Keywords:  Authorization, HIPAA
Authorization

One can implement HIPAA in a proprietary manner or use standards, in particular DICOM, and the profile definitions as described in IHE.  To provide a homogeneous and consistent infrastructure that can  facilitate different vendors, it makes sense to use standard solutions.

Security implementation on a device is typically divided into four categories.  One of the four categories is Authorization.

After a system has determined a person's identity, the next step is to find out what information he or she has access to, based on a certain user profile or role.  For example, a file room clerk will most likely have a different profile from a nurse.  This is known as role based authorization.

Search Database