330 likes | 416 Views
Security of Health Information. Nancy Clark, M.Ed. FSU College of Medicine http://www.med.fsu.edu/informatics. Objectives. Demonstrate knowledge of issues surrounding the privacy and security of clinical data, including: Health Insurance Portability and Accountability Act (HIPAA)
E N D
Security of Health Information Nancy Clark, M.Ed. FSU College of Medicine http://www.med.fsu.edu/informatics
Objectives • Demonstrate knowledge of issues surrounding the privacy and security of clinical data, including: • Health Insurance Portability and Accountability Act (HIPAA) • Patient confidentiality • E-Mail with patients and colleagues • Role of technology
Issues • HIPAA and privacy • Threats to security and privacy • Using good passwords • Using virus software • Hardware/software options • Backing up your system • E-Mail with Patients
HIPAA • Health Insurance Portability and Accountability Act of 1996 • Insurance Reform:Carry health insurance to different plans • Administrative Simplification:Standards for electronically stored and transmitted data • Improve efficiency of sharing health data • Protecting privacy and confidentiality
Security, Privacy, Confidentiality • Privacy – The Right • Right of individual to have anonymity • Confidentiality – The Expectation • Obligation of the user of an individual’s information to respect and uphold that individual’s privacy • Security – The Mechanism • Policies, procedures, mechanisms, tools, technologies, and accountability methods to support Privacy • PHI - Protected Health Information • Patient identifiable information protected(paper or electronic)
Illustration Husband's note on refrigerator to his wife: Someone from the Gyna College called- They said Pabst beer is normal.
Significance of HIPAA What You Need to Know About HIPAA Now “In my opinion, … the unmistakable legacy of HIPAA will be to encourage computerization of all personal health information, regardless of who creates, stores or transmits it. How else can providers meet HIPAA's exhaustive requirements … The alternative to computerizing patients' medical information will be to maintain massive paper logs kept under lock and key. “ David C. Kibbe, MD, MBA
Categories of Security Regulations • Administrative procedures • Contingency planning • Information access controls • Staff training
Categories of Security Regulations • Administrative Procedures • Physical safeguards • Medical records storage areas • Printers, copiers, fax machines • Workstations • Server locations
Categories of Security Regulations • Administrative Procedures • Physical safeguards • Technical security • Passwords • Authentication • Digital signatures • Firewalls • Virus protection, VPN, encryption…
Security – The Three “A”s • Authentication • You are who you say you are • Authorization • You can see and do what you are permitted by policy to see and do • Accountability • You are held responsible for what you see and do
Authentication • Passwords – simplest form of authentication • Can be very secure, but one breach can spread rapidly • Can be too secure – if you forget your password
Selecting Good Passwords Using Good Passwords Suggestions for Selecting Good Passwords • not guessable by any program • easily remembered • private • Secret • Change them regularly
Biometric Authentication • Identify who you are by a physical attribute • Signature • Facial Points • Voice Print • Typing Style
Biometric Authentication • Fingerprint • Optical, Digital • Hmmm… would someone in a hospital have access to a severed finger? • Iris • Highly accurate • Same issue as with a dead finger • Requires a camera
Authorization • I’m a valid user or the system, and I’ve been authenticated. I want to see EVERYTHING on EVERYONE!!! • The system can define who is authorized to see and do what
Authorization Models • User Based • I have certain authorization rights based on who I am as an individual • Role Based • I have authority based on my role e.g. doctor vs. nurse vs. lab technologist • Context Based • Who you are + Where you are + What you are + When you are What you are
Accountability • You are held responsible for what you see and do • Difficult to develop systems-based ways of ensuring accountability • An ethics problem
Accountability • Security can help ensure accountability • Audit Logging – “We know where you’ve been” • Password policies • Alert capabilities
Ethics and Morals • One definition • Morals – choice between right and wrong • Ethics – choice between right and right • Example 1 • Famous person in hospital, and you’re curious about their lab results
Workplace Ethics • Many people may have access to patient data • Trust • Knowledge of Rules - Training • Awareness of Consequences
Technology Solutions • Data Encryption • Data Aging – remove data after a certain time • Data Transmission Security – can’t move what isn’t authorized • Local Authentication • Includes time-out function
Threats to Data Security and Privacy • Viruses, worms, etc • Hackers/snoopers • Crashes • Theft • Power failure/surges • Trauma/loss
Virus Protection • Norton • McAfee • Others - Computer Security Software • Updating
Unauthorized Access Protection • Firewalls Home PC Firewall Guide • Secure Network Devices • Secure Modems • Encryption devices • Virtual Private Networks (VPN) Introduction to Network Security
Hardware Solutions • UPS –uninterruptible power supply • Surge protector – power/modem • APC • Tape backup • RAID/mirrored system • Protective cases (laptops and PDAs) • Compucage
What: email files word processor files databases web bookmarks files you directly create Where: Zip/Jaz disk CD-R or RW Compact Flash (PDA) DVD Tape Remote sites Backing Up Your Data Backing up your data
Smart E-mailing with Patients Tips to avoid legal problems • Get informed consent • Include instructions when and how e-mail should escalate to phone call or office visit. • Use password-protected screen savers. • Never forward patient-identifiable information to 3rd party • Never use patient's e-mail address in marketing scheme.
Tips to avoid legal problems • Don't share e-mail accounts with family members. • Use encryption when available and practical. • Double-check "to" fields before sending. • Commit policy decisions to writing and electronic form. • Save e-mail communication; electronically or on paper.
Wrap Up • Keep HIPAA on radar screen • Observe how clerkship faculty practices are dealing with security • Read policies • Ask questions • Follow as unfolds