Introduction
The security threats in computers affect almost every organization and company. Hospitals have been affected by these security threats in one way or another for several years. The information about a given hospital or healthcare unit is crucial and should be protected at all costs. For instance, the information about all the patients and staff in a given hospital should not be accessed by the unauthorized individuals since when this takes place; the medical ethical standards are violated. Therefore, as a software developer, I came up with a unique information system security plan to be used in every health unit or hospital and as a result, ensure that the information in all these hospitals is protected.
Electronic Medical Software Security Plan is an exceptional invention whose objective is essentially to improve the protection of the information technology in our hospitals. All the information systems in our hospitals have certain level of sensitivity hence this invention is efficient in protecting these systems. The above security system uses SRU network system to pass information between mainframe system and hospital staff using the 3270 computer emulation on the personal computers (Maiwald 2001).
The other unique feature of this invention is that it is essentially protected by a firewall. The hardware requirement is that it is a must for the users to log onto this network prior to using the CICS system. The other requirement is that all the computers must be kept safe. In terms of encryption, the web staff registration systems make use of the encryption while communicating with the hospital staffs and patients over the internet (Vacca 2009). The training needed is not complicated since users manuals are provided free of charge when you buy this Electronic Medical Software Security Plan. In addition, there is an online tutorial provided once you access this invention. This invention is also cost effective since the price charged is pocket friendly.
The benefits of Electronic Medical Software Security Plan to health information system and patients cannot be underestimated. Starting with the health information systems, the advantage is that this invention offers the required security hence unauthorized parties will not access health information. The health information about the patients is safe when using this invention hence this will ensure that information about their health is not accessed by unauthorized individuals.
References
Maiwald, E. (2001). Network security: A beginner's guide. New York, N.Y: Osborne/McGraw-Hill.
Vacca, J. R. (2009). Computer and information security handbook. Amsterdam: Elsevier