Friday, 9 April 2010

BPM is not software security

Mary Katherine in her article was trying to support the move toward "Electronic Health Records (EHRs)", but during that she pitched an interesting idea about authorization and privacy in BPM, she says:
‘‘ While BPM is not software security, it does have the ability to define a workflow, involving only pertinent parties at each step. From this, rules and authorizations can be applied to the process ensuring that only authorized personnel are able to complete necessary tasks."

she also explained how BPM can be used to track and report on who accessed the patient database, when it was accessed, who's records were opened, and updates or changes that were made.

Resource:
Security in BPM Suites Can Remedy Security Breaches in Paper based Medical Records.
Mary Katherine Strupe, 2009.

No comments:

Post a Comment