Title: Keep it Confidential
1Keep it Confidential
An Overview of Healthcare Information Security
from a Systems Approach
- Presented by
- Amber Boglin
- Amaechi Erondu
- Holly Trask
- 20 April 1998
2- Project Overview
- Introduction
- Problem
- Exploration of Alternatives
- Implementing a Data Security Plan
- Conclusion
3Computer-based Patient Records
- An electronic patient record that resides in a
system designed to support users through
availability of complete and accurate data,
practitioner reminders and alerts, clinical
decision support systems, links to bodies of
medical knowledge, and other aids.
Source Institute of Medicine
4- Last Project
- Client
- Kaiser Permanente of Ohio
- Objectives
- Reduce the cost of medical records keeping
- Improve access to patient records
5Why we need security A short story
Community General Hospital
Hospital Lab Clerk
Daughter Lizzy
6Lizzys Prank
Ill really screw up these peoples weekend
Informs Patient HIV Positive
Informs Patient she is both- HIV positive and
pregnant
Lizzy gains access to emergency room patient
database, As a prank she calls every one on the
list to inform men that they tested positive for
HIV and tells the women that they are
pregnant. One woman she tells that she has tested
positive for both.
(Bayard, 1)
7Case Studies in Undefined Confidentiality Policy
- AIDS patients fear worker leaked list...
- Casual conversations of patient status in a small
town... - Teen daughter of hospital laboratory clerk calls
blood work patients and tells them they are HIV
positive... - Violation of privacy with celebrity medical
records
8- Project Overview
- Introduction
- Problem
- Exploration of Alternatives
- Implementation a Data Security Plan
- Conclusion
9Security of Healthcare Information
- Security is the protection of information
systems against unauthorized access to or
modification of information, whether in storage,
processing, or transit, and against the denial of
service to authorized users or the provision of
service to unauthorized users, including those
measure necessary to detect, document and counter
such threats.
Source National Research Council, 1991
10Flow of Personal Health Information
Direct Pt. Care Dr. Office Clinic Hospital Nursing
Facility institutions
Support Activities Service payers Quality
Reviews Admin. Reviews
Social Users Insurance Elig Employers Licensing
Public Health Medical Research Welfare
Commercial Users Marketing Profit/Risk Mgmt Drug
Usage
Source Alan Westin,1976
11- 1996 Poll Data
- 75 survey respondents feared their health care
information would be used for purposes other than
health care services. - 27 reported that their medical information had
been improperly disclosed at sometime. - 35 of those who had been affected said the
disclosure has resulted in embarassment and
personal harm.
(Bard, 1)
12Threats to Information Confidentiality
- Insiders make innocent mistakes
- People are curious
- Insiders knowing divulge information
- Outsider attacks
- Unrestrained secondary use-there is money to be
made
Rindfleisch, 1998
13(No Transcript)
14- Project Overview
- Introduction
- Problem
- Exploration of Alternatives
- Implementing a Data Security Plan
- Conclusion
15Features of a Security System
- Authentication
- Authorization
- Integrity
- Audit Trails
- Disaster Prevention/Recovery
- Secure Data Storage
- Transmission
Source Computer-based Patient Record Institute
16Authentication
- Providing assurance regarding the identity of a
subject or object
Source ASTM E1762
17Authentication Features
- The system
- permits passwords of sufficient length such that
they are unique for every user - provides the ability to inform a user of the last
time the system was accessed with the users ID
code - provides reports of current inventory of users,
Ids and access authorities
18Authorization
- The granting of rights (to information), which
includes the granting of access based on access
rights
Source ISO 7498-2
19Authorization Features
- The system
- allows defined access to specific data elements,
files, menus, commands and networks based on
users patient care responsibilities by user,
function and location - has a time-out feature that automatically signs a
user off a terminal if left unattended for a
defined period of time - can determine who is accessing a patient record
at any point in time through on-line inquiry
20Integrity
- Refers to the accuracy, consistency and
completeness of data, a program, a system, or a
network
Source National Research Council, 1991
21Integrity Features
- The system
- provides data management features that eliminate
the redundant maintenance of duplicate patient
data - supports anti-virus software
- is protected from unauthorized access via the
Internet through the use of firewalls,
cryptography and other authentication devices
22Audit Trails
- The results or reports of monitoring each
operation on information
Source National Research Council, 1991
23Audit Trail Features
- The system
- logs and reports all violations of system
security procedures - allows sign-on identification to tag on-line
transaction audit records for reporting
capabilities - supports the ability to use third-party audit
packages
24Disaster Prevention Recovery
- The process of an organization restoring data
loss in the event of a fire, natural disaster,
vandalism or system failure
Source CPRI, July 1996
25Disaster Prevention Recovery Features
- The system
- provides a backup process that can be performed
in a dynamic mode so that the system can be
operational 24 hours/day - provides a data archiving process based on system
administrator criteria - can recover to the point of failure if disaster
occurs
26Secure Data Storage
- The establishment and maintenance of data in a
protected place
27Transmission
- The remote exchange of data between
person-program, person-person or program-program
Source Longley, 1987
28Data Storage Transmission Features
- The system
- supports the ability to import export data
- provides interface to allow archival of data
- secures dial-in access, unique user IDs and
passwords, limited access times and limited
connection duration
29- Technological Approaches to Securing Patient Data
- Access Control/User Authentication
- Passwords
- Tokens
- Firewalls
- Data Authentication
- Digital Signatures
- Biometrics user authentication
- Key Management
- Key management issues for public key cryptography
- Audit trails
- Digital notary time stamp
30Firewalls
- A combination of hardware and software components
used to protect an internal network, or intranet,
from potential security breaches by way of
external or public access networks such as the
Internet. - Firewall Functions
- A firewall acts as a barrier between a network
of machines that operate under a common security
policy. - A firewall does not protect from inside attacks.
Source American Academy of Family Physicians
Family Practice Management lead article, May 1997.
31Source Rindfleisch, 25
32Encryption
Uses mathematical formulas to scramble
information like credit card numbers to make them
unreadable to computer users who lack a software
key that can decode encrypted data. Encryption
Functions Keys This system uses two different
keys to encrypt a message and another to decrypt
the message. Public Keys The system uses a key
that is publicly available to to decrypt
messages. Usually this key is widely distributed
so anyone who obtains it can send an encrypted
message to the person who has his public key.
(Source Bard, 3)
33Rindfleisch,40
34The Systems Development Life Cycle
- Proper policy Planning
- Analysis of the problem
- Designing or Prototyping a Solution
- Implementation of the Solutions
- Support, Maintenance and Education
35- Project Overview
- Introduction
- Problem
- Exploration of Alternatives
- Implementing a Data Security Plan
- Conclusion
36Confidentiality Project Planning
- Understanding laws and regulations
- Organization-specific documentation of
information security policies, standards and
procedures - Senior management support concerning the
corporate direction for information security in
writing
37Policy Planning Understanding Key Legislation
- Privacy Act of 1974
- Emergency Medical Treatment and Active Labor Act
- Patient Self-Determination Act
- Freedom of Information Act
- Your organizations confidentiality policy!
38Problem Analysis
- Review the current and proposed security network
architecture - Assess existing security technology and document
current problems - Identify document various human factors issues
concerning security - Interview physicians for suggestions in creating
a security model based on best practices
39Planning for Human Error
- Outside access to internal, personal information
- Individuals may make money by selling information
- Employee disclosure of personal patient
information - accidental
- on purpose
40Designing or Prototyping a Solution
- Develop model the proposed security
architecture with various diagrams - Match institution-wide patient record security
policies to proposed model - Evaluate third-party computerized patient record
security tools - Develop user training and security/confidentiality
awareness training - Develop EMR information security roles
responsibilities - Develop standards for technology usage upgrades
41Solution Implementation
- Designate implementation project management
leaders - Integrate constant physician involvement with CPR
security plan implementation - Create implementation time line and plan
guidelines - Pilot the security/confidentiality policies
procedures and user manuals for security
technology - Post the policies and plan organization-wide user
training to master the new technologies to secure
patient data - Conduct an implementation review, including
representative clinical and administrative users
42Support, Maintenance and Education
- Evaluate re-visit final implementation
checklist - Schedule an ongoing CPR security awareness
training program - Designate CPR security compliance review board
schedule quarterly progress reports - Review current healthcare data security personnel
responsibility descriptions and update them
reflect the new security/confidentiality plan
43Implementation Cost Analysis
44- Project Overview
- Introduction
- Problem
- Exploration of Alternatives
- Implementing a Data Security Plan
- Conclusion
45Conclusions Recommendations
- Necessary integration of CPR data security
policies with emerging proposed security
technology - Team involvement between physicians, other
clinical staff in implementing secure plans for
CPR information systems - Plan for disaster recovery of CPR information
- Clarify internal security policies to external
organizations - Pilot test the technology to simulate internal
external security attacks - Clarify document consequences for CPR security
attacks and violations