image14

Healthcare

HIPAA

LOYOLA INFORMATION TECHNOLOGY SERVICES 18 HIPAA IDENTIFIERS
Softclaim Data Recovery

Data Recovery - Backup and Restore

In computer blog reviews top marks are always given when an application developer includes the ability for users to back up their data. You might be thinking “But users already have MS Backup, Norton Utilities etc.”, and this is true they have. But many computer users do not have confidence in their ability to use such products – have they chosen the right files/directory?  Is there some setting they have overlooked? etc 


BackFlash -  “Has There Been A System Crash? Get Your User’s Data Back In A Flash!” 

  • Security Option: you can use an ID string to make sure no other BackFlash user can restore from your backups.
  • Compression is excellent and uses the high performance 32 bit ZLIB DLL
  • Each set of backup objects will be given a unique serial number to ensure that only object from the same set are used on restore and also that the most recent backup is being used.
  • Any drive and path can be specified for backup – so large capacity drives such as USB drives could be used or drives somewhere else on the network.
  • During compression an animated hourglass is displayed to show the progress together with bytes processed in total for the drive and also for the file.
  • Unattended Backup facility
  • User can decide where files are restored to – useful when restoring to a different PC
  •  All details of backups are stored in a log file 

Softclaim Audit Trail and Data Recovery "Undelete"

Audit Trail and Data Recovery "Undelete"

  •  Changes, inserts and deletes are logged – wherever they occur
  • The size of the audit file is kept under control because changes are stored on a field-by-field basis (not the whole record for every change)
  • Memo changes (up to 64K) are stored in a separate file – again, to keep the log file size under control.
  • When a record is deleted there is the option to store the whole record (and related child files) in an archive file.
  • This allows records to be “undeleted”
  • Changes to individual fields can be rolled back.
  • The scope of the rollback can be either 
    • a) Just the highlighted set of changes or 
    • b) All changes going back to a certain date. 
    • Rolling back in reverse order means that a record can be reinstated to a defined date. Also, rollback can be restricted to a named User ID.
  • All key information is stored in the log file : date/time of change, User ID of person changing, computer name, Filename, Fieldname, Old Value, New Value, Procedure used, Unique Record ID, Primary Field (for quick identification of the main record) and 4 user fields where you can record any other info you think is relevant to this log file entry.

Softclaim Access Security

Access Security

 User Access Control Features

  • Logins and Passwords
  • User access control at a screen, control and even browse-column level
  • User Groups and Workgroups
  • Allows multiple login areas inside an application
  • Enforce case sensitive passwords, regular password changes, minimum password composition
  • Multiple user groups per user
  • Password reset 

 

Licensing and Registration Features

  • Client Company Name. Serial Number and Expiry Date


Network Features

  • Supports Central Network user database spanning multiple EXE’s
  • Supports central configuration, no need to go to each workstation
  • Checks and enforces concurrent network copies

Softclaim Securing Data at Rest

Securing Data at Rest

We live in an age where very sensitive data needs to be stored, and it needs to be stored in a safe way so that it cannot be stolen, or altered, by users, or programs, without the appropriate access. Data stored in persistent storage (like on a hard drive, or in a database) is known as "Data At Rest".

Security implemented provides security for data at rest, and provides Field-Level encryption to selected fields in the database.

When considering how best to protect the data, it is worth understanding the sort of protections that may be required.


  1. Protecting the data from someone who gains access to the raw disk file (or backup file).
  2. Protecting the data from alteration by other programs, such as Database Management programs 
  3. Detecting when the data has been illegally altered by other programs.
  4. Protecting the data from being copied from one row to another, while in its encrypted state.
  5. Protecting data from being decrypted simply because it is the same as some other known encrypted value.
  6. Protecting the data from programmers.


There are also two categories of data that have to be protected

  • Passwords
  • Everything else


To accomplish the above two basic security techniques are used to protect data which is at rest.

  • Encryption
  • Hashing