Overview of Healthcare IT Security including research based statistics and leveraging best practices to ensure sustainability and compliance for providers
2. Don’t Take My Word For It
Ademóla 0., Adesina, A., Agbele, K., Februarie, R., Abidoye, A., & Nyongesa, H. (2011). Ensuring The Security
And Privacy Of Information In Mobile Health-care Communication Systems. South African Journal Of Science,
Vol. 107, Doi;10.4102/sajs. Retrieved April 9, 2012
Dimitropoulos, L., Patel, V., Scheffler, S., & Posnack, S. (2011). Public Attitudes Toward Health Information
Exchange: Perceived Benefits and Concerns. Special Issue: The American Journal Of Managed Care, Vol. 17.
Retrieved April 12, 2012
Kumar, P. & Lee, H. (2012). Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks:
A Survey. Sensors, 12, 55-91, doi:10.3390/s120100055. Retrieved April 15, 2012
Kovalchuk, Y., McDonald-Maier, K., and Howells, G. (2011). Overview of ICmetrics Technology – Security
Infrastructure for Autonomous and Intelligent Healthcare System. International Journal of u- and e- Service,
Science and Technology, Vol. 4, No. 3. Retrieved April 14, 2012.
Lenert, L. & Sundwall,D. (2012). Opportunity Forged by Crisis: Public Health Surveillance and Meaningful Use
Regulations–A Crisis of Opportunity. American Journal of Public Health Government, Politics, and Law, Vol
102, No. 3. Retrieved April 15, 2012.
Sarrico. C. & Hauenstein, J. (2011). Can EHRs and HIEs Get Along With HIPAA security Requirements? Journal
of Healthcare Financial Management. Retrieved April 15, 2012.
2
4. Current Situation
Laboratory
Information
System
Patient
Pharmacy
Registration
Insurance
Patient
Orthopedics Contracts
Info Management
Surgery Scheduling
Radiology
Information
System
4
6. Problem Statement
82% 75%
Consumers Consumers
concerned concerned
40-64
about EHR
70% about HIE
security security Highest age
Consumers
group with
concerned
concerns
about HIE
over privacy
privacy
and security
5
7. Root Cause
#1 surpassing drug trafficking
$56.6B in costs (not including fines)
80% data loss due to Malware
6
8. Data Flow
C o n t r o l ! A c c e s s
Internet!
C o n t r o l !
A c c e s s
Wireless Transfer!
Intranet!
C o n t r o l !
Local Server!
A c c e s s
Patient Data!
A c c e s s C o n t r o l !
7
11. Resolution Approach
STANDARDS & BEST PRACTICES
ENSURE
DOCUMENT RESOLVE DEVELOP
SUSTAINABILIT
CURRENT WEAK MITIGATION
Y&
STATE AREAS STRATEGIES
COMPLIANCE
TRAINING & AUDIT
10
12. What’s In It For the Client?
Sustainability and Compliance
11