SlideShare a Scribd company logo
1 of 22
Medical Records Security By: Dr. Abbas Shojaee Nov, 2009 Part 1 This presentation uses works of: M. E. Kabay, PhD – Norwich university Juan J. Cruz - General Counsel for United  I.S.D. C. Peter Waegemann - CEO, Medical Records Institute (MRI) Joseph Tan – Ehealth care information systems Edward H. Shortliffe – Biomedical Informatics
Introduction  How Information is Critical in Healthcare Necessities Meanings Aspects Security Problems at a Hospital Medical Records Privacy  Toward a security framework Topics
Patient care:  instant access to current, correct, readable data Data transfer to other treatment centers Prescriptions Drug interactions Patient histories (sensitivity) Billing insurance companies – cash flow Notification of infectious diseases to state and federal authorities Collaboration with law enforcement Telemedicine Links to doctors' offices How Information is Critical in Healthcare	Some Samples
Medical data is highly sensitive as: Its disclosure may harm somebody. Needs to kept safe from lost Must be accurate and up to date Have to be provided by authorized staff Must support administrative reviews and legal issues The law and government enforcements Collegiality vs confidentiality Data and System Security: 	What necessitates it?
Privacy The desire of a person to control disclosure of personal health and other information Confidentiality The ability of a person to control the release of his or her personal health information to a care provider or information custodian under an agreement that limits Security Is the protection of privacy and confidentiality through a collection of policies, procedures, and safeguards Health information Protection: 	What does it means?
The security steps taken in a health care information system serve five key functions (National Research Council, 1997): Availability Accountability: Authentication, Authorization,  Audit trails Perimeter definition Inside - outside Role-limited access:  Patients, Community physicians, Specialty physicians, Public health agencies, Medical researchers, ,Billing clerks, Insurance payers: justifications of charges Comprehensibility and control Security: 	What are different aspects?
Authentication Authorization Cryptography technology Symmetric or Secret key Asymmetric or Public key- private key Usages: digital signature, content validation, non repudiation operation Challenges: computation power, certification authority …
Minimal disclosure  Risk analysis at core  Auditing procedures  Authentication  Access profile  Emergency override  Append-only Audit trail Printing, data transfers Network access Training and awareness Example on practical requirements
Networks  not integrated Laboratories  disparate systems Doctors' PCs  largely uncontrolled and unprotected Terminals / workstations unprotected impossible to use individual sessions Security Problems at Hospitals
Data protection conflicts with ease of use  Password management poses problems  Medical and non-medical staff don't cooperate Non-medical use is a reality Shared responsibilities complicate audit trail Medicine is a high-stress job READ/APPEND access only:  no WRITE Special Requirements for Access Control
How much patient data should be available to  Treating physicians?  Consulting physicians?  Medical students?  Pharmacy staff?  Dietary staff?  Chaplains? Unit coordinators after patient discharge? Employees in multi-facility applications (clinics) Vendors (Managed Care reps, technicians)? Information technology staff? Volunteers? Controlled Access – but for Whom?
Non-admitting doctor misuses patient info for insurance company Online discharge summaries available to everyone in hospital Snooper chats up secretaries for access to doctors' office files Staff members' families provoke curiosity and snooping on patient records Paparazzi bribe employees for access to VIP records (may need special protection for files of VIPs) Criminals use patient info for blackmail Staff use patient data to get dates or to stalk victims Some Scenarios for Abuse
Paper records Paper records let medical-records staff monitor usage; usually highly professional Paper records provide good security simply because of lower accessibility But poor reporting facilities – need manual search of text Hybrid systems use online database with manual input of usage records  Audit trails (1)
Electronic records Who will analyze audit trails? Need exception reports Audit trail a deterrent to misuse?   Audit trails (2)
Risk from poorly-controlled data access Fears are hindering networking  Limited awareness, little understanding  Ineffective classification methods Inadequate controls drawn from other work environments      Summary of Problems
Education essential Develop Informatics Risk Management Committee Resources must be assigned to improve security Requirements are stringent but must be met Tokens or face-recognition systems offer best solution for identification & authentication Security awareness must be an ongoing process Solutions
Privacy and the Medical Record Privacy and Confidentiality:  Different?  Regulations Affecting Patient Records  Basic Principles of Medical Informatics Security Medical Records Privacy
General principles  Context-specific  Technology has always incited worry Breach of privacy is a tort  Rights of privacy unreasonable intrusion appropriation of name, appearance unreasonable publicity public misrepresentation Implications:  change / common sense / interest groups Privacy and the Medical Record
Considerable theoretical debate about  privacy  confidentiality  secrecy      Privacy and Confidentiality:  Different?
Debate:  Who Regulates?  Quill Pen Laws  Boards of Medical Examiners:  physicians' offices JCAHO: Utility and security  WEDI argues for federal intervention  Wright argues against federal intervention Regulations Affecting Patient Records
Towards a security and privacy framework Please find in part 2
DISCUSSION

More Related Content

What's hot

Electronic medical record
Electronic medical recordElectronic medical record
Electronic medical recordFrank James
 
Electronic medical records pt.
Electronic medical records pt.Electronic medical records pt.
Electronic medical records pt.sheilabreeding
 
Electronic medical records
Electronic medical recordsElectronic medical records
Electronic medical recordsNamita Batra
 
Electronic Medical Record (Emr)
Electronic Medical Record (Emr)Electronic Medical Record (Emr)
Electronic Medical Record (Emr)trina_chowdhury
 
Emr presentation
Emr presentationEmr presentation
Emr presentationChris Oyibe
 
Electronic Health Record System and Its Key Benefits to Healthcare Industry
Electronic Health Record System and Its Key Benefits to Healthcare IndustryElectronic Health Record System and Its Key Benefits to Healthcare Industry
Electronic Health Record System and Its Key Benefits to Healthcare IndustryCalance
 
Electronic health records
Electronic health recordsElectronic health records
Electronic health recordsSyed Ali Raza
 
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...Nawanan Theera-Ampornpunt
 
Electronic health record
Electronic health recordElectronic health record
Electronic health recordEhrecord79
 
Electronic Medical Record
Electronic Medical RecordElectronic Medical Record
Electronic Medical RecordTricia Gervacio
 
Confidentiality
ConfidentialityConfidentiality
ConfidentialityLLSS64
 
Information Technology in Hospitals
Information Technology in HospitalsInformation Technology in Hospitals
Information Technology in HospitalsVijay Raj Yanamala
 
Electronic medical record 25.04.2021
Electronic medical record 25.04.2021Electronic medical record 25.04.2021
Electronic medical record 25.04.2021Shazia Iqbal
 
Healthcare confidentiality training.2013bev
Healthcare confidentiality training.2013bevHealthcare confidentiality training.2013bev
Healthcare confidentiality training.2013bevblk70130
 
Hospital challanges
Hospital challangesHospital challanges
Hospital challangesNc Das
 

What's hot (20)

Medical Record Management
Medical Record Management   Medical Record Management
Medical Record Management
 
Electronic medical record
Electronic medical recordElectronic medical record
Electronic medical record
 
Electronic medical records pt.
Electronic medical records pt.Electronic medical records pt.
Electronic medical records pt.
 
Electronic medical records
Electronic medical recordsElectronic medical records
Electronic medical records
 
Electronic Medical Record (Emr)
Electronic Medical Record (Emr)Electronic Medical Record (Emr)
Electronic Medical Record (Emr)
 
Emr presentation
Emr presentationEmr presentation
Emr presentation
 
Electronic Health Record System and Its Key Benefits to Healthcare Industry
Electronic Health Record System and Its Key Benefits to Healthcare IndustryElectronic Health Record System and Its Key Benefits to Healthcare Industry
Electronic Health Record System and Its Key Benefits to Healthcare Industry
 
Electronic health records
Electronic health recordsElectronic health records
Electronic health records
 
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...
 
Telemedicine
TelemedicineTelemedicine
Telemedicine
 
Electronic health record
Electronic health recordElectronic health record
Electronic health record
 
Telemedicine
TelemedicineTelemedicine
Telemedicine
 
Electronic Medical Record
Electronic Medical RecordElectronic Medical Record
Electronic Medical Record
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Information Technology in Hospitals
Information Technology in HospitalsInformation Technology in Hospitals
Information Technology in Hospitals
 
Telemedicine
TelemedicineTelemedicine
Telemedicine
 
Electronic medical record 25.04.2021
Electronic medical record 25.04.2021Electronic medical record 25.04.2021
Electronic medical record 25.04.2021
 
Hospital Information System
Hospital Information SystemHospital Information System
Hospital Information System
 
Healthcare confidentiality training.2013bev
Healthcare confidentiality training.2013bevHealthcare confidentiality training.2013bev
Healthcare confidentiality training.2013bev
 
Hospital challanges
Hospital challangesHospital challanges
Hospital challanges
 

Viewers also liked

Conidentiality mha 690 by jeffrey rosenburg w1 d2 1
Conidentiality mha 690 by jeffrey rosenburg w1 d2 1Conidentiality mha 690 by jeffrey rosenburg w1 d2 1
Conidentiality mha 690 by jeffrey rosenburg w1 d2 1jandjrosenburg
 
Medical record confidentiality
Medical record confidentialityMedical record confidentiality
Medical record confidentialitycusr
 
MHA 690 Medical Confidentiality Discussion
MHA 690 Medical Confidentiality DiscussionMHA 690 Medical Confidentiality Discussion
MHA 690 Medical Confidentiality DiscussionQwatevyia Edwards
 
Medical Records and Confidentiality
Medical Records and ConfidentialityMedical Records and Confidentiality
Medical Records and ConfidentialityKelly McKenna
 
Hipaa and patient medical record confidentiality
Hipaa and patient medical record confidentialityHipaa and patient medical record confidentiality
Hipaa and patient medical record confidentialityvflores007
 
SCHS Topic 5: Privacy, Confidentiality and Medical Records
SCHS Topic 5: Privacy, Confidentiality and Medical RecordsSCHS Topic 5: Privacy, Confidentiality and Medical Records
SCHS Topic 5: Privacy, Confidentiality and Medical RecordsDr Ghaiath Hussein
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentialityswilson0050
 

Viewers also liked (7)

Conidentiality mha 690 by jeffrey rosenburg w1 d2 1
Conidentiality mha 690 by jeffrey rosenburg w1 d2 1Conidentiality mha 690 by jeffrey rosenburg w1 d2 1
Conidentiality mha 690 by jeffrey rosenburg w1 d2 1
 
Medical record confidentiality
Medical record confidentialityMedical record confidentiality
Medical record confidentiality
 
MHA 690 Medical Confidentiality Discussion
MHA 690 Medical Confidentiality DiscussionMHA 690 Medical Confidentiality Discussion
MHA 690 Medical Confidentiality Discussion
 
Medical Records and Confidentiality
Medical Records and ConfidentialityMedical Records and Confidentiality
Medical Records and Confidentiality
 
Hipaa and patient medical record confidentiality
Hipaa and patient medical record confidentialityHipaa and patient medical record confidentiality
Hipaa and patient medical record confidentiality
 
SCHS Topic 5: Privacy, Confidentiality and Medical Records
SCHS Topic 5: Privacy, Confidentiality and Medical RecordsSCHS Topic 5: Privacy, Confidentiality and Medical Records
SCHS Topic 5: Privacy, Confidentiality and Medical Records
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentiality
 

Similar to Medical Records Privacy Confidentiality And Security

ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...
ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...
ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...ICEGOV
 
Health information system security
Health information system securityHealth information system security
Health information system securitykristinleighclark
 
Electronic Health Recordsand Electronic Case Records in 2012
Electronic Health Recordsand Electronic Case Records in 2012Electronic Health Recordsand Electronic Case Records in 2012
Electronic Health Recordsand Electronic Case Records in 2012Health Informatics New Zealand
 
Confidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.pptConfidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.pptJohnLagman3
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHNovell
 
telemedicineppt.pptx
telemedicineppt.pptxtelemedicineppt.pptx
telemedicineppt.pptxRiyaMathur18
 
Personal Health Records
Personal Health RecordsPersonal Health Records
Personal Health RecordsRRR784
 
Why is data privacy a crucial aspect of using Electronic Records.pptx
Why is data privacy a crucial aspect of using Electronic Records.pptxWhy is data privacy a crucial aspect of using Electronic Records.pptx
Why is data privacy a crucial aspect of using Electronic Records.pptxMocDoc
 
Babithas Notes on unit-2 Health/Nursing Informatics Technology
Babithas Notes on unit-2 Health/Nursing Informatics TechnologyBabithas Notes on unit-2 Health/Nursing Informatics Technology
Babithas Notes on unit-2 Health/Nursing Informatics TechnologyBabitha Devu
 
Wealth of Networks
Wealth of NetworksWealth of Networks
Wealth of Networks3GDR
 
Best_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfBest_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfJacob Li
 
STH 2017_Day 3_Track 1_Session 1_Caralis_Preventing Medical Errors Compatibil...
STH 2017_Day 3_Track 1_Session 1_Caralis_Preventing Medical Errors Compatibil...STH 2017_Day 3_Track 1_Session 1_Caralis_Preventing Medical Errors Compatibil...
STH 2017_Day 3_Track 1_Session 1_Caralis_Preventing Medical Errors Compatibil...Benghie Hyacinthe
 
Day in-the-life endo wide 2 with vid
Day in-the-life endo wide 2 with vidDay in-the-life endo wide 2 with vid
Day in-the-life endo wide 2 with vidDavid Voran
 
The Scope of Health Information Technology: Progress and Challenges
The Scope of Health Information Technology: Progress and ChallengesThe Scope of Health Information Technology: Progress and Challenges
The Scope of Health Information Technology: Progress and ChallengesAndrew Oram
 
The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?Stephen Cobb
 
National Association of Healthcare Access Management Presentation
National Association of Healthcare Access Management PresentationNational Association of Healthcare Access Management Presentation
National Association of Healthcare Access Management Presentationmikemike09
 
Medical Software and Hardware
Medical Software and HardwareMedical Software and Hardware
Medical Software and HardwareHridyanshSharma5
 
The vital significance of ecm in healthcare
The vital significance of ecm in healthcareThe vital significance of ecm in healthcare
The vital significance of ecm in healthcareBenevolence Technologies
 

Similar to Medical Records Privacy Confidentiality And Security (20)

ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...
ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...
ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...
 
Health information system security
Health information system securityHealth information system security
Health information system security
 
Electronic Health Recordsand Electronic Case Records in 2012
Electronic Health Recordsand Electronic Case Records in 2012Electronic Health Recordsand Electronic Case Records in 2012
Electronic Health Recordsand Electronic Case Records in 2012
 
Confidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.pptConfidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.ppt
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
 
telemedicineppt.pptx
telemedicineppt.pptxtelemedicineppt.pptx
telemedicineppt.pptx
 
Personal Health Records
Personal Health RecordsPersonal Health Records
Personal Health Records
 
Why is data privacy a crucial aspect of using Electronic Records.pptx
Why is data privacy a crucial aspect of using Electronic Records.pptxWhy is data privacy a crucial aspect of using Electronic Records.pptx
Why is data privacy a crucial aspect of using Electronic Records.pptx
 
Babithas Notes on unit-2 Health/Nursing Informatics Technology
Babithas Notes on unit-2 Health/Nursing Informatics TechnologyBabithas Notes on unit-2 Health/Nursing Informatics Technology
Babithas Notes on unit-2 Health/Nursing Informatics Technology
 
Wealth of Networks
Wealth of NetworksWealth of Networks
Wealth of Networks
 
HL7: Clinical Decision Support
HL7: Clinical Decision SupportHL7: Clinical Decision Support
HL7: Clinical Decision Support
 
Best_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfBest_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdf
 
STH 2017_Day 3_Track 1_Session 1_Caralis_Preventing Medical Errors Compatibil...
STH 2017_Day 3_Track 1_Session 1_Caralis_Preventing Medical Errors Compatibil...STH 2017_Day 3_Track 1_Session 1_Caralis_Preventing Medical Errors Compatibil...
STH 2017_Day 3_Track 1_Session 1_Caralis_Preventing Medical Errors Compatibil...
 
Day in-the-life endo wide 2 with vid
Day in-the-life endo wide 2 with vidDay in-the-life endo wide 2 with vid
Day in-the-life endo wide 2 with vid
 
The Scope of Health Information Technology: Progress and Challenges
The Scope of Health Information Technology: Progress and ChallengesThe Scope of Health Information Technology: Progress and Challenges
The Scope of Health Information Technology: Progress and Challenges
 
Telehealth
TelehealthTelehealth
Telehealth
 
The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?
 
National Association of Healthcare Access Management Presentation
National Association of Healthcare Access Management PresentationNational Association of Healthcare Access Management Presentation
National Association of Healthcare Access Management Presentation
 
Medical Software and Hardware
Medical Software and HardwareMedical Software and Hardware
Medical Software and Hardware
 
The vital significance of ecm in healthcare
The vital significance of ecm in healthcareThe vital significance of ecm in healthcare
The vital significance of ecm in healthcare
 

More from Abbas Shojaee MD, CHDA

More from Abbas Shojaee MD, CHDA (6)

Data Science Governance in Healthcare
Data Science Governance in HealthcareData Science Governance in Healthcare
Data Science Governance in Healthcare
 
The Complexity of Survival
The Complexity of SurvivalThe Complexity of Survival
The Complexity of Survival
 
0 methods for multiple treatment comparisons
0 methods for multiple treatment comparisons0 methods for multiple treatment comparisons
0 methods for multiple treatment comparisons
 
0 An Introduction To Snomed Ct1
0 An Introduction To Snomed Ct10 An Introduction To Snomed Ct1
0 An Introduction To Snomed Ct1
 
Msf Project Managment 2006 Part 2
Msf Project Managment 2006   Part 2Msf Project Managment 2006   Part 2
Msf Project Managment 2006 Part 2
 
Msf Project Managment 2006 Part 1
Msf Project Managment 2006   Part 1Msf Project Managment 2006   Part 1
Msf Project Managment 2006 Part 1
 

Medical Records Privacy Confidentiality And Security

  • 1. Medical Records Security By: Dr. Abbas Shojaee Nov, 2009 Part 1 This presentation uses works of: M. E. Kabay, PhD – Norwich university Juan J. Cruz - General Counsel for United I.S.D. C. Peter Waegemann - CEO, Medical Records Institute (MRI) Joseph Tan – Ehealth care information systems Edward H. Shortliffe – Biomedical Informatics
  • 2. Introduction How Information is Critical in Healthcare Necessities Meanings Aspects Security Problems at a Hospital Medical Records Privacy Toward a security framework Topics
  • 3. Patient care: instant access to current, correct, readable data Data transfer to other treatment centers Prescriptions Drug interactions Patient histories (sensitivity) Billing insurance companies – cash flow Notification of infectious diseases to state and federal authorities Collaboration with law enforcement Telemedicine Links to doctors' offices How Information is Critical in Healthcare Some Samples
  • 4. Medical data is highly sensitive as: Its disclosure may harm somebody. Needs to kept safe from lost Must be accurate and up to date Have to be provided by authorized staff Must support administrative reviews and legal issues The law and government enforcements Collegiality vs confidentiality Data and System Security: What necessitates it?
  • 5. Privacy The desire of a person to control disclosure of personal health and other information Confidentiality The ability of a person to control the release of his or her personal health information to a care provider or information custodian under an agreement that limits Security Is the protection of privacy and confidentiality through a collection of policies, procedures, and safeguards Health information Protection: What does it means?
  • 6. The security steps taken in a health care information system serve five key functions (National Research Council, 1997): Availability Accountability: Authentication, Authorization, Audit trails Perimeter definition Inside - outside Role-limited access: Patients, Community physicians, Specialty physicians, Public health agencies, Medical researchers, ,Billing clerks, Insurance payers: justifications of charges Comprehensibility and control Security: What are different aspects?
  • 7. Authentication Authorization Cryptography technology Symmetric or Secret key Asymmetric or Public key- private key Usages: digital signature, content validation, non repudiation operation Challenges: computation power, certification authority …
  • 8. Minimal disclosure Risk analysis at core Auditing procedures Authentication Access profile Emergency override Append-only Audit trail Printing, data transfers Network access Training and awareness Example on practical requirements
  • 9. Networks not integrated Laboratories disparate systems Doctors' PCs largely uncontrolled and unprotected Terminals / workstations unprotected impossible to use individual sessions Security Problems at Hospitals
  • 10. Data protection conflicts with ease of use Password management poses problems Medical and non-medical staff don't cooperate Non-medical use is a reality Shared responsibilities complicate audit trail Medicine is a high-stress job READ/APPEND access only: no WRITE Special Requirements for Access Control
  • 11. How much patient data should be available to Treating physicians? Consulting physicians? Medical students? Pharmacy staff? Dietary staff? Chaplains? Unit coordinators after patient discharge? Employees in multi-facility applications (clinics) Vendors (Managed Care reps, technicians)? Information technology staff? Volunteers? Controlled Access – but for Whom?
  • 12. Non-admitting doctor misuses patient info for insurance company Online discharge summaries available to everyone in hospital Snooper chats up secretaries for access to doctors' office files Staff members' families provoke curiosity and snooping on patient records Paparazzi bribe employees for access to VIP records (may need special protection for files of VIPs) Criminals use patient info for blackmail Staff use patient data to get dates or to stalk victims Some Scenarios for Abuse
  • 13. Paper records Paper records let medical-records staff monitor usage; usually highly professional Paper records provide good security simply because of lower accessibility But poor reporting facilities – need manual search of text Hybrid systems use online database with manual input of usage records Audit trails (1)
  • 14. Electronic records Who will analyze audit trails? Need exception reports Audit trail a deterrent to misuse? Audit trails (2)
  • 15. Risk from poorly-controlled data access Fears are hindering networking Limited awareness, little understanding Ineffective classification methods Inadequate controls drawn from other work environments Summary of Problems
  • 16. Education essential Develop Informatics Risk Management Committee Resources must be assigned to improve security Requirements are stringent but must be met Tokens or face-recognition systems offer best solution for identification & authentication Security awareness must be an ongoing process Solutions
  • 17. Privacy and the Medical Record Privacy and Confidentiality: Different? Regulations Affecting Patient Records Basic Principles of Medical Informatics Security Medical Records Privacy
  • 18. General principles Context-specific Technology has always incited worry Breach of privacy is a tort Rights of privacy unreasonable intrusion appropriation of name, appearance unreasonable publicity public misrepresentation Implications: change / common sense / interest groups Privacy and the Medical Record
  • 19. Considerable theoretical debate about privacy confidentiality secrecy Privacy and Confidentiality: Different?
  • 20. Debate: Who Regulates? Quill Pen Laws Boards of Medical Examiners: physicians' offices JCAHO: Utility and security WEDI argues for federal intervention Wright argues against federal intervention Regulations Affecting Patient Records
  • 21. Towards a security and privacy framework Please find in part 2