Volume 10 - Issue 4 - April 2002

To help you better implement a system to protect sensitive patient information, last month I discussed ways that you can secure the information on your computers from outside influences. This month, I'll focus on steps you can take to protect sensitive patient information from being accessed by unauthorized personnel inside your practice. These actions include limiting network permissions, developing a password protection and log-in policy and limiting remote access. I'll also cover points to consider when evaluating your current operating system.   NETWORK PERMISSIONS Once t