‘‘ While BPM is not software security, it does have the ability to define a workflow, involving only pertinent parties at each step. From this, rules and authorizations can be applied to the process ensuring that only authorized personnel are able to complete necessary tasks."
she also explained how BPM can be used to track and report on who accessed the patient database, when it was accessed, who's records were opened, and updates or changes that were made.
Resource:
Security in BPM Suites Can Remedy Security Breaches in Paper based Medical Records.
Mary Katherine Strupe, 2009.
No comments:
Post a Comment