Medical_Record_Privacy - 91-514-201-s2010

advertisement
Internet Web Systems II- Spring 2010
Vinay Veeramachaneni
EMR/EHR (United States)
 Why EMR/EHR?
 What is Privacy and Security?
 The Law
 Example Scenarios
 How to Protect?
 Existing Systems
 Conclusion

Medical and health records maintained
on paper.
 Records were send by fax, mail or
asked by phone.
 Possibility of error is most likely by
human.
 Point-of-Care is hard to regulate.

Availability of faster Internet and
bandwidth
 Low cost of hardware
 Low cost of storage
 Storage at multiple locations/mirrors to
recover from failure
 Software providing enhanced
authentication

Digitalize and maintain patient medical
records.
 Electronically maintain and update
health records.
 Invest about $20 billion to improve
health care (Stimulus package).
 Eliminate Health disparities.

(1)
Lower health care costs
 Reduce medical errors
 Improve point-of-care
 Improve access to data
 Improve quality of health care
 Enhance the use of EMR by providers
and hospitals.

Ability to keep information about
themselves private or reveal to a
selected individual.
 Protect an individual’s trust.
 Confide with trusted individuals.
 Security is preventing any unauthorized
access to personal information.
 Store in a reliable location.
 Prevent any illegal use of information.

Government
Healthcare
Provider
Patient
Hospital
Physician
hacking
Re-route
prescripti
on drugs
Ransom
Outsourcing
Information
breach
Sell to
Pharmaceutical
companies
Possibility
of illegal
use
Sell to
researchers
Social Web
-Loss of privacy
-Loss of employment
-Loss of insurance
-Improper treatment
-Reluctant to medical
care
-Social discrimination
Societies
Household
members
Poor handling
by medical
professionals
Employers
Related places
Losing records
 Discussing in public areas including
social web.
 Bribery
 Miscommunication
 Poor analysis
 Use of data without consent

Used for peer-to-peer communication
 Used to connect members with various
physical and mental ailments
 Impact on the drugs physicians
prescribe (Stanford Business School)
 E.g.: PatientsLikeMe, SoberCircle,
Doc2Doc, Healtheva, SurgyTec,……
 Educational purpose.
 Discussing related cases and cure.

Hackers hold Virginia medical records for
ransom (Washington post, May 4 2009).
Hackers threatened the state government
that they will sell the medical records of 8
million patients and prescription drug
monitoring records, unless the government
pays a $10 million ransom.
 One outsourced medical transcriptionist
threatened to post patient medical records
online.

Private medical records for sale:
Patients’ files outsourced for computer
input end up in black market.
(www.dailymail.co.uk 18th Oct 2009)
 Confidential medical records of patients
of Britain’s Hospital were illegally sold in
the black market in this case to under
cover federal agents.

Medics tweeting and posting data in
social Websites.
 An insurance agent found out the
abortion of his niece and told her
parents.
 An employer illegally accessed the
medical record of the employee’s HIV
status.

HITECH Act – Health Information
Technology for Economic and Clinical
Health Act, 2009.
 “Meaningful Use” of EHR and set of
standards.
 HIPAA act, 1996 – Health Insurance
Portability and Accountability Act
 American Recovery and Reinvestment
Act.









Fair practice
Patient and professionals’ training
Prevent mishandling of data
Optimize the information
Provide better authentication
Securing the facilities (Hospitals and
Healthcare Institutions)
Limit use of social networking, not to
discuss about patients
Provide standards and responsibilities
Do not enter personal data
 Identify theft
 Red flag any misuse
 Penalties
 Report any illegal activity
 Report Phishing Websites
 Business treaties that provide data
protection.

Study on Certification Commission for
Health Information Technology (CCHIT)US HER certification organization.
 OpenEMR software
 Static Analysis summary of 1210 alerts
 Vulnerabilities like Cross-site scripting,
nonexistent access control, path
manipulation, error information leak.

Cross-site Scripting
Error Message Information Leak
Shibboleth (Johns Hopkins)
 Verisign
 eClinicalWorks EMR (Tufts Medical)
 E-MDs
 www.omniMD.com
 Dr.I-Net







Cost Savings
Improved Margins
Improved Patient
Satisfaction
Better care
(Research by
Microsoft)
(Nemours-Pediatric
Health System)
Pros
-



Cost efficiency
Faster response
Easy patient transfer
Reduce medical errors
Faster access to data
Cons
-
Concerns of privacy
Problem of hacking
Lose patients
Reluctant to medical care
Social discrimination
Privacy is always an ongoing debate also with
personal identity and financial data.
Digitalizing medical data became a law in
United States and also implemented globally.
Just as any financial organizations, hospitals
also must provide enhanced authentication.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
http://www.omnimd.com
http://whereismydata.wordpress.com/2008/09/24/exapmles-ofmisuse-of-medical-records--where-is-my-data/
http://en.wikipedia.org
http://www.doseofdigital.com/healthcare-pharma-social-mediawiki/
http://www.gsb.stanford.edu/news/research/mktg_nair_drugs.s
html
http://www.krollfraudsolutions.com/pdf/2010_KrollHIMSS_Study_FINAL.pdf
www.hhs.gov
http://www.netreach.net/~wmanning/privacy.htm
http://www.data-storagetoday.com/story.xhtml?story_id=13100CRGCVD5&full_skip=1
http://www.healthcareitnews.com/news/officials-outline-criteriameaningful-use
Towards Improving Security criteria for certification of HER
system
Download