İptal Edildi

Data Encryption

Data Encryption

This project involves providing advice as to data encryption to WORLD BEST PRACTICE.

The encryption must comply with the US HIPAA Act of 1996 (Health Insurance Portability and Accountability Act of 1996 ).

THE PROJECT:

Part 1: C - customers:

Sound file data is created by digital dictation and consists of sound files only.

These sound files will exist on local PC's (Windows and Mac OS). Lets call these files as the files of C (for customer). There will be many C's.

C's comprise lawyers and doctors i.e. intelligent people who are not often technically computer literate.

They (C) must be provided with software to encrypt the sound files. That software must be free to the customers

This tender requires advice as to that encryption AND COMPRESSION software and technical assistance in deploying the same to customers via our WWW site as a free download - and writing for the www site the 'how to use' and 'how to download" and "FAQs" section concerning that encryption software.

In summary the sound files are to be compressed and sent in a secure manner.

Part 2: S - server:

The secure compressed sound files sent by C's must be stored on a server (S) which is highly secure. The server must be located in Australia. The tender involves assisting select the server and configuration for security.

Part 3: T - transcriber:

The sound files need to be accessed by transcriptionists overseas in a secure manner. The tender involves advice as to that encryption and compression software and technical assistance in deploying the same - and writing for the www site the 'Transcribers - how to use' and 'Transcribers - how to download" and "Transcribers - FAQs" section concerning that encryption and compression software.

Part 4: TO - output from transcriptionists

The transcriptionists transcribe the dictation from C into a Microsoft word file (latest MS word software used).

That output (O) from transcriptionists (T) is called TO. That TO must be encrypted and compression. So, in summary, T has transcribed the dictation (from C) in MS word and must now encrypt and compress the MS word file (TOMS) which is the MS word version of the sound file. The tender involves advice as to that MS word file encryption software and compression and technical assistance in deploying the same.

Part 5: TOPR1 - output from transcriptionists (TO) in MS format sent to Proof Reader 1 (PR1).

The transcriptionist (T) now sends the outputted (O) MS word file (TOMS) AND the sound file both encrypted and compressed to the first proof reader (PR1) who may be anywhere in the world. PR1 reads the MS word file while playing the sound file to ensure accurate transcription. Proof reader one may or may not need to amend the TOMS, however we will call that file, whether amended or not, TOMSPR1 - meaning transcriptionist output in MS word as checked by proof reader one - PR1 - transmission output in MS word as read by proof reader one. The tender involves advice as to that encryption software and technical assistance in deploying the same to the first proof readers - and writing for the www site the 'Proof Readers (First Read) - how to use' and 'Proof Readers (First Read) - how to download" and "Proof Readers (First Read) - FAQs" section concerning that encryption software.

Part 6: TOPR2 - output from first proof readers (PR1) sent to Proof Reader 2 (PR2).

The first proof readers (PR1) now sends the MS word file (TOMSPR1) and the sound file both encrypted and compressed to a second proof reader (PR2) who may be anywhere in the world. PR2 (also) reads the MS word file (TOMSPR1) while playing the sound file to ensure accurate transcription. Proof reader two may or may not need to amend the TOMSPR1, however we will call that file, whether amended or not, TOMSPR2 - meaning transcriptionist output in MS word as checked (after proof reader one) by proof reader two - PR2 - proof reader two. The tender involves advice as to that encryption software and compression and technical assistance in deploying the same to the second proof readers - and writing for the www site the 'Proof Readers (Second Read) - how to use' and 'Proof Readers (Second Read) - how to download" and "Proof Readers (Second Read) - FAQs" section concerning that encryption software.

Part 7: TOMSPR2 - output from second proof readers (PR2) sent to Server S and to C

TOMSPR2 and the original sound file in transfered by proof reader 2 too the server. The word file (as proof read 2 times) called TOMSPR2 is then emailed to the C (i.e. the word file, not the sound file, as the C has the original on his desktop) from which it came (as C's original sound file) - in encrypted and compressed form. That file must then upon reaching C's desktop be easily unencrypted. The tender involves advice as to that encryption software and technical assistance in deploying the same to C - and writing for the www site the "Customer - how to unencrypt" and "Customer FAQs" section concerning that way to uncompress and unencrypt.

In summary:

The following chain must be secure:

Sound file from customer > server > transcriber (sound file and ms word file) > first proof reader (sound file and ms word file) > second proof reader (sound file and ms word file) > server (word file) > customer

Your role is not writing the www site - but is to specify which software is used by customers and transcriptionists and proof readers to ensure security - and which server to use to hold the sound files and ms word output files. In addition to assisting in specification and identification of security software the work involves assistance in deployment and writing how to use, how to download and FAQs pages so customers, transcriptionists and proof readers can easily download and use the system. Lastly an ongoing HELP DESK by email facility is required (however that is for a later quote).

Please quote for the above and supply in detail your firms qualifications and how you will ensure compliance with the US HIPAA Act of 1996 (Health Insurance Portability and Accountability Act of 1996 ). Your firm will be required to ensure the system is in world best practice for and is HIPAA compliant. We will be passing on your certified warranty to our clients and if it proves wrong and we are sued we will in turn pass liability onto your firm - SO BE SURE YOUR FIRM IS HIGHLY QUALIFIED as we INSIST the system must be best practice compliant and legally compliant as our reputation will depend on that fact - i.e. while the medical files are worthless we do not need bad publicity be having hackers intercept the system and letting the press know - if you follow our drift.

Robert Truman LL.B.

Lawyer for client.

Australia

Beceriler: Ses Servisleri, Sistem Yöneticisi, Web Güvenliği

Daha fazlasını görün: hipaa compliance software, writing software free download, writing software mac, writing services australia, work proof reader, transcriptionist services, transcribe software free, transcribe 6, times free press, tender writing services, technical writing advice, technical transcription services, select medical, security lawyers, qualifications need lawyer, proof read services, pc deployment, overseas transcription services, original quote, original client, call transcription, desk australia, need lawyers, need lawyer advice, need lawyer australia

İşveren Hakkında:
( 19 değerlendirme ) Adelaide, Australia

Proje NO: #18497