Skip to main content

Home/ ITGS News/ Group items tagged security

Rss Feed Group items tagged

Rubayeth M

Are local solutions the future for government IT? - 0 views

  •  
    Damian Green a person who insists not giving their medical information to Google Health and Microsoft Vault.
Rubayeth M

Video boom threatens to gridlock the internet - 0 views

  •  
    In this article the stakeholders are worried about the internet connectivity. Since many people are using it today as we speak they are watching videos, tv shows, listening to music from the Internet, and many others and would be known as stakeholders. The issue here is the reliability of the hardware. In the article it states that the copper wires that were initially put for calling which only required voice. Now it has increased with much more and in order for the internet connectivity to increase there needs to be more of a solution than fiber optic cables since it was not planted in to the ground before. The IT systems that requiring so much internet speeds are computers, mobile devices, computers within the doctors office, and many other. For tele medicine to continue there needs to sufficient or reliable internet connectivity. For instance, say a doctor wanted to help out another doctor in India. For the doctor in America it wouldn't take more than a couple of minutes. If the hospital did not have its own secure internet then it would have taken a long time since other internet connectors are using it to download and upload video,stream live music, and much more. The point here is that for one to have accessibility in the internet connectivity there needs to be globalization. Globalization will help increase and satisfy almost everyone's needs.
Alex F

Can Barack Obama ensure all Americans have electronic health records by 2014? | Society... - 0 views

  • Personal health records are a concept enabling customers to gather their information from different providers (perhaps their primary and secondary care providers, for example) and store them in one place.
    • Alex F
       
      this is how health records are used, and how useful they would be when customers go to different providers and that way information can be passed on.
  • Portability and Accountability Act of 1996 which is meant to govern the security and privacy of EHRs.
    • Alex F
       
      this is historical information
  • Privacy
    • Alex F
       
      issue/ concern
  • ...5 more annotations...
  • health information exchanges, and the DHHS has already commissioned 15 contractors to work on trial implementations of prototype architectures.
  • 2007, according to research from George Washington University, 20-25% of outpatients were being served by some form of electronic health records (EHR) in the US
  • "meaningful use": the practical deployment of these records for e-prescribing, laboratory exchange and quality measurement
  • The American Medical Association says it is fully behind Connecting for Health.
  • Google and Microsoft have also endorsed Connecting for Health, a consortium that provided one of the original prototype architectures for the NHIE (and unconnected to the NHS IT organisation of the same name).
Madeline Brownstone

BBC NEWS | Technology | Public to shape smart tag policy - 0 views

  •  
    The stakeholders may eventually draft new regulations to police the tags, but, for now, the commission proposes no new laws to govern their use.
  •  
    The stakeholders may eventually draft new regulations to police the tags, but, for now, the commission proposes no new laws to govern their use.
Madeline Brownstone

BBC NEWS | Technology | Hackers prepare supermarket sweep - 0 views

  •  
    Self-checkout systems in UK supermarkets are being targeted by hi-tech criminals with stolen credit card details. A BBC investigation has unearthed a plan hatching online to loot US bank accounts via the checkout systems.
  •  
    Self-checkout systems in UK supermarkets are being targeted by hi-tech criminals with stolen credit card details. A BBC investigation has unearthed a plan hatching online to loot US bank accounts via the checkout systems.
Madeline Brownstone

Shortcuts - Typing In an E-Mail Address, and Giving Up Your Friends' Too - NYTimes.com - 2 views

  •  
    Contact Scraping to build user base of Tagged.com
Madeline Brownstone

BBC NEWS | Business | Twitter 'costs businesses £1.4bn' - 1 views

  • Staff who use Twitter and other social networking sites while at work are costing UK businesses £1.38bn every year, a report has said.
  • Although many businesses have banned the use of Facebook in the workplace
    • Madeline Brownstone
       
      I infer that Facebook bans can be enforced through proxy server settings.
  • Over three-quarters of respondents said that their employer had not issued them with specific guidelines with regards to using Twitter. "Without guidelines and usage polices businesses are leaving themselves wide open to a reduction in productivity, brand damage and security risks," Morse said.
    • Madeline Brownstone
       
      If company policies need to specify this site or that site, they will drive themselves crazy with writing and rewriting regulations. It is just not a practical solution.
  • ...1 more annotation...
  • It added that companies should think about protecting the reputation of their brand. A third of workers admitted they had seen sensitive information posted on social networks. However, 84% said they felt it should be up to them what they posted online
    • Madeline Brownstone
       
      a secondary issue is inferred here. The author implies that there are some workers who revealy company business through social networking sites and that is potentially harmful for the company's reputation. A twist here: the company wants privacy!
  •  
    Seem like this has potential as a lead article.
Madeline Brownstone

BBC NEWS | Technology | Slump prompts workplace snooping - 3 views

  • He warned that continued unauthorised access to confidential data could mean all kinds of problems for companies. Data leaks might damage customer relationships, leave a firm in breach of regulations or hand vital data to competitors. "Businesses must wake up and realize that trust is not a security policy," he said.
    • Madeline Brownstone
       
      Although this is a juicy article. It is not bringing up an issue in the context of a a busness or group of businesses that have suffered any real impact. It is written in a very general way.
  •  
    "The global economic slump is prompting IT staff to snoop on colleagues, suggests research. A survey of IT workers by Cyber-Ark found that 35% of those questioned had viewed confidential information, such as salaries and redundancy lists. "
  •  
    Could this be a good lead article?
« First ‹ Previous 101 - 108 of 108
Showing 20 items per page