450 likes | 672 Views
Keep it Confidential. An Overview of Healthcare Information Security from a Systems Approach. Presented by: Amber Boglin Amaechi Erondu Holly Trask 20 April 1998. Project Overview Introduction Problem Exploration of Alternatives Implementing a Data Security Plan Conclusion.
E N D
Keep it Confidential An Overview of Healthcare Information Security from a Systems Approach Presented by: Amber Boglin Amaechi Erondu Holly Trask 20 April 1998
Project Overview • Introduction • Problem • Exploration of Alternatives • Implementing a Data Security Plan • Conclusion
Computer-based Patient Records • “An electronic patient record that resides in a system designed to support users through availability of complete and accurate data, practitioner reminders and alerts, clinical decision support systems, links to bodies of medical knowledge, and other aids.” Source: Institute of Medicine
Last Project • Client: • Kaiser Permanente of Ohio • Objectives: • Reduce the cost of medical records keeping • Improve access to patient records
Why we need security: A short story Community General Hospital Hospital Lab Clerk Daughter Lizzy
Lizzy’s Prank I’ll really screw up these people’s weekend Informs Patient HIV Positive Informs Patient she is both- HIV positive and pregnant Lizzy gains access to emergency room patient database, As a prank she calls every one on the list to inform men that they tested positive for HIV and tells the women that they are pregnant. One woman she tells that she has tested positive for both. (Bayard, 1)
Case Studies in Undefined Confidentiality Policy • AIDS patients fear worker leaked list... • Casual conversations of patient status in a small town... • Teen daughter of hospital laboratory clerk calls blood work patients and tells them they are HIV positive... • Violation of privacy with celebrity medical records
Project Overview • Introduction • Problem • Exploration of Alternatives • Implementation a Data Security Plan • Conclusion
Security of Healthcare Information • “Security is the protection of information systems against unauthorized access to or modification of information, whether in storage, processing, or transit, and against the denial of service to authorized users or the provision of service to unauthorized users, including those measure necessary to detect, document and counter such threats.” Source: National Research Council, 1991
Flow of Personal Health Information Direct Pt. Care Dr. Office Clinic Hospital Nursing Facility institutions Support Activities Service payers Quality Reviews Admin. Reviews Social Users Insurance Elig Employers Licensing Public Health Medical Research Welfare Commercial Users Marketing Profit/Risk Mgmt Drug Usage Source: Alan Westin,1976
1996 Poll Data • 75% survey respondents feared their health care information would be used for purposes other than health care services. • 27% reported that their medical information had been improperly disclosed at sometime. • 35% of those who had been affected said the disclosure has resulted in embarassment and personal harm. (Bard, 1)
Threats to Information Confidentiality • Insiders make “innocent” mistakes • People are curious • Insiders knowing divulge information • Outsider attacks • Unrestrained secondary use-there is money to be made Rindfleisch, 1998
Project Overview • Introduction • Problem • Exploration of Alternatives • Implementing a Data Security Plan • Conclusion
Features of a Security System • Authentication • Authorization • Integrity • Audit Trails • Disaster Prevention/Recovery • Secure Data Storage • Transmission Source: Computer-based Patient Record Institute
Authentication • Providing assurance regarding the identity of a subject or object Source: ASTM E1762
Authentication Features The system: • permits passwords of sufficient length such that they are unique for every user • provides the ability to inform a user of the last time the system was accessed with the user’s ID code • provides reports of current inventory of users, Ids and access authorities
Authorization • The granting of rights (to information), which includes the granting of access based on access rights Source: ISO 7498-2
Authorization Features The system: • allows defined access to specific data elements, files, menus, commands and networks based on user’s patient care responsibilities by user, function and location • has a time-out feature that automatically signs a user off a terminal if left unattended for a defined period of time • can determine who is accessing a patient record at any point in time through on-line inquiry
Integrity • Refers to the accuracy, consistency and completeness of data, a program, a system, or a network Source: National Research Council, 1991
Integrity Features The system: • provides data management features that eliminate the redundant maintenance of duplicate patient data • supports anti-virus software • is protected from unauthorized access via the Internet through the use of firewalls, cryptography and other authentication devices
Audit Trails • The results or reports of monitoring each operation on information Source: National Research Council, 1991
Audit Trail Features The system: • logs and reports all violations of system security procedures • allows sign-on identification to tag on-line transaction audit records for reporting capabilities • supports the ability to use third-party audit packages
Disaster Prevention & Recovery • The process of an organization restoring data loss in the event of a fire, natural disaster, vandalism or system failure Source: CPRI, July 1996
Disaster Prevention & Recovery Features The system: • provides a backup process that can be performed in a dynamic mode so that the system can be operational 24 hours/day • provides a data archiving process based on system administrator criteria • can recover to the point of failure if disaster occurs
Secure Data Storage • The establishment and maintenance of data in a protected place
Transmission • The remote exchange of data between person-program, person-person or program-program Source: Longley, 1987
Data Storage & Transmission Features The system: • supports the ability to import & export data • provides interface to allow archival of data • secures dial-in access, unique user IDs and passwords, limited access times and limited connection duration
Technological Approaches to Securing Patient Data • Access Control/User Authentication • Passwords • Tokens • Firewalls • Data Authentication • Digital Signatures • Biometrics user authentication • Key Management • Key management issues for public key cryptography • Audit trails • Digital notary time stamp
Firewalls • A combination of hardware and software components used to protect an internal network, or intranet, from potential security breaches by way of external or public access networks such as the Internet. Firewall Functions • A firewall acts as a barrier between a network of machines that operate under a common security policy. • A firewall does not protect from inside attacks. Source: American Academy of Family Physicians: Family Practice Management lead article, May 1997.
Encryption Uses mathematical formulas to scramble information like credit card numbers to make them unreadable to computer users who lack a software key that can decode encrypted data. Encryption Functions Keys This system uses two different keys to encrypt a message and another to decrypt the message. Public Keys The system uses a key that is publicly available to to decrypt messages. Usually this key is widely distributed so anyone who obtains it can send an encrypted message to the person who has his public key. (Source: Bard, 3)
The Systems Development Life Cycle • Proper policy Planning • Analysis of the problem • Designing or Prototyping a Solution • Implementation of the Solutions • Support, Maintenance and Education
Project Overview • Introduction • Problem • Exploration of Alternatives • Implementing a Data Security Plan • Conclusion
Confidentiality Project Planning • Understanding laws and regulations • Organization-specific documentation of information security policies, standards and procedures • Senior management support concerning the corporate direction for information security in writing
Policy Planning: Understanding Key Legislation • Privacy Act of 1974 • Emergency Medical Treatment and Active Labor Act • Patient Self-Determination Act • Freedom of Information Act • Your organization’s confidentiality policy!
Problem Analysis • Review the current and proposed security network architecture • Assess existing security technology and document current problems • Identify & document various human factors issues concerning security • Interview physicians for suggestions in creating a security model based on best practices
Planning for Human Error • Outside access to internal, personal information • Individuals may make money by selling information • Employee disclosure of personal patient information • accidental • on purpose
Designing or Prototyping a Solution • Develop & model the proposed security architecture with various diagrams • Match institution-wide patient record security policies to proposed model • Evaluate third-party computerized patient record security tools • Develop user training and security/confidentiality awareness training • Develop EMR information security roles & responsibilities • Develop standards for technology usage & upgrades
Solution Implementation • Designate implementation & project management leaders • Integrate constant physician involvement with CPR security plan implementation • Create implementation time line and plan guidelines • Pilot the security/confidentiality policies & procedures and user manuals for security technology • Post the policies and plan organization-wide user training to master the new technologies to secure patient data • Conduct an implementation review, including representative clinical and administrative users
Support, Maintenance and Education • Evaluate & re-visit final implementation checklist • Schedule an ongoing CPR security awareness training program • Designate CPR security compliance review board & schedule quarterly progress reports • Review current healthcare data security personnel responsibility descriptions and update them reflect the new security/confidentiality plan
Implementation Cost Analysis Systems RFP information
Project Overview • Introduction • Problem • Exploration of Alternatives • Implementing a Data Security Plan • Conclusion
Conclusions & Recommendations • Necessary integration of CPR data security policies with emerging & proposed security technology • Team involvement between physicians, other clinical staff in implementing secure plans for CPR information systems • Plan for disaster recovery of CPR information • Clarify internal security policies to external organizations • Pilot test the technology to simulate internal & external security attacks • Clarify & document consequences for CPR security attacks and violations