Skip to main content

Home/ ITGS News/ Group items tagged Government

Rss Feed Group items tagged

Arafat Chowdhury

Outsourcing to India Draws Western Lawyers - 0 views

  •  
    This article is about the outsourcing of lawyers in India as the title says. By "draws western lawyers", its says how the cost has become cheaper for many lawyers to use Indians to do the small tasks that require a lot of time. The Western lawyers can use the Indians to save their own time and money and gain access to a larger work force, however for a certain price. With all these benefits from outsourcing the issue of globalization is involved. Western lawyers are using Indians across the world to get the work done at a lower price. Money is what these firms are tackling but also the efficacy of the work and the experience many Indians have (or the Indians learn through training). Jobs are available to them and this helps the economy of India but not the economy of America. The stakeholders thus are the Indian employees and the Western lawyers.
Yuval S

NAEA Deployed CipherOptics Advanced IPSec Network Encryption Solution - 0 views

  •  
    Cipheroptics give data security and network encryption solutions to security enterprises, financial institutions, health care, and government agencies. NAEA (North American Energy Alliance) utilized Cipheropitics to protect their data, using encryption. Dominick Birolin, the network engineer for NAEA, states that the company was "looking for a solution that could protect our critical cyber assets and meet our unique deployment requirements when we found CipherOptics." They chose this over others because CipherOptics offers security solutions for high performance networks. In addition to that, "the company's wire-speed encryption appliances are able to secure any network without changing the underlying infrastructure or application performance." Encryption works: initially by the business putting the sensitive data in plaintext. Plaintext is the normal, readable digital text. The business, using Cipheroptics, then converts the text into ciphertext. This text is made in a way that it can only be read by someone who has the key to put it back into plaintext and make it readable. The business holds the private key, which enables them to encrypt, and keep private, the data while still managing to access it when necessary.
Elisavet M

Data Security Laws Seem Likely, So Consumers and Businesses Vie to Shape Them - 0 views

  •  
    During 2005, political organizations advocated for strict laws implementing data security enforcement, as rising concerns stemmed out of alarming statistical studies and research, revealing identity theft, credit card frauds and hacking as emerging and terrorizing practices overtaking much of the internet realm. This article introduces the beginning of the rise in public awareness, as technology strongly began to redirect the business world into another more digital phase. It was during that year, the primary stakeholders, also known as the businesses ( participants of e-commerce that stored, verified and utilized private consumer data), vocalized their needs clarifying their desire for the creation of constraints in regards to the consequences or negative implications of passing certain bills (for data security). The past exemplifies the various influences the introduction of data security measures, passed by the government legislatures, had upon newly initiated businesses; among the most significant implications discussed were: the need to build a secure database for reliable storage of clientele digital data with the utilization of particular software as well as improving business organizational structure in order to maximize the rate of security notifications towards consumers based on a foundation of rigid security standards. Far from the adaptation to such implications, the political crisis of establishing solid ground for a new set of security data policies and standards became an overwhelming process for politicians, congress members in conjunction with consumer and data privacy groups that rivaled in attaining the responsibilities of passing the needed laws. The politicians (stakeholders, holding the role of administering governmental legislation to stabilize data security breaches), came into opposition with the concerns of many members of advocacy groups (stakeholders, holding the responsibility of supervising and publicly navigating the direction of th
  •  
    continuation: the adjusted standards enforced by politicians). The problem of adhering to the instruction of newly created laws motioning businesses to appoint data security officers, draft policies, to comply with policies and procedures involving giving access to files in business databases for the Federal Trade Commission to check comes into collision with what most online businesses want to go through the process of doing. However, with the issue of security surfacing future consumer problems, as security breaches become major forces threatening the safe entering of digitally encrypted information (such as credit card codes), many companies become increasingly aware of the needed adherence to the strict security data laws, in order to continue profiting financially in order to keep the rate of consumer trust and payment increasing.
Mohammad A

Tech Companies Push to Digitalize Patients' Records - 0 views

  •  
    This article is regarding the use of Electronic Health Records, and digitalizing medical documents for the "betterment" of the medical staff, and the ease of use that databases provide as a solution to the IT issues that these facilities face. Many health care policy makers within the government, including President Obama, are advocating for the major shift in the use of electronic health records, and digitalizing patient information. However, only a small percentage of medical treatment offices have done so (approximately 17%). Basically, electronic health records document personal information of the patients, for example name, address, age, and medical issues that they face, making it much more easier for doctors and medical staff members to get into the use of e-prescriptions, providing treatment electronically. However, as information becomes digitalized, often times, major issues such as reliability of the IT equipment becomes and important aspect of the scenario. Major companies such as Dell and IBM are in the run to provide electronic health record databases for medical facilities to use. To these major stakeholders, these databases, when set-up properly, are basically a tool for health care providers to use; they can reduce costs and improve the type of care that is provided for patients. They also have the patient's entire medical history, and other medications, along with lab tests that if properly connected to databases, can ease the treatment guidelines. Thus the benefits include less trivial tests, reduced health related errors, and better care with less costs for patients. The IT systems that are provided, including faster networks with improved wireless connections and more financially affordable computers are what will basically be used within the medical facilities running on electronic health records with digitalized information. Also, there will be more space for these new machines to be placed in, since all
  •  
    continued... the paper documents are now going to be taking no physical space; entirely stored digitally. However these devices do not provide the solution of reliability that staff members may face when on the wireless networks and/or dealing with digital data. One solution that the article provides is the new Internet-based service model, known as cloud computing, in which much of the computing firepower and data reside in remote data centers, which doctors, nurses and staff would use via the Web browsers on their personal computers. Through cloud-computing, there is a more reliable and efficient way for medical staff members to document data without having system failures, and also if they ever plan on outsourcing, they can easily work with the database online.
Alex F

Can Barack Obama ensure all Americans have electronic health records by 2014? | Society... - 0 views

  • Personal health records are a concept enabling customers to gather their information from different providers (perhaps their primary and secondary care providers, for example) and store them in one place.
    • Alex F
       
      this is how health records are used, and how useful they would be when customers go to different providers and that way information can be passed on.
  • Portability and Accountability Act of 1996 which is meant to govern the security and privacy of EHRs.
    • Alex F
       
      this is historical information
  • Privacy
    • Alex F
       
      issue/ concern
  • ...5 more annotations...
  • health information exchanges, and the DHHS has already commissioned 15 contractors to work on trial implementations of prototype architectures.
  • 2007, according to research from George Washington University, 20-25% of outpatients were being served by some form of electronic health records (EHR) in the US
  • "meaningful use": the practical deployment of these records for e-prescribing, laboratory exchange and quality measurement
  • The American Medical Association says it is fully behind Connecting for Health.
  • Google and Microsoft have also endorsed Connecting for Health, a consortium that provided one of the original prototype architectures for the NHIE (and unconnected to the NHS IT organisation of the same name).
Yuval S

New rules issued on electronic health records - 1 views

  •  
    This news article talks about the new rules that are focused around EHR. The situation is that despite the push toward "electronic health records by Washington, the transition toward EHR still has a long way to go." Last year, the American Medical Association estimated that there were over 800,000 physicians in the U.S., said Practice Fusion, which offers a free Web-based system to doctors. But only 6.3 percent of them said they had a fully functional electronic medical records system in place. There was and attempt to resolve this by these rules. The government is hoping to clarify the conditions under which doctors and hospitals can collect payments by investing in electronic health records, or EHR, for the next few years. Calling the rules a "significant milestone," General Electric said they include important changes that make the objectives for incentive payments more realistic for medical providers. The exact rules that are going into place are: "One of the rules, issued by the Centers for Medicare & Medicaid Services, defines the "meaningful use" objectives that medical professionals must meet to qualify for the payments. The goal of this rule is to provide greater flexibility by offering a menu of different objectives and procedures that providers can choose from to qualify. The other rule, issued by the Office of the National Coordinator for Health Information Technology, defines the standards that must be met by EHR technology so medical providers are confident that the equipment they use will actually perform all the required functions."
Jaymee C

Mobile phone safety. The real truth about the hazards explained for the layman. - 0 views

  • "...with medical science indicating increased risks of tumors, cancer, genetic damage and other health problems from the use of cellphones, the government and the cellphone industry have abandoned the public."
  • he changed his opinion in the face of accumulating evidence about the dangers and wrote a book about it.
  • A scientist who maintains that mobile phones are safe to use is either corrupt or seriously incompetent.
  • ...1 more annotation...
  • Furthermore, the data may have been faked so as to suit the intersts of the sponsor. In other cases there may be a hidden influence (read corruption) from the industry.
  •  
    health issues from cell phone usage
Madeline Brownstone

BBC NEWS | Technology | Seven million 'use illegal files' - 1 views

  • An alliance of nine UK bodies representing the creative industries recently joined trades unions in calling on the government to force internet service providers to cut off persistent illegal file-sharers. They said more than half of net traffic in the UK was illegal content.
  • The latest report for the SABIP, said the new generation of broadband access at 50Mbps could deliver 200 MP3 files in five minutes, a DVD in three and the complete digitised works of Charles Dickens in less than 10.
    • Madeline Brownstone
       
      Lists the speed of downloads. I wonder how this compares with USA download speeds that are far less.
  • Dame Lynne Brindley, SABIP Board member, said: "This report gives us some baseline evidence from which we can develop a clear research strategy to support policy development in this fast moving area."
    • Madeline Brownstone
       
      Anybody have a copy of this report?
  •  
    Impacts of illegal file sharing.
Madeline Brownstone

BBC NEWS | UK | UK Politics | UK surveillance plan to go ahead - 1 views

  •  
    Interesting plan that GB has proposed. Monitoring ALL internet traffic. Whoa!!
« First ‹ Previous 81 - 90 of 90
Showing 20 items per page