200 likes | 219 Views
Emily J. Hurst, MSLS Technology Coordinator National Network of Libraries of Medicine South Central Region @ hurstej @ nnlmscr. Health Information & Online Privacy for You & Your Organization. Health Information Online.
E N D
Emily J. Hurst, MSLS Technology Coordinator National Network of Libraries of Medicine South Central Region @hurstej@nnlmscr Health Information & Online Privacy for You & Your Organization
Health Information Online • One in three American adults have gone online to figure out a medical condition. • Health Online 2013. Susannah Fox and Maeve Duggan. Pew Research Internet Project. http://www.pewinternet.org/2013/01/15/health-online-2013/
HIPAA • Health Insurance Portability and Accountability Act of 1996 (HIPAA) • http://www.hhs.gov/ocr/privacy/hipaa/understanding/ • Protects • Individually identifiable health information (IIHI) • Information related to physical or mental condition of the individual • The provision of health care to the individual • Payment for health care • Information that identifies the individual • HIPAA Compliant entities: • Health Plans • Most Health Care Providers • Health Care Clearinghouses • Business Associates of these entities
Online Health Information Sharing • A tremendous amount of health-related information is found on the Internet. Many discussion forums are available for individuals to share information on specific diseases and health conditions. Websites dispense a wide variety of information. There is no guarantee that information you disclose in any of these forums is confidential. Always review the privacy policy of any website you visit. • Privacy Rights Clearinghouse. Medical Records Privacy. https://www.privacyrights.org/medical-records-privacy
PHRs and Privacy • Not all Personal Health Records (PHRs) are mandated to be HIPAA compliant. • When selecting a PHR, individuals should evaluate privacy policies to decide if they are comfortable with the protections and rights offered, such as how their information will be safeguarded, for what purposes their information will be used and disclosed, and the extent to which the individual will control access to information in the PHR. • Personal Health Records and the HIPAA Privacy Rule: http://www.hhs.gov/ocr/privacy/hipaa/understanding/special/healthit/phrs.pdf
Libraries and Privacy • Is your organization tracking user behavior on computers? • ALA • http://www.ala.org/advocacy/intfreedom/librarybill/interpretations/privacy • MLA • https://www.mlanet.org/about/ethics.html • Does your library have an up to date privacy policy? • http://www.ala.org/advocacy/privacyconfidentiality/toolkitsprivacy/Developing-or-Revising-a-Library-Privacy-Policy
Disclaimers • Consider updating disclaimers to include online privacy statement. • Disclaimers, MLA CAPHIS: http://caphis.mlanet.org/chis/disclaimers.html
NLM and Privacy • The National Library of Medicine (NLM) does not collect any personally identifiable information (PII) about you when you visit their websites unless you choose to provide that information to them. • NLM Privacy Policy. http://www.nlm.nih.gov/privacy.html
Secure Wireless Networks • Turn on wireless router’s encryption setting - WPA2 (Wi-Fi Protected Access II) – WEP (Wired Equivalent Privacy) is less secure • Change default password • Change default network name – Services Set Identifier (SSID) • Turn on wireless router’s firewall • At Home: • Turn off guest access – Turn network name broadcasting off
Encourage Encryption • Hypertext Transfer Protocol Secure (HTTPS) provides secure communication over a computer network. • Protects against: • Forging • Eavesdroppers • Man-in-the-Middle attacks • HTTPS is not an anonymity tool • What libraries can do: • Enable HTTPS on your website • Educate/Encourage patrons to use HTTPS for secure online communications • HTTPS Everywhere FAQ: https://www.eff.org/https-everywhere/faq
Privacy Protecting Search Tools • DuckDuckGo • https://duckduckgo.com/ • Startpage • https://www.startpage.com/ • Blekko • http://blekko.com/ • Deletes personally identifiable information (PII) within 48 hours
Passwords • Create strong passwords • At least 8 characters long • Combination of upper case, lower case, special characters and numbers • Avoid using: • Names of family members or pets • Real words with numbers or special characters replacing some or part of the word • Sequences • Personal information • How Strong Is Your Password? • https://www.microsoft.com/en-gb/security/pc-security/password-checker.aspx
Password Management Tools • LastPass 3.0 • https://lastpass.com/ • Free browser extension or $12.00/year • Dashlane 2.0 • https://www.dashlane.com • Free or $29.99/year • KeePass • http://keepass.info/ • Free
Mobile Device Security • Remove unnecessary data from your devices • Social Security Number • Credit Card Numbers • Bank Accounts • Set passcode or fingerprint lock • Enable idle timeout lock • Download apps only from trusted sources • Encrypt data • Enroll with a trusted service such as Find My iPhone • Keep operating system (OS) up to date
What Else Is There? • Antivirus • System restore software (Deep Freeze) • Privacy/Protective monitor screens • Private area for reviewing online health information • User training • Online Security • Reliable Online Health Resources
Resources – Online Health Info • The Medical Library Association Guide to Providing Consumer and Patient Health Information. Edited by Michele Spatz. • Personal Health Records and the HIPAA Privacy Rule: http://library.ahima.org/xpedio/groups/public/documents/government/bok1_042307.pdf#page%3D1 • When HIPAA applies to mobile applications: http://mobihealthnews.com/11261/when-hipaa-applies-to-mobile-applications/ • Find and Evaluate Health Information on the Web: https://www.mlanet.org/resources/userguide.html • The Consumer Health Reference Interview and Ethical Issues: http://nnlm.gov/outreach/consumer/ethics.html • Health Information in Libraries (ALA): http://www.ala.org/tools/atoz/health-information-libraries
Resources - Technology • Protecting Your Wireless Network: http://www.fcc.gov/guides/protecting-your-wireless-network • The Ultimate Guide for Creating Strong Passwords: http://www.thegeekstuff.com/2008/06/the-ultimate-guide-for-creating-strong-passwords • Guidelines for Securing Mobile Computing Devices: http://web.stanford.edu/group/security/securecomputing/mobile_devices.html • The Best Antivirus for 2014: http://www.pcmag.com/article2/0,2817,2372364,00.asp
Contact Emily J. Hurst, MSLS Technology Coordinator National Network of Libraries of MedicineSouth Central Region emily.hurst@exch.library.tmc.edu (800) 338.7657 (Toll Free) This project has been funded in whole or in part with Federal funds from the National Library of Medicine, National Institutes of Health, under Contract No. HHSN-276-2011-00007-C with the Houston Academy of Medicine-Texas Medical Center Library.
1 Hour MLA CE • https://www.surveymonkey.com/s/july2014scr • Complete by August 1, 2014
Join Us Next Time! • Wednesday, August 20, 2014 • Topic: Metadata: The Key to Linking Data • Speaker: Guest Speakers: Dick Miller, Thea S. Allen & Joanne Banko from Lane Medical Library, Stanford University