Anda di halaman 1dari 14

Working with Health IT Systems

Protecting Privacy, Security, and


Confidentiality in HIT Systems

Lecture b
This material (Comp7_Unit7b) was developed by Johns Hopkins University, funded by the Department of Health and Human
Services, Office of the National Coordinator for Health Information Technology under Award Number IU24OC00013.

Protecting Privacy, Security, and
Confidentiality in HIT Systems
Learning ObjectivesLecture a
Explain and illustrate privacy, security, and
confidentiality in HIT settings.
Identify common threats encountered when
using HIT.
Formulate strategies to minimize threats to
privacy, security, and confidentiality in HIT
systems.


2
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Working with Health IT Systems
Protecting Privacy, Security, and Confidentiality
in HIT SystemsLecture b
Physical Safeguards
Facility Access Controls







3
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Working with Health IT Systems
Protecting Privacy, Security, and Confidentiality
in HIT SystemsLecture b
Physical Safeguards
Examples
Workstation Use
Workstation Security
Device and Media Controls (e.g., media
disposal, access to backup and storage
media)
4
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Working with Health IT Systems
Protecting Privacy, Security, and Confidentiality
in HIT SystemsLecture b
Physical Safeguards
Examples
Device and Media Controls
media disposal
access to backup and storage media





5
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Working with Health IT Systems
Protecting Privacy, Security, and Confidentiality
in HIT SystemsLecture b
Technical Safeguards
Examples
Access Control
Unique user identification
Emergency access
Automatic logoff
Encryption/decryption


6
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Working with Health IT Systems
Protecting Privacy, Security, and Confidentiality
in HIT SystemsLecture b
Technical Safeguards
Examples
Audit Controls
Integrity






7
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Working with Health IT Systems
Protecting Privacy, Security, and Confidentiality
in HIT SystemsLecture b
Technical Safeguards
Examples
Person or Entity Authentication
Password/passphrase/PIN
Smart card/token/key
Biometrics
Two factor
authentication




8
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Working with Health IT Systems
Protecting Privacy, Security, and Confidentiality
in HIT SystemsLecture b
Technical Safeguards
Examples
Transmission Security
Integrity controls
Encryption













9
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Working with Health IT Systems
Protecting Privacy, Security, and Confidentiality
in HIT SystemsLecture b
Risk Analysis and Management
Analysis
Gather data on potential threats and
vulnerabilities
Assess current security measures
Determine likelihood, impact and level of risk
Identify needed security measures
Management
Develop a plan for implementation
Evaluate and maintain security measures
10
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Working with Health IT Systems
Protecting Privacy, Security, and Confidentiality
in HIT SystemsLecture b
Meaningful Use
Criteria for meaningful use of EHRs
related to privacy, security, and
confidentiality meant to align with HIPAA
Emphasizes need to conduct a risk
analysis
Some specific requirements
for EHR vendors
11
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Working with Health IT Systems
Protecting Privacy, Security, and Confidentiality
in HIT SystemsLecture b
Protecting Privacy, Security, and
Confidentiality in HIT Systems
SummaryLecture b
Privacy, security, and confidentiality in HIT
settings
Common threats encountered when using HIT
Strategies to minimize threats to privacy,
security, and confidentiality in
HIT systems


12
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Working with Health IT Systems
Protecting Privacy, Security, and Confidentiality
in HIT SystemsLecture b
Protecting Privacy, Security, and
Confidentiality in HIT Systems
ReferencesLecture b
References
American Health Information Management Association. Available from: http://www.ahima.org
Ensuring Security of High-Risk Information in EHRs c2008. Available from:
http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_039956.hcsp?dDocName=bok1_039956
HIPAA Security Series: Security 101 for Covered Entities .c2004 Available from:
http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/security101.pdf
Nationwide Privacy and Security Framework for Electronic Exchange of Individually Identifiable Health Information.
c2008. Available from:
http://healthit.hhs.gov/portal/server.pt/gateway/PTARGS_0_10731_848088_0_0_18/NationwidePS_Framework-
5.pdf
Scribd. Mobility Infrastructure Solution Design Guide. c2008. Available from:
http://www.scribd.com/doc/24975115/Procurve-Wifi-Network-Design-Guide
U.S. Department of Health and Human Services. Available from: http://www.hhs.gov


13
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Working with Health IT Systems
Protecting Privacy, Security, and Confidentiality
in HIT SystemsLecture b
Protecting Privacy, Security, and
Confidentiality in HIT Systems
ReferencesLecture b
14
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Working with Health IT Systems
Protecting Privacy, Security, and Confidentiality
in HIT SystemsLecture b
Images
Slide 3: HIPPA Security Bulletins. Courtesy HIPPA. Available from: http://www.hhs.gov/ocr/privacy
Slide 5: Logo of the Federal Trade Commission. Courtesy Federal Trade Commission.
Slide 6: Cloud Computing will Challenge Security Policies. Courtesy U.S. Dept. of Commerce
Slide 7: The Field of Security Has to Adapt. Courtesy National Institutes of Health (NIH)
Slide 8: A Sophisticated Users Station. Courtesy National Science Foundation (NSF) Available from:
http://www.nsf.gov/od/lpa/news/press/00/stim5.htm
Slide 9: Transmission Security Controls Prevent Unauthorized Access to ePHI.
Available from: http://blog.tsa.gov/2008/08/encryption-is-issue-in-case-of-missing.html.

Anda mungkin juga menyukai