Hello Greg,

I think actually, they are following best practice. Its pretty easy
for a Location certificate to "escape" into the wild and the easy
access to the private key is a big problem.

The use of a individual token to produce legal referrals is something
the security experts would approve of. I have a PKI key and it is a
pain when you forget it, but using it to sign referrals is not a major
issue. If they agreed to issue 2-3 tokens for everyone, if desired, it
would be better but the logic behind it is solid. Its the lack of
implementations that's the problem.

You can scan a handsigned referral and sign that with a location
certificate and store it in a database and throw away the paper. For
documents that have never existed as paper a smartcard solution is
appropriate and you would be hard pressed to find anyone in the
security community to support using location certificates.

Duncan needs to store a PKI signed version of the referral in his
database and then its fine. It needs to be signed with a smartcard, or
else receptionists could generate legal referrals at will.

Its not a huge risk with referrals, but extend it to scripts and the
potential for abuse is huge.

Tuesday, February 28, 2006, 11:56:39 AM, you wrote:

GT> Tim Churches wrote:
>> Duncan Guy wrote:
>>> I'm not so sure I want to be a test case but ... Given this is a unique
>>> situation and to access our EMR the specialist who is referring to me
>>> has to log onto the server via a terminal session with his/her unique
>>> username and password and then onto the EMR with his/her unique password
>>> and the EMR records every keystroke with time and date stamping I was
>>> hoping this might do.  S'pose there isn't an answer to this one.
>> 
>> The problem is that your EMR, timestamps included, can be altered post
>> hoc in a completely undetectable fashion. The only solution to this is
>> to create secure hashes ("digests") of the state of your EMR and have
>> that timestamped digest digitally signed by a trusted third party - by a
>> digital notary public. Provided that there is no collusion between you
>> and the notary public (and notaries public are chosen and honour-bound
>> to resist such collusion), then the use of such digital notarisation
>> provides very good evidence (very difficult to challenge in a court of
>> law) that your EHR actualy contained the information you asserted that
>> it did (eg evidence of a referral) on a particular date (as opposed to
>> having been "doctored" at a later date to make it appear that it
>> contained that information at some earlier date).

GT> Tim,

GT> A great alternative that will benefit doctors, Medicare Australia and 
GT> the public. The only problem is that you've just told the Medicare 
GT> Australia guys responsible for developing their PKI system that they are 
GT> a bunch of idiots who have to abandon a big part of what they've created 
GT> and go down a different road. Big loss of face, possibly even some 
GT> awkward questions to answer re appropriateness of their use of public money.

GT> Greg




-- 
Best regards,
 Andrew                            mailto:[EMAIL PROTECTED]

Andrew McIntyre
Buderim Gastroenterology Centre
www.buderimgastro.com.au
PH: 07 54455055 FAX: 54455047


_______________________________________________
Gpcg_talk mailing list
[email protected]
http://ozdocit.org/cgi-bin/mailman/listinfo/gpcg_talk

Reply via email to