Friday, May 11, 2012

A New E-Health Web Site Is On-Line So You Can Apply To Register for a PCEHR.

Go to www.ehealth.gov.au to explore.
Not much to see just yet.
David.

6 comments:

  1. I registered but whether I was successful or not I have no idea because I got no feedback - like Thanks you. So I registered again just in case but still no Thank You.

    Why is it so?
    It wasn't until I went to my inbox I found an acknowledgment of my registration.

    That is just not good enough.

    ReplyDelete
  2. Seems odd a system of this investment size would allow you to register twice without alerting you to the fact?

    Anyway I was tempted to participate in this PCEHR until a friend sent me a series of you tube videos from a recent PCEHR event.

    http://www.youtube.com/watch?v=wWBNjDmloS8

    Frankly if this is the level of maturity of the Security team in PCEHR then quite frankly they have a lot of work to do to convince me of joining such a scheme. The tactics although well intentioned perhaps are not what I would expect from the level of experience needed to deliver such capabilities, how the Head of PCEHR would allow this is also a little baffling, but then it usually starts at the top
    I would like to point out that many of the other videos were very well presented

    ReplyDelete
  3. This is not about registering for a PCEHR - it is to register your interest in signing up for a PCEHR! There is a difference. Are they going to use this to gauge how many people just might sign on the dotted line come 1 July?

    ReplyDelete
  4. Anonymous 5/11/2012 09:24:00 PM

    Thank you for the YouTube clip from NEHTA's recent security presentation.

    I think Dr Ken Tan and NEHTA better consult their well paid legal counsel (01:20). Unashamed incompetence of the highest level.


    http://www.austlii.edu.au/au/legis/cth/consol_act/cca1995115/sch1.html


    Commonwealth Consolidated Acts

    CRIMINAL CODE ACT 1995 - SCHEDULE The Criminal Code

    Division 477 -- Serious computer offences

    477.1 Unauthorised access, modification or impairment with intent to commit a serious offence

    Intention to commit a serious Commonwealth, State or Territory offence

    (1) A person is guilty of an offence if:

    (a) the person causes:

    (i) any unauthorised access to data held in a computer; or

    (ii) any unauthorised modification of data held in a computer; or

    (iii) any unauthorised impairment of electronic communication to or from a computer; and

    (b) the unauthorised access, modification or impairment is caused by means of a carriage service; and

    (c) the person knows the access, modification or impairment is unauthorised; and

    (d) the person intends to commit, or facilitate the commission of, a serious offence against a law of the Commonwealth, a State or a Territory (whether by that person or another person) by the access, modification or impairment.

    (2) Absolute liability applies to paragraph (1)(b).

    (3) In a prosecution for an offence against subsection (1), it is not necessary to prove that the defendant knew that the offence was:

    (a) an offence against a law of the Commonwealth, a State or a Territory; or

    (b) a serious offence.


    Division 478 -- Other computer offences

    478.1 Unauthorised access to, or modification of, restricted data

    (1) A person is guilty of an offence if:

    (a) the person causes any unauthorised access to, or modification of, restricted data; and

    (b) the person intends to cause the access or modification; and

    (c) the person knows that the access or modification is unauthorised; and

    (d) one or more of the following applies:

    (i) the restricted data is held in a Commonwealth computer;

    (ii) the restricted data is held on behalf of the Commonwealth;

    (iii) the access to, or modification of, the restricted data is caused by means of a carriage service.

    Penalty: 2 years imprisonment.

    (2) Absolute liability applies to paragraph (1)(d).

    (3) In this section:

    "restricted data" means data:

    (a) held in a computer; and

    (b) to which access is restricted by an access control system associated with a function of the computer.

    ReplyDelete
  5. Interesting Link - YouTube clip from NEHTA's recent security presentation

    Is NEHTA now admitting that DOHA has created a target of all GP offices and networks? Are they saying NASH is such a risk to PCEHR that anyone with a simple app can now harvest information at random and the audit trail will lead directly to a GP, who will face enormous fines, probably ruin the practice and the usual social issues that go with financial ruin.
    Based on this I for one will not be registry and will most certainly be prescribing my GP to these facts.
    DOHA seem to be forcing GP's to adopt a system that will make them a target for hacking, this is wrong, why is DOHA, NEHTA, MSIA, AMA, RACGP and all these other interested parties not providing safeguards for the Clinicians and Consumers.
    A joke and a joke through their own admission, I trust David this will not be another minor issue to be swept under the carpet, it shows just how useful your site can be, perhaps and article explaining what these all means from DOHA would be useful

    ReplyDelete
  6. The gravy train article in The Weekend Australian tells us how these people live, work and play.

    When the trough is full the swine will gather and enjoy the swill as long as it lasts. The more money government pours in the more the swine swilling will continue.

    ReplyDelete