Policy on ‘ICT Security’ Guidance Aim To increase awareness of the policy on IT Security Policy . Introduction Proliferation of computerised systems, Internet (www), E-mail, E-commerce etc E-Health? Legislative drivers – Data Protection Act 1998; – Regulation of Investigatory Powers Act (RIP) 1998; – Human Rights Act 2000. Reflective Questions What do you think are the current strengths of the Trust’s ICT infrastructure? What do you think are the weaknesses? What is eHealth ? “Using the internet and other electronic channels to access and deliver health and lifestyle information and services” Current state of eHealth First online cancer support group (alt.support.cancer) founded 1992 There are > 100k medical websites, growing exponentially Over a third of UK homes claim an internet link in 2001 85% of UK doctors report some patients who benefited from the internet (Potts et al ’02) 44% of UK doctors report some patients who experienced problems from the internet ...fast, professional medical services ...worldwide consultation with your doctor by e-mail & phone ...and if you need to be seen, we offer convenient affordable appointments on the day you want. e-med offers all the services of a GP Surgery but with: - longer appointments, on the day you want - a relaxed uncrowded waiting room - a fast results service after tests The patient/client view What do people want ? Web sites: Reliable medical information Answers to medical questions Interactive services: data capture & charting, risk scoring, chronic disease management… Virtual communities Discussion forums, email lists, etc. Provide online social support, sympathy - social support more traffic than information exchange (Valaitis 2000) 1147 cancer-related mailing lists on Yahoo, 308 active – (Potts 2002) Why do people want it ? Information: Free, easy to search Convenient to access for a sick person - in your home 24X7 in local library Huge coverage, including rare diseases – the five common cancers account for only 52% of all cases Support groups, advice: As anonymous as you want Can choose a group you fit into No commitment to participate (lurkers) Do people use it ? Demand for email contact with Diabetes UK: 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% Phone Email 1997 1999 2001 Source: Debbie Hammond, Diabetes UK Do people use it ? NHSDirect Online content: 10k users per day. NHSDirect Online Enquiry Service, 2002 figures: Average number of calls per day 90 80 70 60 50 40 30 20 10 0 Ja a nu ry Fe ua br ry ar M ch Ap ril ay M n Ju e Ju t ly A us ug pt e S be m e r ob ct O er N e ov m r be D e ec m r be Who / where do people use it ? Cancer patients: 10% of cancer patients in NI, 23% in London had used the net Higher usage in younger, educated sector No difference with gender, diagnosis (Mills ’02, Wilkins ‘02) UK population: ONS survey Jan ’01: overall, 14% would go to the net for cancer info. Gender / age figures varied: 25% males 25-44, <1% females 75+ The Freestyle Tracker “A Comprehensive Diabetes Management System in the Palm of Your Hand” • Combines blood glucose meter, diabetes manager, and (PDA) all in one compact device • World's smallest sample blood glucose testing for nearly painless monitoring • Tracks and stores diabetes information for on-the-go review • Displays data in various formats to enable easier understanding and management • Sleek PDA appearance makes glucose testing and diabetes data management more discreet • Provides easy access to a 2,500 item Food List … The professional view Potential benefits for Professionals Virtual electronic patient records - data from multiple sites on one screen Instant access to knowledge: guidelines, other reference material Professional knowledge services Globalisation of services Your own web site Electronic directory & booking of hospital tests, procedures Care pathways linking organisations Professional dept. / GP practice web sites Audience: patients, carers, GPs, Trust staff Contents: – Local practice information and patient advice – Links to good external sites (eg. patient support, leaflets) – Secure personal page for each patient - drug list, test results, letters, discharge summaries, asthma / DM data… Potential benefits: – Better information for patients, carers, others – Fewer telephone calls, appointments – Improved adherence to appointments, treatments… Potential harms Internet printout syndrome - more information to discuss “Cyber-chondria”, prescription drug abuse, other harms ? Loss of direct contact with patients – fewer consults, commercial eHealth sites ? Competition from alternative practitioners, cyberproviders Privacy Issues So, The ICT Security Policy What does IT Security mean? IT Security provides improvements in: – Confidentiality – Integrity – Availability All IT systems are subject to threats Incorrect input Theft Wilful damage Unauthorised access Software viruses The Impact of the Threats Personal privacy Legal damages and Personal health and penalties Disruption of services Political embarrassment safety Financial Commercial confidentiality The IT Security Policy Illustrates management commitment Relates to IM&T strategies Relates to business plans Defines security Shows intention to comply with legislation Defines responsibilities Covers everyone Acts as basis for procedures Why do we need a Security Policy? We need to preserve:– Confidentiality of data access; – Integrity of the Trust systems; – Availability of information to right staff. Security policy needed to defend against threats and to comply with prevailing legislation. Current Legislation Computer Misuse Act 1990 Data Protection Act 1998 Regulation of Investigatory Powers (RIP) 2000 Human Rights Act 2000 HPSS IS Security Policy Freedom of Information Act The Computer Misuse Act 1990 Introduced three new offences Unauthorised access to computers Unauthorised access with intent Unauthorised modification Regulation of Investigatory Powers (RIP) 2000 General presumption that communications (email & internet) traffic should not be intercepted, see Article 8 -HRA 2000 But ‘Lawful Business Practice Rules’ permits monitoring of communications without employees specific consent under clearly defined circumstances Main Provisions DPA 1998 Covers all HPSS records including electronic records Defines ‘processing’ as obtaining, holding and disclosing data Permits subject access to all records Imposes considerable penalties Data Protection ’98 Principles The 1. Personal data shall be processed fairly and lawfully 2. Personal data shall be obtained only for one or more specified and lawful purpose 3. Personal data shall be adequate, necessary and not excessive in relation to the purpose for which it was provided Data Protection ’98 The Principles continued... 4. Personal data shall be accurate and up to date 5. Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for those purposes 6. Personal data shall be processed in accordance with the rights of the subject under the Act Data Protection ’98 The Principles continued... 7. Technical & organizational measures shall be taken against unauthorized or unlawful processing of personal data and against accidental loss or damage to personal data 8. Personal data shall not be transferred to a country outside the European Economic Area. General Security Measures Virus Control: Do not load files on PC unless virus checked. Do not load illegal software. Report any virus detection to ITSO. Remote access & laptop users should ensure anti-virus software is up-to-date. General Security Measures Protection of Hardware from theft: – Do not remove equipment from Trust sites without relevant authority (except for laptops). – Laptops , PDAs must use hard disk password or encryption to secure against loss of personal data. – Lock offices, drawers, close blinds/curtains after hours. General Security Measures Accidental Damage: – Avoid eating/drinking near hardware. – Location of hardware should comply with Health & Safety standards. – Switch off all IT hardware when not in use. – Avoid obstructing cooling fans on computers and printers. General Security Measures. Protection of data storage media: – Data on diskettes can be corrupted by being kept near electronic/magnetic devices or direct sunlight, radiators etc. – All media (diskettes, CD-ROM) should be locked away when not in use. – All storage media should be clearly marked. – Backup storage must be replaced within recommended time frames. General Security Measures. Unauthorised access to data: – Use power-on passwords where available. – Passwords should be changed. – Use password protected screen savers. – VDU’s should be tilted way from the public. – All sensitive printouts should be shredded. Staff using Email Trust email traffic is monitored and quarantined, if necessary Avoid inappropriate use of email Restrict access to recipients who are interested in the message Check email regularly Delete unwanted messages Staff using Email Inform IT dept when sending attachments >1MB Don’t email attachments with sensitive information outside the HPSS Report any virus incidents to ITSO, do not forward virus alerts to any other person except ITSO Passwords An important line of defence Need to be implemented to be effective Staff carry responsibility for impersonation Staff should use password protection for: • • • • Power-on Network login System login eg HRMS, SOSCARE etc Screensavers Do not duplicate passwords used in the above list: Passwords Choose a password with care Poor examples are: • Your own name • Spouses name • Pets name! • Car number • Favourite football team Use a phrase and compose password from initial letters and numbers; • ILIA2BH (I live in a 2 bedroom house) • IGOHO28J (I go on holiday on 28 June) Passwords Follow these simple rules; – Choose one that cannot be easily guessed; – Do not write it down – Keep it secret (except for contingency reasons) – Change on a regular basis – Change password immediately if you think it has been compromised Create a new account for temporary access to ‘outsiders’ The use of password ‘cracking’ software without prior approval of CE is a disciplinary offence Internet Policy Access permitted only through the Trust Wide Area Network Unacceptable use: anything – Illegal – Offensive – Unethical Internet Policy Business use only. – Personal use blocks other business users – DIS/Trust can block inappropriate sites Do not transmit sensitive information Remember obligations under the Data Protection Act 1998. Internet use monitored Users need to accept the terms of the Internet policy Internet Policy HPSS data posted by staff on the Internet must carry a message indicating ‘Crown Copyright’. Any document created & posted onto the Internet by staff must identify the author and include ‘North and West Belfast HSS Trust’ (as opposed to non Trust documents). Internet Policy User/News groups involvement requires director level authority. Never use ‘Trust’ based passwords on the internet. Avoid downloading files unless it is expressly permitted by the Web site. Internet Policy Do not enter into any agreements on behalf of Trust unless authorised to do so. Avoid downloading malicious software Make best use of Internet time by – Being search specific – Keep downloading time to a minimum Do not expect too much of the internet Exercise Can you describe a breach of IT security that occurred within your work area. Describe: What happened? Why it happened? What the impact was? How you recovered (if you did) Steps taken to prevent a repetition. Trust Example: Office Fire What Happened? – Recent fire destroyed 8 PCs, printer and PC based data Why it happened? – Accidental fire What was the impact? – Minimal as there was central backup of files. Would have catastrophic otherwise. How we recovered? – Data reloaded onto contingency PC’s in another Office. Conclusions Measures will: – reduce threats – reduce vulnerability – reduce impact If you are concerned about security, ask the IT department for help and advice. Security is everyone's responsibility Staff declaration A Poem for Computer Users over 40!! Thank-you for attending