorization
Access Control
Auditing
Physical Security
![Page 5: Hi security in telemedicine](https://reader037.vdocument.in/reader037/viewer/2022110120/55865122d8b42a32698b458d/html5/thumbnails/5.jpg)
Authentication
UserID and Password
PKI Certificate
SecurId Token
![Page 6: Hi security in telemedicine](https://reader037.vdocument.in/reader037/viewer/2022110120/55865122d8b42a32698b458d/html5/thumbnails/6.jpg)
Transport SecuritySSL Encryption
Virtual private network
Symmetric key Encryption by App
Dedicated land line connection
Intranet Only connection
![Page 7: Hi security in telemedicine](https://reader037.vdocument.in/reader037/viewer/2022110120/55865122d8b42a32698b458d/html5/thumbnails/7.jpg)
AuthorizationCreation of Authorization levels depending on the identified criteria such as role of provider
![Page 8: Hi security in telemedicine](https://reader037.vdocument.in/reader037/viewer/2022110120/55865122d8b42a32698b458d/html5/thumbnails/8.jpg)
Access control
Full access
Limited access
![Page 9: Hi security in telemedicine](https://reader037.vdocument.in/reader037/viewer/2022110120/55865122d8b42a32698b458d/html5/thumbnails/9.jpg)
AuditingAudit logs for
inappropriate access through capturing
User
IP address
Patient
Data typ
Access type
Timeof access
![Page 10: Hi security in telemedicine](https://reader037.vdocument.in/reader037/viewer/2022110120/55865122d8b42a32698b458d/html5/thumbnails/10.jpg)
Physical Security24 hr staffing of computer facility with biometric locks
Units has no floppy, CD, USB
No installation of unauthorized software
![Page 11: Hi security in telemedicine](https://reader037.vdocument.in/reader037/viewer/2022110120/55865122d8b42a32698b458d/html5/thumbnails/11.jpg)
Recommendation Multiple security solutions should be tailored accordingly to different group of users
Security should not be sophisticated and must be user-friendly
Remember that computer security is never absolute and will continue to evolve.
![Page 12: Hi security in telemedicine](https://reader037.vdocument.in/reader037/viewer/2022110120/55865122d8b42a32698b458d/html5/thumbnails/12.jpg)
“Thank you”