er technology to solve the problems of building automation systems of the medical center:
- increased convenience of search and selection of data from directories storing static information and logs of operations performed
- increase the speed of search and selection of information
- ensuring implementation of electronic medical records
- automation of working place
- security of information storage
- providing multi-user work
1.2.4 Analysis of the system of information security and data protectionof the fundamental components of the success of the modern enterprise system is the development of information security and data protection. The need for action in this area is defined by strong competition in the market for providing medical services. Unscrupulous competitors are ready to go to illegal activities in order to take possession of someone else s information, and taking possession of it to use it to the detriment of competitors. Another important aspect of information security is to protect against intentional or accidental destruction of data, resulting in a loss of information critical to the operational work of the enterprise.the conduct of the paper records of the center situation with regard to information security and information security situation is very mediocre. Data on patients spent with them therapeutic and diagnostic activities are stored in the form of paper documents in cabinets of center staff, and waste papers in the archive. In this case, nothing prevents unauthorized employees to familiarize themselves with these documents or copy them and steal. Job instructions to follow the order of filing are unlikely to stop an attacker who set a goal to seize them. There is also high probability of loss of documents when the paper version of doing business, as well as the intentional or accidental destruction of documents.using a computerized version of the level of information security is increased considerably. The system itself is automated document forcing the user to be more responsible in the matter., Information security and data protection is performed by means of a password system for access to resources information system at various levels. First of all, this is the password logon to the operating system of his workplace. Enter the password opens the user access to the resources of the computer, and documents stored on it. In this case, the security policy should be set up so that the user was not a complete master in the workplace, and could not, for example, install malicious software or programs to copy the information. Limitation of rights complicates the user experience, but it ensures data security. You should always find a balance between convenience and comfort of the user and the safe storage of corporate information or customer information.the user enters his password to the operating system, it accesses not only the resources of the computer, but also to network resources center. This might be the case, if a user logs on to the computer as a domain user or network user. In this case, treat the delineation of the rights of users in the network to even more closely. Configure the network user rights to such a way as to enable him to seamlessly work with their documents, but restrict access to documents, the rights to the work with which it is not, or it is only right to view. In this case, the problem is solved at the same time protect the data from unauthorized access and from accidental damage them.prerogative of the distribution of the rights of users in the enterprise has a system administrator. It must distinguish between users rights of access to documents and applications on the network as well as on local computers.second level of protection of information is password-protected access directly into the automated system of the medical center.third level of password protection of information is the password to access the meringue SQL Server database when building client-server architecture of the systems. In this mode of operation, the data stored in the database, protected not only by the system access rights of users, but also the system of SQL Server, which is an order increases the level of safety.undeniable factor that increases the level of information security and data protection in the implementation of electronic system of work of the center is the opportunity for the need to save the entire database of documents to any electronic medium in the event, such as natural disasters. In the future, this copy of the database can be deployed at the new location and paper work continued from the point at which it was interrupted.addition to password protection organization of information should not be neglected and the physical protection of information. It is...