Find Jobs
Hire Freelancers

Data Encryption

$300-1000 USD

Cancelado
Publicado hace casi 19 años

$300-1000 USD

Pagado a la entrega
Data Encryption This project involves providing advice as to data encryption to WORLD BEST PRACTICE. The encryption must comply with the US HIPAA Act of 1996 (Health Insurance Portability and Accountability Act of 1996 ). THE PROJECT: Part 1: C - customers: Sound file data is created by digital dictation and consists of sound files only. These sound files will exist on local PC's (Windows and Mac OS). Lets call these files as the files of C (for customer). There will be many C's. C's comprise lawyers and doctors i.e. intelligent people who are not often technically computer literate. They (C) must be provided with software to encrypt the sound files. That software must be free to the customers This tender requires advice as to that encryption AND COMPRESSION software and technical assistance in deploying the same to customers via our WWW site as a free download - and writing for the www site the 'how to use' and 'how to download" and "FAQs" section concerning that encryption software. In summary the sound files are to be compressed and sent in a secure manner. Part 2: S - server: The secure compressed sound files sent by C's must be stored on a server (S) which is highly secure. The server must be located in Australia. The tender involves assisting select the server and configuration for security. Part 3: T - transcriber: The sound files need to be accessed by transcriptionists overseas in a secure manner. The tender involves advice as to that encryption and compression software and technical assistance in deploying the same - and writing for the www site the 'Transcribers - how to use' and 'Transcribers - how to download" and "Transcribers - FAQs" section concerning that encryption and compression software. Part 4: TO - output from transcriptionists The transcriptionists transcribe the dictation from C into a Microsoft word file (latest MS word software used). That output (O) from transcriptionists (T) is called TO. That TO must be encrypted and compression. So, in summary, T has transcribed the dictation (from C) in MS word and must now encrypt and compress the MS word file (TOMS) which is the MS word version of the sound file. The tender involves advice as to that MS word file encryption software and compression and technical assistance in deploying the same. Part 5: TOPR1 - output from transcriptionists (TO) in MS format sent to Proof Reader 1 (PR1). The transcriptionist (T) now sends the outputted (O) MS word file (TOMS) AND the sound file both encrypted and compressed to the first proof reader (PR1) who may be anywhere in the world. PR1 reads the MS word file while playing the sound file to ensure accurate transcription. Proof reader one may or may not need to amend the TOMS, however we will call that file, whether amended or not, TOMSPR1 - meaning transcriptionist output in MS word as checked by proof reader one - PR1 - transmission output in MS word as read by proof reader one. The tender involves advice as to that encryption software and technical assistance in deploying the same to the first proof readers - and writing for the www site the 'Proof Readers (First Read) - how to use' and 'Proof Readers (First Read) - how to download" and "Proof Readers (First Read) - FAQs" section concerning that encryption software. Part 6: TOPR2 - output from first proof readers (PR1) sent to Proof Reader 2 (PR2). The first proof readers (PR1) now sends the MS word file (TOMSPR1) and the sound file both encrypted and compressed to a second proof reader (PR2) who may be anywhere in the world. PR2 (also) reads the MS word file (TOMSPR1) while playing the sound file to ensure accurate transcription. Proof reader two may or may not need to amend the TOMSPR1, however we will call that file, whether amended or not, TOMSPR2 - meaning transcriptionist output in MS word as checked (after proof reader one) by proof reader two - PR2 - proof reader two. The tender involves advice as to that encryption software and compression and technical assistance in deploying the same to the second proof readers - and writing for the www site the 'Proof Readers (Second Read) - how to use' and 'Proof Readers (Second Read) - how to download" and "Proof Readers (Second Read) - FAQs" section concerning that encryption software. Part 7: TOMSPR2 - output from second proof readers (PR2) sent to Server S and to C TOMSPR2 and the original sound file in transfered by proof reader 2 too the server. The word file (as proof read 2 times) called TOMSPR2 is then emailed to the C (i.e. the word file, not the sound file, as the C has the original on his desktop) from which it came (as C's original sound file) - in encrypted and compressed form. That file must then upon reaching C's desktop be easily unencrypted. The tender involves advice as to that encryption software and technical assistance in deploying the same to C - and writing for the www site the "Customer - how to unencrypt" and "Customer FAQs" section concerning that way to uncompress and unencrypt. In summary: The following chain must be secure: Sound file from customer > server > transcriber (sound file and ms word file) > first proof reader (sound file and ms word file) > second proof reader (sound file and ms word file) > server (word file) > customer Your role is not writing the www site - but is to specify which software is used by customers and transcriptionists and proof readers to ensure security - and which server to use to hold the sound files and ms word output files. In addition to assisting in specification and identification of security software the work involves assistance in deployment and writing how to use, how to download and FAQs pages so customers, transcriptionists and proof readers can easily download and use the system. Lastly an ongoing HELP DESK by email facility is required (however that is for a later quote). Please quote for the above and supply in detail your firms qualifications and how you will ensure compliance with the US HIPAA Act of 1996 (Health Insurance Portability and Accountability Act of 1996 ). Your firm will be required to ensure the system is in world best practice for and is HIPAA compliant. We will be passing on your certified warranty to our clients and if it proves wrong and we are sued we will in turn pass liability onto your firm - SO BE SURE YOUR FIRM IS HIGHLY QUALIFIED as we INSIST the system must be best practice compliant and legally compliant as our reputation will depend on that fact - i.e. while the medical files are worthless we do not need bad publicity be having hackers intercept the system and letting the press know - if you follow our drift. Robert Truman LL.B. Lawyer for client. Australia
ID del proyecto: 18497

Información sobre el proyecto

8 propuestas
Proyecto remoto
Activo hace 18 años

¿Buscas ganar dinero?

Beneficios de presentar ofertas en Freelancer

Fija tu plazo y presupuesto
Cobra por tu trabajo
Describe tu propuesta
Es gratis registrarse y presentar ofertas en los trabajos

Sobre este cliente

Bandera de AUSTRALIA
Adelaide, Australia
5,0
19
Miembro desde feb 9, 2005

Verificación del cliente

¡Gracias! Te hemos enviado un enlace para reclamar tu crédito gratuito.
Algo salió mal al enviar tu correo electrónico. Por favor, intenta de nuevo.
Usuarios registrados Total de empleos publicados
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
Cargando visualización previa
Permiso concedido para Geolocalización.
Tu sesión de acceso ha expirado y has sido desconectado. Por favor, inica sesión nuevamente.