HMS Synopsis
HMS Synopsis
Synopsis
ON
Title of Project
Project Category
Security Mechanism
1.1. INTRODUCTION:
Today hospitals are high-tech public welfare and relation system. At
present days most of them need a speedy and efficient system to finish daily
activity such as new patient enrollment, doctor activity, nursing staff
management etc. till today some of the nursing home and hospital
maintaining their daily activity manually or some are using old computer
based system which are became obsolete as compared to today’s technology
so to over come this problem which are facing by different health center in
around Guwahati city we have proposed to reinvestigate the system to
develop a modernize computer base hospital management system.
We have visited so many private and government hospitals in an around
Guwahati city from where we collect the data about what kind of system they
were using to maintain the whole data about the patient and the doctors and
the rooms and lab service they have. The system they are using not a user
friendly and efficient. Database management system use to handle day to day
data and previous data is not up to date. The existing system is bound to some
particular system of activity only or some of them are not using proper user
interface for output, input and reporting.
So overcome this above problem we have proposed to design a user
friendly hospital management system having modern database at back end.
We have proposed to develop computer base hospital management database
system using Visual basic and MS Access .
1.2. OBJECTIVE:
4. PROJECT CATEGORY:
My project falls under the category –
Tools:
Man Power: A Qualified computer professional with appropriate knowledge of GUI, Visual
Basic and SQL Server is sufficient
TABLE DESIGN:
DB Table for Login:-
Table name - Login.
Table Description – Contains login information.
Primary key-
The measures for data protection taken by an organization reflect its awareness and
attitude towards INFORMATION AND Information Technology. If top management treats
computers as a de-humanized, intangible, but integrity would, at best, be lackadaisical. On
the other hand, if the management considers information as an important recourse and
computers as an aid in decision making one would find a positive approach and
involvement by the management towards security of information. This attitude naturally
percolates down to the lower levels and the workers consider the computer correspondingly
as an enemy.
One of the best and first steps in ensuring data security is to create awareness and
develop a culture within the organization towards the ways in which information can be
lost/alter and what would be the consequences, of such an occurrence, to the organization
and individuals.
All other steps that can be taken are:
IT ‘Planning: The organization must decide on a policy for introduction of IT. This
must be done at the highest level and should address issues such as levels of protection for
various aspects of information relating to the organization.
Selection of technology, keeping in mind obsolesces due to new innovations and
necessity for keeping in step;
Identification of points of exposure of weak links to device means to plug them;
Physical protection of machine and media.
Control and monitoring the access to data, its usage, by persons and its integrity
must be early defined and responsibility for ensuring these must test on persons designed
for these tasks; an audit procedure would go a long way in ensuring adherence to laid down
guidelines.
While the above are relevant for any computer based MIS implementation, in case of
PCs, the rules acquisition and use must be unambiguously stated. Additional points to be
looked into are:
Information classification;
Responsibility for security;
User training to increase security awareness and propagation of do’s and do not’s.
Guidelines for creation and changes to passwords etc.
There are four time-honored principles for ensuring security and recovery in case
of breaches of security:
10.2 PREVENTION:
The best method is of course stopping all breaches of security before they occur.
‘Need-to knows’ policy is an offshoot of the principle of prevention.
10.3 DETECTION:
However one may try to ensure it, total security is almost impossible. The next
principle, therefore, is that one must be able to detect breaches to security, whenever they
occur, within the shortest possible time. This helps in damage assessment and, also, in
devising further preventive measures.
There must be enough resilience in the system to recoup the losses, damage and
become functional, by reinstating the status, at the earliest.
These measures are for PCs being used by us. The measures available are:
Physically bolt down the PC to a table so that it can’t be casually lifted and taken
away.
Locate the PC in such a way that it is conveniently accessible to the user, but hidden
from casual passes-by.
Have likeable cupboards for floppies and keep them locked at all times, except when
used.
Keyboard and PC locking devices can be fitted so that the PC can’t be operated unless
these locks are opened.
Keep a record of all floppies in use; don’t permit alien floppies into the organization.
Use lockable rooms for PCs, specially those handling sensitive data. Make it a
practice to lock the room when leaving it for even a short time.
Time above apply to server, gateways and the like.
5. PROJECT MODULES :
a) Login Process :
Administrator or supervisor will enter user id and password.
System will confirm the entry and give permission for login into
the system.
b) Admission Process :
This process is automates the registration of the patient. Here
settings up the entry of various information relating to patients
are recorded. Also a physician is allocated to a patient.
c) Lab services :
Patient lab regarding test will be process and record through
this module and update the database. On the basis of the record it
will report the lab test. It will also give the information about the
cost of lab test to the bill process.
d) Billing process :
This process calculates the total expenditure made on various
information relating to patients through the entire process i.e.
from admission to discharge is produced out in the form of bill to
be paid by the patients.
e) Room maintenance :
This process maintains the rooms and beds whether they are
vacant or occupied along with capacity of the rooms and rates.
f) Checkout process :
This process is automates the discharge of the patient. Here
settings up the entry of various information relating to patients
like bills paid or not are recorded.