1 / 45

Keep it Confidential

Keep it Confidential. An Overview of Healthcare Information Security from a Systems Approach. Presented by: Amber Boglin Amaechi Erondu Holly Trask 20 April 1998. Project Overview Introduction Problem Exploration of Alternatives Implementing a Data Security Plan Conclusion.

lise
Download Presentation

Keep it Confidential

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Keep it Confidential An Overview of Healthcare Information Security from a Systems Approach Presented by: Amber Boglin Amaechi Erondu Holly Trask 20 April 1998

  2. Project Overview • Introduction • Problem • Exploration of Alternatives • Implementing a Data Security Plan • Conclusion

  3. Computer-based Patient Records • “An electronic patient record that resides in a system designed to support users through availability of complete and accurate data, practitioner reminders and alerts, clinical decision support systems, links to bodies of medical knowledge, and other aids.” Source: Institute of Medicine

  4. Last Project • Client: • Kaiser Permanente of Ohio • Objectives: • Reduce the cost of medical records keeping • Improve access to patient records

  5. Why we need security: A short story Community General Hospital Hospital Lab Clerk Daughter Lizzy

  6. Lizzy’s Prank I’ll really screw up these people’s weekend Informs Patient HIV Positive Informs Patient she is both- HIV positive and pregnant Lizzy gains access to emergency room patient database, As a prank she calls every one on the list to inform men that they tested positive for HIV and tells the women that they are pregnant. One woman she tells that she has tested positive for both. (Bayard, 1)

  7. Case Studies in Undefined Confidentiality Policy • AIDS patients fear worker leaked list... • Casual conversations of patient status in a small town... • Teen daughter of hospital laboratory clerk calls blood work patients and tells them they are HIV positive... • Violation of privacy with celebrity medical records

  8. Project Overview • Introduction • Problem • Exploration of Alternatives • Implementation a Data Security Plan • Conclusion

  9. Security of Healthcare Information • “Security is the protection of information systems against unauthorized access to or modification of information, whether in storage, processing, or transit, and against the denial of service to authorized users or the provision of service to unauthorized users, including those measure necessary to detect, document and counter such threats.” Source: National Research Council, 1991

  10. Flow of Personal Health Information Direct Pt. Care Dr. Office Clinic Hospital Nursing Facility institutions Support Activities Service payers Quality Reviews Admin. Reviews Social Users Insurance Elig Employers Licensing Public Health Medical Research Welfare Commercial Users Marketing Profit/Risk Mgmt Drug Usage Source: Alan Westin,1976

  11. 1996 Poll Data • 75% survey respondents feared their health care information would be used for purposes other than health care services. • 27% reported that their medical information had been improperly disclosed at sometime. • 35% of those who had been affected said the disclosure has resulted in embarassment and personal harm. (Bard, 1)

  12. Threats to Information Confidentiality • Insiders make “innocent” mistakes • People are curious • Insiders knowing divulge information • Outsider attacks • Unrestrained secondary use-there is money to be made Rindfleisch, 1998

  13. Project Overview • Introduction • Problem • Exploration of Alternatives • Implementing a Data Security Plan • Conclusion

  14. Features of a Security System • Authentication • Authorization • Integrity • Audit Trails • Disaster Prevention/Recovery • Secure Data Storage • Transmission Source: Computer-based Patient Record Institute

  15. Authentication • Providing assurance regarding the identity of a subject or object Source: ASTM E1762

  16. Authentication Features The system: • permits passwords of sufficient length such that they are unique for every user • provides the ability to inform a user of the last time the system was accessed with the user’s ID code • provides reports of current inventory of users, Ids and access authorities

  17. Authorization • The granting of rights (to information), which includes the granting of access based on access rights Source: ISO 7498-2

  18. Authorization Features The system: • allows defined access to specific data elements, files, menus, commands and networks based on user’s patient care responsibilities by user, function and location • has a time-out feature that automatically signs a user off a terminal if left unattended for a defined period of time • can determine who is accessing a patient record at any point in time through on-line inquiry

  19. Integrity • Refers to the accuracy, consistency and completeness of data, a program, a system, or a network Source: National Research Council, 1991

  20. Integrity Features The system: • provides data management features that eliminate the redundant maintenance of duplicate patient data • supports anti-virus software • is protected from unauthorized access via the Internet through the use of firewalls, cryptography and other authentication devices

  21. Audit Trails • The results or reports of monitoring each operation on information Source: National Research Council, 1991

  22. Audit Trail Features The system: • logs and reports all violations of system security procedures • allows sign-on identification to tag on-line transaction audit records for reporting capabilities • supports the ability to use third-party audit packages

  23. Disaster Prevention & Recovery • The process of an organization restoring data loss in the event of a fire, natural disaster, vandalism or system failure Source: CPRI, July 1996

  24. Disaster Prevention & Recovery Features The system: • provides a backup process that can be performed in a dynamic mode so that the system can be operational 24 hours/day • provides a data archiving process based on system administrator criteria • can recover to the point of failure if disaster occurs

  25. Secure Data Storage • The establishment and maintenance of data in a protected place

  26. Transmission • The remote exchange of data between person-program, person-person or program-program Source: Longley, 1987

  27. Data Storage & Transmission Features The system: • supports the ability to import & export data • provides interface to allow archival of data • secures dial-in access, unique user IDs and passwords, limited access times and limited connection duration

  28. Technological Approaches to Securing Patient Data • Access Control/User Authentication • Passwords • Tokens • Firewalls • Data Authentication • Digital Signatures • Biometrics user authentication • Key Management • Key management issues for public key cryptography • Audit trails • Digital notary time stamp

  29. Firewalls • A combination of hardware and software components used to protect an internal network, or intranet, from potential security breaches by way of external or public access networks such as the Internet. Firewall Functions • A firewall acts as a barrier between a network of machines that operate under a common security policy. • A firewall does not protect from inside attacks. Source: American Academy of Family Physicians: Family Practice Management lead article, May 1997.

  30. Source: Rindfleisch, 25

  31. Encryption Uses mathematical formulas to scramble information like credit card numbers to make them unreadable to computer users who lack a software key that can decode encrypted data. Encryption Functions Keys This system uses two different keys to encrypt a message and another to decrypt the message. Public Keys The system uses a key that is publicly available to to decrypt messages. Usually this key is widely distributed so anyone who obtains it can send an encrypted message to the person who has his public key. (Source: Bard, 3)

  32. Rindfleisch,40

  33. The Systems Development Life Cycle • Proper policy Planning • Analysis of the problem • Designing or Prototyping a Solution • Implementation of the Solutions • Support, Maintenance and Education

  34. Project Overview • Introduction • Problem • Exploration of Alternatives • Implementing a Data Security Plan • Conclusion

  35. Confidentiality Project Planning • Understanding laws and regulations • Organization-specific documentation of information security policies, standards and procedures • Senior management support concerning the corporate direction for information security in writing

  36. Policy Planning: Understanding Key Legislation • Privacy Act of 1974 • Emergency Medical Treatment and Active Labor Act • Patient Self-Determination Act • Freedom of Information Act • Your organization’s confidentiality policy!

  37. Problem Analysis • Review the current and proposed security network architecture • Assess existing security technology and document current problems • Identify & document various human factors issues concerning security • Interview physicians for suggestions in creating a security model based on best practices

  38. Planning for Human Error • Outside access to internal, personal information • Individuals may make money by selling information • Employee disclosure of personal patient information • accidental • on purpose

  39. Designing or Prototyping a Solution • Develop & model the proposed security architecture with various diagrams • Match institution-wide patient record security policies to proposed model • Evaluate third-party computerized patient record security tools • Develop user training and security/confidentiality awareness training • Develop EMR information security roles & responsibilities • Develop standards for technology usage & upgrades

  40. Solution Implementation • Designate implementation & project management leaders • Integrate constant physician involvement with CPR security plan implementation • Create implementation time line and plan guidelines • Pilot the security/confidentiality policies & procedures and user manuals for security technology • Post the policies and plan organization-wide user training to master the new technologies to secure patient data • Conduct an implementation review, including representative clinical and administrative users

  41. Support, Maintenance and Education • Evaluate & re-visit final implementation checklist • Schedule an ongoing CPR security awareness training program • Designate CPR security compliance review board & schedule quarterly progress reports • Review current healthcare data security personnel responsibility descriptions and update them reflect the new security/confidentiality plan

  42. Implementation Cost Analysis Systems RFP information

  43. Project Overview • Introduction • Problem • Exploration of Alternatives • Implementing a Data Security Plan • Conclusion

  44. Conclusions & Recommendations • Necessary integration of CPR data security policies with emerging & proposed security technology • Team involvement between physicians, other clinical staff in implementing secure plans for CPR information systems • Plan for disaster recovery of CPR information • Clarify internal security policies to external organizations • Pilot test the technology to simulate internal & external security attacks • Clarify & document consequences for CPR security attacks and violations

More Related