A typical cycle for backups that is considered to over come most problems
is
7 copies for each of the last 7 days
6 months for each of the last 6 months
3 years for each of the last 3 years.
That may be a bit expesinve for HDD so tape is often used instead and also
for the daily backups often only the changes are stored and not the whole
filetsystem.
jon

Quoting Tim Churches <[EMAIL PROTECTED]>:

> Michael Christie wrote:
> > Hello to all,
> > We backup our Practice Mx software and Clinical software to a
> removable
> > HDD which we take home every night.
>
> As someone else commented, hopefully you use a series of removal HDDs
> which you rotate. Otherwise you risk overwriting your only good backup
> with a  bad backup. This typically happens if your clinical system
> database or other data files become corrupted on your server. You then
> overwrite the last backup of uncorrupted files with a version containing
> corrupted files. You then discover the corruption in your database and
> decide to restore from backup, only to find that you only have backups
> of corrupted versions of the database. Then you are stuffed. Hence the
> need for backup media cycles. There are many schemes for this - the GFS
> (somewhat sexist: grandfather, father, son) scheme was popular when I
> last had to worry about such things five or six years ago. perhaps
> someone can point to a good online discussion of back-up media rotation
> schemes.
>
> > In the clinical package there is a lot of scanned documents and
> letters
> > to specialists which are simple Word files, most of which include Pts
> > names and addresses and Medicare numbers, and lists of medical
> problems
> > of individual pts.
> > I was thinking, if say my car was broken into and the bag containing
> the
> > HDD was stolen there is a risk of patients details being accessed.
>
> Damn right. This has been discussed at length several times on the
> former GPCG_TALk list, the archives of which are available online but
> alas are not searchable, so I can't point you at that discussion. Pity.
>
> > The Clinical and Practice Mx databases obviously could be broken into
> if
> >  one was a computer expert. (Unlikely I would think in the "normal"
> car
> > thief.) But the Word docs are easily accessible by plugging the HDD
> into
> >   another computer.They are all in a folder called Docs.
>
> I wouldn't count on the thickness of the thief. Things like portable
> hard discs quickly find their way onto the second-hand computer gear
> market, are traded multiple times in quick succession, and end up in the
> hands of a university computer science student. Life's like that.
>
> > Can my colleagues tell me what does a doctor do if this occurs?
> Besides
> > the Police, who would need to be notified regarding this?
>
> Your medical defence union, for sure.
>
> > Would you need to contact ALL the patients from the surgery , say
> 10,000
> > people re the theft and that it is MAYBE possible that their medical
> > details have been stolen.
>
> I have argued that that would be teh ethical thing to do, but gee, it
> puts you at grave risk of a class action by some of your patients,
> particularly if some are lawyers or lawyers get wind of it.
>
> >  put an ad in the paper? Go on Today Tonight?
>
> That would guarantee a class action against you, I suspect. Such an
> action would not need to prove that the data were misused or even
> accessed by the thief or whoever ends up with the HDD device - I
> strongly suspect that just "proving" significant mental anguish at the
> possibility that confidential medical details might be published on the
> Internet would be enough to make the courts ruin your whole day.
>
> > Is there a way of making access to the removable HDD difficult, say
> > putting password access to the HDD?
>
> Strong encryption, as Horst and others have pointed out, is teh
> solution.
>
> > This problem would obviously apply to stolen backup DVD's and tapes as
> well.
> > How do we get around this?
>
> Strong encryption of all confidential patient data written to all
> removable digital media which is to be removed from the surgery and
> which is not stored in the safe.
>
> The same applies to clinical databases hosted on laptops, of course. As
> Horst mentions, an encrypting file system can be used. Even Windows
> supports this - again, I have posted details of traps with this to bear
> in mind on the former GPCG_TALK list, but those posts can't easily be
> found now. Pity. anyway, you can find tutorials on file system
> encryption with Windows on the Net via Google - but the default Windows
> file system encryption is insecure - you need to tweak some Registry
> entries so that you are forced to enter a password at boot time as Horst
> notes in order to properly secure it.
>
> Tim C
>
>
> >
> > _______________________________________________
> > Gpcg_talk mailing list
> > [email protected]
> > http://ozdocit.org/cgi-bin/mailman/listinfo/gpcg_talk
> >
>
> _______________________________________________
> Gpcg_talk mailing list
> [email protected]
> http://ozdocit.org/cgi-bin/mailman/listinfo/gpcg_talk
>


--
Jon Patrick
Chair of Language Technology
School of Information Technologies
University of Sydney
Sydney, NSW, 2006, Australia

----------------------------------------------------------------
This message was sent using IMP, the Internet Messaging Program.
_______________________________________________
Gpcg_talk mailing list
[email protected]
http://ozdocit.org/cgi-bin/mailman/listinfo/gpcg_talk

Reply via email to