1) Individual Security Verification
Absolutely no one can access any part of the system
without a pre-approved identity. That has been issued by
MEDISCRIBE© and is in the MEDISCRIBE©
2) Authentication for Access
All identities will be verified each time the system is
accessed. Not only from the stand point of the
MEDISCRIBE© user, but from the terminal and user.
For example, if an emergency room is attempting to
access the data, each ER has a unique identifier code that they are issued by their State. This code must be used along with the individual’s verification of identity. The same is true for Doctor’s that are not part of the MEDISCRIBE© System, they will enter their State assigned medical license number. In the event that the subscriber is outside of the United States, the medical professional will access the system and a “live operator” will respond and verify and authenticate the information.
3) Authentication for Updates
Each time the information is updated the individual or entity that is updating the information will go through an authentication and verification routine and will have to enter their unique identifies into the MEDISCRIBE© System.
4) Hacking Attempts, Viruses, and authorized access
Should there be a “Hacking” attempt, a virus that is detected, or if there is an authorized attempt to access the MEDISCRIBE© System the attempt will be immediately pinpointed as to which server has received the intrusion an it will isolate that server and the balance of the servers will be reassigned to absorb the work load until the security threat is identified, isolated, and resolved.
5) Legal Proceedings
Anyone or entity that will attempt to breach the security protocols of the MEDISCRIBE© System will be prosecuted under the host of State, Federal Laws, and International Laws dealing with cyber crimes. A complete record and tracking system of the IP addresses and other identifiers will be recorded for prosecution.
This is what MEDISCRIBE© has designed.