Thomas Beale wrote:

> Tim Cook wrote:
> 
>> On Sat, 2004-03-06 at 14:17, Tim Churches wrote:
>>  
>>
>>> In general, caches should be
>>> held on encrypted filesystems, either on-disc or in-memory, with the
>>> keys (or a key to the keys) to the encryption/decryption managed by a
>>> daemon which purges the keys from memory when asked (eg locking the
>>> device) or automatically after a short period of disuse.
>>>   
>>
>>
>> Well, now that would certainly be a secure way to handle caching.  If I
>> were worrying about national secrets. 
>> Do you go to this extreme now (as a manager) when doing your risk
>> assessments?  I am wondering what the total (additional) costs of system
>> design and hardware resources is when these facilities are implemented.
>> I think that in most cases we can reliably depend on locked doors and
>> holding people responsible for protecting data they are entrusted 
>> with. I will agree that security training needs to include this 
>> awareness so
>> that users know how to properly store each of these devices when not in
>> use.
>>
>>  
>>
> A well known study in Harvard medical school (I think) showed that 
> putting the message "Do not inappropriately access patient data - all 
> your accesses are being logged" on clinician screens a few times a day 
> resulted in a drop to near 0 of inappropriate access. No other 
> technology was used
> - thomas

There must be a downside to do that too - discouraging access by those
who have urgent need while being undertrained on the system - it would
sure scare me off  - and that would effectively reduce medic-medic
communication rather than promote it.  Sure security is important
but don't forget it is always compromise [Bruce Schneier].
-
If you have any questions about using this list,
please send a message to d.lloyd at openehr.org

Reply via email to