SlideShare a Scribd company logo
1 of 83
PSYC 3500 Strategies for Enhancing Learning and Memory
Self-Evaluation Template
Name:
Date:
*Level choices: Non-Performance, Basic, Proficient, and
Distinguished (please refer to the Scoring Guide for
descriptions of each level)
Criteria
Level
Comments
Describe techniques for enhancing learning and memory using
relevant theories.
Define a population of interest and learning and memory issues
related to that population.
Describe strategies for enhancing learning and memory for the
selected population.
Apply course readings, including peer-reviewed resources, to
presentation.
Conduct a self-evaluation of this assignment using the scoring
guide and identifying the proficiency level for each criterion.
Apply critical thinking and communication skills concerning
learning and memory in a manner that is scholarly, professional,
and respectful.
Apply current edition of APA style, including in-text citations
and full references for sources.
International Journal of Telerehabilitation • telerehab.pitt.edu
International Journal of Telerehabilitation • Vol. 9, No. 2 Fall
2017 • (10.5195/ijt.2017.6231)
A SYSTEMATIC REVIEW OF RESEARCH STUDIES
EXAMINING TELEHEALTH PRIVACY AND SECURITY
PRACTICES USED BY HEALTHCARE PROVIDERS
VALERIE J. M. WATZLAF, PHD, MPH, RHIA, FAHIMA,
LEMING ZHOU, PHD, DSC,
DILHARI R. DEALMEIDA, PHD, RHIA, LINDA M.
HARTMAN, MLS, AHIP
DEPARTMENT OF HEALTH INFORMATION
MANAGEMENT, SCHOOL OF HEALTH AND
REHABILITATION
SCIENCES, UNIVERSITY OF PITTSBURGH, PITTSBURGH,
PA, USA
ABSTRACT
The objective of this systematic review was to systematically
review papers in the United States that examine current
practices
in privacy and security when telehealth technologies are used by
healthcare providers. A literature search was conducted
using the Preferred Reporting Items for Systematic Reviews and
Meta-Analyses Protocols (PRISMA-P). PubMed, CINAHL
and INSPEC from 2003 – 2016 were searched and returned
25,404 papers (after duplications were removed). Inclusion and
exclusion criteria were strictly followed to examine title,
abstract, and full text for 21 published papers which reported on
privacy and security practices used by healthcare providers
using telehealth. Data on confidentiality, integrity, privacy,
informed consent, access control, availability, retention,
encryption, and authentication were all searched and retrieved
from
the papers examined. Papers were selected by two independent
reviewers, first per inclusion/exclusion criteria and, where
there was disagreement, a third reviewer was consulted. The
percentage of agreement and Cohen’s kappa was 99.04% and
0.7331 respectively. The papers reviewed ranged from 2004 to
2016 and included several types of telehealth specialties.
Sixty-seven percent were policy type studies, and 14 percent
were survey/interview studies. There were no randomized
controlled trials. Based upon the results, we conclude that it is
necessary to have more studies with specific information about
the use of privacy and security practices when using telehealth
technologies as well as studies that examine patient and
provider preferences on how data is kept private and secure
during and after telehealth sessions.
Keywords: Computer security, Health personnel, Privacy,
Systematic review, Telehealth
BACKGROUND AND SIGNIFICANCE
When in-person meetings and paper-based health records are
used, healthcare providers have a clear idea about how to
protect the privacy and security of healthcare information.
Providers see each patient in a private room and the patient
records
are locked in a secure office setting which is only accessible to
authorized personnel. When the healthcare practice is moved
to the Internet, as in the case with telehealth, and all
information is electronic, the situation becomes more complex.
Most
healthcare providers are not trained in protecting security and
patient privacy in cyberspace. In cyberspace, there are many
methods that can be used to break into the electronic system and
gain unauthorized access to a large amount of protected
health information (PHI). Therefore, the information security
and patient privacy in telehealth is at a higher risk for breaches
of
PHI. For instance, from 2010 to 2015 it was found that laptops
(20.2%), network servers (12.1%), desktop computers (13%),
and other portable electronic devices (5.6%) made up 51 percent
of data sources of all healthcare data breaches that affected
more than 500 individuals (Office of the National Coordinator
for Health Information Technology, 2016).
PHI is highly regulated in the United States. The most familiar
regulation impacting healthcare facilities and providers is
the Health Insurance Portability and Accountability Act
(HIPAA) of 1996 (US Department of Health and Human
Services,
2013). HIPAA is a federal law that provides privacy and
security rules and regulations to protect PHI. The HIPAA
Privacy Rule
is an administrative regulation created by the Department of
Health and Human Services (DHHS). It was developed after the
US Congress passed HIPAA, and went into effect in 2003.
The HIPAA Privacy Rule only applies to healthcare providers
that conduct electronic billing transactions but is effective for
both paper and electronic health information. It is a set of
national standards that addresses the use and disclosure of PHI
by a
covered entity such as a healthcare organization as well as
establishing privacy rights for individuals on how their PHI is
used
International Journal of Telerehabilitation • telerehab.pitt.edu
International Journal of Telerehabilitation • Vol. 9, No. 2
Fall 2017 • (10.5195/ijt.2017.6231)
and shared. Its major objective is to protect the flow of health
information while at the same time providing high quality
healthcare.
The HIPAA Security Rule went into effect in 2005 and regulates
only electronic health information. It is a set of national
standards that protects an individual’s electronic health
information that is created, received, used or maintained by a
covered
entity such as a healthcare organization. It requires the
administrative, physical, and technical standards to be adopted
so that
confidentiality and integrity of electronic PHI is protected.
In addition to HIPAA, there are many other federal and state
laws that govern the use and disclosure of health
information. Of these laws, HIPAA and the Health Information
Technology for Economic and Clinical Health (HITECH) Act of
2009 have provided the most specific regulations for the
protection of privacy and security of health information in the
United
States. However, some state regulations may be even more
stringent, such as requiring a consent form for disclosure of a
patient’s own medical record when HIPAA does not require
consent (Rinehart-Thompson, 2013). The HITECH Act includes
changes to the HIPAA Privacy and Security rules that focus
mainly on health information technology and strengthens
standards for the privacy and security of health information. It
went into effect in 2010 but some parts of the act have different
compliance deadlines (Rinehart-Thompson, 2013).
For this article, we adopted the Health Resources and Services
Administration’s (HRSA) 2015 definition of telehealth: “the
use of electronic information and telecommunications
technologies to support long-distance clinical health care,
patient and
professional health-related education, public health and health
administration. Technologies include videoconferencing, the
Internet, store-and-forward imaging, streaming media, and
terrestrial and wireless communications” (Health Resources and
Services Administration, 2015). The HRSA definition was used
because it aligns with our purpose, which is to provide a
systematic review of published papers that pertain to privacy
and security provisions used by healthcare providers when
deploying telehealth technologies in the United States.
Our previous experiences in interacting with telehealth
providers suggest that the providers do not always know the
best
practices to use to decrease the risk of privacy and security
issues in telehealth (Cohn & Watzlaf, 2012; Watzlaf, 2010;
Watzlaf, Moeini, & Matusow, 2011). Many of the features
within the free, consumer-based video and voice communication
systems that were evaluated did not demonstrate to the
providers using them that the information was private and
secure
(Watzlaf & Ondich, 2012). Also, many of the telehealth
providers did not know the best practices to use to educate
consumers
on privacy and security (Watzlaf, Moeini, & Firouzan, 2010;
Watzlaf, Moeini, Matusow, & Firouzan, 2011).
Through our past work, audit checklists were developed to
determine if a system supports HIPAA compliance (Watzlaf et
al., 2010; Peterson & Watzlaf, 2014). The 58-question checklist
is specific to Information and Communication Technologies
(ICTs) (Watzlaf et al., 2010). There are already methods and
tools available for healthcare providers to evaluate the security
and privacy features of telehealth systems they are currently
using. Now, it is necessary to conduct a systematic review on
the
status of privacy and security provisions that are used by
healthcare professionals when deploying telehealth services to
see if
they are using the tools and guidelines available to them or if
they incorporate new systems to evaluate privacy and security
within telehealth systems.
OBJECTIVES:
1. Evaluate, from published papers, what privacy and security
measures were addressed when healthcare providers used
telehealth technologies.
2. Compile best practices and guidelines for healthcare
professionals using telehealth technologies.
MATERIAL AND METHODS
SEARCH STRATEGY
A systematic literature search was performed on papers
published between 2003 to 2016. The sources used in the search
included PubMed (Medline via PubMed; National Library of
Medicine, Bethesda, MD; started in 1966) CINAHL databases
(indexing from nursing and allied health literature) and INSPEC
(a scientific and technical database developed by the
Institution of Engineering and Technology).
International Journal of Telerehabilitation • telerehab.pitt.edu
International Journal of Telerehabilitation • Vol. 9, No. 2 Fall
2017 • (10.5195/ijt.2017.6231)
Briefly, our literature search strategy combined synonyms for
telehealth with privacy and security across healthcare
professionals. The list of synonymous terms was voluminous.
Some examples of synonymous terms for telehealth included
telemedicine, telepathology, telerehabilitation; synonymous
terms for privacy and security included confidentiality,
encryption,
access control, authentication; synonymous terms for healthcare
professionals included physicians, clinicians, nurses,
occupation therapists. Language restrictions included those
papers written in English only. In addition, reference lists were
reviewed manually from relevant original research and review
papers.
These searches returned 21,540 papers from PubMed and 4,785
papers from CINAHL, and 591 papers from INSPEC for
a total of 26,916 papers, of which 1,512 were duplicates. After a
review of titles and abstracts, 21 papers were reviewed in full
text (Figure 1). After the first round of article selections, one
third of the papers were found to be international. Papers were
then restricted to those in the United States since HIPAA and
HITECH are laws that are enforced in the United States only
and
these laws are a major influence in privacy and security in the
US.
The protocol for this study was based on the Preferred
Reporting Items for Systematic Review and Meta-Analysis
Protocols (PRISMA-P). The PRISMA-P contains 17 items that
are considered essential as well as minimum components to
include in systematic reviews or meta-analyses. PRISMA-P
recommends that each systematic review include detailed
criteria
using the PICOS (participants, interventions, comparisons,
outcome(s) and study design) reporting system (Moher et al.,
2015). Details of the full protocol have been previously
published in Prospero and the International Journal of
Telerehabilitation
(Watzlaf, DeAlmeida, Zhou, & Hartman, 2015; Watzlaf,
DeAlmeida, Molinero, Zhou, & Hartman, 2015).
STUDY ELIGIBILITY
To be eligible for this systematic review, published papers had
to meet all the following criteria:
1. Published papers that included research, best practices, or
recommendations on the use of telehealth and privacy or
security.
2. Published papers that included any type of health care
professional using any available telehealth for their clients with
a focus on privacy and/or security, HIPAA and/or HITECH.
3. Published papers with full text in English.
4. Published papers where research or recommendations focused
on the US only published between 2003-2016.
5. Existing solutions/best practices to privacy and security
challenges, HIPAA compliance (qualitative and quantitative)
in telehealth use.
Figure 1. A flow diagram of the search and selection process.
International Journal of Telerehabilitation • telerehab.pitt.edu
International Journal of Telerehabilitation • Vol. 9, No. 2
Fall 2017 • (10.5195/ijt.2017.6231)
Figure 1 description: Figure 1 depicts a flow diagram of the
search and selection process. First box a top: Articles
identified
through database search (N=26,916), PubMed (n=21,540),
CINAHL (n=4,785), INSPEC (n-591). Arrow to box below:
Articles
after removing duplications (n=25,404); arrow to the box to the
right: Duplicate records (n=1,512). Next arrow to box below:
Articles after first round filtering (n=406); arrow to the box to
the right: Articles removed by reviewing titles and abstracts
(n=24,998). Next arrow to box below: Articles after second
round filtering (n=50); arrow to the box to the right: Articles
removed by reviewing full texts (n=356). Next arrow to box
below: Articles included after ATA guidelines are added
(n=61);
arrow to the box to the right: Articles removed by evaluating
the security and privacy contents (n=40). Last arrow to the box
below: Articles included in systematic review (n=21).
EXCLUSION OF PAPERS
Papers were reviewed and excluded in different phases:
• Phase I: Duplicates Removed. A total of 26,916 papers were
found in the three databases and 1,512 were removed
as duplicates to yield 25,404 papers.
• Phase II: Articles Removed by Reviewing Title and Abstract.
A title/abstract review was conducted, first by two
independent reviewers. A third reviewer was used to resolve
disagreement (24,998 excluded, to yield a total of 406
papers).
• Phase III: Articles Removed After Reviewing Full Text. A full
text review of 406 papers was conducted by all three
reviewers (356 excluded, 50 papers remained).
• Phase IV: American Telemedicine Association Guidelines
Added. Since the American Telemedicine Association
(ATA) guidelines were not returned from the original search
because they were guidelines and not peer-reviewed
articles, they were added into the original list (50) because of
their focus on telehealth, privacy and security (11
added. Total of 61 papers).
• Phase V: Articles Removed by Evaluating Security and
Privacy Content. A review of these papers to examine
security and privacy contents yielded 40 exclusions. And
eventually, a total of 21 papers were included in the final
systematic review.
In the initial title/abstract review the major reasons for
exclusion were:
1. Papers were published before HIPAA was enforced in 2003
2. Studies were not conducted in the US and therefore did not
abide by HIPAA/HITECH
In the full text review the major reasons for exclusion were that
the papers did not include both telehealth and a major
aspect of privacy and security related to telehealth use.
DATA EXTRACTION PROCESS AND QUALITY
ASSESSMENT
All search results were exported into EndNote libraries.
EndNote is a bibliographic management system. De-
duplications
were performed by using the method described by Bramer et al
(Bramer, Giustini, de Jonge, Holland, & Bekhuis, 2016).
Studies were removed if they were found to be duplicated. The
PDFs of the papers reviewed were stored in a shared Box
account (i.e., a secure cloud content platform in which users can
share large documents as well as collaborate, Redwood City,
CA).
Each article meeting the inclusion criteria was reviewed and its
characteristics documented using a standardized pre-
tested data extraction form. The data extraction form captured
the following data items: the three large goals of privacy and
security (confidentiality, integrity, and availability); the
specific techniques for achieving these goals (authentication,
encryption,
access control, physical security, policy, database backup, error
detection, anti-virus, software patches, secure system design,
intrusion detection); and the methods in each system (study
designs, settings, and outcomes).
The reference librarian performed the search and only provided
the title, abstract and year to the reviewers. The two
reviewers (DD, VW) independently read the title and abstracts
of the identified papers and determined eligibility based on the
specified inclusion/exclusion criteria. To better know how to
appropriately search the article titles and abstract, two of the
reviewers (DD and VW) conducted a pilot study by using a
small sample (n=100) of papers, made the selection and then
discussed the results against the selection criteria. From this
pilot study we could determine that we applied the same
selection criteria for our search strategy.
International Journal of Telerehabilitation • telerehab.pitt.edu
International Journal of Telerehabilitation • Vol. 9, No. 2 Fall
2017 • (10.5195/ijt.2017.6231)
Reviewers were blind to journals, study authors and institutions.
Any disagreements between the reviewers were resolved
by a third reviewer (LZ). Inter-rater reliability was measured
using the Cohen’s kappa statistical test (k). An inter-rater
Kappa
score was assessed during the first round of the paper selection,
to ensure a Kappa score at or above 0.8 as measured by
Cohen’s Kappa (k) statistical test. Full-text of studies making
this first cut were reviewed.
Three reviewers screened these for inclusion/exclusion criteria.
Selection disagreements were resolved through
discussion and reasons for excluding studies were recorded. A
form, developed in Excel, was used to extract data from
selected studies and included the author, year of publication,
reference; study design and sample size; setting; privacy and
security descriptions; primary outcomes; study limitations,
HIPAA compliance, and best practices. Reviewers assessed the
overall quality of evidence for every important outcome using
the GRADE four point ranked scale: (4) High; (3) Moderate; (2)
Low; (1) Very low (Balshem et al., 2011). Full papers were used
as evidence for decisions about the quality of evidence and
the strength of recommendations. Any differences in the
grading were assessed and discussed in several meetings with
investigators until full consensus was reached.
DATA SYNTHESIS
Quantitative analysis of the data from the papers was limited
due to the lack of quantifiable data in the privacy and
security literature. However, subcategories with similar
characteristics received more in-depth comparisons.
Investigators first
broke the data into qualitative themes that related to privacy,
security and administrative content. Each of those areas were
broken down into subthemes such as patient rights, use, and
disclosure for privacy; technical and physical for security; and
organizational and education/training/personnel for
administrative. Then, specific content within the 21 papers
were reviewed
closely and categorized across each of those themes and
subthemes.
RESULTS
REVIEWER AGREEMENT
For the 25,404 entries reviewed by 2 reviewers the percentage
of agreement was very good with the observed value of
99.04% and the 95% CI between 98.91 to 99.16 calculated per
the Wilson efficient-score method. For the Cohen’s kappa, the
observed kappa is 0.7331 and the 95% CI are 0.7009 to 0.7653.
Although the kappa is lower than 0.8, this still suggests
substantial agreement (Fleiss, Cohen, & Everitt, 1969).
TIME PERIOD AND TYPE OF STUDIES
A total of 21 papers (Watzlaf & Ondich, 2012; Watzlaf et al.,
2010; Watzlaf, Moeini, Matusow, et al., 2011; Peterson &
Watzlaf, 2014; Paing et al., 2009; Cason, Behl, & Ringwalt,
2012; Daniel, Sulmasy, & for the Health and Public Policy
Committee of the American College of Physicians, 2015; Naam
& Sanbar, 2015; American Telemedicine Association, 2009,
2011, 2014a, 2014b, 2016; Hall & McGraw, 2014; Garg &
Brewer, 2011; Brous, 2016; Mullen-Fortino et al., 2012; Nieves,
Candelario, Short, & Briscoe, 2009; Putrino, 2014; Demiris,
2004; Demiris, Edison, & Schopp, 2004) were selected for this
systematic review. These selected papers were published
between 2004 to 2016, in which 29 percent of them were
published
between 2011-2012. The papers included several telehealth
specialties such as telerehabilitation, telepsychiatry, teletrauma,
telenursing and tele-diabetes. Sixty-seven percent were
guideline/policy/strategy type studies, with three using a survey
or
interview method (14%). Other studies included a usability
study, a systematic review, a pilot study and an opinion piece.
There were no randomized controlled trials found that focused
on privacy and security in telehealth (Table 1).
International Journal of Telerehabilitation • telerehab.pitt.edu
International Journal of Telerehabilitation • Vol. 9, No. 2
Fall 2017 • (10.5195/ijt.2017.6231)
Table 1. Overview of Reviewed Studies
Overview of Studies
Time Period # %
2004-2005
2009-2010
2011-2012
2013-2014
2015-2016
2 9.5
4 19.0
6 28.6
5 23.8
4 19.0
Total 21 100
Specialties # %
Telepsychiatry
Teletrauma
Telenursing
Telerehabilitation
Telepathology
Teleburn
Telediabetes
Telesurgery
General telehealth
2 9.5
2 9.5
2 9.5
5 23.8
1 4.8
1 4.8
2 9.5
1 4.8
5 23.8
Total 21 100
Type of Study # %
Guideline/policy/strategy
Survey/Interview
Usability
Pilot
Opinion
Systematic/literature review
14 66.7
3 14.3
1 4.8
1 4.8
1 4.8
1 4.8
Total 21 100
DESCRIPTIVE ANALYSIS OF ALL STUDIES
A quantitative analysis of the privacy, security, and
administrative areas that were discussed in the papers is
summarized
in Table 2. All studies discussed some aspect of privacy and
security. Sixty-seven percent addressed patient rights to include
informed consent, accessibility, confidential communications,
or the patient’s ability to amend their information. Thirty-eight
percent addressed use and disclosure to include how video
sessions are retained, authorizations for release of information
to
other countries, websites, and third parties, accounting of
disclosures, purging and/or deletion schedule of files on mobile
devices and audio and video muting to maintain privacy. Sixty-
seven percent of the studies addressed the technical aspects of
security to include encryption, two-factor authentication, data
backup, storage and recovery to meet HIPAA requirements,
National Institute of Standards and Technology (NIST) and
Health Level-7 (HL7) recommendations. However, only 38
percent
addressed the physical aspects of the telehealth session to
include a secure server location, back-up generator and
maintaining a secure physical environment for where the
telehealth session is held. One of the studies contained a
systematic
review of telemedicine security and found poor reporting of
methodologies for telemedicine technologies and security
measures. Fifty-two percent of the papers did not discuss the
organization of privacy and security through policies,
procedures, Business Associate Agreements (BAAs) or
compliance audits, however, 67 percent addressed the need for
education and training of providers, patients and technical
support workforce.
International Journal of Telerehabilitation • telerehab.pitt.edu
International Journal of Telerehabilitation • Vol. 9, No. 2 Fall
2017 • (10.5195/ijt.2017.6231)
Table 2: Privacy, Security, and Administrative Content
Privacy, Security,
Administrative Content
# %
Privacy
Patient Rights
Yes, addressed
No, not addressed
Use and Disclosure
Yes, addressed
No, not addressed
14 66.7
7 33.3
8 38.1
13 61.9
Security
Technical
Yes, addressed
No, not addressed
Physical
Yes, addressed
No, not addressed
14 66.7
7 33.3
8 38.1
13 61.9
Privacy, Security,
Administrative Content
# %
Administrative
Organization (policies)
Yes, addressed
No, not addressed
Education/Training/
Personnel
Yes, addressed
No, not addressed
10 47.6
11 52.4
14 66.7
7 33.3
Table 3 provides a detailed summary of all papers for privacy,
security and administrative content. Most of the patient
rights content dealt with providing verbal or written informed
consent in simple, easy to understand language and to have
providers discuss the risks of privacy and security when using
telehealth. Use of audio/video muting and a secure physical
environment was also discussed to be included in the consent
for treatment so that the patient understands how their
information during and after the telehealth session is private.
Use and disclosure was not as clearly addressed, although
several papers stated that access to patient information should
only be granted with proper authorization, and there was a
need to have this discussed with the patient so that they
understood ownership of the data before the telehealth session
begins. Encryption and two-factor authentication were other
major areas addressed in the papers. Some papers did provide
details as to the types of encryption to use as well as meeting
HIPAA and NIST requirements and recommendations. Data
backups, storage of the video files, and the ability to keep them
secure was also discussed. Other areas addressed included a
review of consumer-based free systems and the importance of
healthcare providers’ understanding of which telehealth
technologies meet federal, state, and local laws. Other areas
mentioned included performing an overall privacy and security
assessment of the telehealth system and to maintain security
solutions specific to the telehealth system, making sure that
confidentiality and security are a primary concern. Many of the
papers expressed the need for overall provider and patient
awareness, education and training and policies on keeping
telehealth information private and secure, and policies that
specify
who can be included in the telehealth session. Other papers
expressed the need for maintaining a BAA with the vendor
providing the telehealth system. Some papers addressed the
need for more research on the effectiveness of telemedicine to
include telehealth security training, legal liability, HIPAA
compliance and the importance of an independent assessment of
overall privacy and security. Some of the papers described the
lack of current scientific studies around privacy and security in
telehealth and the need for more studies that demonstrate the
effectiveness of best practices in privacy and security of
telehealth (Table 3).
International Journal of Telerehabilitation • telerehab.pitt.edu
International Journal of Telerehabilitation • Vol. 9, No. 2
Fall 2017 • (10.5195/ijt.2017.6231)
Table 3: Detailed Summary of All Papers for Privacy, Security
and Administrative Content
Privacy Security Administrative
Article Title, Year
Journal
Type of Study
Patient Rights
(access, amend, right to
confidential
communications,
informed consent etc.)
Use & Disclosure
(authorizations,
accounting of
disclosures, de-
identification of
data etc.)
Technical
(encryption, access
control, authentication,
data backup, storage,
recovery)
Physical
(secure server
location, backup
generator etc.)
Organizational
(policies, BAAs,
auditing)
Education/
Training/
Personnel
(American
Telemedicine
Association,
2009)
Evidence Based
Practice for
Telemental Health
Policy
Keep physical
surroundings private
using audio/video
muting; Considered
essential to easily
change from public to
private audio mode.
(American
Telemedicine
Association,
2014a)
Clinical
Guidelines for
Telepathology
Policy
Unauthorized persons
should not have
access to sensitive
information.
Use audio/video
muting, and easily
change from public to
private audio mode.
Consideration
should be given to
periodic purging or
deletion of
telepathology files
from mobile
devices.
Data transmission must
be secure through
encryption that meets
recognized standards.
Mobile device use
requires a passphrase
or other equivalent
security feature, multi-
factor authentication,
inactivity timeout
function with
passphrase or re-
authentication to access
the device after timeout
is exceeded (15
minutes).
Give providers the
capability to use
remote wiping if
device lost or stolen.
Back up or store on
secure data storage
locations. Do not
use cloud services if
they cannot comply
in keeping PHI
confidential.
Mobile devices
should be kept in
the provider’s
possession when
traveling or in an
uncontrolled
environment.
Those in charge of
technology should know
technology security.
Mobile devices should be
kept in the provider’s
possession when traveling
or in an uncontrolled
environment.
(American
Telemedicine
Association,
2016)
Practice
Guidelines for
Informed consent:
discuss with patient
about the telehealth
session and use simple
language especially
when describing all
If transmission data are
stored on hard drive,
use Federal Information
Processing Standard
(FIPS) 140-2 encryption
AES as acceptable
Those in charge of the
technology should educate
users with respect to all
privacy and security options.
Educate patients on the
potential for inadvertently
International Journal of Telerehabilitation • telerehab.pitt.edu
International Journal of Telerehabilitation • Vol. 9, No. 2 Fall
2017 • (10.5195/ijt.2017.6231)
Privacy Security Administrative
Article Title, Year
Journal
Type of Study
Patient Rights
(access, amend, right to
confidential
communications,
informed consent etc.)
Use & Disclosure
(authorizations,
accounting of
disclosures, de-
identification of
data etc.)
Technical
(encryption, access
control, authentication,
data backup, storage,
recovery)
Physical
(secure server
location, backup
generator etc.)
Organizational
(policies, BAAs,
auditing)
Education/
Training/
Personnel
Teleburn
Policy
privacy and security
issues such as
encryption, store-
forward transmissions
of data/images,
videoconferencing etc.
Key topics should
include confidentiality
and limits to
confidentiality in
electronic
communications; how
patient information will
be documented and
stored.
levels of security.
Pre-boot authentication
should also be used.
storing data and PHI;
intention to record services;
methods of storage; how
PHI will be shared with
authorized users and
encrypted for maximum
security; recordings will be
streamed to protect
accidental or unauthorized
file sharing or transfer.
(American
Telemedicine
Association,
2014b)
Core Operational
Guidelines for
Telehealth
Services Involving
Provider-Patient
Interactions
Policy
Healthcare providers
should provide to the
patient verbal/written
information related to
privacy and security;
potential risks and
confidentiality in easy
to understand
language, especially
when discussing
encryption or potential
for technical failures;
limits to confidential
communication,
documentation and
storage of patient
information.
Access to
recordings only
granted to
authorized users.
Stream to protect
from accidental or
unauthorized file
sharing/transfer.
Privacy Features
should include:
audio, video
muting, easily
change from
public to private
mode, privacy of
the mobile device.
Multi-factor
authentication; inactivity
timeout function; keep
mobile devices with
provider always; wipe or
disable mobile device if
lost or stolen.
Audio, video and all
other data transmission
should use encryption
(at least on the side of
the healthcare
professional) that meets
recognized standards.
Use software that has
appropriate verification,
confidentiality, and
All devices should
have up to date
security software,
device management
software to provide
consistent oversight
of applications,
device and data
configuration and
security, backup
plan for
communication
between sites and
discussed with the
patient. Only allow
one session to be
open at one time
and if there is an
Establish
guidelines for
periodic purging or
deletion.
Providers should give
guidance to patients about
inadvertently storing PHI
and how best to protect
privacy. Discuss recording of
services, how information
will be stored and how
privacy will be protected.
International Journal of Telerehabilitation • telerehab.pitt.edu
International Journal of Telerehabilitation • Vol. 9, No. 2
Fall 2017 • (10.5195/ijt.2017.6231)
Privacy Security Administrative
Article Title, Year
Journal
Type of Study
Patient Rights
(access, amend, right to
confidential
communications,
informed consent etc.)
Use & Disclosure
(authorizations,
accounting of
disclosures, de-
identification of
data etc.)
Technical
(encryption, access
control, authentication,
data backup, storage,
recovery)
Physical
(secure server
location, backup
generator etc.)
Organizational
(policies, BAAs,
auditing)
Education/
Training/
Personnel
Should also discuss a
policy for the patient
sharing portions of this
information with public
and written
agreements may be
needed to protect both
the patient and
provider.
security measures.
If services are recorded,
store in a secure
location and make
accessible to authorized
users only.
attempt to open an
additional session
the system will
automatically log off
the first session or
block the second
session from being
opened.
Session logs should
be secured in a
separate location
and only granted to
authorized users.
Back up to or store
on secure data
storage locations.
Do not use cloud
services if they
cannot comply in
keeping PHI
confidential.
Brous, 2016)
American Journal
of Nursing
Policy
Nurses must meet
medical information
and patient privacy
requirements of
HIPAA, as well as
state privacy laws,
organizational policies,
and ethical standards.
Devices that contain
PHI must meet security
requirements, and
wireless
communications must
have cybersecurity
protection; electronic
files must be stored in a
manner that ensures
All providers should be
educated on how to prevent
data breaches when
communicating information
via telehealth, transmitting
images or audio or video
files electronically and on
how to respond when they
do occur.
International Journal of Telerehabilitation • telerehab.pitt.edu
International Journal of Telerehabilitation • Vol. 9, No. 2 Fall
2017 • (10.5195/ijt.2017.6231)
Privacy Security Administrative
Article Title, Year
Journal
Type of Study
Patient Rights
(access, amend, right to
confidential
communications,
informed consent etc.)
Use & Disclosure
(authorizations,
accounting of
disclosures, de-
identification of
data etc.)
Technical
(encryption, access
control, authentication,
data backup, storage,
recovery)
Physical
(secure server
location, backup
generator etc.)
Organizational
(policies, BAAs,
auditing)
Education/
Training/
Personnel
privacy and
confidentiality since
audio and video
recordings are
susceptible to hacking.
To meet HIPAA standards
any systems that transmit or
store electronic information
about patients must be
operated and monitored by
computer technicians with
expertise in security
measures. Also, all health
care providers should check
state privacy laws which can
be more stringent than
HIPAA. The National
Telehealth Policy Resource
Center provides state-
specific information on laws,
regulations, reimbursement
policies and pending
legislation.
(Cason et al.,
2012)
International
Journal of
Telerehabilitation
Survey
44% of providers
surveyed expressed
concerns with privacy
issues
40% of providers
surveyed expressed
concerns with security
issues
Need for secure and
private delivery
platforms
Personnel shortages in
telehealth delivery
(Daniel et al.,
2015)
Annals of Internal
Medicine
Policy Position
Paper
Skype not
considered HIPAA
compliant since no
BAA with Microsoft.
Skype was
noncompliant with
Oklahoma Health
Care Authority’s
International Journal of Telerehabilitation • telerehab.pitt.edu
International Journal of Telerehabilitation • Vol. 9, No. 2
Fall 2017 • (10.5195/ijt.2017.6231)
Privacy Security Administrative
Article Title, Year
Journal
Type of Study
Patient Rights
(access, amend, right to
confidential
communications,
informed consent etc.)
Use & Disclosure
(authorizations,
accounting of
disclosures, de-
identification of
data etc.)
Technical
(encryption, access
control, authentication,
data backup, storage,
recovery)
Physical
(secure server
location, backup
generator etc.)
Organizational
(policies, BAAs,
auditing)
Education/
Training/
Personnel
policy.
(Demiris et al.,
2004)
Telemedicine
Journal and e-
Health
Interview
Research Study
18.7% need for digital
images to be captured
and store in EHR at
point of care.
56.2% did not believe that
security and privacy risks
would be increased when
using telemedicine; 31.2%
said they did not know
enough to respond to the
question; and 12.5 %
believed there could be
increased risk.
9.3% said technical support
not readily available;
All providers were not
influenced in their ability to
ask questions due to
concerns over security or
privacy.
Further education is needed
on this topic.
(Demiris, 2004)
International
Journal of
Electronic
Healthcare
Policy Overview
Privacy, storage,
transmission of images
and maintenance of
video/audio recordings
and other PHI must be
examined and
addressed as
transmission of this
data over
communication lines
Access to
ownership of data
must be
addressed with
the patient since
some patients
share this data
with a web server
owned by a third
party that allows
International Journal of Telerehabilitation • telerehab.pitt.edu
International Journal of Telerehabilitation • Vol. 9, No. 2 Fall
2017 • (10.5195/ijt.2017.6231)
Privacy Security Administrative
Article Title, Year
Journal
Type of Study
Patient Rights
(access, amend, right to
confidential
communications,
informed consent etc.)
Use & Disclosure
(authorizations,
accounting of
disclosures, de-
identification of
data etc.)
Technical
(encryption, access
control, authentication,
data backup, storage,
recovery)
Physical
(secure server
location, backup
generator etc.)
Organizational
(policies, BAAs,
auditing)
Education/
Training/
Personnel
have concerns of
privacy violations.
providers to log in
and access their
patient’s data.
(Garg & Brewer,
2011)
Journal of
Diabetes Science
and Technology
Systematic
Review
Many telemedicine
researchers are
unfamiliar with the field
of security in general.
The authors found
instances of poor
encryption standards,
designs of
communication
protocols with no proof
of security, HIPAA or
HL7 compliance.
Reliability and
availability of the
systems are key since
many provide critical life
supporting systems for
people with diabetes
and other chronic
illnesses. Data integrity,
the quality of security
research, network
security and
cryptography all need to
be improved as well,
per this systematic
review of security of
telemedicine systems.
Most of the papers in the
systematic review of security
in telehealth did not address
training, legal liability, or
HIPAA and HL7 compliance.
Another area that was
neglected was research on
availability or the measures
used to ensure availability of
telehealth systems.
(Hall & McGraw,
2014)
No federal agency
has authority to
International Journal of Telerehabilitation • telerehab.pitt.edu
International Journal of Telerehabilitation • Vol. 9, No. 2
Fall 2017 • (10.5195/ijt.2017.6231)
Privacy Security Administrative
Article Title, Year
Journal
Type of Study
Patient Rights
(access, amend, right to
confidential
communications,
informed consent etc.)
Use & Disclosure
(authorizations,
accounting of
disclosures, de-
identification of
data etc.)
Technical
(encryption, access
control, authentication,
data backup, storage,
recovery)
Physical
(secure server
location, backup
generator etc.)
Organizational
(policies, BAAs,
auditing)
Education/
Training/
Personnel
Health Affairs
Policy
enact P&S
requirements to
cover the entire
telehealth
ecosystem and
these authors
advocate for the
Federal Trade
Commission (FTC)
to do this.
(Mullen-Fortino et
al., 2012)
American Journal
of Critical Care
Survey Research
179 nurses that use
telemedicine were surveyed
and 11% of nurses surveyed
believe it is intrusive; 27%
believe it decreases patient
privacy and 13% believe it
creates a feeling of being
spied upon. It is important
to change these perceptions
of nurses for telehealth
technology to expand.
(Naam & Sanbar,
2015)
Journal of Hand
Surgery
Policy
Verbal or written
informed consent
required from patients
or representative’s
office visit
Establish policy
and procedure
(P&P) by
physicians and
hospitals on use of
telemedicine that
include patient
education materials
that explain what
the patient can
expect using
Community-wide education
for patients and providers on
PHI and maintaining privacy
and confidentiality when
using telemedicine
International Journal of Telerehabilitation • telerehab.pitt.edu
International Journal of Telerehabilitation • Vol. 9, No. 2 Fall
2017 • (10.5195/ijt.2017.6231)
Privacy Security Administrative
Article Title, Year
Journal
Type of Study
Patient Rights
(access, amend, right to
confidential
communications,
informed consent etc.)
Use & Disclosure
(authorizations,
accounting of
disclosures, de-
identification of
data etc.)
Technical
(encryption, access
control, authentication,
data backup, storage,
recovery)
Physical
(secure server
location, backup
generator etc.)
Organizational
(policies, BAAs,
auditing)
Education/
Training/
Personnel
telemedicine.
(Nieves et al.,
2009)
Military Medicine
Pilot Study
All transmission
protocols were
compliant with HIPAA. It
included Tandberg 880
MXP video
conferencing equipment
and used Integrated
Services Digital
Network (ISDN) or the
hospitals Internet
Protocol (IP) network
lines with a bandwidth
speed of >384 Kilobits
per second (Kbps).
Audio and image quality
were also suitable for
use in clinical services.
(Paing et al.,
2009)
Current
Psychiatry
Reports
Summary of
studies/
policy
Families should sign a
release for
communication and
consent for treatment
for children; mental
health professional
should discuss HIPAA
provisions with each
client as part of the
informed consent
process.
Adolescents were
concerned about
whether someone
could tap into the lines
Videotapes of
telehealth
sessions are an
official part of the
medical record.
Transmission protocol
meets HIPAA
requirements
Videotapes kept in
secure storage
Practice the 4 C’s:
Contracting,
Competence,
Confidentiality and
Control (Koocher)
when managing
potential risk;
Policies must
specify who can be
included in the
session especially
those off camera.
More studies on
confidentiality, technology
issues needed
Provide sufficient manpower
for technological support
International Journal of Telerehabilitation • telerehab.pitt.edu
International Journal of Telerehabilitation • Vol. 9, No. 2
Fall 2017 • (10.5195/ijt.2017.6231)
Privacy Security Administrative
Article Title, Year
Journal
Type of Study
Patient Rights
(access, amend, right to
confidential
communications,
informed consent etc.)
Use & Disclosure
(authorizations,
accounting of
disclosures, de-
identification of
data etc.)
Technical
(encryption, access
control, authentication,
data backup, storage,
recovery)
Physical
(secure server
location, backup
generator etc.)
Organizational
(policies, BAAs,
auditing)
Education/
Training/
Personnel
to hear them.
(Peterson &
Watzlaf, 2014)
International
Journal of
Telerehabilitation
Policy
Checklist includes
accessibility,
amendment, retention
of PHI.
Checklist includes
requests for PHI,
sharing of PHI
with other
countries and
websites.
Checklist includes
encryption, user
procedures, audit
system activity such as
username, password
(PW), additional
authentication, overall
assessment
Check cloud based
solutions to make
sure secure
Checklist includes
the need for BAAs
for telerehabilitation
store and forward
companies and if
direct identifiers of
PHI included a
Data Use
Agreement (DUA)
required under
HIPAA
Use Privacy and Security
(P&S)
checklist
to evaluate
system/
employees before use
(Putrino, 2014)
Current Opinion
of Neurology
Opinion
When designing
telemedicine systems
confidentiality and
security are major
concern. Designing
video game driven tele-
rehabilitation (VGDT) is
no exception. Patient
data should be de-
identified and never
stored on the patient’s
local device. Data
should always be
encrypted when
streaming across a
network.
(Watzlaf et al.,
2010)
International
Journal of
Checklist includes
accessibility,
amendment, retention
of PHI, BAAs;
Checklist includes
requests for PHI,
sharing of PHI
with other
Checklist includes
encryption, user
procedures, audit
system activity such as
Maintain secure
transmissions while
the session is
conducted and when
Form team of health and
legal professionals to
evaluate system for HIPAA,
state, and local
International Journal of Telerehabilitation • telerehab.pitt.edu
International Journal of Telerehabilitation • Vol. 9, No. 2 Fall
2017 • (10.5195/ijt.2017.6231)
Privacy Security Administrative
Article Title, Year
Journal
Type of Study
Patient Rights
(access, amend, right to
confidential
communications,
informed consent etc.)
Use & Disclosure
(authorizations,
accounting of
disclosures, de-
identification of
data etc.)
Technical
(encryption, access
control, authentication,
data backup, storage,
recovery)
Physical
(secure server
location, backup
generator etc.)
Organizational
(policies, BAAs,
auditing)
Education/
Training/
Personnel
Telerehabilitation
Policy
Informed consent
needed to be signed
by patients to include
privacy and security
issues of telehealth
system
countries and
websites,
Incident response
needed
username, PW,
additional
authentication, overall
assessment; follow
security standards
recommended by NIST
such as not using
username and PW for
anything other than
telerehabilitation
communication,
changing it often, using
strong usernames and
PWs, no computer
viruses, and
consistently
authenticate user
communication
stored and released
to internal and
external entities
requirements; educate and
train all personnel
(Watzlaf, Moeini,
Matusow, et al.,
2011)
International
Journal of
Telerehabilitation
Policy
Examined accessibility
and retention of PHI by
employees and others.
Examined
requests from
legal, sharing of
information with
other countries,
websites.
Encryption, antivirus
and audit and security
system evaluation was
examined.
128-bit Advanced
Encryption Standard
(AES) Secure Real-
Time Transport Protocol
(SRTP) recommended
by NIST. Only 50% of
companies reviewed
use some form of
encryption.
70% of companies
made no mention of
Sharing of
information was not
always addressed
in vendor policies
Used a HIPAA compliant
checklist for top 10 Voice
over Internet Protocol (VoIP)
companies
Most of the companies did
not include all items on the
checklist in their policies.
International Journal of Telerehabilitation • telerehab.pitt.edu
International Journal of Telerehabilitation • Vol. 9, No. 2
Fall 2017 • (10.5195/ijt.2017.6231)
Privacy Security Administrative
Article Title, Year
Journal
Type of Study
Patient Rights
(access, amend, right to
confidential
communications,
informed consent etc.)
Use & Disclosure
(authorizations,
accounting of
disclosures, de-
identification of
data etc.)
Technical
(encryption, access
control, authentication,
data backup, storage,
recovery)
Physical
(secure server
location, backup
generator etc.)
Organizational
(policies, BAAs,
auditing)
Education/
Training/
Personnel
security evaluation.
(Watzlaf &
Ondich, 2012)
International
Journal of
Telerehabilitation
Usability Study
Consent for
disclosure is
needed.
More secure entrance
into telehealth system
than username and PW.
Impersonation of the
system should be
prevented.
Ensure HIPAA
compliance and
obtain a BAA
between telehealth
system and covered
entity.
Develop clear,
understandable
privacy and
security (P&S)
policies into the
patient consent
form
Policies should
describe the P&S
of the conferencing
session and
describe how it will
restrict: employee
access to technical
problems;
information to other
users; retention of
session; and
sharing of
information with
other websites,
countries and other
third parties without
patient consent.
Form a team and use the
HIPAA checklist to ensure
compliance before using a
telehealth system.
Review the P&S policies of
each system before use.
Ask questions of the
telehealth company not
addressed in the policy.
International Journal of Telerehabilitation • telerehab.pitt.edu
International Journal of Telerehabilitation • Vol. 9, No. 2 Fall
2017 • (10.5195/ijt.2017.6231)
DISCUSSION
This systematic review of privacy and security practices that
healthcare providers may use with telehealth technologies
has shown that privacy and security is a concern across all types
of specialties such as telerehabilitation, telenursing,
teletrauma, and telepsychiatry. All providers need to make
privacy and security of utmost concern when conducting a
telehealth session.
The papers suggest that most of the work has been policy and
strategy pieces with no experimental or quasi-experimental
studies represented. In both survey research studies conducted,
healthcare providers had concerns over privacy and security
in telehealth and that it can be intrusive for the patient. In an
interview study, it was found that providers did not believe that
telehealth increased the risk of privacy or security concerns
although some did not know enough to answer the question fully
and thought there could be increased risk. These studies alone
show that there is uncertainty on this topic.
Many healthcare providers may not know all the many aspects
of privacy and security within telehealth and need more
education and training as well as technical support personnel to
help them in these areas. Many of the policy studies stated
that policy and procedure (P&P) as well as education and
training are needed for all healthcare providers and technical
support personnel to prevent breaches of PHI.
These papers also stated that healthcare professionals need to
know state, regional, and national laws and regulations,
legal liability, HIPAA/HITECH and HL7 compliance, as well as
measures used to ensure availability of PHI to the proper users.
Methods were also discussed regarding how audio or video
recordings are to be stored, maintained and accessed to protect
patient privacy, and how mobile devices used in telehealth
sessions are to be reinforced to protect the privacy and security
of
patient information.
The most detailed information surrounding informed consent for
a telehealth session was found in the ATA guidelines and
recommendations and discussed how maintaining privacy and
security within the telehealth session must be included in the
informed consent in easy to understand language especially
when discussing encryption, authentication and other methods
to
maintain confidential communications between provider and
patient. The use of audio and video muting as well as the ability
to
quickly change from public to private audio mode so that
unauthorized users may not see or hear what is being
communicated
was also discussed throughout the ATA guideline papers.
There does not seem to be consensus about the use and
disclosure of PHI in telehealth since some systems will allow
sharing with certain groups as part of their privacy policy.
HIPAA, however, states that proper authorizations are
warranted
when there are requests for information and an accounting of
disclosures is necessary when PHI is shared. However, there
still seems to be some uncertainty as to what parts of the
telehealth session will be kept, for how long, how they will be
maintained and where they will be stored.
If the telehealth sessions are recorded and kept with the
electronic health record (EHR) then proper authorizations are
necessary when PHI is requested. However, there is no standard
method for how this is done. Some systems may convene a
telehealth session and not store any of the information that was
transmitted. Some may record the session but then destroy
the recording after the session is over. Some may record and
store the session or even transmit the session to a third party for
additional treatment and consultation. Some type of standard
process in this area is needed.
Security measures such as encryption and authentication were
addressed, but not all papers provided a standardized
description of the encryption methods used or the best methods
for authentication. Very few papers addressed the importance
of an independent audit on the telehealth system for privacy and
security features by an outside entity.
LIMITATIONS
There were some limitations to our systematic review. Due to
time constraints the grey literature, such as dissertations
and other unpublished reports, other databases listed in the
protocol, vendors or authors (also mentioned in the protocol)
were
not searched. Also, as mentioned previously, only English
language articles were reviewed.
International Journal of Telerehabilitation • telerehab.pitt.edu
International Journal of Telerehabilitation • Vol. 9, No. 2
Fall 2017 • (10.5195/ijt.2017.6231)
CONCLUSION
In summary, more scientific research studies are needed to
determine the best practices in privacy and security
surrounding telehealth. Experimental studies that address the
effectiveness of privacy and security evaluations of the
telehealth system, proper informed consent that discusses the
privacy and security aspects of the telehealth session with the
patient as well as testing of access control, disaster recovery
and risk analysis of the telehealth system are essential to
improve the practices of the entire telehealth team.
Best practices that are consistent across all types of telehealth
services for all healthcare providers are needed to address
all privacy and security issues. Privacy and security aspects are
just as important as providing a clear and trouble-free
telehealth session and a privacy and security evaluation should
be performed before the telehealth system is used with a
patient. Tools used to assist healthcare providers on what they
should look for when deciding on a telehealth system are
needed. This systematic review results informed the need for
and subsequently led to the development of a best practice tool
that will enable healthcare providers to assess privacy and
security features of the telehealth technologies they are
planning to
use. Hopefully, this tool will move healthcare providers one
step closer to enabling best practices in privacy and security in
telehealth.
ACKNOWLEDGMENTS
This research was supported in part by the National Institute on
Disability, Independent Living, and Rehabilitation
Research (NIDILRR) grant #90RE5018 (RERC from Cloud to
Smartphone: Empowering and Accessible ICT). Systematic
Review Registration: PROSPERO: CRD42015020552
REFERENCES
American Telemedicine Association. (2009). Evidence-based
practice for telemental health. Retrieved from
http://hub.americantelemed.org/resources/telemedicine-practice-
guidelines
American Telemedicine Association. (2011). Telehealth practice
recommendations for diabetic retinopathy. Retrieved from
http://hub.americantelemed.org/resources/telemedicine-practice-
guidelines
American Telemedicine Association. (2014a). Clinical
guidelines for telepathology. Retrieved from
http://hub.americantelemed.org/resources/telemedicine-practice-
guidelines
American Telemedicine Association. (2014b). Core operational
guidelines for telehealth services involving provider-patient
interactions.
Retrieved from
http://hub.americantelemed.org/resources/telemedicine-practice-
guidelines
American Telemedicine Association. (2016). Practice guidelines
for teleburn care. Retrieved from
http://hub.americantelemed.org/resources/telemedicine-practice-
guidelines
Balshem, H., Helfand, M., Schunemann, H. J., Oxman, A. D.,
Kunz, R., Brozek, J., . . . Guyatt, G. H. (2011). GRADE
Guidelines: 3. Rating the
quality of evidence. Journal of Clinical Epidemiology, 64, 401-
406. https://doi.org/10.1016/j.jclinepi.2010.07.015
Bramer, W. M., Giustini, D., de Jonge, G. B., Holland, L., &
Bekhuis, T. (2016). De-duplication of database search results
for systematic
reviews in EndNote. Journal of the Medical Library
Association, 104, 240-243. https://doi.org/10.3163/1536-
5050.104.3.014
Brous, E. (2016). Legal considerations in telehealth and
telemedicine. American Journal of Nursing, 116(9), 64-67.
https://doi.org/10.1097/01.NAJ.0000494700.78616.d3
Cason, J., Behl, D., & Ringwalt, S. (2012). Overview of states'
use of telehealth for the delivery of early intervention (IDEA
Part C) services.
International Journal of Telerehabilitation, 4(2), 39-46.
https://doi.org/10.5195/IJT.2012.6105
Cohn, E., & Watzlaf, V. (2012). Telepractice and informed
consent: Readability of VoIP privacy practices. Paper presented
at the American
Speech-Language Hearing Association.
Daniel, H., Sulmasy, L. S., & for the Health and Public Policy
Committee of the American College of Physicians. (2015).
Policy
recommendations to guide the use of telemedicine in primary
care settings: An American College of Physicians position
paper. Annals of
Internal Medicine, 163, 787-789. https://doi.org/10.7326/M15-
0498
Demiris, G. (2004). Electronic home healthcare: Concepts and
challenges. International Journal of Electronic Healthcare, 1(1),
4-16.
https://doi.org/10.1504/IJEH.2004.004655
http://hub.americantelemed.org/resources/telemedicine-practice-
guidelines
http://hub.americantelemed.org/resources/telemedicine-practice-
guidelines
http://hub.americantelemed.org/resources/telemedicine-practice-
guidelines
http://hub.americantelemed.org/resources/telemedicine-practice-
guidelines
http://hub.americantelemed.org/resources/telemedicine-practice-
guidelines
https://doi.org/10.1016/j.jclinepi.2010.07.015
https://doi.org/10.3163/1536-5050.104.3.014
https://doi.org/10.1097/01.NAJ.0000494700.78616.d3
https://doi.org/10.5195/IJT.2012.6105
https://doi.org/10.7326/M15-0498
https://doi.org/10.1504/IJEH.2004.004655
International Journal of Telerehabilitation • telerehab.pitt.edu
International Journal of Telerehabilitation • Vol. 9, No. 2 Fall
2017 • (10.5195/ijt.2017.6231)
This work is licensed under a Creative Commons Attribution
4.0
International License.
This journal is published by the University Library System of
the
University of Pittsburgh as part of its D-Scribe Digital
Publishing
Program and is cosponsored by the University of Pittsburgh
Press.
Demiris, G., Edison, K., & Schopp, L. H. (2004). Shaping the
future: Needs and expectations of telehealth professionals.
Telemedicine and e-
Health, 10 (Suppl 2), S60-S63.
https://doi.org/10.1089/tmj.2004.10.S-60
Fleiss, J. L., Cohen, J., & Everitt, B. S. (1969). Large sample
standard errors of kappa and weighted kappa. Psychological
Bulletin, 72, 323-
327. https://doi.org/10.1037/h0028106
Garg, V., & Brewer, J. (2011). Telemedicine security: A
systematic review. Journal of Diabetes Science and Technology,
5, 768-777.
https://doi.org/10.1177/193229681100500331
Hall, J. L., & McGraw, D. (2014). For telehealth to succeed,
privacy and security risks must be identified and addressed.
Health Affairs
(Millwood), 33, 216-221.
https://doi.org/10.1377/hlthaff.2013.0997
Health Resources and Services Administration. (2015).
Telehealth. Retrieved from https://www.hrsa.gov/rural-
health/telehealth/index.html
Moher, D., Shamseer, L., Clarke, M., Ghersi, D., Liberati, A.,
Petticrew, M., . . . PRISMA-P Group. (2015). Preferred
reporting items for
systematic review and meta-analysis protocols (PRISMA-P)
2015 Statement. Systematic Reviews, 4, 1.
https://doi.org/10.1186/2046-
4053-4-1
Mullen-Fortino, M., DiMartino, J., Entrikin, L., Mulliner, S.,
Hanson, C. W., & Kahn, J. M. (2012). Bedside nurses'
perceptions of intensive care
unit telemedicine. American Journal of Critical Care, 21(1), 24-
32. https://doi.org/10.4037/ajcc2012801
Naam, N. H., & Sanbar, S. (2015). Advanced technology and
confidentiality in hand surgery. Journal of Hand Surgery, 40,
182-187.
https://doi.org/10.1016/j.jhsa.2014.03.011
Nieves, J. E., Candelario, J., Short, D., & Briscoe, G. (2009).
Telemental health for our soldiers: A brief review and a new
pilot program.
Military Medicine, 174, xxi-xxii.
Office of the National Coordinator for Health Information
Technology. (2016). Breaches of unsecured protected health
information. Health IT
Quick-Stat #53. Retrieved from
https://dashboard.healthit.gov/quickstats/pages/breaches-
protected-health-information.php
Paing, W. W., Weller, R. A., Welsh, B., Foster, T., Birnkrant, J.
M., & Weller, E. B. (2009). Telemedicine in children and
adolescents. Current
Psychiatry Reports, 11, 114-119.
https://doi.org/10.1007/s11920-009-0018-9
Peterson, C., & Watzlaf, V. (2014). Telerehabilitation store and
forward applications: A review of applications and privacy
considerations in
physical and occupational therapy practice. International
Journal of Telerehabilitation, 6(2), 75-84.
https://doi.org/10.5195/ijt.2014.6161
Putrino, D. (2014). Telerehabilitation and emerging virtual
reality approaches to stroke rehabilitation. Current Opinion in
Neurology, 27, 631-
636. https://doi.org/10.1097/WCO.0000000000000152
Rinehart-Thompson, L. (2013). Introduction to health
information privacy and security. Chicago, IL: AHIMA Press.
US Department of Health and Human Services. (2013). HIPAA
administrative simplification regulation text. Retrieved from
http://www.hhs.gov/sites/default/files/ocr/privacy/hipaa/adminis
trative/combined/hipaa-simplification-201303.pdf
Watzlaf, V. (2010). Are your internet based technology
practices HIPAA compliant? Paper presented at the American
Telemedicine
Association, Telerehabilitation SIG.
Watzlaf, V., & Ondich, B. (2012). VoIP for telerehabilitation: A
pilot usability study for HIPAA compliance. International
Journal of
Telerehabilitation, 4(1), 25-32.
https://doi.org/10.5195/ijt.2012.6096
Watzlaf, V., Moeini, S., & Firouzan, P. (2010). VOIP for
telerehabilitation: A risk analysis for privacy, security, and
HIPAA compliance.
International Journal of Telerehabilitation, 2(2), 3-14.
https://doi.org/10.5195/ijt.2010.6056
Watzlaf, V., Moeini, S., & Matusow, L. (2011). Privacy and
security assessment for internet-based technologies. Paper
presented at the
Pennsylvania Speech and Hearing Association Conference,
Pittsburgh, PA.
Watzlaf, V., Moeini, S., Matusow, L., & Firouzan, P. (2011).
VOIP for Telerehabilitation: A Risk Analysis for Privacy,
Security and HIPAA
Compliance: Part II. International Journal of Telerehabilitation,
3(1), 3-10. https://doi.org/10.5195/ijt.2011.6070
Watzlaf, V., DeAlmeida, D., Zhou, L., & Hartman, L. (2015).
Protocol for a systematic review of telehealth privacy and
security research to
identify best practices. International Journal of
Telerehabilitation, 7(2), 15-22.
https://doi.org/10.5195/ijt.2015.6186
Watzlaf, V., DeAlmeida, D., Molinero, A., Zhou, L., &
Hartman, L. (2015). Protocol for systematic review in privacy
and security in telehealth:
Best practices for healthcare professionals. PROSPERO, 2015,
CRD42015020552. Retrieved from
http://www.crd.york.ac.uk/PROSPERO/display_record.php?ID=
CRD42015020552
http://creativecommons.org/licenses/by/4.0/
http://creativecommons.org/licenses/by/4.0/
http://www.library.pitt.edu/
http://www.pitt.edu/
http://www.library.pitt.edu/articles/digpubtype/index.html
http://www.library.pitt.edu/articles/digpubtype/index.html
http://upress.pitt.edu/
http://creativecommons.org/licenses/by-nc-nd/3.0/us/
https://doi.org/10.1089/tmj.2004.10.S-60
https://doi.org/10.1037/h0028106
https://doi.org/10.1177/193229681100500331
https://doi.org/10.1377/hlthaff.2013.0997
https://www.hrsa.gov/rural-health/telehealth/index.html
https://doi.org/10.1186/2046-4053-4-1
https://doi.org/10.1186/2046-4053-4-1
https://doi.org/10.4037/ajcc2012801
https://doi.org/10.1016/j.jhsa.2014.03.011
https://dashboard.healthit.gov/quickstats/pages/breaches-
protected-health-information.php
https://doi.org/10.1007/s11920-009-0018-9
https://doi.org/10.5195/ijt.2014.6161
https://doi.org/10.1097/WCO.0000000000000152
http://www.hhs.gov/sites/default/files/ocr/privacy/hipaa/adminis
trative/combined/hipaa-simplification-201303.pdf
https://doi.org/10.5195/ijt.2012.6096
http://www.crd.york.ac.uk/PROSPERO/display_record.php?ID=
CRD42015020552A SYSTEMATIC REVIEW OF RESEARCH
STUDIES EXAMINING TELEHEALTH PRIVACY AND
SECURITY PRACTICES USED BY HEALTHCARE
PROVIDERSValerie J. M. Watzlaf, PhD, MPH, RHIA,
FAHIMA, Leming Zhou, PhD, DSc, Dilhari R. DeAlmeida,
PhD, RHIA, Linda M. Hartman, MLS, AHIPDEPARTMENT OF
HEALTH INFORMATION MANAGEMENT, SCHOOL OF
HEALTH AND REHABILITATION SCIENCES, UNIVERSITY
OF PITTSBURGH, PITTSBURGH, PA,
USAAbstractBACKGROUND AND
SIGNIFICANCEMATERIAL AND METHODSSearch
StrategyStudy EligibilityExclusion of papersData Extraction
Process and Quality AssessmentData
SynthesisRESULTSReviewer AgreementTime Period and Type
of StudiesDescriptive Analysis of All
StudiesDISCUSSIONLIMITATIONSCONCLUSIONACKNOWL
EDGMENTSReferences
Guidelines for Effective PowerPoint Presentations
Introduction
One concern about visual presentations is that the technology
used to create them can be used in such a way that it actually
detracts from the message rather than enhances it. To help you
consider carefully how your message is presented so that it
reflects care, quality, and professionalism, consider the
information provided in the remaining slides.
NOTE: This presentation serves as an example in itself, by
utilizing all of the guidelines mentioned.
Outline
Writing
Organization
Audience
Design
Images
Bullets
Tables
Font
Speaker Notes
The following topics will be covered:
Writing
Present ideas succinctly with lean prose.
Use short sentences.
Use active, rather than passive voice.
Avoid negative statements, if possible.
Avoid double negative entirely.
Check spelling and grammar.
Use consistent capitalization rules.
Organization
Develop a clear, strategic introduction to provide context for
the presentation.
Develop an agenda or outline slide to provide a roadmap for the
presentation.
Group relevant pieces of information together.
Integrate legends and keys with charts and tables.
Organize slides in logical order.
Present one concept or idea per slide.
Use only one conclusion slide to recap main ideas.
Audience
Present information at language level of intended audience.
Do not use jargon or field-specific language.
Follow the 70% rule—If it does not apply to 70% of your
audience, present it to individuals at a different time.
Design
Use a consistent design throughout the presentation.
Keep layout and other features consistent.
Use the master slide design feature to ensure consistency.
Use consistent horizontal and vertical alignment of slide
elements throughout the presentation.
Leave ample space around images and text.
Images
When applicable, enhance text-only slide content by developing
relevant images for your presentation.
Do not use gratuitous graphics on each slide.
Use animations only when needed to enhance meaning. If
selected, use them sparingly and consistently.
Bullets
Use bullets unless showing rank or sequence of items.
If possible, use no more than five bullet points and eight lines
of text total per slide.
Tables
Use simple tables to show numbers, with no more than 4 rows x
4 columns.
Reserve more detailed tables for a written summary.
Font
Keep font size at 24 point or above for slide titles.
Keep font size at 18 or above for headings and explanatory text.
Use sans serif fonts such as Arial or Verdana.
Use ample contrast between backgrounds and text.
Speaker Notes
Summarize key information.
Provide explanation.
Discuss application and implication to the field, discipline or
work setting.
Document the narration you would use with each slide.

More Related Content

Similar to PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx

Towards ehr interoperability in tanzania
Towards ehr interoperability in tanzaniaTowards ehr interoperability in tanzania
Towards ehr interoperability in tanzaniaIJCSEA Journal
 
Implementing The Affordable Care Act Essay
Implementing The Affordable Care Act EssayImplementing The Affordable Care Act Essay
Implementing The Affordable Care Act EssayMichelle Love
 
Confidentiality manager training mha 690
Confidentiality manager training mha 690Confidentiality manager training mha 690
Confidentiality manager training mha 690nikki1919
 
Introduction hippaa
Introduction hippaaIntroduction hippaa
Introduction hippaaTina Peña
 
76 CHAPTER 4 Assessing Health and Health Behaviors Objecti.docx
76 CHAPTER 4 Assessing Health and Health Behaviors Objecti.docx76 CHAPTER 4 Assessing Health and Health Behaviors Objecti.docx
76 CHAPTER 4 Assessing Health and Health Behaviors Objecti.docxpriestmanmable
 
Mha 690 discussion 2 Seynabou
Mha 690 discussion 2 SeynabouMha 690 discussion 2 Seynabou
Mha 690 discussion 2 SeynabouSeynaboundiaye
 
Management training: Confidentiality
Management training: ConfidentialityManagement training: Confidentiality
Management training: ConfidentialityMichellePina
 
Week 2 discussion 2 confidentiality
Week 2 discussion 2 confidentialityWeek 2 discussion 2 confidentiality
Week 2 discussion 2 confidentialityMichellePina
 
Public Health Informatics, Consumer Health Informatics, mHealth & PHRs
Public Health Informatics, Consumer Health Informatics, mHealth & PHRsPublic Health Informatics, Consumer Health Informatics, mHealth & PHRs
Public Health Informatics, Consumer Health Informatics, mHealth & PHRsNawanan Theera-Ampornpunt
 
Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...Kato Mivule
 
Strategic Plan Listening Session
Strategic Plan Listening SessionStrategic Plan Listening Session
Strategic Plan Listening SessionBrian Ahier
 
Priv&security&profin electrcommunicationsrev9 23
Priv&security&profin electrcommunicationsrev9 23Priv&security&profin electrcommunicationsrev9 23
Priv&security&profin electrcommunicationsrev9 23Deven McGraw
 
1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docx1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docxteresehearn
 
Public Health Informatics, Consumer Health Informatics, mHealth & Personal He...
Public Health Informatics, Consumer Health Informatics, mHealth & Personal He...Public Health Informatics, Consumer Health Informatics, mHealth & Personal He...
Public Health Informatics, Consumer Health Informatics, mHealth & Personal He...Nawanan Theera-Ampornpunt
 
Consumer Health Informatics, Mobile Health, and Social Media for Health: Part...
Consumer Health Informatics, Mobile Health, and Social Media for Health: Part...Consumer Health Informatics, Mobile Health, and Social Media for Health: Part...
Consumer Health Informatics, Mobile Health, and Social Media for Health: Part...Nawanan Theera-Ampornpunt
 
6292016 library.ahima.orgPBDataStandards#appxAhttpl.docx
6292016 library.ahima.orgPBDataStandards#appxAhttpl.docx6292016 library.ahima.orgPBDataStandards#appxAhttpl.docx
6292016 library.ahima.orgPBDataStandards#appxAhttpl.docxpriestmanmable
 
6292016 library.ahima.orgPBDataStandards#appxAhttpl.docx
6292016 library.ahima.orgPBDataStandards#appxAhttpl.docx6292016 library.ahima.orgPBDataStandards#appxAhttpl.docx
6292016 library.ahima.orgPBDataStandards#appxAhttpl.docxblondellchancy
 
Running Head THE HEALTH INFORMATION EXCHANGE (HIE) IN U.S 1.docx
Running Head THE HEALTH INFORMATION EXCHANGE (HIE) IN U.S 1.docxRunning Head THE HEALTH INFORMATION EXCHANGE (HIE) IN U.S 1.docx
Running Head THE HEALTH INFORMATION EXCHANGE (HIE) IN U.S 1.docxtodd521
 
Health information technology (Health IT)
Health information technology (Health IT)Health information technology (Health IT)
Health information technology (Health IT)Mohammad Yeakub
 
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boroEhr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla borokayla_ann_30
 

Similar to PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx (20)

Towards ehr interoperability in tanzania
Towards ehr interoperability in tanzaniaTowards ehr interoperability in tanzania
Towards ehr interoperability in tanzania
 
Implementing The Affordable Care Act Essay
Implementing The Affordable Care Act EssayImplementing The Affordable Care Act Essay
Implementing The Affordable Care Act Essay
 
Confidentiality manager training mha 690
Confidentiality manager training mha 690Confidentiality manager training mha 690
Confidentiality manager training mha 690
 
Introduction hippaa
Introduction hippaaIntroduction hippaa
Introduction hippaa
 
76 CHAPTER 4 Assessing Health and Health Behaviors Objecti.docx
76 CHAPTER 4 Assessing Health and Health Behaviors Objecti.docx76 CHAPTER 4 Assessing Health and Health Behaviors Objecti.docx
76 CHAPTER 4 Assessing Health and Health Behaviors Objecti.docx
 
Mha 690 discussion 2 Seynabou
Mha 690 discussion 2 SeynabouMha 690 discussion 2 Seynabou
Mha 690 discussion 2 Seynabou
 
Management training: Confidentiality
Management training: ConfidentialityManagement training: Confidentiality
Management training: Confidentiality
 
Week 2 discussion 2 confidentiality
Week 2 discussion 2 confidentialityWeek 2 discussion 2 confidentiality
Week 2 discussion 2 confidentiality
 
Public Health Informatics, Consumer Health Informatics, mHealth & PHRs
Public Health Informatics, Consumer Health Informatics, mHealth & PHRsPublic Health Informatics, Consumer Health Informatics, mHealth & PHRs
Public Health Informatics, Consumer Health Informatics, mHealth & PHRs
 
Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...
 
Strategic Plan Listening Session
Strategic Plan Listening SessionStrategic Plan Listening Session
Strategic Plan Listening Session
 
Priv&security&profin electrcommunicationsrev9 23
Priv&security&profin electrcommunicationsrev9 23Priv&security&profin electrcommunicationsrev9 23
Priv&security&profin electrcommunicationsrev9 23
 
1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docx1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docx
 
Public Health Informatics, Consumer Health Informatics, mHealth & Personal He...
Public Health Informatics, Consumer Health Informatics, mHealth & Personal He...Public Health Informatics, Consumer Health Informatics, mHealth & Personal He...
Public Health Informatics, Consumer Health Informatics, mHealth & Personal He...
 
Consumer Health Informatics, Mobile Health, and Social Media for Health: Part...
Consumer Health Informatics, Mobile Health, and Social Media for Health: Part...Consumer Health Informatics, Mobile Health, and Social Media for Health: Part...
Consumer Health Informatics, Mobile Health, and Social Media for Health: Part...
 
6292016 library.ahima.orgPBDataStandards#appxAhttpl.docx
6292016 library.ahima.orgPBDataStandards#appxAhttpl.docx6292016 library.ahima.orgPBDataStandards#appxAhttpl.docx
6292016 library.ahima.orgPBDataStandards#appxAhttpl.docx
 
6292016 library.ahima.orgPBDataStandards#appxAhttpl.docx
6292016 library.ahima.orgPBDataStandards#appxAhttpl.docx6292016 library.ahima.orgPBDataStandards#appxAhttpl.docx
6292016 library.ahima.orgPBDataStandards#appxAhttpl.docx
 
Running Head THE HEALTH INFORMATION EXCHANGE (HIE) IN U.S 1.docx
Running Head THE HEALTH INFORMATION EXCHANGE (HIE) IN U.S 1.docxRunning Head THE HEALTH INFORMATION EXCHANGE (HIE) IN U.S 1.docx
Running Head THE HEALTH INFORMATION EXCHANGE (HIE) IN U.S 1.docx
 
Health information technology (Health IT)
Health information technology (Health IT)Health information technology (Health IT)
Health information technology (Health IT)
 
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boroEhr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
 

More from woodruffeloisa

Your employer is pleased with your desire to further your educatio.docx
Your employer is pleased with your desire to further your educatio.docxYour employer is pleased with your desire to further your educatio.docx
Your employer is pleased with your desire to further your educatio.docxwoodruffeloisa
 
Your finished project, including both elements of the paper, should .docx
Your finished project, including both elements of the paper, should .docxYour finished project, including both elements of the paper, should .docx
Your finished project, including both elements of the paper, should .docxwoodruffeloisa
 
Your first task is to find a public budget to analyze. It is suggest.docx
Your first task is to find a public budget to analyze. It is suggest.docxYour first task is to find a public budget to analyze. It is suggest.docx
Your first task is to find a public budget to analyze. It is suggest.docxwoodruffeloisa
 
Your essay should explain the trip from your personal point of view,.docx
Your essay should explain the trip from your personal point of view,.docxYour essay should explain the trip from your personal point of view,.docx
Your essay should explain the trip from your personal point of view,.docxwoodruffeloisa
 
Your dilemma is that you have to make a painful medical decision and.docx
Your dilemma is that you have to make a painful medical decision and.docxYour dilemma is that you have to make a painful medical decision and.docx
Your dilemma is that you have to make a painful medical decision and.docxwoodruffeloisa
 
your definition of moral reasoning. Then, compare two similarities.docx
your definition of moral reasoning. Then, compare two similarities.docxyour definition of moral reasoning. Then, compare two similarities.docx
your definition of moral reasoning. Then, compare two similarities.docxwoodruffeloisa
 
Your company is in the process of updating its networks. In preparat.docx
Your company is in the process of updating its networks. In preparat.docxYour company is in the process of updating its networks. In preparat.docx
Your company is in the process of updating its networks. In preparat.docxwoodruffeloisa
 
Your company has just announced that a new formal performance evalua.docx
Your company has just announced that a new formal performance evalua.docxYour company has just announced that a new formal performance evalua.docx
Your company has just announced that a new formal performance evalua.docxwoodruffeloisa
 
Your CLC team should submit the followingA completed priority.docx
Your CLC team should submit the followingA completed priority.docxYour CLC team should submit the followingA completed priority.docx
Your CLC team should submit the followingA completed priority.docxwoodruffeloisa
 
Your classroom will be made up of diverse children. Research what va.docx
Your classroom will be made up of diverse children. Research what va.docxYour classroom will be made up of diverse children. Research what va.docx
Your classroom will be made up of diverse children. Research what va.docxwoodruffeloisa
 
Your business plan must include the following1.Introduction o.docx
Your business plan must include the following1.Introduction o.docxYour business plan must include the following1.Introduction o.docx
Your business plan must include the following1.Introduction o.docxwoodruffeloisa
 
Your assignment is to write a formal response to this work. By caref.docx
Your assignment is to write a formal response to this work. By caref.docxYour assignment is to write a formal response to this work. By caref.docx
Your assignment is to write a formal response to this work. By caref.docxwoodruffeloisa
 
Your assignment is to write about the ethical theory HedonismYour.docx
Your assignment is to write about the ethical theory HedonismYour.docxYour assignment is to write about the ethical theory HedonismYour.docx
Your assignment is to write about the ethical theory HedonismYour.docxwoodruffeloisa
 
Your assignment is to write a short position paper (1 to 2 pages dou.docx
Your assignment is to write a short position paper (1 to 2 pages dou.docxYour assignment is to write a short position paper (1 to 2 pages dou.docx
Your assignment is to write a short position paper (1 to 2 pages dou.docxwoodruffeloisa
 
Your assignment is to report on a cultural experience visit you .docx
Your assignment is to report on a cultural experience visit you .docxYour assignment is to report on a cultural experience visit you .docx
Your assignment is to report on a cultural experience visit you .docxwoodruffeloisa
 
Your assignment is to create a Visual Timeline” of 12 to 15 images..docx
Your assignment is to create a Visual Timeline” of 12 to 15 images..docxYour assignment is to create a Visual Timeline” of 12 to 15 images..docx
Your assignment is to create a Visual Timeline” of 12 to 15 images..docxwoodruffeloisa
 
Your annotated bibliography will list a minimum of six items. .docx
Your annotated bibliography will list a minimum of six items. .docxYour annotated bibliography will list a minimum of six items. .docx
Your annotated bibliography will list a minimum of six items. .docxwoodruffeloisa
 
Your business plan must include the following1.Introduction of .docx
Your business plan must include the following1.Introduction of .docxYour business plan must include the following1.Introduction of .docx
Your business plan must include the following1.Introduction of .docxwoodruffeloisa
 
you wrote an analysis on a piece of literature. In this task, you wi.docx
you wrote an analysis on a piece of literature. In this task, you wi.docxyou wrote an analysis on a piece of literature. In this task, you wi.docx
you wrote an analysis on a piece of literature. In this task, you wi.docxwoodruffeloisa
 
You work for a small community hospital that has recently updated it.docx
You work for a small community hospital that has recently updated it.docxYou work for a small community hospital that has recently updated it.docx
You work for a small community hospital that has recently updated it.docxwoodruffeloisa
 

More from woodruffeloisa (20)

Your employer is pleased with your desire to further your educatio.docx
Your employer is pleased with your desire to further your educatio.docxYour employer is pleased with your desire to further your educatio.docx
Your employer is pleased with your desire to further your educatio.docx
 
Your finished project, including both elements of the paper, should .docx
Your finished project, including both elements of the paper, should .docxYour finished project, including both elements of the paper, should .docx
Your finished project, including both elements of the paper, should .docx
 
Your first task is to find a public budget to analyze. It is suggest.docx
Your first task is to find a public budget to analyze. It is suggest.docxYour first task is to find a public budget to analyze. It is suggest.docx
Your first task is to find a public budget to analyze. It is suggest.docx
 
Your essay should explain the trip from your personal point of view,.docx
Your essay should explain the trip from your personal point of view,.docxYour essay should explain the trip from your personal point of view,.docx
Your essay should explain the trip from your personal point of view,.docx
 
Your dilemma is that you have to make a painful medical decision and.docx
Your dilemma is that you have to make a painful medical decision and.docxYour dilemma is that you have to make a painful medical decision and.docx
Your dilemma is that you have to make a painful medical decision and.docx
 
your definition of moral reasoning. Then, compare two similarities.docx
your definition of moral reasoning. Then, compare two similarities.docxyour definition of moral reasoning. Then, compare two similarities.docx
your definition of moral reasoning. Then, compare two similarities.docx
 
Your company is in the process of updating its networks. In preparat.docx
Your company is in the process of updating its networks. In preparat.docxYour company is in the process of updating its networks. In preparat.docx
Your company is in the process of updating its networks. In preparat.docx
 
Your company has just announced that a new formal performance evalua.docx
Your company has just announced that a new formal performance evalua.docxYour company has just announced that a new formal performance evalua.docx
Your company has just announced that a new formal performance evalua.docx
 
Your CLC team should submit the followingA completed priority.docx
Your CLC team should submit the followingA completed priority.docxYour CLC team should submit the followingA completed priority.docx
Your CLC team should submit the followingA completed priority.docx
 
Your classroom will be made up of diverse children. Research what va.docx
Your classroom will be made up of diverse children. Research what va.docxYour classroom will be made up of diverse children. Research what va.docx
Your classroom will be made up of diverse children. Research what va.docx
 
Your business plan must include the following1.Introduction o.docx
Your business plan must include the following1.Introduction o.docxYour business plan must include the following1.Introduction o.docx
Your business plan must include the following1.Introduction o.docx
 
Your assignment is to write a formal response to this work. By caref.docx
Your assignment is to write a formal response to this work. By caref.docxYour assignment is to write a formal response to this work. By caref.docx
Your assignment is to write a formal response to this work. By caref.docx
 
Your assignment is to write about the ethical theory HedonismYour.docx
Your assignment is to write about the ethical theory HedonismYour.docxYour assignment is to write about the ethical theory HedonismYour.docx
Your assignment is to write about the ethical theory HedonismYour.docx
 
Your assignment is to write a short position paper (1 to 2 pages dou.docx
Your assignment is to write a short position paper (1 to 2 pages dou.docxYour assignment is to write a short position paper (1 to 2 pages dou.docx
Your assignment is to write a short position paper (1 to 2 pages dou.docx
 
Your assignment is to report on a cultural experience visit you .docx
Your assignment is to report on a cultural experience visit you .docxYour assignment is to report on a cultural experience visit you .docx
Your assignment is to report on a cultural experience visit you .docx
 
Your assignment is to create a Visual Timeline” of 12 to 15 images..docx
Your assignment is to create a Visual Timeline” of 12 to 15 images..docxYour assignment is to create a Visual Timeline” of 12 to 15 images..docx
Your assignment is to create a Visual Timeline” of 12 to 15 images..docx
 
Your annotated bibliography will list a minimum of six items. .docx
Your annotated bibliography will list a minimum of six items. .docxYour annotated bibliography will list a minimum of six items. .docx
Your annotated bibliography will list a minimum of six items. .docx
 
Your business plan must include the following1.Introduction of .docx
Your business plan must include the following1.Introduction of .docxYour business plan must include the following1.Introduction of .docx
Your business plan must include the following1.Introduction of .docx
 
you wrote an analysis on a piece of literature. In this task, you wi.docx
you wrote an analysis on a piece of literature. In this task, you wi.docxyou wrote an analysis on a piece of literature. In this task, you wi.docx
you wrote an analysis on a piece of literature. In this task, you wi.docx
 
You work for a small community hospital that has recently updated it.docx
You work for a small community hospital that has recently updated it.docxYou work for a small community hospital that has recently updated it.docx
You work for a small community hospital that has recently updated it.docx
 

Recently uploaded

Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Recently uploaded (20)

Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 

PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx

  • 1. PSYC 3500 Strategies for Enhancing Learning and Memory Self-Evaluation Template Name: Date: *Level choices: Non-Performance, Basic, Proficient, and Distinguished (please refer to the Scoring Guide for descriptions of each level) Criteria Level Comments Describe techniques for enhancing learning and memory using relevant theories. Define a population of interest and learning and memory issues related to that population. Describe strategies for enhancing learning and memory for the selected population. Apply course readings, including peer-reviewed resources, to presentation. Conduct a self-evaluation of this assignment using the scoring guide and identifying the proficiency level for each criterion. Apply critical thinking and communication skills concerning learning and memory in a manner that is scholarly, professional, and respectful.
  • 2. Apply current edition of APA style, including in-text citations and full references for sources. International Journal of Telerehabilitation • telerehab.pitt.edu International Journal of Telerehabilitation • Vol. 9, No. 2 Fall 2017 • (10.5195/ijt.2017.6231) A SYSTEMATIC REVIEW OF RESEARCH STUDIES EXAMINING TELEHEALTH PRIVACY AND SECURITY PRACTICES USED BY HEALTHCARE PROVIDERS VALERIE J. M. WATZLAF, PHD, MPH, RHIA, FAHIMA, LEMING ZHOU, PHD, DSC, DILHARI R. DEALMEIDA, PHD, RHIA, LINDA M. HARTMAN, MLS, AHIP DEPARTMENT OF HEALTH INFORMATION MANAGEMENT, SCHOOL OF HEALTH AND REHABILITATION SCIENCES, UNIVERSITY OF PITTSBURGH, PITTSBURGH, PA, USA ABSTRACT The objective of this systematic review was to systematically
  • 3. review papers in the United States that examine current practices in privacy and security when telehealth technologies are used by healthcare providers. A literature search was conducted using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses Protocols (PRISMA-P). PubMed, CINAHL and INSPEC from 2003 – 2016 were searched and returned 25,404 papers (after duplications were removed). Inclusion and exclusion criteria were strictly followed to examine title, abstract, and full text for 21 published papers which reported on privacy and security practices used by healthcare providers using telehealth. Data on confidentiality, integrity, privacy, informed consent, access control, availability, retention, encryption, and authentication were all searched and retrieved from the papers examined. Papers were selected by two independent reviewers, first per inclusion/exclusion criteria and, where there was disagreement, a third reviewer was consulted. The percentage of agreement and Cohen’s kappa was 99.04% and 0.7331 respectively. The papers reviewed ranged from 2004 to 2016 and included several types of telehealth specialties. Sixty-seven percent were policy type studies, and 14 percent were survey/interview studies. There were no randomized controlled trials. Based upon the results, we conclude that it is necessary to have more studies with specific information about the use of privacy and security practices when using telehealth technologies as well as studies that examine patient and provider preferences on how data is kept private and secure during and after telehealth sessions. Keywords: Computer security, Health personnel, Privacy, Systematic review, Telehealth BACKGROUND AND SIGNIFICANCE When in-person meetings and paper-based health records are
  • 4. used, healthcare providers have a clear idea about how to protect the privacy and security of healthcare information. Providers see each patient in a private room and the patient records are locked in a secure office setting which is only accessible to authorized personnel. When the healthcare practice is moved to the Internet, as in the case with telehealth, and all information is electronic, the situation becomes more complex. Most healthcare providers are not trained in protecting security and patient privacy in cyberspace. In cyberspace, there are many methods that can be used to break into the electronic system and gain unauthorized access to a large amount of protected health information (PHI). Therefore, the information security and patient privacy in telehealth is at a higher risk for breaches of PHI. For instance, from 2010 to 2015 it was found that laptops (20.2%), network servers (12.1%), desktop computers (13%), and other portable electronic devices (5.6%) made up 51 percent of data sources of all healthcare data breaches that affected more than 500 individuals (Office of the National Coordinator for Health Information Technology, 2016). PHI is highly regulated in the United States. The most familiar regulation impacting healthcare facilities and providers is the Health Insurance Portability and Accountability Act (HIPAA) of 1996 (US Department of Health and Human Services, 2013). HIPAA is a federal law that provides privacy and security rules and regulations to protect PHI. The HIPAA Privacy Rule is an administrative regulation created by the Department of Health and Human Services (DHHS). It was developed after the US Congress passed HIPAA, and went into effect in 2003.
  • 5. The HIPAA Privacy Rule only applies to healthcare providers that conduct electronic billing transactions but is effective for both paper and electronic health information. It is a set of national standards that addresses the use and disclosure of PHI by a covered entity such as a healthcare organization as well as establishing privacy rights for individuals on how their PHI is used International Journal of Telerehabilitation • telerehab.pitt.edu International Journal of Telerehabilitation • Vol. 9, No. 2 Fall 2017 • (10.5195/ijt.2017.6231) and shared. Its major objective is to protect the flow of health information while at the same time providing high quality healthcare. The HIPAA Security Rule went into effect in 2005 and regulates only electronic health information. It is a set of national standards that protects an individual’s electronic health information that is created, received, used or maintained by a covered entity such as a healthcare organization. It requires the administrative, physical, and technical standards to be adopted so that confidentiality and integrity of electronic PHI is protected.
  • 6. In addition to HIPAA, there are many other federal and state laws that govern the use and disclosure of health information. Of these laws, HIPAA and the Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 have provided the most specific regulations for the protection of privacy and security of health information in the United States. However, some state regulations may be even more stringent, such as requiring a consent form for disclosure of a patient’s own medical record when HIPAA does not require consent (Rinehart-Thompson, 2013). The HITECH Act includes changes to the HIPAA Privacy and Security rules that focus mainly on health information technology and strengthens standards for the privacy and security of health information. It went into effect in 2010 but some parts of the act have different compliance deadlines (Rinehart-Thompson, 2013). For this article, we adopted the Health Resources and Services Administration’s (HRSA) 2015 definition of telehealth: “the use of electronic information and telecommunications technologies to support long-distance clinical health care, patient and professional health-related education, public health and health administration. Technologies include videoconferencing, the Internet, store-and-forward imaging, streaming media, and terrestrial and wireless communications” (Health Resources and Services Administration, 2015). The HRSA definition was used because it aligns with our purpose, which is to provide a systematic review of published papers that pertain to privacy and security provisions used by healthcare providers when deploying telehealth technologies in the United States. Our previous experiences in interacting with telehealth providers suggest that the providers do not always know the best
  • 7. practices to use to decrease the risk of privacy and security issues in telehealth (Cohn & Watzlaf, 2012; Watzlaf, 2010; Watzlaf, Moeini, & Matusow, 2011). Many of the features within the free, consumer-based video and voice communication systems that were evaluated did not demonstrate to the providers using them that the information was private and secure (Watzlaf & Ondich, 2012). Also, many of the telehealth providers did not know the best practices to use to educate consumers on privacy and security (Watzlaf, Moeini, & Firouzan, 2010; Watzlaf, Moeini, Matusow, & Firouzan, 2011). Through our past work, audit checklists were developed to determine if a system supports HIPAA compliance (Watzlaf et al., 2010; Peterson & Watzlaf, 2014). The 58-question checklist is specific to Information and Communication Technologies (ICTs) (Watzlaf et al., 2010). There are already methods and tools available for healthcare providers to evaluate the security and privacy features of telehealth systems they are currently using. Now, it is necessary to conduct a systematic review on the status of privacy and security provisions that are used by healthcare professionals when deploying telehealth services to see if they are using the tools and guidelines available to them or if they incorporate new systems to evaluate privacy and security within telehealth systems. OBJECTIVES: 1. Evaluate, from published papers, what privacy and security measures were addressed when healthcare providers used telehealth technologies. 2. Compile best practices and guidelines for healthcare
  • 8. professionals using telehealth technologies. MATERIAL AND METHODS SEARCH STRATEGY A systematic literature search was performed on papers published between 2003 to 2016. The sources used in the search included PubMed (Medline via PubMed; National Library of Medicine, Bethesda, MD; started in 1966) CINAHL databases (indexing from nursing and allied health literature) and INSPEC (a scientific and technical database developed by the Institution of Engineering and Technology). International Journal of Telerehabilitation • telerehab.pitt.edu International Journal of Telerehabilitation • Vol. 9, No. 2 Fall 2017 • (10.5195/ijt.2017.6231) Briefly, our literature search strategy combined synonyms for telehealth with privacy and security across healthcare professionals. The list of synonymous terms was voluminous. Some examples of synonymous terms for telehealth included telemedicine, telepathology, telerehabilitation; synonymous terms for privacy and security included confidentiality, encryption, access control, authentication; synonymous terms for healthcare
  • 9. professionals included physicians, clinicians, nurses, occupation therapists. Language restrictions included those papers written in English only. In addition, reference lists were reviewed manually from relevant original research and review papers. These searches returned 21,540 papers from PubMed and 4,785 papers from CINAHL, and 591 papers from INSPEC for a total of 26,916 papers, of which 1,512 were duplicates. After a review of titles and abstracts, 21 papers were reviewed in full text (Figure 1). After the first round of article selections, one third of the papers were found to be international. Papers were then restricted to those in the United States since HIPAA and HITECH are laws that are enforced in the United States only and these laws are a major influence in privacy and security in the US. The protocol for this study was based on the Preferred Reporting Items for Systematic Review and Meta-Analysis Protocols (PRISMA-P). The PRISMA-P contains 17 items that are considered essential as well as minimum components to include in systematic reviews or meta-analyses. PRISMA-P recommends that each systematic review include detailed criteria using the PICOS (participants, interventions, comparisons, outcome(s) and study design) reporting system (Moher et al., 2015). Details of the full protocol have been previously published in Prospero and the International Journal of Telerehabilitation (Watzlaf, DeAlmeida, Zhou, & Hartman, 2015; Watzlaf, DeAlmeida, Molinero, Zhou, & Hartman, 2015). STUDY ELIGIBILITY To be eligible for this systematic review, published papers had to meet all the following criteria:
  • 10. 1. Published papers that included research, best practices, or recommendations on the use of telehealth and privacy or security. 2. Published papers that included any type of health care professional using any available telehealth for their clients with a focus on privacy and/or security, HIPAA and/or HITECH. 3. Published papers with full text in English. 4. Published papers where research or recommendations focused on the US only published between 2003-2016. 5. Existing solutions/best practices to privacy and security challenges, HIPAA compliance (qualitative and quantitative) in telehealth use. Figure 1. A flow diagram of the search and selection process. International Journal of Telerehabilitation • telerehab.pitt.edu International Journal of Telerehabilitation • Vol. 9, No. 2 Fall 2017 • (10.5195/ijt.2017.6231) Figure 1 description: Figure 1 depicts a flow diagram of the search and selection process. First box a top: Articles
  • 11. identified through database search (N=26,916), PubMed (n=21,540), CINAHL (n=4,785), INSPEC (n-591). Arrow to box below: Articles after removing duplications (n=25,404); arrow to the box to the right: Duplicate records (n=1,512). Next arrow to box below: Articles after first round filtering (n=406); arrow to the box to the right: Articles removed by reviewing titles and abstracts (n=24,998). Next arrow to box below: Articles after second round filtering (n=50); arrow to the box to the right: Articles removed by reviewing full texts (n=356). Next arrow to box below: Articles included after ATA guidelines are added (n=61); arrow to the box to the right: Articles removed by evaluating the security and privacy contents (n=40). Last arrow to the box below: Articles included in systematic review (n=21). EXCLUSION OF PAPERS Papers were reviewed and excluded in different phases: • Phase I: Duplicates Removed. A total of 26,916 papers were found in the three databases and 1,512 were removed as duplicates to yield 25,404 papers. • Phase II: Articles Removed by Reviewing Title and Abstract. A title/abstract review was conducted, first by two independent reviewers. A third reviewer was used to resolve disagreement (24,998 excluded, to yield a total of 406 papers). • Phase III: Articles Removed After Reviewing Full Text. A full text review of 406 papers was conducted by all three reviewers (356 excluded, 50 papers remained).
  • 12. • Phase IV: American Telemedicine Association Guidelines Added. Since the American Telemedicine Association (ATA) guidelines were not returned from the original search because they were guidelines and not peer-reviewed articles, they were added into the original list (50) because of their focus on telehealth, privacy and security (11 added. Total of 61 papers). • Phase V: Articles Removed by Evaluating Security and Privacy Content. A review of these papers to examine security and privacy contents yielded 40 exclusions. And eventually, a total of 21 papers were included in the final systematic review. In the initial title/abstract review the major reasons for exclusion were: 1. Papers were published before HIPAA was enforced in 2003 2. Studies were not conducted in the US and therefore did not abide by HIPAA/HITECH In the full text review the major reasons for exclusion were that the papers did not include both telehealth and a major aspect of privacy and security related to telehealth use. DATA EXTRACTION PROCESS AND QUALITY ASSESSMENT All search results were exported into EndNote libraries. EndNote is a bibliographic management system. De- duplications were performed by using the method described by Bramer et al (Bramer, Giustini, de Jonge, Holland, & Bekhuis, 2016). Studies were removed if they were found to be duplicated. The PDFs of the papers reviewed were stored in a shared Box account (i.e., a secure cloud content platform in which users can
  • 13. share large documents as well as collaborate, Redwood City, CA). Each article meeting the inclusion criteria was reviewed and its characteristics documented using a standardized pre- tested data extraction form. The data extraction form captured the following data items: the three large goals of privacy and security (confidentiality, integrity, and availability); the specific techniques for achieving these goals (authentication, encryption, access control, physical security, policy, database backup, error detection, anti-virus, software patches, secure system design, intrusion detection); and the methods in each system (study designs, settings, and outcomes). The reference librarian performed the search and only provided the title, abstract and year to the reviewers. The two reviewers (DD, VW) independently read the title and abstracts of the identified papers and determined eligibility based on the specified inclusion/exclusion criteria. To better know how to appropriately search the article titles and abstract, two of the reviewers (DD and VW) conducted a pilot study by using a small sample (n=100) of papers, made the selection and then discussed the results against the selection criteria. From this pilot study we could determine that we applied the same selection criteria for our search strategy. International Journal of Telerehabilitation • telerehab.pitt.edu
  • 14. International Journal of Telerehabilitation • Vol. 9, No. 2 Fall 2017 • (10.5195/ijt.2017.6231) Reviewers were blind to journals, study authors and institutions. Any disagreements between the reviewers were resolved by a third reviewer (LZ). Inter-rater reliability was measured using the Cohen’s kappa statistical test (k). An inter-rater Kappa score was assessed during the first round of the paper selection, to ensure a Kappa score at or above 0.8 as measured by Cohen’s Kappa (k) statistical test. Full-text of studies making this first cut were reviewed. Three reviewers screened these for inclusion/exclusion criteria. Selection disagreements were resolved through discussion and reasons for excluding studies were recorded. A form, developed in Excel, was used to extract data from selected studies and included the author, year of publication, reference; study design and sample size; setting; privacy and security descriptions; primary outcomes; study limitations, HIPAA compliance, and best practices. Reviewers assessed the overall quality of evidence for every important outcome using the GRADE four point ranked scale: (4) High; (3) Moderate; (2) Low; (1) Very low (Balshem et al., 2011). Full papers were used as evidence for decisions about the quality of evidence and the strength of recommendations. Any differences in the grading were assessed and discussed in several meetings with investigators until full consensus was reached. DATA SYNTHESIS Quantitative analysis of the data from the papers was limited due to the lack of quantifiable data in the privacy and security literature. However, subcategories with similar
  • 15. characteristics received more in-depth comparisons. Investigators first broke the data into qualitative themes that related to privacy, security and administrative content. Each of those areas were broken down into subthemes such as patient rights, use, and disclosure for privacy; technical and physical for security; and organizational and education/training/personnel for administrative. Then, specific content within the 21 papers were reviewed closely and categorized across each of those themes and subthemes. RESULTS REVIEWER AGREEMENT For the 25,404 entries reviewed by 2 reviewers the percentage of agreement was very good with the observed value of 99.04% and the 95% CI between 98.91 to 99.16 calculated per the Wilson efficient-score method. For the Cohen’s kappa, the observed kappa is 0.7331 and the 95% CI are 0.7009 to 0.7653. Although the kappa is lower than 0.8, this still suggests substantial agreement (Fleiss, Cohen, & Everitt, 1969). TIME PERIOD AND TYPE OF STUDIES A total of 21 papers (Watzlaf & Ondich, 2012; Watzlaf et al., 2010; Watzlaf, Moeini, Matusow, et al., 2011; Peterson & Watzlaf, 2014; Paing et al., 2009; Cason, Behl, & Ringwalt, 2012; Daniel, Sulmasy, & for the Health and Public Policy Committee of the American College of Physicians, 2015; Naam & Sanbar, 2015; American Telemedicine Association, 2009, 2011, 2014a, 2014b, 2016; Hall & McGraw, 2014; Garg & Brewer, 2011; Brous, 2016; Mullen-Fortino et al., 2012; Nieves, Candelario, Short, & Briscoe, 2009; Putrino, 2014; Demiris, 2004; Demiris, Edison, & Schopp, 2004) were selected for this
  • 16. systematic review. These selected papers were published between 2004 to 2016, in which 29 percent of them were published between 2011-2012. The papers included several telehealth specialties such as telerehabilitation, telepsychiatry, teletrauma, telenursing and tele-diabetes. Sixty-seven percent were guideline/policy/strategy type studies, with three using a survey or interview method (14%). Other studies included a usability study, a systematic review, a pilot study and an opinion piece. There were no randomized controlled trials found that focused on privacy and security in telehealth (Table 1). International Journal of Telerehabilitation • telerehab.pitt.edu International Journal of Telerehabilitation • Vol. 9, No. 2 Fall 2017 • (10.5195/ijt.2017.6231) Table 1. Overview of Reviewed Studies Overview of Studies
  • 17. Time Period # % 2004-2005 2009-2010 2011-2012 2013-2014 2015-2016 2 9.5 4 19.0 6 28.6 5 23.8 4 19.0 Total 21 100 Specialties # % Telepsychiatry Teletrauma Telenursing Telerehabilitation Telepathology
  • 18. Teleburn Telediabetes Telesurgery General telehealth 2 9.5 2 9.5 2 9.5 5 23.8 1 4.8 1 4.8 2 9.5 1 4.8 5 23.8 Total 21 100 Type of Study # % Guideline/policy/strategy Survey/Interview Usability
  • 19. Pilot Opinion Systematic/literature review 14 66.7 3 14.3 1 4.8 1 4.8 1 4.8 1 4.8 Total 21 100 DESCRIPTIVE ANALYSIS OF ALL STUDIES A quantitative analysis of the privacy, security, and administrative areas that were discussed in the papers is summarized in Table 2. All studies discussed some aspect of privacy and security. Sixty-seven percent addressed patient rights to include informed consent, accessibility, confidential communications, or the patient’s ability to amend their information. Thirty-eight percent addressed use and disclosure to include how video sessions are retained, authorizations for release of information to other countries, websites, and third parties, accounting of disclosures, purging and/or deletion schedule of files on mobile devices and audio and video muting to maintain privacy. Sixty-
  • 20. seven percent of the studies addressed the technical aspects of security to include encryption, two-factor authentication, data backup, storage and recovery to meet HIPAA requirements, National Institute of Standards and Technology (NIST) and Health Level-7 (HL7) recommendations. However, only 38 percent addressed the physical aspects of the telehealth session to include a secure server location, back-up generator and maintaining a secure physical environment for where the telehealth session is held. One of the studies contained a systematic review of telemedicine security and found poor reporting of methodologies for telemedicine technologies and security measures. Fifty-two percent of the papers did not discuss the organization of privacy and security through policies, procedures, Business Associate Agreements (BAAs) or compliance audits, however, 67 percent addressed the need for education and training of providers, patients and technical support workforce. International Journal of Telerehabilitation • telerehab.pitt.edu International Journal of Telerehabilitation • Vol. 9, No. 2 Fall 2017 • (10.5195/ijt.2017.6231) Table 2: Privacy, Security, and Administrative Content
  • 21. Privacy, Security, Administrative Content # % Privacy Patient Rights Yes, addressed No, not addressed Use and Disclosure Yes, addressed No, not addressed 14 66.7 7 33.3 8 38.1 13 61.9 Security Technical Yes, addressed No, not addressed Physical Yes, addressed No, not addressed
  • 22. 14 66.7 7 33.3 8 38.1 13 61.9 Privacy, Security, Administrative Content # % Administrative Organization (policies) Yes, addressed No, not addressed Education/Training/ Personnel Yes, addressed No, not addressed 10 47.6 11 52.4 14 66.7 7 33.3 Table 3 provides a detailed summary of all papers for privacy, security and administrative content. Most of the patient rights content dealt with providing verbal or written informed
  • 23. consent in simple, easy to understand language and to have providers discuss the risks of privacy and security when using telehealth. Use of audio/video muting and a secure physical environment was also discussed to be included in the consent for treatment so that the patient understands how their information during and after the telehealth session is private. Use and disclosure was not as clearly addressed, although several papers stated that access to patient information should only be granted with proper authorization, and there was a need to have this discussed with the patient so that they understood ownership of the data before the telehealth session begins. Encryption and two-factor authentication were other major areas addressed in the papers. Some papers did provide details as to the types of encryption to use as well as meeting HIPAA and NIST requirements and recommendations. Data backups, storage of the video files, and the ability to keep them secure was also discussed. Other areas addressed included a review of consumer-based free systems and the importance of healthcare providers’ understanding of which telehealth technologies meet federal, state, and local laws. Other areas mentioned included performing an overall privacy and security assessment of the telehealth system and to maintain security solutions specific to the telehealth system, making sure that confidentiality and security are a primary concern. Many of the papers expressed the need for overall provider and patient awareness, education and training and policies on keeping telehealth information private and secure, and policies that specify who can be included in the telehealth session. Other papers expressed the need for maintaining a BAA with the vendor providing the telehealth system. Some papers addressed the need for more research on the effectiveness of telemedicine to include telehealth security training, legal liability, HIPAA compliance and the importance of an independent assessment of overall privacy and security. Some of the papers described the lack of current scientific studies around privacy and security in
  • 24. telehealth and the need for more studies that demonstrate the effectiveness of best practices in privacy and security of telehealth (Table 3). International Journal of Telerehabilitation • telerehab.pitt.edu International Journal of Telerehabilitation • Vol. 9, No. 2 Fall 2017 • (10.5195/ijt.2017.6231) Table 3: Detailed Summary of All Papers for Privacy, Security and Administrative Content Privacy Security Administrative Article Title, Year Journal Type of Study Patient Rights (access, amend, right to confidential communications, informed consent etc.) Use & Disclosure
  • 25. (authorizations, accounting of disclosures, de- identification of data etc.) Technical (encryption, access control, authentication, data backup, storage, recovery) Physical (secure server location, backup generator etc.) Organizational (policies, BAAs, auditing) Education/ Training/ Personnel (American Telemedicine Association, 2009) Evidence Based Practice for Telemental Health Policy Keep physical surroundings private
  • 26. using audio/video muting; Considered essential to easily change from public to private audio mode. (American Telemedicine Association, 2014a) Clinical Guidelines for Telepathology Policy Unauthorized persons should not have access to sensitive information. Use audio/video muting, and easily change from public to private audio mode. Consideration should be given to periodic purging or deletion of telepathology files from mobile devices. Data transmission must
  • 27. be secure through encryption that meets recognized standards. Mobile device use requires a passphrase or other equivalent security feature, multi- factor authentication, inactivity timeout function with passphrase or re- authentication to access the device after timeout is exceeded (15 minutes). Give providers the capability to use remote wiping if device lost or stolen. Back up or store on secure data storage locations. Do not use cloud services if they cannot comply in keeping PHI confidential. Mobile devices should be kept in the provider’s possession when traveling or in an uncontrolled
  • 28. environment. Those in charge of technology should know technology security. Mobile devices should be kept in the provider’s possession when traveling or in an uncontrolled environment. (American Telemedicine Association, 2016) Practice Guidelines for Informed consent: discuss with patient about the telehealth session and use simple language especially when describing all If transmission data are stored on hard drive, use Federal Information Processing Standard (FIPS) 140-2 encryption AES as acceptable Those in charge of the technology should educate
  • 29. users with respect to all privacy and security options. Educate patients on the potential for inadvertently International Journal of Telerehabilitation • telerehab.pitt.edu International Journal of Telerehabilitation • Vol. 9, No. 2 Fall 2017 • (10.5195/ijt.2017.6231) Privacy Security Administrative Article Title, Year Journal Type of Study Patient Rights (access, amend, right to confidential communications, informed consent etc.) Use & Disclosure (authorizations, accounting of disclosures, de-
  • 30. identification of data etc.) Technical (encryption, access control, authentication, data backup, storage, recovery) Physical (secure server location, backup generator etc.) Organizational (policies, BAAs, auditing) Education/ Training/ Personnel Teleburn Policy privacy and security issues such as encryption, store- forward transmissions of data/images, videoconferencing etc. Key topics should include confidentiality and limits to confidentiality in electronic
  • 31. communications; how patient information will be documented and stored. levels of security. Pre-boot authentication should also be used. storing data and PHI; intention to record services; methods of storage; how PHI will be shared with authorized users and encrypted for maximum security; recordings will be streamed to protect accidental or unauthorized file sharing or transfer. (American Telemedicine Association, 2014b) Core Operational Guidelines for Telehealth Services Involving Provider-Patient Interactions Policy Healthcare providers should provide to the patient verbal/written
  • 32. information related to privacy and security; potential risks and confidentiality in easy to understand language, especially when discussing encryption or potential for technical failures; limits to confidential communication, documentation and storage of patient information. Access to recordings only granted to authorized users. Stream to protect from accidental or unauthorized file sharing/transfer. Privacy Features should include: audio, video muting, easily change from public to private mode, privacy of the mobile device.
  • 33. Multi-factor authentication; inactivity timeout function; keep mobile devices with provider always; wipe or disable mobile device if lost or stolen. Audio, video and all other data transmission should use encryption (at least on the side of the healthcare professional) that meets recognized standards. Use software that has appropriate verification, confidentiality, and All devices should have up to date security software, device management software to provide consistent oversight of applications, device and data configuration and security, backup plan for communication between sites and discussed with the patient. Only allow one session to be
  • 34. open at one time and if there is an Establish guidelines for periodic purging or deletion. Providers should give guidance to patients about inadvertently storing PHI and how best to protect privacy. Discuss recording of services, how information will be stored and how privacy will be protected. International Journal of Telerehabilitation • telerehab.pitt.edu International Journal of Telerehabilitation • Vol. 9, No. 2 Fall 2017 • (10.5195/ijt.2017.6231) Privacy Security Administrative Article Title, Year Journal
  • 35. Type of Study Patient Rights (access, amend, right to confidential communications, informed consent etc.) Use & Disclosure (authorizations, accounting of disclosures, de- identification of data etc.) Technical (encryption, access control, authentication, data backup, storage, recovery) Physical (secure server location, backup generator etc.) Organizational (policies, BAAs, auditing) Education/ Training/ Personnel Should also discuss a policy for the patient
  • 36. sharing portions of this information with public and written agreements may be needed to protect both the patient and provider. security measures. If services are recorded, store in a secure location and make accessible to authorized users only. attempt to open an additional session the system will automatically log off the first session or block the second session from being opened. Session logs should be secured in a separate location and only granted to authorized users. Back up to or store
  • 37. on secure data storage locations. Do not use cloud services if they cannot comply in keeping PHI confidential. Brous, 2016) American Journal of Nursing Policy Nurses must meet medical information and patient privacy requirements of HIPAA, as well as state privacy laws, organizational policies, and ethical standards. Devices that contain PHI must meet security requirements, and wireless communications must have cybersecurity protection; electronic files must be stored in a manner that ensures All providers should be educated on how to prevent data breaches when
  • 38. communicating information via telehealth, transmitting images or audio or video files electronically and on how to respond when they do occur. International Journal of Telerehabilitation • telerehab.pitt.edu International Journal of Telerehabilitation • Vol. 9, No. 2 Fall 2017 • (10.5195/ijt.2017.6231) Privacy Security Administrative Article Title, Year Journal Type of Study Patient Rights (access, amend, right to confidential communications, informed consent etc.) Use & Disclosure (authorizations,
  • 39. accounting of disclosures, de- identification of data etc.) Technical (encryption, access control, authentication, data backup, storage, recovery) Physical (secure server location, backup generator etc.) Organizational (policies, BAAs, auditing) Education/ Training/ Personnel privacy and confidentiality since audio and video recordings are susceptible to hacking. To meet HIPAA standards any systems that transmit or store electronic information about patients must be operated and monitored by
  • 40. computer technicians with expertise in security measures. Also, all health care providers should check state privacy laws which can be more stringent than HIPAA. The National Telehealth Policy Resource Center provides state- specific information on laws, regulations, reimbursement policies and pending legislation. (Cason et al., 2012) International Journal of Telerehabilitation Survey 44% of providers surveyed expressed concerns with privacy issues 40% of providers surveyed expressed concerns with security issues Need for secure and private delivery platforms Personnel shortages in
  • 41. telehealth delivery (Daniel et al., 2015) Annals of Internal Medicine Policy Position Paper Skype not considered HIPAA compliant since no BAA with Microsoft. Skype was noncompliant with Oklahoma Health Care Authority’s International Journal of Telerehabilitation • telerehab.pitt.edu International Journal of Telerehabilitation • Vol. 9, No. 2 Fall 2017 • (10.5195/ijt.2017.6231) Privacy Security Administrative
  • 42. Article Title, Year Journal Type of Study Patient Rights (access, amend, right to confidential communications, informed consent etc.) Use & Disclosure (authorizations, accounting of disclosures, de- identification of data etc.) Technical (encryption, access control, authentication, data backup, storage, recovery) Physical (secure server location, backup generator etc.) Organizational (policies, BAAs, auditing) Education/ Training/ Personnel
  • 43. policy. (Demiris et al., 2004) Telemedicine Journal and e- Health Interview Research Study 18.7% need for digital images to be captured and store in EHR at point of care. 56.2% did not believe that security and privacy risks would be increased when using telemedicine; 31.2% said they did not know enough to respond to the question; and 12.5 % believed there could be increased risk. 9.3% said technical support not readily available; All providers were not influenced in their ability to ask questions due to concerns over security or privacy.
  • 44. Further education is needed on this topic. (Demiris, 2004) International Journal of Electronic Healthcare Policy Overview Privacy, storage, transmission of images and maintenance of video/audio recordings and other PHI must be examined and addressed as transmission of this data over communication lines Access to ownership of data must be addressed with the patient since some patients share this data with a web server owned by a third party that allows
  • 45. International Journal of Telerehabilitation • telerehab.pitt.edu International Journal of Telerehabilitation • Vol. 9, No. 2 Fall 2017 • (10.5195/ijt.2017.6231) Privacy Security Administrative Article Title, Year Journal Type of Study Patient Rights (access, amend, right to confidential communications, informed consent etc.) Use & Disclosure (authorizations, accounting of disclosures, de- identification of data etc.) Technical (encryption, access control, authentication,
  • 46. data backup, storage, recovery) Physical (secure server location, backup generator etc.) Organizational (policies, BAAs, auditing) Education/ Training/ Personnel have concerns of privacy violations. providers to log in and access their patient’s data. (Garg & Brewer, 2011) Journal of Diabetes Science and Technology Systematic Review Many telemedicine researchers are unfamiliar with the field of security in general. The authors found
  • 47. instances of poor encryption standards, designs of communication protocols with no proof of security, HIPAA or HL7 compliance. Reliability and availability of the systems are key since many provide critical life supporting systems for people with diabetes and other chronic illnesses. Data integrity, the quality of security research, network security and cryptography all need to be improved as well, per this systematic review of security of telemedicine systems. Most of the papers in the systematic review of security in telehealth did not address training, legal liability, or HIPAA and HL7 compliance. Another area that was neglected was research on availability or the measures used to ensure availability of telehealth systems. (Hall & McGraw,
  • 48. 2014) No federal agency has authority to International Journal of Telerehabilitation • telerehab.pitt.edu International Journal of Telerehabilitation • Vol. 9, No. 2 Fall 2017 • (10.5195/ijt.2017.6231) Privacy Security Administrative Article Title, Year Journal Type of Study Patient Rights (access, amend, right to confidential communications, informed consent etc.) Use & Disclosure (authorizations,
  • 49. accounting of disclosures, de- identification of data etc.) Technical (encryption, access control, authentication, data backup, storage, recovery) Physical (secure server location, backup generator etc.) Organizational (policies, BAAs, auditing) Education/ Training/ Personnel Health Affairs Policy enact P&S requirements to cover the entire telehealth ecosystem and these authors advocate for the Federal Trade Commission (FTC)
  • 50. to do this. (Mullen-Fortino et al., 2012) American Journal of Critical Care Survey Research 179 nurses that use telemedicine were surveyed and 11% of nurses surveyed believe it is intrusive; 27% believe it decreases patient privacy and 13% believe it creates a feeling of being spied upon. It is important to change these perceptions of nurses for telehealth technology to expand. (Naam & Sanbar, 2015) Journal of Hand Surgery Policy Verbal or written informed consent required from patients or representative’s office visit Establish policy and procedure (P&P) by
  • 51. physicians and hospitals on use of telemedicine that include patient education materials that explain what the patient can expect using Community-wide education for patients and providers on PHI and maintaining privacy and confidentiality when using telemedicine International Journal of Telerehabilitation • telerehab.pitt.edu International Journal of Telerehabilitation • Vol. 9, No. 2 Fall 2017 • (10.5195/ijt.2017.6231) Privacy Security Administrative Article Title, Year Journal Type of Study
  • 52. Patient Rights (access, amend, right to confidential communications, informed consent etc.) Use & Disclosure (authorizations, accounting of disclosures, de- identification of data etc.) Technical (encryption, access control, authentication, data backup, storage, recovery) Physical (secure server location, backup generator etc.) Organizational (policies, BAAs, auditing) Education/ Training/ Personnel telemedicine. (Nieves et al., 2009) Military Medicine
  • 53. Pilot Study All transmission protocols were compliant with HIPAA. It included Tandberg 880 MXP video conferencing equipment and used Integrated Services Digital Network (ISDN) or the hospitals Internet Protocol (IP) network lines with a bandwidth speed of >384 Kilobits per second (Kbps). Audio and image quality were also suitable for use in clinical services. (Paing et al., 2009) Current Psychiatry Reports Summary of studies/ policy Families should sign a release for communication and consent for treatment for children; mental health professional
  • 54. should discuss HIPAA provisions with each client as part of the informed consent process. Adolescents were concerned about whether someone could tap into the lines Videotapes of telehealth sessions are an official part of the medical record. Transmission protocol meets HIPAA requirements Videotapes kept in secure storage Practice the 4 C’s: Contracting, Competence, Confidentiality and Control (Koocher) when managing potential risk; Policies must specify who can be included in the session especially
  • 55. those off camera. More studies on confidentiality, technology issues needed Provide sufficient manpower for technological support International Journal of Telerehabilitation • telerehab.pitt.edu International Journal of Telerehabilitation • Vol. 9, No. 2 Fall 2017 • (10.5195/ijt.2017.6231) Privacy Security Administrative Article Title, Year Journal Type of Study Patient Rights (access, amend, right to confidential communications, informed consent etc.)
  • 56. Use & Disclosure (authorizations, accounting of disclosures, de- identification of data etc.) Technical (encryption, access control, authentication, data backup, storage, recovery) Physical (secure server location, backup generator etc.) Organizational (policies, BAAs, auditing) Education/ Training/ Personnel to hear them. (Peterson & Watzlaf, 2014) International Journal of Telerehabilitation Policy Checklist includes
  • 57. accessibility, amendment, retention of PHI. Checklist includes requests for PHI, sharing of PHI with other countries and websites. Checklist includes encryption, user procedures, audit system activity such as username, password (PW), additional authentication, overall assessment Check cloud based solutions to make sure secure Checklist includes the need for BAAs for telerehabilitation store and forward companies and if direct identifiers of PHI included a Data Use Agreement (DUA) required under HIPAA
  • 58. Use Privacy and Security (P&S) checklist to evaluate system/ employees before use (Putrino, 2014) Current Opinion of Neurology Opinion When designing telemedicine systems confidentiality and security are major concern. Designing video game driven tele- rehabilitation (VGDT) is no exception. Patient data should be de- identified and never stored on the patient’s local device. Data should always be encrypted when streaming across a network. (Watzlaf et al., 2010) International Journal of Checklist includes
  • 59. accessibility, amendment, retention of PHI, BAAs; Checklist includes requests for PHI, sharing of PHI with other Checklist includes encryption, user procedures, audit system activity such as Maintain secure transmissions while the session is conducted and when Form team of health and legal professionals to evaluate system for HIPAA, state, and local International Journal of Telerehabilitation • telerehab.pitt.edu International Journal of Telerehabilitation • Vol. 9, No. 2 Fall 2017 • (10.5195/ijt.2017.6231)
  • 60. Privacy Security Administrative Article Title, Year Journal Type of Study Patient Rights (access, amend, right to confidential communications, informed consent etc.) Use & Disclosure (authorizations, accounting of disclosures, de- identification of data etc.) Technical (encryption, access control, authentication, data backup, storage, recovery) Physical (secure server location, backup generator etc.) Organizational (policies, BAAs, auditing)
  • 61. Education/ Training/ Personnel Telerehabilitation Policy Informed consent needed to be signed by patients to include privacy and security issues of telehealth system countries and websites, Incident response needed username, PW, additional authentication, overall assessment; follow security standards recommended by NIST such as not using username and PW for anything other than telerehabilitation communication, changing it often, using strong usernames and PWs, no computer
  • 62. viruses, and consistently authenticate user communication stored and released to internal and external entities requirements; educate and train all personnel (Watzlaf, Moeini, Matusow, et al., 2011) International Journal of Telerehabilitation Policy Examined accessibility and retention of PHI by employees and others. Examined requests from legal, sharing of information with other countries, websites. Encryption, antivirus and audit and security system evaluation was examined.
  • 63. 128-bit Advanced Encryption Standard (AES) Secure Real- Time Transport Protocol (SRTP) recommended by NIST. Only 50% of companies reviewed use some form of encryption. 70% of companies made no mention of Sharing of information was not always addressed in vendor policies Used a HIPAA compliant checklist for top 10 Voice over Internet Protocol (VoIP) companies Most of the companies did not include all items on the checklist in their policies. International Journal of Telerehabilitation • telerehab.pitt.edu
  • 64. International Journal of Telerehabilitation • Vol. 9, No. 2 Fall 2017 • (10.5195/ijt.2017.6231) Privacy Security Administrative Article Title, Year Journal Type of Study Patient Rights (access, amend, right to confidential communications, informed consent etc.) Use & Disclosure (authorizations, accounting of disclosures, de- identification of data etc.) Technical (encryption, access control, authentication, data backup, storage, recovery) Physical (secure server location, backup generator etc.)
  • 65. Organizational (policies, BAAs, auditing) Education/ Training/ Personnel security evaluation. (Watzlaf & Ondich, 2012) International Journal of Telerehabilitation Usability Study Consent for disclosure is needed. More secure entrance into telehealth system than username and PW. Impersonation of the system should be prevented. Ensure HIPAA compliance and obtain a BAA between telehealth system and covered
  • 66. entity. Develop clear, understandable privacy and security (P&S) policies into the patient consent form Policies should describe the P&S of the conferencing session and describe how it will restrict: employee access to technical problems; information to other users; retention of session; and sharing of information with other websites, countries and other third parties without patient consent. Form a team and use the HIPAA checklist to ensure compliance before using a telehealth system. Review the P&S policies of each system before use.
  • 67. Ask questions of the telehealth company not addressed in the policy. International Journal of Telerehabilitation • telerehab.pitt.edu International Journal of Telerehabilitation • Vol. 9, No. 2 Fall 2017 • (10.5195/ijt.2017.6231) DISCUSSION This systematic review of privacy and security practices that healthcare providers may use with telehealth technologies has shown that privacy and security is a concern across all types of specialties such as telerehabilitation, telenursing, teletrauma, and telepsychiatry. All providers need to make privacy and security of utmost concern when conducting a telehealth session. The papers suggest that most of the work has been policy and strategy pieces with no experimental or quasi-experimental studies represented. In both survey research studies conducted, healthcare providers had concerns over privacy and security
  • 68. in telehealth and that it can be intrusive for the patient. In an interview study, it was found that providers did not believe that telehealth increased the risk of privacy or security concerns although some did not know enough to answer the question fully and thought there could be increased risk. These studies alone show that there is uncertainty on this topic. Many healthcare providers may not know all the many aspects of privacy and security within telehealth and need more education and training as well as technical support personnel to help them in these areas. Many of the policy studies stated that policy and procedure (P&P) as well as education and training are needed for all healthcare providers and technical support personnel to prevent breaches of PHI. These papers also stated that healthcare professionals need to know state, regional, and national laws and regulations, legal liability, HIPAA/HITECH and HL7 compliance, as well as measures used to ensure availability of PHI to the proper users. Methods were also discussed regarding how audio or video recordings are to be stored, maintained and accessed to protect patient privacy, and how mobile devices used in telehealth sessions are to be reinforced to protect the privacy and security of patient information. The most detailed information surrounding informed consent for a telehealth session was found in the ATA guidelines and recommendations and discussed how maintaining privacy and security within the telehealth session must be included in the informed consent in easy to understand language especially when discussing encryption, authentication and other methods to maintain confidential communications between provider and patient. The use of audio and video muting as well as the ability to
  • 69. quickly change from public to private audio mode so that unauthorized users may not see or hear what is being communicated was also discussed throughout the ATA guideline papers. There does not seem to be consensus about the use and disclosure of PHI in telehealth since some systems will allow sharing with certain groups as part of their privacy policy. HIPAA, however, states that proper authorizations are warranted when there are requests for information and an accounting of disclosures is necessary when PHI is shared. However, there still seems to be some uncertainty as to what parts of the telehealth session will be kept, for how long, how they will be maintained and where they will be stored. If the telehealth sessions are recorded and kept with the electronic health record (EHR) then proper authorizations are necessary when PHI is requested. However, there is no standard method for how this is done. Some systems may convene a telehealth session and not store any of the information that was transmitted. Some may record the session but then destroy the recording after the session is over. Some may record and store the session or even transmit the session to a third party for additional treatment and consultation. Some type of standard process in this area is needed. Security measures such as encryption and authentication were addressed, but not all papers provided a standardized description of the encryption methods used or the best methods for authentication. Very few papers addressed the importance of an independent audit on the telehealth system for privacy and security features by an outside entity. LIMITATIONS There were some limitations to our systematic review. Due to
  • 70. time constraints the grey literature, such as dissertations and other unpublished reports, other databases listed in the protocol, vendors or authors (also mentioned in the protocol) were not searched. Also, as mentioned previously, only English language articles were reviewed. International Journal of Telerehabilitation • telerehab.pitt.edu International Journal of Telerehabilitation • Vol. 9, No. 2 Fall 2017 • (10.5195/ijt.2017.6231) CONCLUSION In summary, more scientific research studies are needed to determine the best practices in privacy and security surrounding telehealth. Experimental studies that address the effectiveness of privacy and security evaluations of the telehealth system, proper informed consent that discusses the privacy and security aspects of the telehealth session with the patient as well as testing of access control, disaster recovery and risk analysis of the telehealth system are essential to improve the practices of the entire telehealth team. Best practices that are consistent across all types of telehealth services for all healthcare providers are needed to address
  • 71. all privacy and security issues. Privacy and security aspects are just as important as providing a clear and trouble-free telehealth session and a privacy and security evaluation should be performed before the telehealth system is used with a patient. Tools used to assist healthcare providers on what they should look for when deciding on a telehealth system are needed. This systematic review results informed the need for and subsequently led to the development of a best practice tool that will enable healthcare providers to assess privacy and security features of the telehealth technologies they are planning to use. Hopefully, this tool will move healthcare providers one step closer to enabling best practices in privacy and security in telehealth. ACKNOWLEDGMENTS This research was supported in part by the National Institute on Disability, Independent Living, and Rehabilitation Research (NIDILRR) grant #90RE5018 (RERC from Cloud to Smartphone: Empowering and Accessible ICT). Systematic Review Registration: PROSPERO: CRD42015020552 REFERENCES American Telemedicine Association. (2009). Evidence-based practice for telemental health. Retrieved from http://hub.americantelemed.org/resources/telemedicine-practice- guidelines American Telemedicine Association. (2011). Telehealth practice recommendations for diabetic retinopathy. Retrieved from http://hub.americantelemed.org/resources/telemedicine-practice- guidelines American Telemedicine Association. (2014a). Clinical
  • 72. guidelines for telepathology. Retrieved from http://hub.americantelemed.org/resources/telemedicine-practice- guidelines American Telemedicine Association. (2014b). Core operational guidelines for telehealth services involving provider-patient interactions. Retrieved from http://hub.americantelemed.org/resources/telemedicine-practice- guidelines American Telemedicine Association. (2016). Practice guidelines for teleburn care. Retrieved from http://hub.americantelemed.org/resources/telemedicine-practice- guidelines Balshem, H., Helfand, M., Schunemann, H. J., Oxman, A. D., Kunz, R., Brozek, J., . . . Guyatt, G. H. (2011). GRADE Guidelines: 3. Rating the quality of evidence. Journal of Clinical Epidemiology, 64, 401- 406. https://doi.org/10.1016/j.jclinepi.2010.07.015 Bramer, W. M., Giustini, D., de Jonge, G. B., Holland, L., & Bekhuis, T. (2016). De-duplication of database search results for systematic reviews in EndNote. Journal of the Medical Library Association, 104, 240-243. https://doi.org/10.3163/1536- 5050.104.3.014 Brous, E. (2016). Legal considerations in telehealth and telemedicine. American Journal of Nursing, 116(9), 64-67. https://doi.org/10.1097/01.NAJ.0000494700.78616.d3 Cason, J., Behl, D., & Ringwalt, S. (2012). Overview of states' use of telehealth for the delivery of early intervention (IDEA Part C) services.
  • 73. International Journal of Telerehabilitation, 4(2), 39-46. https://doi.org/10.5195/IJT.2012.6105 Cohn, E., & Watzlaf, V. (2012). Telepractice and informed consent: Readability of VoIP privacy practices. Paper presented at the American Speech-Language Hearing Association. Daniel, H., Sulmasy, L. S., & for the Health and Public Policy Committee of the American College of Physicians. (2015). Policy recommendations to guide the use of telemedicine in primary care settings: An American College of Physicians position paper. Annals of Internal Medicine, 163, 787-789. https://doi.org/10.7326/M15- 0498 Demiris, G. (2004). Electronic home healthcare: Concepts and challenges. International Journal of Electronic Healthcare, 1(1), 4-16. https://doi.org/10.1504/IJEH.2004.004655 http://hub.americantelemed.org/resources/telemedicine-practice- guidelines http://hub.americantelemed.org/resources/telemedicine-practice- guidelines http://hub.americantelemed.org/resources/telemedicine-practice- guidelines http://hub.americantelemed.org/resources/telemedicine-practice- guidelines http://hub.americantelemed.org/resources/telemedicine-practice- guidelines https://doi.org/10.1016/j.jclinepi.2010.07.015 https://doi.org/10.3163/1536-5050.104.3.014 https://doi.org/10.1097/01.NAJ.0000494700.78616.d3 https://doi.org/10.5195/IJT.2012.6105
  • 74. https://doi.org/10.7326/M15-0498 https://doi.org/10.1504/IJEH.2004.004655 International Journal of Telerehabilitation • telerehab.pitt.edu International Journal of Telerehabilitation • Vol. 9, No. 2 Fall 2017 • (10.5195/ijt.2017.6231) This work is licensed under a Creative Commons Attribution 4.0 International License. This journal is published by the University Library System of the University of Pittsburgh as part of its D-Scribe Digital Publishing Program and is cosponsored by the University of Pittsburgh Press. Demiris, G., Edison, K., & Schopp, L. H. (2004). Shaping the future: Needs and expectations of telehealth professionals. Telemedicine and e- Health, 10 (Suppl 2), S60-S63. https://doi.org/10.1089/tmj.2004.10.S-60 Fleiss, J. L., Cohen, J., & Everitt, B. S. (1969). Large sample
  • 75. standard errors of kappa and weighted kappa. Psychological Bulletin, 72, 323- 327. https://doi.org/10.1037/h0028106 Garg, V., & Brewer, J. (2011). Telemedicine security: A systematic review. Journal of Diabetes Science and Technology, 5, 768-777. https://doi.org/10.1177/193229681100500331 Hall, J. L., & McGraw, D. (2014). For telehealth to succeed, privacy and security risks must be identified and addressed. Health Affairs (Millwood), 33, 216-221. https://doi.org/10.1377/hlthaff.2013.0997 Health Resources and Services Administration. (2015). Telehealth. Retrieved from https://www.hrsa.gov/rural- health/telehealth/index.html Moher, D., Shamseer, L., Clarke, M., Ghersi, D., Liberati, A., Petticrew, M., . . . PRISMA-P Group. (2015). Preferred reporting items for systematic review and meta-analysis protocols (PRISMA-P) 2015 Statement. Systematic Reviews, 4, 1. https://doi.org/10.1186/2046- 4053-4-1 Mullen-Fortino, M., DiMartino, J., Entrikin, L., Mulliner, S., Hanson, C. W., & Kahn, J. M. (2012). Bedside nurses' perceptions of intensive care unit telemedicine. American Journal of Critical Care, 21(1), 24- 32. https://doi.org/10.4037/ajcc2012801 Naam, N. H., & Sanbar, S. (2015). Advanced technology and confidentiality in hand surgery. Journal of Hand Surgery, 40, 182-187.
  • 76. https://doi.org/10.1016/j.jhsa.2014.03.011 Nieves, J. E., Candelario, J., Short, D., & Briscoe, G. (2009). Telemental health for our soldiers: A brief review and a new pilot program. Military Medicine, 174, xxi-xxii. Office of the National Coordinator for Health Information Technology. (2016). Breaches of unsecured protected health information. Health IT Quick-Stat #53. Retrieved from https://dashboard.healthit.gov/quickstats/pages/breaches- protected-health-information.php Paing, W. W., Weller, R. A., Welsh, B., Foster, T., Birnkrant, J. M., & Weller, E. B. (2009). Telemedicine in children and adolescents. Current Psychiatry Reports, 11, 114-119. https://doi.org/10.1007/s11920-009-0018-9 Peterson, C., & Watzlaf, V. (2014). Telerehabilitation store and forward applications: A review of applications and privacy considerations in physical and occupational therapy practice. International Journal of Telerehabilitation, 6(2), 75-84. https://doi.org/10.5195/ijt.2014.6161 Putrino, D. (2014). Telerehabilitation and emerging virtual reality approaches to stroke rehabilitation. Current Opinion in Neurology, 27, 631- 636. https://doi.org/10.1097/WCO.0000000000000152 Rinehart-Thompson, L. (2013). Introduction to health information privacy and security. Chicago, IL: AHIMA Press. US Department of Health and Human Services. (2013). HIPAA
  • 77. administrative simplification regulation text. Retrieved from http://www.hhs.gov/sites/default/files/ocr/privacy/hipaa/adminis trative/combined/hipaa-simplification-201303.pdf Watzlaf, V. (2010). Are your internet based technology practices HIPAA compliant? Paper presented at the American Telemedicine Association, Telerehabilitation SIG. Watzlaf, V., & Ondich, B. (2012). VoIP for telerehabilitation: A pilot usability study for HIPAA compliance. International Journal of Telerehabilitation, 4(1), 25-32. https://doi.org/10.5195/ijt.2012.6096 Watzlaf, V., Moeini, S., & Firouzan, P. (2010). VOIP for telerehabilitation: A risk analysis for privacy, security, and HIPAA compliance. International Journal of Telerehabilitation, 2(2), 3-14. https://doi.org/10.5195/ijt.2010.6056 Watzlaf, V., Moeini, S., & Matusow, L. (2011). Privacy and security assessment for internet-based technologies. Paper presented at the Pennsylvania Speech and Hearing Association Conference, Pittsburgh, PA. Watzlaf, V., Moeini, S., Matusow, L., & Firouzan, P. (2011). VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II. International Journal of Telerehabilitation, 3(1), 3-10. https://doi.org/10.5195/ijt.2011.6070 Watzlaf, V., DeAlmeida, D., Zhou, L., & Hartman, L. (2015). Protocol for a systematic review of telehealth privacy and security research to
  • 78. identify best practices. International Journal of Telerehabilitation, 7(2), 15-22. https://doi.org/10.5195/ijt.2015.6186 Watzlaf, V., DeAlmeida, D., Molinero, A., Zhou, L., & Hartman, L. (2015). Protocol for systematic review in privacy and security in telehealth: Best practices for healthcare professionals. PROSPERO, 2015, CRD42015020552. Retrieved from http://www.crd.york.ac.uk/PROSPERO/display_record.php?ID= CRD42015020552 http://creativecommons.org/licenses/by/4.0/ http://creativecommons.org/licenses/by/4.0/ http://www.library.pitt.edu/ http://www.pitt.edu/ http://www.library.pitt.edu/articles/digpubtype/index.html http://www.library.pitt.edu/articles/digpubtype/index.html http://upress.pitt.edu/ http://creativecommons.org/licenses/by-nc-nd/3.0/us/ https://doi.org/10.1089/tmj.2004.10.S-60 https://doi.org/10.1037/h0028106 https://doi.org/10.1177/193229681100500331 https://doi.org/10.1377/hlthaff.2013.0997 https://www.hrsa.gov/rural-health/telehealth/index.html https://doi.org/10.1186/2046-4053-4-1 https://doi.org/10.1186/2046-4053-4-1 https://doi.org/10.4037/ajcc2012801 https://doi.org/10.1016/j.jhsa.2014.03.011 https://dashboard.healthit.gov/quickstats/pages/breaches- protected-health-information.php
  • 79. https://doi.org/10.1007/s11920-009-0018-9 https://doi.org/10.5195/ijt.2014.6161 https://doi.org/10.1097/WCO.0000000000000152 http://www.hhs.gov/sites/default/files/ocr/privacy/hipaa/adminis trative/combined/hipaa-simplification-201303.pdf https://doi.org/10.5195/ijt.2012.6096 http://www.crd.york.ac.uk/PROSPERO/display_record.php?ID= CRD42015020552A SYSTEMATIC REVIEW OF RESEARCH STUDIES EXAMINING TELEHEALTH PRIVACY AND SECURITY PRACTICES USED BY HEALTHCARE PROVIDERSValerie J. M. Watzlaf, PhD, MPH, RHIA, FAHIMA, Leming Zhou, PhD, DSc, Dilhari R. DeAlmeida, PhD, RHIA, Linda M. Hartman, MLS, AHIPDEPARTMENT OF HEALTH INFORMATION MANAGEMENT, SCHOOL OF HEALTH AND REHABILITATION SCIENCES, UNIVERSITY OF PITTSBURGH, PITTSBURGH, PA, USAAbstractBACKGROUND AND SIGNIFICANCEMATERIAL AND METHODSSearch StrategyStudy EligibilityExclusion of papersData Extraction Process and Quality AssessmentData SynthesisRESULTSReviewer AgreementTime Period and Type of StudiesDescriptive Analysis of All StudiesDISCUSSIONLIMITATIONSCONCLUSIONACKNOWL EDGMENTSReferences Guidelines for Effective PowerPoint Presentations Introduction
  • 80. One concern about visual presentations is that the technology used to create them can be used in such a way that it actually detracts from the message rather than enhances it. To help you consider carefully how your message is presented so that it reflects care, quality, and professionalism, consider the information provided in the remaining slides. NOTE: This presentation serves as an example in itself, by utilizing all of the guidelines mentioned. Outline Writing Organization Audience Design Images Bullets Tables Font Speaker Notes The following topics will be covered: Writing Present ideas succinctly with lean prose. Use short sentences. Use active, rather than passive voice. Avoid negative statements, if possible. Avoid double negative entirely. Check spelling and grammar.
  • 81. Use consistent capitalization rules. Organization Develop a clear, strategic introduction to provide context for the presentation. Develop an agenda or outline slide to provide a roadmap for the presentation. Group relevant pieces of information together. Integrate legends and keys with charts and tables. Organize slides in logical order. Present one concept or idea per slide. Use only one conclusion slide to recap main ideas. Audience Present information at language level of intended audience. Do not use jargon or field-specific language. Follow the 70% rule—If it does not apply to 70% of your audience, present it to individuals at a different time. Design Use a consistent design throughout the presentation.
  • 82. Keep layout and other features consistent. Use the master slide design feature to ensure consistency. Use consistent horizontal and vertical alignment of slide elements throughout the presentation. Leave ample space around images and text. Images When applicable, enhance text-only slide content by developing relevant images for your presentation. Do not use gratuitous graphics on each slide. Use animations only when needed to enhance meaning. If selected, use them sparingly and consistently. Bullets Use bullets unless showing rank or sequence of items. If possible, use no more than five bullet points and eight lines of text total per slide. Tables Use simple tables to show numbers, with no more than 4 rows x 4 columns.
  • 83. Reserve more detailed tables for a written summary. Font Keep font size at 24 point or above for slide titles. Keep font size at 18 or above for headings and explanatory text. Use sans serif fonts such as Arial or Verdana. Use ample contrast between backgrounds and text. Speaker Notes Summarize key information. Provide explanation. Discuss application and implication to the field, discipline or work setting. Document the narration you would use with each slide.