PHR stands for "Personal Health Record" a PHR permits you to securely gather, store, manage and share your own and your family's health information - when you want, where you want, and with whom you choose. EMed Life Alert Personal Health Record is more than your personal health history. It's smart. It works within the EMed Health Navigator system to provide you useful information and direct you to tools that you might find helpful. You can even securely download your phr onto the EMed Life Alert USB Wristband in case of an emergency.
You can purchase a PHR Life Alert Smartband at all FONTANA pharmacys!
EMed Personal Health Record:
EMed's Personal Health Record service is FREE and the wristband to store your Personal Health Record on is just $25.00 USD and comes with a limited warranty.
You can purchase your EMED Personal Health Record Storage Wristband by Clicking Here.
You can also find the "EMED LIFE ALERT" Personal Health Record Storage Wristband at all FONTANA pharmacies!
Here's a summary of some important points: Unless specifically authorized by you, or legally required, EMed will not release any data in which individuals can be personally identified. EMed does analyze data and produce reports for client organizations, but only using data collected from large populations of users. Such aggregate data cannot be used to identify any individuals. EMed uses aggregate data to better understand the needs of their organization and design appropriate health improvement programs to meet those needs. EMed abides by the Hi-Ethics MAJ Principles of Jamaica and the Hi-Ethics alliance. We are committed to helping people improve their health and the health of their families.
The Super Cool Security Stuff:
EMed partnering with Microsoft uses cutting-edge security practices and unmatched experience running some of the largest online services around the globe, Microsoft delivers enterprise cloud services to EMed that everyone can trust.
Design and Operational Security EMed has partnered with Microsoft for developed industry-leading best practices in the design and management of online services, including: Security Centers of Excellence. The Microsoft Digital Crimes Unit, Microsoft Cybercrime Center, and Microsoft Malware Protection Center provide insight into evolving global security threats.
Security Development Lifecycle (SDL). Since 2004, all Microsoft products and services have been designed and built from the ground up using its Security Development Lifecycle - a comprehensive approach for writing more secure, reliable and privacy-enhanced code.
Operational Security Assurance (OSA). The Microsoft OSA program provides an operational security baseline across all major cloud services, helping ensure key risks are consistently mitigated.
Assume Breach. Specialized teams of Microsoft security engineers use pioneering security practices and operate with an "assume breach"™ mindset to identify potential vulnerabilities and proactively eliminate threats before they become risks to customers. Incident Response. Microsoft operates a global 24x7 event and incident response team to help mitigate threats from attacks and malicious activity.
24 hour monitored physical security. Datacenters are physically constructed, managed, and monitored to shelter data and services from unauthorized access as well as environmental threats. Monitoring and logging. Security is monitored with the aid of centralized monitoring, correlation, and analysis systems that manage the large amount of information generated by devices within the environment and providing timely alerts. In addition, multiple levels of monitoring, logging, and reporting are available to provide visibility to customers. Patching. Integrated deployment systems manage the distribution and installation of security patches.
Antivirus/Antimalware protection. Microsoft Antimalware is built-in to Cloud Services to help identify and remove viruses, spyware and other malicious software and provide real time protection. Customers can also run antimalware solutions from partners on their Virtual Machines.
Intrusion detection and DDoS. Intrusion detection and prevention systems, denial of service attack prevention, regular penetration testing, and forensic tools help identify and mitigate threats from both outside and inside.
Zero standing privileges. Access to customer data by Microsoft operations and support personnel is denied by default. When granted, access is carefully managed and logged. Data center access to the systems that store customer data is strictly controlled via lock box processes.
Isolation. EMed uses network isolation to prevent unwanted communications between deployments, and access controls block unauthorized users. Virtual Machines do not receive inbound traffic from the Internet unless customers configure them to do so.
Encrypted communications. Built-in SSL and TLS cryptography enables customers to encrypt communications within and between deployments, from EMed to on-premises datacenters, and from EMed PHR to administrators and users. Private connection. EMed uses ExpressRoute to establish a private connection to datacenters, keeping their traffic off the Internet.
Data encryption. EMed has a wide range of encryption capabilities up to AES-256, giving peace of mind. Multi-Factor Authentication and access monitoring offer enhanced security.
Congratulations! You are on your way to taking control of your health information. To create a free personal health record account just click here. We know you will enjoy recording all your medical health issues, medications, allergies, immunizations, health record documents, xray images and MRI/CT-SCAN images from your doctor. So what are you waiting for?
You never know it just might save your life one day.