Data Security

Our Products Provide Our Clients With the Highest Level of Security For Their Data

We have built a high level of security into the our image capture devices and software. This is important in the ‘connected’ world  because data is all too easily accessed and stolen by hackers or opportunists.

Data security starts at the source of the data, the actual camera capture system. Our cameras and colposcopes contain no physical data storage inside and can therefore not be accessed. Some other cameras may include local functions, which means that they potentially could be hacked.

Our hardware units are protected by a dual layer of security if requested and only users that have passwords can enter the system. The system has 3 levels of login permissions:

  1.  Superusers can only configure the system (that’s for our engineers)
  2.  Administrators can perform everyday administration tasks such as backups or add users
  3.  Standard users can only perform software tasks such as capture images and video or add new patients.

For super security solutions we can configure a third level BIOS level password, but security must be balanced between ease of use and risk of losing passwords, so we often advise 1-2 levels, depending on the usage.

All data on our systems is encrypted, even the video has our own algorithm installed to encrypt on the unit. Full encryption means that even if the unit is stolen, the data cannot be viewed in any form because the encryption turns it into nonsense text. Your data can only be seen by the persons who have the passwords and have permission to enter the application and view or delete records or data.

Lastly, where data is burned to DVD or saved to USB drive, all data is encrypted, the only way to view this data is by using the MaynViewer software available on every data transfer. The user just has to open MaynViewer and a prompt for the password will instantly appear, allowing them to add this password after which the images and video will be available to see.

We offer all the above as options depending on your requirements, so we can disable the security on a granular scale from very secure to systems that require no security at all.

Features – Data Security

  1.  All data is encrypted, even video, so nothing is available on the machine outside the application
  2.  Encryption level to 256 AES (HIGHLY SECURE)
  3.  Potentially 3 layers of security to get through before the user gains access to the application, normally 1 level is sufficient
  4.  Cameras and scopes have no included software or data making them almost impossible to hack
  5.  Secure USB data sticks and removable drives for backups, including PIN access and fully encrypted
  6.  Training includes the backup process, exporting safely, general security and password management

Benefits – Data Security

 

  1.  All data is encrypted, even video, so nothing is available on the machine outside the application
  2.  Encryption level to 256 AES (HIGHLY SECURE)
  3.  Potentially 3 layers of security to get through before the user gains access to the application, normally 1 level is sufficient
  4.  Cameras and scopes have no included software or data making them almost impossible to hack
  5.  Secure USB data sticks and removable drives for backups, including PIN access and fully encrypted
  6.  Training includes the backup process, exporting safely, general security and password management

Next Steps...

We hope you found something of interest on this page, if you would like to speak to a human being please click HERE to go to our contact page, otherwise you can select the link below to organise a date and time for one of our engineers to pay a visit and discuss your system security

ORGANISE A CALL

Open chat
1
Hi - thanks for contacting us, please give us a moment to respond

Thanks
Powered by