Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security of Computerized Medical Information: Threats from Authorized Users James G. Anderson, Ph.D. Purdue University.

Similar presentations


Presentation on theme: "Security of Computerized Medical Information: Threats from Authorized Users James G. Anderson, Ph.D. Purdue University."— Presentation transcript:

1 Security of Computerized Medical Information: Threats from Authorized Users James G. Anderson, Ph.D. Purdue University

2 Growth of Health Care Information Technology The health care industry spends $15 billion annually. The industry is expected to grow 20% annually. There are 35 publicly traded companies with market capitalization of $25 billion.

3

4 Dilemma How can we provide data required by the health care industry and protect the privacy of patients?

5

6 Public Concerns about Privacy 24% of health care providers reported violations of patients’ privacy. 18% of the public felt that it was inappropriate to use patient data without consent. 75% of the public felt that it was inappropriate to use prescription data to detect fraud. 11% of the public reported not filing insurance claims to protect their privacy.

7

8 Threats from Authorized Users Errors Curiosity Financial reasons Personal reasons

9

10 Secondary Uses of Health Information Employers Insurance companies Sale of information to third parties

11

12 Public Policy Issues Existing laws only cover data collected by federal agencies. These laws do not cover secondary users of health information. There is a lack of incentives for institutions to invest in security of health information.

13

14

15 The Health Insurance Portability and Accountability Act of 1996. Only covers health information transmitted electronically. Does not cover insurance companies, pharmacies and direct marketers of personal data. Permits use of health information with patient identifiers for health care operations.

16 The Health Insurance Portability and Accountability Act of 1996. May allow sale of patient data for secondary use. Privately funded research is exempt form the regulations. There is concern over the use of a unique patient identifier. There are differences in regulations between the E.U. and the U.S.

17 The Need for Public Policy EMR systems are critical to support integrated health care delivery systems. EMRs are vulnerable to inappropriate use. A policy framework is needed to direct future development and private investment in IT. Absence of policies creates confusion about privacy rights. Pending legislation contains conflicting proposals that will need to be resolved.

18


Download ppt "Security of Computerized Medical Information: Threats from Authorized Users James G. Anderson, Ph.D. Purdue University."

Similar presentations


Ads by Google