{"title":"Cloud computing – Securing patient data","authors":"D. Amos","doi":"10.4103/digm.digm_20_19","DOIUrl":null,"url":null,"abstract":"96 *Address for correspondence: Mr. David Charles Amos, 780 Melton Road, Thurmaston, Leicester, LE4 8BD, United Kingdom. E‐mail: david.amos.uk@gmail.com to be able to share access to that data with roles outside of the hospital environment. External roles may be approved third parties involved in patient support at home – allowing patients to be discharged as early as possible, thereby making a ward bed available for another patient. Providing external access to legacy systems is particularly difficult due to the fact they are unlikely to be compatible with mobile devices and ring-fenced behind many layers of IT security for protection. To resolve this dilemma, the application needs to be redesigned and rebuilt as a cloud computing service so that the use of the application and the data held therein may then be shared by those approved to have access. A fundamental element of the new application design is that it should provide access via a standard browser so that any mobile device may operate with the system. Here is where the need for a new model of security becomes the key.","PeriodicalId":72818,"journal":{"name":"Digital medicine","volume":"5 1","pages":"96 - 99"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Digital medicine","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4103/digm.digm_20_19","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
96 *Address for correspondence: Mr. David Charles Amos, 780 Melton Road, Thurmaston, Leicester, LE4 8BD, United Kingdom. E‐mail: david.amos.uk@gmail.com to be able to share access to that data with roles outside of the hospital environment. External roles may be approved third parties involved in patient support at home – allowing patients to be discharged as early as possible, thereby making a ward bed available for another patient. Providing external access to legacy systems is particularly difficult due to the fact they are unlikely to be compatible with mobile devices and ring-fenced behind many layers of IT security for protection. To resolve this dilemma, the application needs to be redesigned and rebuilt as a cloud computing service so that the use of the application and the data held therein may then be shared by those approved to have access. A fundamental element of the new application design is that it should provide access via a standard browser so that any mobile device may operate with the system. Here is where the need for a new model of security becomes the key.