As our society becomes more and more dependent on information systems, so too will the need to protect this information. Many existing and emerging technologies are available to protect information, but the proliferation of technologies can make it difficult to sort out what will best serve the needs of an organization. From what I have observed, the health care community is not particularly sophisticated in evaluating information technologies. Moreover, the vendors tend to be offering ``closed'' systems that violate my basic assumptions about future architectures.
The protection of computerized medical information will require
attention be paid to several areas, including access control, user
authentication, remote system authentication, data authentication,
data encryption, data replication (backups), audit trails, and
timestamp information. In this rather long section I will attempt
to describe how some of these technologies will play a role in the