Anda di halaman 1dari 16

Working with Health IT Systems

Protecting Privacy, Security, and


Confidentiality in HIT Systems
Lecture a
This material (Comp7_Unit7a) was developed by Johns Hopkins University, funded by the Department of Health and Human
Services, Office of the National Coordinator for Health Information Technology under Award Number IU24OC00013.

Protecting Privacy, Security, and
Confidentiality in HIT Systems
Learning ObjectivesLecture a
Explain and illustrate privacy, security, and
confidentiality in HIT settings.
Identify common threats encountered when
using HIT.
Formulate strategies to minimize threats to
privacy, security, and confidentiality in HIT
systems.
2
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Working with Health IT Systems
Protecting Privacy, Security, and Confidentiality
in HIT SystemsLecture a
Electronic Health Information Risks
and Opportunities
Access to electronic vs. paper records
Public apprehension around digitization of
health information
Success of HIT systems depends on
ensuring patient privacy
Security can facilitate patient-centered
care
3
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Working with Health IT Systems
Protecting Privacy, Security, and Confidentiality
in HIT SystemsLecture a
Privacy, Confidentiality, Security
Defined
Privacy: patient is in control
Confidentiality: only authorized individuals
are allowed access
Security: controls/safeguards that ensure
confidentiality
4
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Working with Health IT Systems
Protecting Privacy, Security, and Confidentiality
in HIT SystemsLecture a
Security Management System
Standards
International Organization for
Standardization
(ISO) 27001
National Institute of Standards
(NIST) 800-53
Health Insurance Portability and
Accountability
Act (HIPAA)


5
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Working with Health IT Systems
Protecting Privacy, Security, and Confidentiality
in HIT SystemsLecture a
Health Insurance Portability and
Accountability Act (HIPAA) and Protected
Health Information (PHI)
Health Insurance Portability and Accountability Act of
1996
Privacy Rule (effective 2003)
Security Rule (effective 2005)
HITECH Act of 2009
Civil and criminal penalties
6
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Working with Health IT Systems
Protecting Privacy, Security, and Confidentiality
in HIT SystemsLecture a
Patients Rights Under HIPAA
Under HIPAA , patients health information rights
include:
Right to access their health information
Right to an accounting of disclosures of their
health information
Right to correct or amend their health
information
Right to notice of privacy practices
Right to file a complaint

7
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Working with Health IT Systems
Protecting Privacy, Security, and Confidentiality
in HIT SystemsLecture a
Types of Security Safeguards
Administrative Safeguards
Physical Safeguards
Technical Safeguards
8
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Working with Health IT Systems
Protecting Privacy, Security, and Confidentiality
in HIT SystemsLecture a
Administrative Safeguards
Security Management
Process
Risk Analysis
Risk Management
Sanction Policy
System Activity
Review



9
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Working with Health IT Systems
Protecting Privacy, Security, and Confidentiality
in HIT SystemsLecture a
Administrative Safeguards
Assigned Security Responsibility
Security officer







10
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Working with Health IT Systems
Protecting Privacy, Security, and Confidentiality
in HIT SystemsLecture a
Administrative Safeguards
Workforce Security, Information Access
Management
Who can and who cannot have access
Who determines who can have access and
how
Employee turnover
Contractors
User roles

11
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Working with Health IT Systems
Protecting Privacy, Security, and Confidentiality
in HIT SystemsLecture a
Administrative Safeguards
Security Awareness and Training
Training
Security reminders
Log-in monitoring
Password management

12
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Working with Health IT Systems
Protecting Privacy, Security, and Confidentiality
in HIT SystemsLecture a
Administrative Safeguards
Security Incident Procedures
Contingency Plan
Data backup
Disaster recovery
Emergency operation plan
13
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Working with Health IT Systems
Protecting Privacy, Security, and Confidentiality
in HIT SystemsLecture a
Courtesy of the US Centers for Disease Control and Prevention
Administrative Safeguards
Evaluation
Business Associate Agreements





14
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Working with Health IT Systems
Protecting Privacy, Security, and Confidentiality
in HIT SystemsLecture a
Protecting Privacy, Security, and
Confidentiality in HIT Systems
SummaryLecture a
Privacy, security, and confidentiality in HIT
settings
Common threats encountered when using
HIT
Strategies to minimize threats to privacy,
security, and
confidentiality in
HIT systems






15
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Working with Health IT Systems
Protecting Privacy, Security, and Confidentiality
in HIT SystemsLecture a
Protecting Privacy, Security, and
Confidentiality in HIT Systems
ReferencesLecture a
References
The Nationwide Privacy and Security Framework for Electronic Exchange of Individually Identifiable Health
Information. c2008. Available from:
http://healthit.hhs.gov/portal/server.pt/gateway/PTARGS_0_10731_848088_0_0_18/NationwidePS_Framework-
5.pdf

Images
Slide 5: Cover Sheet from an National Institute of Standards and Technology (NIST) Information Security
Document. Courtesy National Institute of Standards (NIST).
Slide 9: Nationwide Privacy and Security Framework for Electronic Exchange of Individually Identifiable Health
Information. 2008. Available from:
http://healthit.hhs.gov/portal/server.pt/gateway/PTARGS_0_10731_848088_0_0_18/NationwidePS_Framework-5.pdf
Slide 10: Security Operations in Action. Courtesy Centers for Disease Control.
Slide 11: A New ISIS Video Camera. Courtesy Department of Homeland Security. Available from:
http://www.dhs.gov/files/programs/gc_1273160563362.shtmI
Slide 12: A Regularly Scheduled Security Awareness Training Session. Image courtesy CDC.
Slide 13: Symposium on Diversity, Leadership Development and Succession Planning at the CDC. Courtesy
CDC.
Slide 14: Doctor Looking Through Medical Records. Courtesy HHS.
Slide 15: Centers for Disease Controls Activity Lead for the Division of Specialized Media, Pete Seidel. Courtesy
CDC.


16
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Working with Health IT Systems
Protecting Privacy, Security, and Confidentiality
in HIT SystemsLecture a

Anda mungkin juga menyukai