Functional Requirements
a. The software must allow input of patient data from patient (initial) home, secured access at Physician and Nurse Workstations, and from the data streaming real-time monitoring equipment.
b. The software must request username and password for access to data, only after authentication will allow access to the system.
c. The software must require high levels of error correction and input validation.
d. The software must allow browsing by the physician of historical medical information of his/her patients only.
e. The software must identify the patient by a unique numeric identifier derived from a function performed on the patient’s birth date.
f. The software must retrieve, update, and store data from multiple input locations including but not limited to hospital workstations, physician workstations, inbound emergency vehicles, and electronic monitoring equipment.
g. The software must allow patient to view their own medical record online allowing changes only to address, phone number, and insurer after initial input.
h. The software must only allow deletions by the vendor and only after archiving data in flat file format.
i. The software to be developed must display the correct patient name.
j. The software to be developed shall display the correct time of day in compliance with ISO 8601 k. The software to be developed must operate without interruption twenty-four hours a day.
l. The software must allow full and complete record search queries by physicians; also allow access to limited bloodwork, medication, and allergen information by EMT personnel and display results in order specified by operator.
m. The software must allow input of diagnostic imagery and FAT32 compression for storage and transmission of data.
n. The software must enable output of real-time data and imagery from electronic diagnostic equipment through java applets which run in the web browser.
o. The software must retrieve and sort medical record information and allow for screen and print output of said information
p. The software must encrypt the data using Rijndael (AES) encryption algorithms from the database for transmission from point to point.
Aucun commentaire:
Enregistrer un commentaire