COI Report – Part II
Page
19 of
425 workstations. This means that only screen images of the SCM application are viewed by users on the client workstation. There is no transactional data that flows directly between user workstations and the SCM servers – the only thing that is passed from the Citrix Receiver
installed on the workstation, to the Citrix servers, are the users keystrokes and mouse clicks.
49. When a user launches the virtual SCM client application, the user is required to enter user credentials to login to SCM. The user credentials are then sent through a Citrix server to the SCM security server for authentication.
Upon successful authentication, the user will be logged into the SCM system and can access the SCM database with permissions based on the role that the user is associated with.
50. A simplified illustration of the user authentication process is as follows
Figure 3:SingHealth user authentication process to access the SCM Database 51. The SCM allows for the creation of roles in the SCM system (
e.g. doctor role, nurse role. Permissions can beset for each role, allowing that particular role access to specific functions and data. For example,
when attending to a patient, a nurse assigned the nurse role maybe allowed to retrieve that patient’s
COI Report – Part II
Page
20 of
425 records from the SCM database
via the SCM client, but may not be allowed to order a lab test or medication for that patient.
52. The SCM application supports the tagging
of Very Important Persons (“
VIPs”) within its system. For these tagged patients, only selected users are allowed access to the medical records. Even when an authorised user seeks to access a VIP’s visit record, a prompt will be displayed for the user to enter the reason for the access before he/she can proceed to view the record. All instances of access to VIP records are logged and an alert is generated daily to both the user and the hospital’s Chief of Medical Board (“
CMB”)
via email. The user is required to validate his/her access in response to the alert email. If more than a set number of records
are accessed at the same time, an alert would be sent to the
IHiS security team, and the cluster IT and Operations teams.
53. The SCM client does not have any functionality which allows for the bulk retrieval of records from the SCM database. There are reporting functions
which allow users to print, download, or export data into Microsoft Excel. Reporting tools, or custom applications would be used for generating such reports.
Share with your friends: