Monday, January 21, 2008

Shouldn't every organization implement this type of software? How else can we achieve mind control?

http://www.nursezone.com/stories/SpotlightOnNurses.asp?articleID=17352

Hospitals Scan Email to Protect Patient Privacy

By Debra Wood, RN, contributor Monday • January 21 • 2008

Every time Jamie Ray, RN, IBCLC, or her colleagues at Georgia’s DeKalb Medical Center send an e-mail, it passes through a software filter that checks to ensure no patient sensitive medical information is released.

... DeKalb began using the Proofpoint Messaging Security Gateway about three years ago. It blocks nearly 500,000 inbound spam messages each month and 2,000 outbound e-mails.

... The Proofpoint Regulatory Compliance module looks for patient account numbers, credit card numbers, names, and diagnosis and procedure codes, using a series of dictionaries, databases and rules pertaining to a configuration of numbers.

... At Lincoln, certain users are allowed to send patients’ medical information to approved physicians or clinics. The system encrypts the data. If Proofpoint picks up something being sent from DeKalb to an approved third-part vendor, it automatically encrypts the message and dispatches it. Otherwise, it directs the email into an audit category and notifies the security administrator, who will review the message and any attachments.

It also produces a report showing how many messages violated the rules. Lincoln has set up the system to identify the department the e-mail came from. The head of that department receives a report showing violations from its employees and a copy of the suspect e-mail.

... Finney said physicians and nurses find Proofpoint gives them a comfort level.

“With HIPAA (Health Insurance Portability and Accountability Act), it is so convoluted and sometimes difficult to understand that you can accidentally do something and not realize you have done it,” Ray said. “This gives you a feeling of security that I cannot mess it up. Somebody is taking care of that for me. As long as you are doing what you are supposed to be doing, you don’t need to worry about [software safeguards].” [If you are innocent... Bob]

No comments: