International Telecommunication Union Workshop on Standardization in E-health Geneva, 23-25 May 2003 Security needs in telemedicine Philippe Feuerstein,

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
ONLINE PRIVACY & DATA PROTECTION VERINE ETSEBETH.
HIPAA Security Standards Emmanuelle Mirsakov USC School of Pharmacy.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
FERPA: Family Educational Rights and Privacy Act.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Cryptographic Technologies
Applied Cryptography for Network Security
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
ELECTRONIC MEDICAL RECORDS By Group 5 members: Kinal Patel David A. Ronca Tolulope Oke.
© Julia Wilk (FHÖV NRW) 1 Digital Signatures. © Julia Wilk (FHÖV NRW)2 Structure 1. Introduction 2. Basics 3. Elements of digital signatures 4. Realisation.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
Cyber Law & Islamic Ethics
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
HIPAA PRIVACY AND SECURITY AWARENESS.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Advanced HIPAA Issues for Biotech and Life Sciences Companies: Mark E. Schreiber Palmer & Dodge LLP 111 Huntington Avenue Boston, MA
COEN 351 E-Commerce Security Essentials of Cryptography.
Cryptography, Authentication and Digital Signatures
1 Boundary Control Chapter Materi: Boundary controls:  Cryptographic controls  Access controls  Personal identification numbers  Digital signatures.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
Chapter 4 Using Encryption in Cryptographic Protocols & Practices (Part B)
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
HIPAA Health Insurance Portability and Accountability Act of 1996.
DIGITAL SIGNATURE.
COEN 351 E-Commerce Security
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
-1- WORKSHOP ON DATA PROTECTION AND DATA TRANSFERS TO THIRD COUNTRIES Technical and organizational security measures Skopje, 16 May - 17 May 2011 María.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 3 This material was developed by Oregon Health & Science University,
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
Information Security and Privacy in HRIS
Information Security and Privacy By: Mike Battestilli.
Access to Employee Exposure and Medical Records
Privacy & Confidentiality
Chapter 5: The Art of Ensuring Integrity
Instructor Materials Chapter 5: The Art of Ensuring Integrity
Digital Signature.
Computer Security Security Concepts September 20, 2018
Access to Employee Exposure and Medical Records
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Pooja programmer,cse department
Professor of Information Systems Security
Cryptography and Network Security
Instructor Materials Chapter 5: The Art of Ensuring Integrity
13 Managing Medical Records Lesson 3:
Security in SDR & cognitive radio
Mohammad Alauthman Computer Security Mohammad Alauthman
Instructor Materials Chapter 5: Ensuring Integrity
Presentation transcript:

International Telecommunication Union Workshop on Standardization in E-health Geneva, May 2003 Security needs in telemedicine Philippe Feuerstein, MD Centre Hospitalier de Mulhouse, France

ITU-T May 2003 Workshop on Standardization in E-health Introduction o New technologies widely improve the ability to electronically record, store, transfer and share medical data o Sharing data by telemedicine is fast and cheap (at least, compared to classical methods) o More and more participants are involved in this electronic data flow

ITU-T May 2003 Workshop on Standardization in E-health E-health channels o Physician/Physician o Physician/Healthcare professionals o Physician/Patient o Physician/Government agencies o Physician/Public health o Physician/Law enforcement o Physician/Insurance companies o Physician/Registry office

ITU-T May 2003 Workshop on Standardization in E-health Standardization o When talking about standardization, hardware and software are taken into account o Never underestimate the need of standardizing manware: if the different actors dont have similar goals or expectations, nothing will have satisfactory results and security flaws will arise

ITU-T May 2003 Workshop on Standardization in E-health Why security needs? (1) o E-health must: assure physical and logical data protection preserve the use of data from obsolete technologies with a safe way to migrate from analog to numeric data conform to legal and ethical rules: privacy, consent…

ITU-T May 2003 Workshop on Standardization in E-health Why security needs? (2) o E-health must: protect health professionals whenever a medical case turns to a legal case deal with the presence of third party: transfer operator, storage operator protect copyright

ITU-T May 2003 Workshop on Standardization in E-health Hardware Security o Usual safety measures: Hardware protection Data backup …

ITU-T May 2003 Workshop on Standardization in E-health Confidentiality (1) o Keeping secure and secret information concerning an individual, guaranteeing his right to privacy o Patient information is confidential and should not be disclosed without consent unless justified for lawful purposes

ITU-T May 2003 Workshop on Standardization in E-health Confidentiality (2) o Insurance companies obtaining medical information on policyholders could misuse it to deny coverage or claims o Potential employers obtaining health information on current or potential employees could misuse it to fire or not employ a person o Politician obtaining health information on opponents could misuse it for unfair attacks

ITU-T May 2003 Workshop on Standardization in E-health Confidentiality (3) o For most health professionals, confidentiality is an ethical duty o In most countries, confidentiality is a legal obligation, but demanded level is variable: Data Protection Act European Data Protection Directive 95/46 Health Insurance Portability and Accountability Act

ITU-T May 2003 Workshop on Standardization in E-health Confidentiality (4) o Confidentiality can be obtained by use of cryptographic services o In many countries, legal restrictions apply to cryptography materials o Standardization challenge: to find a common algorithm, strong enough to be safe but law compliant in most if all countries

ITU-T May 2003 Workshop on Standardization in E-health Authentication (1) o For most documents, authenticity is bound to the presence of an authorized handwritten signature o Even photocopies are worth nothing o To find an equivalent of handwritten signature for a digital document is a difficult problem

ITU-T May 2003 Workshop on Standardization in E-health Authentication (2) o It is necessary to find a system, dealing with digital document, having these capabilities: The receiver can verify that the issuer is really who he claims to be The issuer cannot subsequently refute the document The receiver, or any third party, cannot have made himself the document A date stamp of the document creation is recorded

ITU-T May 2003 Workshop on Standardization in E-health Authentication (3) o Asymmetric public-key infrastructure (PKI) cryptography fulfills the needs o Unfortunately, no PKI standard is universally recognized o In more and more countries, the validity of digital signature is legally recognized if the system used meets defined criteria (e.g.: Electronic Signatures and Records Act)

ITU-T May 2003 Workshop on Standardization in E-health Integrity (1) o During transfer or storage, data should not be modified voluntarily or accidentally o Modification of conventional data are generally pretty obvious: erasing words in a letter, scratch on a plain film o Situation is different with numerical data

ITU-T May 2003 Workshop on Standardization in E-health Integrity (2) o Real kidney stone or graphical trick?

ITU-T May 2003 Workshop on Standardization in E-health Integrity (3) o Same document with 10% random noise

ITU-T May 2003 Workshop on Standardization in E-health Integrity (4) o Integrity can be compared to sending a postcard on which a plastic cover has been applied: everybody can read it, but nobody can modify it without leaving a visible mark o Integrity of both data ( misc. recording, imaging) and medical report is needed; ideally, they should be attached and inseparable

ITU-T May 2003 Workshop on Standardization in E-health Availability o Data must be accessible and usable upon demand by an authorised user, with an acceptable waiting time o The time used include the whole cycle: Data retrieving Signature, encryption Transfer Decryption, integrity check

ITU-T May 2003 Workshop on Standardization in E-health Auditability o In the health multi-user environment, an authorized person may also access to information in situation when he is not concerned o When transmitting, it is necessary to have a proof that sending, receiving and using data effectively occurred o Timed chronology has also to be known

ITU-T May 2003 Workshop on Standardization in E-health Anonymity o Easily sharing data via telemedicine enable large scale multicentric studies o Individual patient data are used for common benefit; privacy must be preserved and data anonymization is a basic rule o A unique identifier is necessary but no standard exists on how to anonymize data

ITU-T May 2003 Workshop on Standardization in E-health Copyright protection o For educational or informational purpose, more and more data are available online o It is often forgotten that something available online should not be systematically freely used by anyone o Watermarking of document is a possible solution against « cyberplagiarism »

ITU-T May 2003 Workshop on Standardization in E-health The ultimate security ? o New technologies should be better than old ones o In term of security, we wish a data auto destruction mechanism in case of attempt of: alteration (voluntary or accidentally) theft disclosure or any improper use

ITU-T May 2003 Workshop on Standardization in E-health Conclusion o Security issues are numerous and of primordial importance in telemedicine o Circumventing them is one of the key point for the success of telemedicine o Most of these issues can be addressed by cryptographic services and use of PKI o Lack of standardization is a major drawback

International Telecommunication Union Workshop on Standardization in E-health Geneva, May 2003 Thank you for your attention!