AbstractThis report covers the information system of Lifeforce Medical Ltd. The system has grown and this report fully studies and documents the IT requirements of the business enterprise for the next three or up to five years. The document seeks to enable the understanding, makes recommendations for changes to the software, infrastructure, systems, network and other platforms. The report further focuses on the requirements from stakeholders, actual and potential shortcomings of the current information system, recommendations and justifications, and the appropriate assumptions for this process. The paper discusses in details the solutions to the vulnerability of the system. IntroductionLifeforce Medical Ltd is not only an importer and distributor of medical devices but also offers treatments and other products.
The company supports some specialist stockist’s independent pharmacies in the Republic and Northern Ireland. The company history dates back since 1980s. Over time, its Information Systems has developed. A number of employees are computer literate and two IT employees oversee the system activities. The company also maintains in-house stock control. The users of this system access it remotely by their delivery drivers.
The magnanimity of the system makes the database vulnerable such that the database can be compromised leading to disclosure of customers’ data. Requirements from StakeholdersLifeforce Medical Ltd information system has many stakeholders. They include the health care systems, primary care physicians, specialist care physicians, payers, state Medicaid, state government, laboratories and diagnostic facilities, public health, patient groups, purchasers and employers, directors and governing committees, among others. The requirements vary from one stakeholder to another. Healthcare systems require the capacity to transfer health information from one provider or person to another. It will include entities in order to exchange selective information outside their networks.
The system would need to exchange administrative information with the state and the payers. The primary care physicians and speciality care physicians require exchanging information with hospitals and providers. The information might be administrative in nature. Payers are also crucial stakeholders. They might need a method of pressing their electronic claims, verifying, reporting and authorizing. The system should be efficient and effective in terms of cost. The payers might need improved patient wellness and care coordination platforms. The state is also one of the organs that might be interested in creating a statewide health information system.
In pursuing this, the micro information systems should be connected to it. The laboratories and diagnostic facilities like x-rays, medical records and mammograms store significant patient information. The public health needs to report significant information. Therefore, when focusing on stakeholder requirements, data security is tremendously valuable. This would stop serious breaches connected with the way parties share data with each other. Karl (2008: 10) suggests this is like building a perimeter around the records. Data Security ManagementThe system should secure the access paths to data (John, 2007:12-13).
This involves the efforts to deploy firewalls and systems that authenticate users to prevent intrusions. The data store in the database is also vulnerable. This puts the serious stuff to risk. The company should contemplate employing ethical hacker to plug the potential sources of failure of the system.