Go to www.ehealth.gov.au to explore.
Not much to see just yet.
David.
This blog is totally independent, unpaid and has only three major objectives.
The first is to inform readers of news and happenings in the e-Health domain, both here in Australia and world-wide.
The second is to provide commentary on e-Health in Australia and to foster improvement where I can.
The third is to encourage discussion of the matters raised in the blog so hopefully readers can get a balanced view of what is really happening and what successes are being achieved.
6 comments:
I registered but whether I was successful or not I have no idea because I got no feedback - like Thanks you. So I registered again just in case but still no Thank You.
Why is it so?
It wasn't until I went to my inbox I found an acknowledgment of my registration.
That is just not good enough.
Seems odd a system of this investment size would allow you to register twice without alerting you to the fact?
Anyway I was tempted to participate in this PCEHR until a friend sent me a series of you tube videos from a recent PCEHR event.
http://www.youtube.com/watch?v=wWBNjDmloS8
Frankly if this is the level of maturity of the Security team in PCEHR then quite frankly they have a lot of work to do to convince me of joining such a scheme. The tactics although well intentioned perhaps are not what I would expect from the level of experience needed to deliver such capabilities, how the Head of PCEHR would allow this is also a little baffling, but then it usually starts at the top
I would like to point out that many of the other videos were very well presented
This is not about registering for a PCEHR - it is to register your interest in signing up for a PCEHR! There is a difference. Are they going to use this to gauge how many people just might sign on the dotted line come 1 July?
Anonymous 5/11/2012 09:24:00 PM
Thank you for the YouTube clip from NEHTA's recent security presentation.
I think Dr Ken Tan and NEHTA better consult their well paid legal counsel (01:20). Unashamed incompetence of the highest level.
http://www.austlii.edu.au/au/legis/cth/consol_act/cca1995115/sch1.html
Commonwealth Consolidated Acts
CRIMINAL CODE ACT 1995 - SCHEDULE The Criminal Code
Division 477 -- Serious computer offences
477.1 Unauthorised access, modification or impairment with intent to commit a serious offence
Intention to commit a serious Commonwealth, State or Territory offence
(1) A person is guilty of an offence if:
(a) the person causes:
(i) any unauthorised access to data held in a computer; or
(ii) any unauthorised modification of data held in a computer; or
(iii) any unauthorised impairment of electronic communication to or from a computer; and
(b) the unauthorised access, modification or impairment is caused by means of a carriage service; and
(c) the person knows the access, modification or impairment is unauthorised; and
(d) the person intends to commit, or facilitate the commission of, a serious offence against a law of the Commonwealth, a State or a Territory (whether by that person or another person) by the access, modification or impairment.
(2) Absolute liability applies to paragraph (1)(b).
(3) In a prosecution for an offence against subsection (1), it is not necessary to prove that the defendant knew that the offence was:
(a) an offence against a law of the Commonwealth, a State or a Territory; or
(b) a serious offence.
Division 478 -- Other computer offences
478.1 Unauthorised access to, or modification of, restricted data
(1) A person is guilty of an offence if:
(a) the person causes any unauthorised access to, or modification of, restricted data; and
(b) the person intends to cause the access or modification; and
(c) the person knows that the access or modification is unauthorised; and
(d) one or more of the following applies:
(i) the restricted data is held in a Commonwealth computer;
(ii) the restricted data is held on behalf of the Commonwealth;
(iii) the access to, or modification of, the restricted data is caused by means of a carriage service.
Penalty: 2 years imprisonment.
(2) Absolute liability applies to paragraph (1)(d).
(3) In this section:
"restricted data" means data:
(a) held in a computer; and
(b) to which access is restricted by an access control system associated with a function of the computer.
Interesting Link - YouTube clip from NEHTA's recent security presentation
Is NEHTA now admitting that DOHA has created a target of all GP offices and networks? Are they saying NASH is such a risk to PCEHR that anyone with a simple app can now harvest information at random and the audit trail will lead directly to a GP, who will face enormous fines, probably ruin the practice and the usual social issues that go with financial ruin.
Based on this I for one will not be registry and will most certainly be prescribing my GP to these facts.
DOHA seem to be forcing GP's to adopt a system that will make them a target for hacking, this is wrong, why is DOHA, NEHTA, MSIA, AMA, RACGP and all these other interested parties not providing safeguards for the Clinicians and Consumers.
A joke and a joke through their own admission, I trust David this will not be another minor issue to be swept under the carpet, it shows just how useful your site can be, perhaps and article explaining what these all means from DOHA would be useful
The gravy train article in The Weekend Australian tells us how these people live, work and play.
When the trough is full the swine will gather and enjoy the swill as long as it lasts. The more money government pours in the more the swine swilling will continue.
Post a Comment