Security within HealthlinkOnline

Security is of paramount importance to Healthlink and the application uses the highest level of industry-standard security measures to ensure the safety and confidentiality of patient information.

bullet SSL Encryption

Users will notice when they log on to the site the address begins with https rather than http. Https is Hypertext Transfer Protocol (http) using a Secure Socket Layer (SSL). Data sent via an SSL connection is protected by encryption, a mechanism that prevents tampering with any transmitted data. In essence, information is scrambled while it is sent from one computer to another which prevents it being viewed by a non-trusted third party.

HealthlinkOnline utilises 128-bit SSL encryption to provide the highest level of security.

bullet Digital Certificates

Digital certificates are required to initialise an SSL session. Healthlink issues and manages client certificates for all registered practices and agencies. These certificates contain details specific to each site and are used to verify your identity when gaining access to HealthlinkOnline. A server certificate authenticates the service to the user, while the client certificate authenticates the user to HealthlinkOnline.

When you register with us we will create your client certificate and help you install it.

bullet Secure Login

A unique username, password and PIN are required to access the application. This combination is unique to each user and must be entered correctly or access will be denied. Furthermore these credentials are associated with the client certificate providing additional security.

bullet Session Management

Unique Session IDs are generated each time HealthlinkOnline is accessed. If there has been no activity for 40 minutes the session will disconnect and you will need to log in again if you wish to continue using the system. This feature aims to protect you against unauthorised access.

bullet Infrastructure

HealthlinkOnline has a high security infrastructure designed to offer maximum protection. It employs the use of V-LANs, multiple firewalls and VPNs to ensure the data remains as secure as possible.

Next >>