COI Report –
Part VIIPage
218 of
425 44.1.5 Tagging of sensitive data ................................................................................ 359 Databases containing patient data must be monitored in real-time for suspicious activity ........................................................................................ 359 44.3
End-user access to the electronic health records should be made more secure ........................................................................................................... 361 Measures should be considered to secure data-at-rest ................................. 363 Controls must be put in place to better protect against the risk of data exfiltration .................................................................................................... 365 Access to sensitive data must be restricted at both the front-end and at the database-level............................................................................................... 366
Share with your friends: