Confidentiality and Security for e-Health C. Peter Waegemann CEO, Medical Records Institute (MRI) Chairman and Acting Director, Centre for the Advancement.

Slides:



Advertisements
Similar presentations
JCAHO –A HIPAA Business Associate National HIPAA Summit
Advertisements

HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
606 CMR 14.00: Background Record Checks What you need to know!
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
EMS Checklist (ISO model)
Checking & Corrective Action
Electronic Health Record Systems: What are They, Why have They Failed for so Long, and What Progress is Being Made Now? C. Peter Waegemann CEO, Medical.
Bakheet Aldosari, Ph.D. Health 305 Health Information Management Bakheet Aldosari, Ph.D.
HIPAA Security Standards Emmanuelle Mirsakov USC School of Pharmacy.
1 Sep 15Fall 05 Standards in Medical Informatics Standards Nomenclature Terminologies Vocabularies.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
Westbrook Technologies from Document Management’s Role in HIPAA.
CHAPTER © 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2 The Use of Health Information Technology in Physician Practices.
Voice over the Internet Protocol (VoIP) Technologies… How to Select a Videoconferencing System for Your Agency Based on the Work of Watzlaf, V.M., Fahima,
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Security Controls – What Works
Information Security Policies and Standards
Concepts of Database Management Seventh Edition
ELECTRONIC MEDICAL RECORDS By Group 5 members: Kinal Patel David A. Ronca Tolulope Oke.
Instructions and forms
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
National Smartcard Project Work Package 8 – Security Issues Report.
Thomas Levy. Agenda 1.Aims: CIAN 2.Common Business Attacks 3.Information Security & Risk Management 4.Access Control 5.Cryptography 6.Physical Security.
The Use of Health Information Technology in Physician Practices
HIPAA PRIVACY AND SECURITY AWARENESS.
Concepts of Database Management Sixth Edition
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
ISMS for Mobile Devices Page 1 ISO/IEC Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview.
Forms Management: Compliance, Security & Workflow Efficiencies.
Health Information Technology Basics January 8, 2011 by Leola McNeill adapted from Information Technology Basics by June 2009, Kayla Calhoun & Dr. Frank.
Concepts of Database Management Eighth Edition
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
MED INF HIT Integration, Interoperability & Standards ASTM E-31 January 14, 2010 By Imran Khan.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Working with HIT Systems
Chapter 2 Securing Network Server and User Workstations.
HIPAA Health Insurance Portability and Accountability Act of 1996.
Component 3-Terminology in Healthcare and Public Health Settings Unit 16-Definitions and Concepts in the EHR This material was developed by The University.
Chapter 19 Manager of Information Systems. Defining Informatics Process of using cognitive skills and computers to manage information.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
HIPAA Security John Parmigiani Director HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill/Irwin Chapter 6 The Privacy and Security of Electronic Health Information.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 3 This material was developed by Oregon Health & Science University,
© 2016 Chapter 6 Data Management Health Information Management Technology: An Applied Approach.
Computers in the Ambulatory Care Setting
Audit Trail LIS 4776 Advanced Health Informatics Week 14
Chapter 16 Medical Records.
IS4550 Security Policies and Implementation
Professor of Information Systems Security
Paul T. Smith, Esq. Partner, Davis Wright Tremaine LLP
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Introduction to the PACS Security
Presentation transcript:

Confidentiality and Security for e-Health C. Peter Waegemann CEO, Medical Records Institute (MRI) Chairman and Acting Director, Centre for the Advancement of Electronic Health Records (CAEHR) UK Chair, Standards Committee ASTM E31 on Healthcare Informatics Chair, US TAG to ISO TC 215 on Health Informatics Chair, ISO TC 215 Task Force on Consumer Interests Vice Chair, Mobile Healthcare Alliance (MoHCA)

What is e-Health? Internet-enabled Healthcare Applications –Consumer Health Information –Personal Health Records –Internet-based Services (e-Pharmacy, e-Care (incl. and e-communication, etc.) Electronic Health Record (EHR) Systems Administrative and Financial Health Systems

Importance of Healthcare Security Confidentiality/Data Security What if something goes wrong? –Systems Failure (Crash or virus causes loss of data) –Outside force damages (hacker, other) –Disaster Design Issues (Signature, authentication, others) Compliance Issues

How is Healthcare Security Different From Other Industries? Not bilateral conditions Regulated (US: HIPAA and other regulations) Community interest Legal issues

e-Health Security Issues Security for (Patient) Confidentiality Security that Enables Electronic Health Records –Authentication –Data Integrity Systems Security –Secure Transmission –Secure Processing –Secure Storage –Etc.

General Security Standards 200+ Standards for Internet and General Information Systems Authentication Identification Signature Non-repudiation Data Integrity Encryption Data Integrity Process Permanence System Security Communication Processing Storage Permanence Internet Security Personal Health Records Secure Internet Services Healthcare-specific Security Standards

Security on the Internet Reliability of Health Information on the Net Trust to e-care Trust to e-pharmacy

Personal Health Records Secure Documentation Secure Storage Relationship Between the Consumer/Patient and the Website Organization

ASTM E2211 Data Mining: For IIHI, PCHR suppliers shall allow consumers to choose if and how any personally identifiable information collected from them may be used. These choices shall be presented in a manner requiring that the consumer give specific permission for use of such data. Policies: The PCHR supplier shall allow a consumer or other authorized individual easy access at any point in the PCHR application to the policies and standards to which the PCHR supplier site adheres, as well as their associated charges, if any. Access: A PCHR supplier shall provide the consumer with the ability to access data within the PCHR in order to verify its correctness or to contest its accuracy and completeness, or both. Access policies shall describe the turnaround time related to such requests (time from request to access), shall specify associated charges, and shall include instructions for contesting and correcting inaccurate or incomplete data. IntegrityA PCHR supplier must be able to assure data integrity through audit trails and other security methods and shall disclose its quality assurance policies regarding maintenance of data integrity. RetentionThe PCHR suppliers disclosure statement shall state the length of time that the information will be stored and maintained.

Confidentiality Confidentiality is Governed by Local/National Legislation and Provider Policies

E31.17 Privacy, Confidentiality and Access Chair: Mary Alice Hanken Scope: To develop standards that address access, privacy, confidentiality and data security of health information in its many forms and locations. E 1869 Guide for Confidentiality, Privacy, Access and Data Security Principles for Health Information Including Computer Based Patient Records E 1986 Standard Guide for Information Access Privileges to Health Information E 1987 Standard Guide for Individual Rights Regarding Health Information E 1988 Standard Guide for the Training Persons Who Have Access to Health Information PS 115 Provisional Standard Specification for Security Audit and Disclosure Logs for Use in Health Information Systems Standards Under Development Draft PS 105 Provisional Standard Guide for Amendments to Health Information Draft Standard for Utilization and Retention of Encrypted Signature Certificates

Security for EHR Systems Documentation Method Authentication Data Integrity Systems Security

Mobile Health- care Communication and Computing Device Any (small) portable and unobtrusive computing and/or telecommunications device that assists in the collection, retrieval or communication of data relevant to medical care

Mobile communications devices and healthcare Situation: –Mobile wireless devices are entering hospitals and other health care environments –Device support applications providing increased productivity and decreased medical errors –Past issues with wireless equipment give cause for concern and caution regarding potential issues in their usage –Some institutions have issued bans What is the appropriate security? What security standards are needed?

RF Wireless already seen in hospital Paging Cellular (incl: Blackberry, RIM) Wireless LAN (WiFi) Wireless Medical Telemetry System (WMTS) Bluetooth Radio/TV stations

Personal Area Network Local Area Network Wide Area/Mobile Network : Bluetooth 1Mb/s _ 11-54Mb/s Cellular voice, data kb/s 30m100m VoIP Connectivity Networking 150m >1000m >5000m Metropolitan Area Network Mb/s Wireless technology/application

What Are General Mobile Health Computing (MHCD) Applications? A.Handheld (Point-of-Care) Information Accessing Devices B.Intermittently Connected Computing Devices C.Locally (Always) Connected Computing Devices D.Long-Range Connected Computing Devices

EMI/EMC Three Approaches Lack of Data on Risk Varies by Technology: WiFi not as dangerous Ad-hoc Testing

Has the Content Changed Since a Signature Has Been Affixed? Need for Determination of Lower Threshold Signature is to be Changed When Document is Changed or Deteriorated

Best Least Secure

Biometric Identification Identification of Body Parts –Fingerprint –Retina Scan –Face Scan –Hand Scan Identification of Person-specific Processes –Keystroke Recognition –Speech Pattern –Writing/Signature

Beginning with e-Prescribing. Leveraging better ways of identifying ourselves to other services Courtesy Andrew Barbash, MD

System Security Information Flow (Chain of Trust) End-to-End (Point of Origination to Point of Access Security) Stewardship Issues Accountability Audit Access Control Encryption Trusted Data Stores Trusted Communications Data/Function Classification User/Role Clearances Non-repudiation Signature Architecture Back-up/Recovery

Performance Response Time –Systems failure if practitioner can do it faster and there are no other benefits –Dependent on database and technical approaches Database server is bottleneck Underlying Technology and Presentation/Navigation Issues Scaling

Reliability: Unscheduled Downtime 99.9% Availability % Availability 8.76 unscheduled hours of non-availability 5.25 Minutes per Year

US National Standards HIPAA E31.20 Data and System Security for Health Information E Standard Guide for Properties of a Universal Healthcare Identifier (UHID) E Standard Guide for Electronic Authentication of Health Care Information E Standard Guide for User Authentication and Authorization E Standard Specification for Authentication of Healthcare Information Using Digital Signatures E a Standard Guide on Security Framework for Healthcare Information E Standard Guide for Internet and Intranet Healthcare Security E a Standard Practice Healthcare Certificate Policy E31.22 Health Information Transcription and Documentation E Standard Guide for Management of the Confidentiality and Security of Dictation, Transcription, and Transcribed Health Records

Regional and International Standards CEN TC 251 ISO TC 215 Others

There is a notable contrast between sectors regarding inappropriate access to patient records by authorized users within the organization IHDSOs are very concerned Solo/Small practices are much less concerned The greatest concern of the Solo/Small practices is Access to patient record information by unauthorized users The Ambulatory sectors are less concerned about Violations of data security policies and practices Survey

Data Security Guidelines, Standards, or Features Implemented or Planned In general, the use of data security protections is fairly high for: Access control methods Protection of data over networks Protection of data within the enterprise The area where data security protection is least implemented is authentication of users.

IHDSOs have significantly higher levels of implementation; Hospitals are slightly above average; Medium/Large practices are about average; and Solo/Small practices fall significantly below average IHDSOs are especially strong in implementing data security protection within the enterprise (i.e., policies and practices, backup/recovery procedures, and Audit logs) In contrast, Solo/Small practices are weakest in implementing data security protection within the enterprise Data Security Guidelines, Standards, or Features Implemented or Planned

Summary How long will it take to implement a fully operable electronic health record? –A long road ahead The same applies to security standards Practical security standards needed to cover the current status of EHR developments

Copies of these slides may be obtained by ing Attend: Mobile Healthcare Conference September Minneapolis Hilton TEHRE 2003 London, England 2-3 December 2003 in conjunction with International ICT Marketplace Survey on Electronic Health Record Usage and Trends