End-to-End Encryption, Role-Based Access Controls, and Audit Logs in Safeguarding Electronic Health Records – A closer look at the features housing EHR
Authors:-Erumusele Francis Onotole
Abstract-The rise of Electronic Health Records (EHRs) has revolutionized the way health care is practiced globally, particularly in providing patients with effective and precise care. Nevertheless, given the types of information EHRs contain, they are vulnerable to malicious attacks and access by unauthorized persons. The paper focuses on the importance of end-to-end encryption, role-based access control, and audit logs in maintaining optimal security of EHR data. These aspects are discussed in such a way that their combined effect is presented along with the individual functionality of circumstances and how each of them contributes to security, the legal requirements, and the stakeholders.
