SlideShare a Scribd company logo
1 of 10
Six Pillars of Security and Privacy
in Telemedicine
Telemedicine
Telemedicine refers to
the use of
Telecommunications
and medical
informatics to provide
electronically
delivered healthcare
services.
Source: Telemedicine. A Guide to Assessing Telecommunication in Health Care.
Washington, DC: National Academy Press, 1996.
Authentication
• Username Password
is sufficient but must
also be strengthened.
• Trust between the
machine that is
sending the
information and the
one receiving it.
Encryption
• Data is encrypted for
stronger transport
security
• This aims to add a
safety net in case
data is accessed by
unauthorized people
via internet or any
other gateway.
Authorization
• Varying levels of data
access shall be given
to specific people
• Different levels shall
be provided so that
specific patient info
will be available to
specific healthcare
providers
Access Control
• Access control is achieved
once authorization levels
are defined.
• This gives a more defined
system support access
• It could even go as far as
giving VIP access to other
patients and giving them
capability to edit data
Auditing
• Once a machine accesses
the system it records and
logs vital information
• Recorded information
includes: user, IP address,
patient, data type, access
type, and time of access.
• This is one way to monitor
inappropriate access
Physical Security
• Aside from systems
gateway; access also to the
actual server unit is possible
• Site must be staffed 24
hours per day.
• Controlled locks and
biometrics security is
recommended.
• Unauthorized use of flash
drives or any storage device
must be strictly monitored
• Also, software installation
must be avoided
Important Things to Remember

• Security in IT is never absolute; all
factors of must be considered
• There is always a relative risk that is
involved; practice approach is a must
• Patient Security and Confidentiality is
a priority most especially in the field
of healthcare
Six pillars of security and privacy in telemedicine

More Related Content

What's hot

Medical Electrical Safety
Medical Electrical SafetyMedical Electrical Safety
Medical Electrical Safety
Ismail Yusof
 

What's hot (20)

Biomedical instrumentation PPT
Biomedical instrumentation PPTBiomedical instrumentation PPT
Biomedical instrumentation PPT
 
Data Mining in Health Care
Data Mining in Health CareData Mining in Health Care
Data Mining in Health Care
 
Assistive Technology Principles and Practice
Assistive Technology Principles and PracticeAssistive Technology Principles and Practice
Assistive Technology Principles and Practice
 
ECG ANALYSIS IN CLOUD COMPUTING
ECG ANALYSIS IN CLOUD COMPUTINGECG ANALYSIS IN CLOUD COMPUTING
ECG ANALYSIS IN CLOUD COMPUTING
 
Medical Electrical Safety
Medical Electrical SafetyMedical Electrical Safety
Medical Electrical Safety
 
Health Informatics- Module 3-Chapter 1.pptx
Health Informatics- Module 3-Chapter 1.pptxHealth Informatics- Module 3-Chapter 1.pptx
Health Informatics- Module 3-Chapter 1.pptx
 
1 intro medical equipment
1 intro medical equipment1 intro medical equipment
1 intro medical equipment
 
Tele-medicine system
Tele-medicine system Tele-medicine system
Tele-medicine system
 
Hospital Information Systems & Electronic Health Records
Hospital Information Systems & Electronic Health RecordsHospital Information Systems & Electronic Health Records
Hospital Information Systems & Electronic Health Records
 
Biomedical equipments ppt
Biomedical equipments  pptBiomedical equipments  ppt
Biomedical equipments ppt
 
Data Mining in Healthcare: How Health Systems Can Improve Quality and Reduce...
Data Mining in Healthcare:  How Health Systems Can Improve Quality and Reduce...Data Mining in Healthcare:  How Health Systems Can Improve Quality and Reduce...
Data Mining in Healthcare: How Health Systems Can Improve Quality and Reduce...
 
Security & Privacy for Health Data
Security & Privacy for Health DataSecurity & Privacy for Health Data
Security & Privacy for Health Data
 
Telesurgery
TelesurgeryTelesurgery
Telesurgery
 
Telemedicine
Telemedicine Telemedicine
Telemedicine
 
e-Health Applications
e-Health Applicationse-Health Applications
e-Health Applications
 
Ai in healthcare
Ai in healthcareAi in healthcare
Ai in healthcare
 
Telemedicine shalaka patil
Telemedicine shalaka patilTelemedicine shalaka patil
Telemedicine shalaka patil
 
ROLE OF IT IN HOSPITALS
ROLE OF IT IN HOSPITALSROLE OF IT IN HOSPITALS
ROLE OF IT IN HOSPITALS
 
Access to health data and information – challenges
Access to health data and information – challengesAccess to health data and information – challenges
Access to health data and information – challenges
 
information technology in healthcare
information technology in healthcareinformation technology in healthcare
information technology in healthcare
 

Viewers also liked

Speciality Equipment & Spares - Company Presentation
Speciality Equipment & Spares - Company PresentationSpeciality Equipment & Spares - Company Presentation
Speciality Equipment & Spares - Company Presentation
shivaprasad srinivas
 
If Conditional Sentence
If Conditional SentenceIf Conditional Sentence
If Conditional Sentence
Aldita0292
 
Conditional Sentence 1
Conditional Sentence 1Conditional Sentence 1
Conditional Sentence 1
Aldita0292
 
If Conditional Sentence
If Conditional SentenceIf Conditional Sentence
If Conditional Sentence
Aldita0292
 
10 commandments for better android development
10 commandments for better android development10 commandments for better android development
10 commandments for better android development
Trey Robinson
 
Bhaskar_SoftwareTesting_Bangalore
Bhaskar_SoftwareTesting_BangaloreBhaskar_SoftwareTesting_Bangalore
Bhaskar_SoftwareTesting_Bangalore
Bhaskar Devadiga
 

Viewers also liked (20)

Fusion - Cloud Security, Management and Support
Fusion - Cloud Security, Management and SupportFusion - Cloud Security, Management and Support
Fusion - Cloud Security, Management and Support
 
IT Pillars Profile
IT Pillars ProfileIT Pillars Profile
IT Pillars Profile
 
Digital Mobile
Digital MobileDigital Mobile
Digital Mobile
 
Speciality Equipment & Spares - Company Presentation
Speciality Equipment & Spares - Company PresentationSpeciality Equipment & Spares - Company Presentation
Speciality Equipment & Spares - Company Presentation
 
European strategic pillars for Open Access +
European strategic pillars for Open Access +European strategic pillars for Open Access +
European strategic pillars for Open Access +
 
Feria científica2
Feria científica2Feria científica2
Feria científica2
 
If Conditional Sentence
If Conditional SentenceIf Conditional Sentence
If Conditional Sentence
 
The Money Event Hackathon - Coupon Quest : An Android App using iBeacons
The Money Event Hackathon - Coupon Quest : An  Android App using iBeaconsThe Money Event Hackathon - Coupon Quest : An  Android App using iBeacons
The Money Event Hackathon - Coupon Quest : An Android App using iBeacons
 
защита новейшая версия
защита   новейшая версиязащита   новейшая версия
защита новейшая версия
 
Conditional Sentence 1
Conditional Sentence 1Conditional Sentence 1
Conditional Sentence 1
 
If Conditional Sentence
If Conditional SentenceIf Conditional Sentence
If Conditional Sentence
 
Google I/O 2014 Recap
Google I/O 2014 Recap Google I/O 2014 Recap
Google I/O 2014 Recap
 
10 commandments for better android development
10 commandments for better android development10 commandments for better android development
10 commandments for better android development
 
Android Build Server
Android Build ServerAndroid Build Server
Android Build Server
 
Retrofit Android by Chris Ollenburg
Retrofit Android by Chris OllenburgRetrofit Android by Chris Ollenburg
Retrofit Android by Chris Ollenburg
 
Bhaskar_SoftwareTesting_Bangalore
Bhaskar_SoftwareTesting_BangaloreBhaskar_SoftwareTesting_Bangalore
Bhaskar_SoftwareTesting_Bangalore
 
Radiología
RadiologíaRadiología
Radiología
 
How to Build Roadmaps that Stick - Roadmapping 301 (Bruce McCarthy) ProductCa...
How to Build Roadmaps that Stick - Roadmapping 301 (Bruce McCarthy) ProductCa...How to Build Roadmaps that Stick - Roadmapping 301 (Bruce McCarthy) ProductCa...
How to Build Roadmaps that Stick - Roadmapping 301 (Bruce McCarthy) ProductCa...
 
Introduction to COMS VLSI Design
Introduction to COMS VLSI DesignIntroduction to COMS VLSI Design
Introduction to COMS VLSI Design
 
How to design Programs using VHDL
How to design Programs using VHDLHow to design Programs using VHDL
How to design Programs using VHDL
 

Similar to Six pillars of security and privacy in telemedicine

Security in electronic health records
Security in electronic health recordsSecurity in electronic health records
Security in electronic health records
samuelerie
 
Security in electronic health records
Security in electronic health recordsSecurity in electronic health records
Security in electronic health records
analeeerie
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1
limsh
 

Similar to Six pillars of security and privacy in telemedicine (20)

ATLlamas
ATLlamasATLlamas
ATLlamas
 
Telemedicine
TelemedicineTelemedicine
Telemedicine
 
Security
SecuritySecurity
Security
 
Ch01 NetSec5e.pptx
Ch01 NetSec5e.pptxCh01 NetSec5e.pptx
Ch01 NetSec5e.pptx
 
information security.pptx
information security.pptxinformation security.pptx
information security.pptx
 
abc.pptx
abc.pptxabc.pptx
abc.pptx
 
Cyber physical system for healthcare
Cyber physical system for healthcareCyber physical system for healthcare
Cyber physical system for healthcare
 
Ch01 NetSec5e.pdf
Ch01 NetSec5e.pdfCh01 NetSec5e.pdf
Ch01 NetSec5e.pdf
 
Healthcare and Cyber Security 2015 :Is India Ready?
Healthcare and Cyber Security 2015 :Is India Ready? Healthcare and Cyber Security 2015 :Is India Ready?
Healthcare and Cyber Security 2015 :Is India Ready?
 
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptx
 
Final copy 7
Final copy 7Final copy 7
Final copy 7
 
Security in electronic health records
Security in electronic health recordsSecurity in electronic health records
Security in electronic health records
 
Information and network security 7 security services
Information and network security 7 security servicesInformation and network security 7 security services
Information and network security 7 security services
 
Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServicePersonal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud Service
 
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ..."Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
 
Security in electronic health records
Security in electronic health recordsSecurity in electronic health records
Security in electronic health records
 
Role of information technology on health
Role of information technology on healthRole of information technology on health
Role of information technology on health
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1
 
Remote Health Technology- E Healthcare Technology
Remote Health Technology- E Healthcare TechnologyRemote Health Technology- E Healthcare Technology
Remote Health Technology- E Healthcare Technology
 
CCS TOPIC 1.pptx
CCS TOPIC 1.pptxCCS TOPIC 1.pptx
CCS TOPIC 1.pptx
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Recently uploaded (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 

Six pillars of security and privacy in telemedicine

  • 1. Six Pillars of Security and Privacy in Telemedicine
  • 2. Telemedicine Telemedicine refers to the use of Telecommunications and medical informatics to provide electronically delivered healthcare services. Source: Telemedicine. A Guide to Assessing Telecommunication in Health Care. Washington, DC: National Academy Press, 1996.
  • 3. Authentication • Username Password is sufficient but must also be strengthened. • Trust between the machine that is sending the information and the one receiving it.
  • 4. Encryption • Data is encrypted for stronger transport security • This aims to add a safety net in case data is accessed by unauthorized people via internet or any other gateway.
  • 5. Authorization • Varying levels of data access shall be given to specific people • Different levels shall be provided so that specific patient info will be available to specific healthcare providers
  • 6. Access Control • Access control is achieved once authorization levels are defined. • This gives a more defined system support access • It could even go as far as giving VIP access to other patients and giving them capability to edit data
  • 7. Auditing • Once a machine accesses the system it records and logs vital information • Recorded information includes: user, IP address, patient, data type, access type, and time of access. • This is one way to monitor inappropriate access
  • 8. Physical Security • Aside from systems gateway; access also to the actual server unit is possible • Site must be staffed 24 hours per day. • Controlled locks and biometrics security is recommended. • Unauthorized use of flash drives or any storage device must be strictly monitored • Also, software installation must be avoided
  • 9. Important Things to Remember • Security in IT is never absolute; all factors of must be considered • There is always a relative risk that is involved; practice approach is a must • Patient Security and Confidentiality is a priority most especially in the field of healthcare