SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Adequacy of data protection in total hospital information system (THIS); THE MALAYSIAN STORY By Noriswadi Ismail Doctoral Researcher in RFID, Data Protection & Privacy MARA Scholar &  HeLEX Academic Visitor  (1st August 2011 – 19th August 2011)
Executive Summary ::: Introduction ::: THIS Brief Background ::: Research Methodology ::: PDPA 2010 ::: 7 Data Protection Principles ::: Observations ::: Interim recommendation ::: Conclusion ::: References
Introduction
Introduction 10th Malaysian Plan (2010-2014) ::: Transforming delivery of the healthcare system (Streamlining regulatory and service provision rules, reviewing legislation and regulations & review financing options); ::: Increasing quality, capacity and coverage of the healthcare infrastructure (Expanding primary care services, strengthening secondary and tertiary care services and improving provision of healthcare services);  ::: Shifting towards wellness and disease prevention, rather than treatment (Expanding the healthy lifestyle campaign and encouraging healthy and active lifestyle); and ::: Increasing the quality of human resources for health
THIS Brief Background ::: Integrated and comprehensive information system that manages, processes and retains all data relating to administrative, financial and clinical ::: Dr. Rasiah S., “…Electronic Information System that supports the core business of patient care which enables and facilitates the functions in fulfilling its services…” Source: New Generation Hospitals – IT hospitals, Malaysia’s Health 2005, Ministry of Health, pp 177-186.
THIS Brief Background Source: Dr. Nor Bizura Abdul Hamid, Planning and Development Division, Ministry of Health, “HIS – Malaysian Experience” presentation slides,  pages 3-5 of 37
THIS Brief Background Source: Dr. Nor Bizura Abdul Hamid, Planning and Development Division, Ministry of Health, “HIS – Malaysian Experience” presentation slides,  page 25 of 37
THIS Brief Background(Application Architecture)  Source: Dr Saadon Ibrahim,  Privilege Management and Access Controls in HIS Hospitals, Clinical Information Technology Coordinator, Hospital Sultan Ismail, Malaysia,  MSC Malaysia IHE Education Session 3/09, Electronic Health Record Privacy, Slide 10 of 47.
Research Methodology ::: Literature Review:Journals and policy papers ( 1st August – 19th August 2011) ::: Observations: Malaysian Personal Data Protection Act 2010 (25th July 2011 – 19th August 2011) ::: Qualitative: Semi-structured interview with focused groups – IT Service Providers, Doctors, IT Team, Patients and Users (January 2012-February 2012)
Research Methodology ::: Limitation: Most of the literature materials are in medical informatics and information system. Lack of legal materials and multidisciplinary materials on the same (especially on local content – Malaysia’s regime/contour)
PDPA 2010 Transborder Data flow? Full / Partial Independence? Data User Forum
*Exemptions ,[object Object]
* Processed for prevention or detection of crime or for the purpose of investigations;
* The apprehension or prosecution of offenders;
The assessment or collection of any tax or any other imposition of a similar nature;
* Processed in relation to information of the physical or mental health of a data subject;
* Processed for preparing statistics or carrying out research;
* Processed for the purpose of or in connection with any order or judgment of a court;
Processed for the purpose of discharging regulatory functions; and
* Processed only for journalistic, literary or artistic purposes,[object Object]
Observations ::: Actors in action: Ministry of Health officials, doctors, consultants (local or foreign), patients (local or foreign), third parties (vendors, contractors, service providers and sub-contractors) ::: Many actors, different liabilities ::: Exemption: Ministry of Health officials, Federal and State Government doctors – leads to uncertainty in comprehensively applying the PDPA 201 although these actors are dealing directly with patients (as data subjects) and consultants
Observations ::: Consultants: How their relationship is defined in THIS? ::: Patients: How secured the patients’ personal sensitive data are processed, managed and retained throughout THIS? What happens to the data of demised patients? Who owns it? And whether PDPA 2010 addresses the period of retention on the same? ::: Third parties: Is contractual obligations suffice?
Observations ::: Transfer of doctors/patients: Whethersuch transfers reach the adequacy level within the PDPA 2010  - is/are yet to be tested. ::: Secondary Opinion: Whether seeking such secondary opinion outside Malaysia deemed to be adequate under the PDPA 2010 -  is yet to be tested :::Transborder data flow: Whether such transborder data flow from a Malaysian hospital to another hospital deemed to be regarded as commercial transaction – is yet to be tested
Observations ::: THIS dilemma 1:Different hospitals, different service providers (system integrators) – Standardisation challenge ::: THIS dilemma 2: Different policies on the integrated systems, and different levels of information security & privilege access – privilege management ::: THIS dilemma 3: At least, there are 3-4 parties involved in a specific application architecture. A back-to-back arrangement on data protection & privacy compliance is technically sophisticated
Interim recommendation ‘360 degree data health check’

Weitere ähnliche Inhalte

Was ist angesagt?

Highlights of the Singapore Personal Data Protection Act 2012
Highlights of the Singapore Personal Data Protection Act 2012Highlights of the Singapore Personal Data Protection Act 2012
Highlights of the Singapore Personal Data Protection Act 2012Fuji Xerox Singapore
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection ActYizi
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection ActSaimaRafiq
 
Guide to-the-general-data-protection-regulation
Guide to-the-general-data-protection-regulationGuide to-the-general-data-protection-regulation
Guide to-the-general-data-protection-regulationN N
 
Personal data protection bill
Personal data protection bill Personal data protection bill
Personal data protection bill Mathew Chacko
 
The 22nd Legal Forum Seminar (Nov 2021)
The 22nd Legal Forum Seminar (Nov 2021)The 22nd Legal Forum Seminar (Nov 2021)
The 22nd Legal Forum Seminar (Nov 2021)LawPlus Ltd.
 
Merit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data ProtectionMerit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data Protectionmeritnorthwest
 
Update on Laws and Practices 2020
Update on Laws and Practices 2020Update on Laws and Practices 2020
Update on Laws and Practices 2020LawPlus Ltd.
 
Data protection act
Data protection act Data protection act
Data protection act Iqbal Bocus
 
Data protection ppt
Data protection pptData protection ppt
Data protection pptgrahamwell
 
Saying "I Don't": the requirement of data subject consent for purposes of dat...
Saying "I Don't": the requirement of data subject consent for purposes of dat...Saying "I Don't": the requirement of data subject consent for purposes of dat...
Saying "I Don't": the requirement of data subject consent for purposes of dat...Werksmans Attorneys
 
Practical steps to take in preparation for the Protection of Personal Informa...
Practical steps to take in preparation for the Protection of Personal Informa...Practical steps to take in preparation for the Protection of Personal Informa...
Practical steps to take in preparation for the Protection of Personal Informa...Werksmans Attorneys
 
Startups - data protection
Startups  - data protectionStartups  - data protection
Startups - data protectionMathew Chacko
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theftAmber Gupta
 
Safety And Security Of Data 4
Safety And Security Of Data 4Safety And Security Of Data 4
Safety And Security Of Data 4Wynthorpe
 
Key Issues on the new General Data Protection Regulation
Key Issues on the new General Data Protection RegulationKey Issues on the new General Data Protection Regulation
Key Issues on the new General Data Protection RegulationOlivier Vandeputte
 
Personal Data Protection Bill 2018
Personal Data Protection Bill 2018Personal Data Protection Bill 2018
Personal Data Protection Bill 2018Nanda Mohan Shenoy
 

Was ist angesagt? (20)

Highlights of the Singapore Personal Data Protection Act 2012
Highlights of the Singapore Personal Data Protection Act 2012Highlights of the Singapore Personal Data Protection Act 2012
Highlights of the Singapore Personal Data Protection Act 2012
 
PDPA 2010 (part 2) - What's Next?
PDPA 2010 (part 2) - What's Next?PDPA 2010 (part 2) - What's Next?
PDPA 2010 (part 2) - What's Next?
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
Guide to-the-general-data-protection-regulation
Guide to-the-general-data-protection-regulationGuide to-the-general-data-protection-regulation
Guide to-the-general-data-protection-regulation
 
Pdpa(kewal)
Pdpa(kewal)Pdpa(kewal)
Pdpa(kewal)
 
Personal data protection bill
Personal data protection bill Personal data protection bill
Personal data protection bill
 
The 22nd Legal Forum Seminar (Nov 2021)
The 22nd Legal Forum Seminar (Nov 2021)The 22nd Legal Forum Seminar (Nov 2021)
The 22nd Legal Forum Seminar (Nov 2021)
 
Merit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data ProtectionMerit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data Protection
 
Popi act presentation
Popi act presentationPopi act presentation
Popi act presentation
 
Update on Laws and Practices 2020
Update on Laws and Practices 2020Update on Laws and Practices 2020
Update on Laws and Practices 2020
 
Data protection act
Data protection act Data protection act
Data protection act
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Saying "I Don't": the requirement of data subject consent for purposes of dat...
Saying "I Don't": the requirement of data subject consent for purposes of dat...Saying "I Don't": the requirement of data subject consent for purposes of dat...
Saying "I Don't": the requirement of data subject consent for purposes of dat...
 
Practical steps to take in preparation for the Protection of Personal Informa...
Practical steps to take in preparation for the Protection of Personal Informa...Practical steps to take in preparation for the Protection of Personal Informa...
Practical steps to take in preparation for the Protection of Personal Informa...
 
Startups - data protection
Startups  - data protectionStartups  - data protection
Startups - data protection
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theft
 
Safety And Security Of Data 4
Safety And Security Of Data 4Safety And Security Of Data 4
Safety And Security Of Data 4
 
Key Issues on the new General Data Protection Regulation
Key Issues on the new General Data Protection RegulationKey Issues on the new General Data Protection Regulation
Key Issues on the new General Data Protection Regulation
 
Personal Data Protection Bill 2018
Personal Data Protection Bill 2018Personal Data Protection Bill 2018
Personal Data Protection Bill 2018
 

Andere mochten auch

Complying with Singapore Personal Data Protection Act - A Practical Guide
Complying with Singapore Personal Data Protection Act - A Practical GuideComplying with Singapore Personal Data Protection Act - A Practical Guide
Complying with Singapore Personal Data Protection Act - A Practical GuideDaniel Li
 
Personal data Protection Act Singapore How-to Perform Assessment
Personal data Protection Act Singapore How-to Perform AssessmentPersonal data Protection Act Singapore How-to Perform Assessment
Personal data Protection Act Singapore How-to Perform AssessmentJean Luc Creppy
 
Dirección administrativa
Dirección administrativa Dirección administrativa
Dirección administrativa ivanna mora
 
1430 mr andrew fung insights from tafep’s initiatives and research on effec...
1430 mr andrew fung   insights from tafep’s initiatives and research on effec...1430 mr andrew fung   insights from tafep’s initiatives and research on effec...
1430 mr andrew fung insights from tafep’s initiatives and research on effec...Age Friendly Workforce Asia
 
Employment Fair Fg Presentation(5)
Employment Fair Fg Presentation(5)Employment Fair Fg Presentation(5)
Employment Fair Fg Presentation(5)theemployer
 
Outsourcing and transfer of personal data - Titta Penttilä - TeliaSonera
Outsourcing and transfer of personal data - Titta Penttilä - TeliaSoneraOutsourcing and transfer of personal data - Titta Penttilä - TeliaSonera
Outsourcing and transfer of personal data - Titta Penttilä - TeliaSoneraSonera
 
Cybercrime Court Decisions from Latin America - Legal and Policy Developments...
Cybercrime Court Decisions from Latin America - Legal and Policy Developments...Cybercrime Court Decisions from Latin America - Legal and Policy Developments...
Cybercrime Court Decisions from Latin America - Legal and Policy Developments...Cédric Laurant
 
Personal Data Protection for your Church
Personal Data Protection for your ChurchPersonal Data Protection for your Church
Personal Data Protection for your ChurchBenjamin Ck Ang
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacylgcdcpas
 
Lecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud ComputingLecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud Computingragibhasan
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Gohsuke Takama
 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingAnkit Singh
 
How to use Singapore Jobsbank (new regulations under the Fair Consideration F...
How to use Singapore Jobsbank (new regulations under the Fair Consideration F...How to use Singapore Jobsbank (new regulations under the Fair Consideration F...
How to use Singapore Jobsbank (new regulations under the Fair Consideration F...33 Talent
 

Andere mochten auch (15)

Complying with Singapore Personal Data Protection Act - A Practical Guide
Complying with Singapore Personal Data Protection Act - A Practical GuideComplying with Singapore Personal Data Protection Act - A Practical Guide
Complying with Singapore Personal Data Protection Act - A Practical Guide
 
Personal data Protection Act Singapore How-to Perform Assessment
Personal data Protection Act Singapore How-to Perform AssessmentPersonal data Protection Act Singapore How-to Perform Assessment
Personal data Protection Act Singapore How-to Perform Assessment
 
Dirección administrativa
Dirección administrativa Dirección administrativa
Dirección administrativa
 
1430 mr andrew fung insights from tafep’s initiatives and research on effec...
1430 mr andrew fung   insights from tafep’s initiatives and research on effec...1430 mr andrew fung   insights from tafep’s initiatives and research on effec...
1430 mr andrew fung insights from tafep’s initiatives and research on effec...
 
Employment Fair Fg Presentation(5)
Employment Fair Fg Presentation(5)Employment Fair Fg Presentation(5)
Employment Fair Fg Presentation(5)
 
Outsourcing and transfer of personal data - Titta Penttilä - TeliaSonera
Outsourcing and transfer of personal data - Titta Penttilä - TeliaSoneraOutsourcing and transfer of personal data - Titta Penttilä - TeliaSonera
Outsourcing and transfer of personal data - Titta Penttilä - TeliaSonera
 
Cybercrime Court Decisions from Latin America - Legal and Policy Developments...
Cybercrime Court Decisions from Latin America - Legal and Policy Developments...Cybercrime Court Decisions from Latin America - Legal and Policy Developments...
Cybercrime Court Decisions from Latin America - Legal and Policy Developments...
 
Personal Data Protection for your Church
Personal Data Protection for your ChurchPersonal Data Protection for your Church
Personal Data Protection for your Church
 
Ethics and information security 2
Ethics and information security 2Ethics and information security 2
Ethics and information security 2
 
Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacy
 
Lecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud ComputingLecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud Computing
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud Computing
 
How to use Singapore Jobsbank (new regulations under the Fair Consideration F...
How to use Singapore Jobsbank (new regulations under the Fair Consideration F...How to use Singapore Jobsbank (new regulations under the Fair Consideration F...
How to use Singapore Jobsbank (new regulations under the Fair Consideration F...
 

Ähnlich wie Adequacy of Data Protection in Malaysian Hospital Systems

A Journey Toward National eHealth: Thailand's Case
A Journey Toward National eHealth: Thailand's CaseA Journey Toward National eHealth: Thailand's Case
A Journey Toward National eHealth: Thailand's CaseNawanan Theera-Ampornpunt
 
RHIS3rd year regular generic HI (1).pptx
RHIS3rd year regular generic HI (1).pptxRHIS3rd year regular generic HI (1).pptx
RHIS3rd year regular generic HI (1).pptxEyobAlemu11
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Integrating openIMIS in the Undergraduate and Postgraduate Medical Curriculum
Integrating openIMIS in the Undergraduate and Postgraduate Medical CurriculumIntegrating openIMIS in the Undergraduate and Postgraduate Medical Curriculum
Integrating openIMIS in the Undergraduate and Postgraduate Medical CurriculumIris Thiele Isip-Tan
 
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docxPSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docxwoodruffeloisa
 
Demzy_CIT 403_Seminar on e-Health
Demzy_CIT 403_Seminar on e-HealthDemzy_CIT 403_Seminar on e-Health
Demzy_CIT 403_Seminar on e-HealthDemzy George
 
151-164Dr.Md.KamalHussainksa.pdf
151-164Dr.Md.KamalHussainksa.pdf151-164Dr.Md.KamalHussainksa.pdf
151-164Dr.Md.KamalHussainksa.pdfUmarFarouq29
 
IRJET- A System for Complete Healthcare Management: Ask-Us-Health A Secon...
IRJET-  	  A System for Complete Healthcare Management: Ask-Us-Health A Secon...IRJET-  	  A System for Complete Healthcare Management: Ask-Us-Health A Secon...
IRJET- A System for Complete Healthcare Management: Ask-Us-Health A Secon...IRJET Journal
 
Applications of Data Science in Healthcare
Applications of Data Science in HealthcareApplications of Data Science in Healthcare
Applications of Data Science in HealthcareBrijitSaraJoseph
 
Security & Privacy - Lecture E
Security & Privacy - Lecture ESecurity & Privacy - Lecture E
Security & Privacy - Lecture ECMDLearning
 
Care.data 17 09-13
Care.data 17 09-13Care.data 17 09-13
Care.data 17 09-13howch1961
 
21st Century Act and its Impact on Healthcare IT
21st Century Act and its Impact on Healthcare IT21st Century Act and its Impact on Healthcare IT
21st Century Act and its Impact on Healthcare ITCitiusTech
 
Mapping the transition of the Catalan Health system to Network Society. A wor...
Mapping the transition of the Catalan Health system to Network Society. A wor...Mapping the transition of the Catalan Health system to Network Society. A wor...
Mapping the transition of the Catalan Health system to Network Society. A wor...Francisco Lupiáñez-Villanueva
 
eHealth: The Next Building Block for Thailand's Healthcare System
eHealth: The Next Building Block for Thailand's Healthcare SystemeHealth: The Next Building Block for Thailand's Healthcare System
eHealth: The Next Building Block for Thailand's Healthcare SystemNawanan Theera-Ampornpunt
 

Ähnlich wie Adequacy of Data Protection in Malaysian Hospital Systems (20)

Roles and Direction of mHealth
Roles and Direction of mHealthRoles and Direction of mHealth
Roles and Direction of mHealth
 
A Journey Toward National eHealth: Thailand's Case
A Journey Toward National eHealth: Thailand's CaseA Journey Toward National eHealth: Thailand's Case
A Journey Toward National eHealth: Thailand's Case
 
RHIS3rd year regular generic HI (1).pptx
RHIS3rd year regular generic HI (1).pptxRHIS3rd year regular generic HI (1).pptx
RHIS3rd year regular generic HI (1).pptx
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Integrating openIMIS in the Undergraduate and Postgraduate Medical Curriculum
Integrating openIMIS in the Undergraduate and Postgraduate Medical CurriculumIntegrating openIMIS in the Undergraduate and Postgraduate Medical Curriculum
Integrating openIMIS in the Undergraduate and Postgraduate Medical Curriculum
 
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docxPSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx
 
Demzy_CIT 403_Seminar on e-Health
Demzy_CIT 403_Seminar on e-HealthDemzy_CIT 403_Seminar on e-Health
Demzy_CIT 403_Seminar on e-Health
 
Unleashing the Benefits of a National EHR
Unleashing the Benefits of a National EHRUnleashing the Benefits of a National EHR
Unleashing the Benefits of a National EHR
 
151-164Dr.Md.KamalHussainksa.pdf
151-164Dr.Md.KamalHussainksa.pdf151-164Dr.Md.KamalHussainksa.pdf
151-164Dr.Md.KamalHussainksa.pdf
 
IRJET- A System for Complete Healthcare Management: Ask-Us-Health A Secon...
IRJET-  	  A System for Complete Healthcare Management: Ask-Us-Health A Secon...IRJET-  	  A System for Complete Healthcare Management: Ask-Us-Health A Secon...
IRJET- A System for Complete Healthcare Management: Ask-Us-Health A Secon...
 
CLINICAL INFORMATICS ppt
CLINICAL INFORMATICS pptCLINICAL INFORMATICS ppt
CLINICAL INFORMATICS ppt
 
Applications of Data Science in Healthcare
Applications of Data Science in HealthcareApplications of Data Science in Healthcare
Applications of Data Science in Healthcare
 
His
HisHis
His
 
Security & Privacy - Lecture E
Security & Privacy - Lecture ESecurity & Privacy - Lecture E
Security & Privacy - Lecture E
 
Care.data 17 09-13
Care.data 17 09-13Care.data 17 09-13
Care.data 17 09-13
 
21st Century Act and its Impact on Healthcare IT
21st Century Act and its Impact on Healthcare IT21st Century Act and its Impact on Healthcare IT
21st Century Act and its Impact on Healthcare IT
 
Mapping the transition of the Catalan Health system to Network Society. A wor...
Mapping the transition of the Catalan Health system to Network Society. A wor...Mapping the transition of the Catalan Health system to Network Society. A wor...
Mapping the transition of the Catalan Health system to Network Society. A wor...
 
eHealth: The Next Building Block for Thailand's Healthcare System
eHealth: The Next Building Block for Thailand's Healthcare SystemeHealth: The Next Building Block for Thailand's Healthcare System
eHealth: The Next Building Block for Thailand's Healthcare System
 
Relationship Between RHIS and HSS
Relationship Between RHIS and HSSRelationship Between RHIS and HSS
Relationship Between RHIS and HSS
 
his.pdf
his.pdfhis.pdf
his.pdf
 

Kürzlich hochgeladen

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 

Kürzlich hochgeladen (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 

Adequacy of Data Protection in Malaysian Hospital Systems

  • 1. Adequacy of data protection in total hospital information system (THIS); THE MALAYSIAN STORY By Noriswadi Ismail Doctoral Researcher in RFID, Data Protection & Privacy MARA Scholar & HeLEX Academic Visitor (1st August 2011 – 19th August 2011)
  • 2. Executive Summary ::: Introduction ::: THIS Brief Background ::: Research Methodology ::: PDPA 2010 ::: 7 Data Protection Principles ::: Observations ::: Interim recommendation ::: Conclusion ::: References
  • 4. Introduction 10th Malaysian Plan (2010-2014) ::: Transforming delivery of the healthcare system (Streamlining regulatory and service provision rules, reviewing legislation and regulations & review financing options); ::: Increasing quality, capacity and coverage of the healthcare infrastructure (Expanding primary care services, strengthening secondary and tertiary care services and improving provision of healthcare services); ::: Shifting towards wellness and disease prevention, rather than treatment (Expanding the healthy lifestyle campaign and encouraging healthy and active lifestyle); and ::: Increasing the quality of human resources for health
  • 5. THIS Brief Background ::: Integrated and comprehensive information system that manages, processes and retains all data relating to administrative, financial and clinical ::: Dr. Rasiah S., “…Electronic Information System that supports the core business of patient care which enables and facilitates the functions in fulfilling its services…” Source: New Generation Hospitals – IT hospitals, Malaysia’s Health 2005, Ministry of Health, pp 177-186.
  • 6. THIS Brief Background Source: Dr. Nor Bizura Abdul Hamid, Planning and Development Division, Ministry of Health, “HIS – Malaysian Experience” presentation slides, pages 3-5 of 37
  • 7. THIS Brief Background Source: Dr. Nor Bizura Abdul Hamid, Planning and Development Division, Ministry of Health, “HIS – Malaysian Experience” presentation slides, page 25 of 37
  • 8. THIS Brief Background(Application Architecture) Source: Dr Saadon Ibrahim, Privilege Management and Access Controls in HIS Hospitals, Clinical Information Technology Coordinator, Hospital Sultan Ismail, Malaysia, MSC Malaysia IHE Education Session 3/09, Electronic Health Record Privacy, Slide 10 of 47.
  • 9. Research Methodology ::: Literature Review:Journals and policy papers ( 1st August – 19th August 2011) ::: Observations: Malaysian Personal Data Protection Act 2010 (25th July 2011 – 19th August 2011) ::: Qualitative: Semi-structured interview with focused groups – IT Service Providers, Doctors, IT Team, Patients and Users (January 2012-February 2012)
  • 10. Research Methodology ::: Limitation: Most of the literature materials are in medical informatics and information system. Lack of legal materials and multidisciplinary materials on the same (especially on local content – Malaysia’s regime/contour)
  • 11. PDPA 2010 Transborder Data flow? Full / Partial Independence? Data User Forum
  • 12.
  • 13. * Processed for prevention or detection of crime or for the purpose of investigations;
  • 14. * The apprehension or prosecution of offenders;
  • 15. The assessment or collection of any tax or any other imposition of a similar nature;
  • 16. * Processed in relation to information of the physical or mental health of a data subject;
  • 17. * Processed for preparing statistics or carrying out research;
  • 18. * Processed for the purpose of or in connection with any order or judgment of a court;
  • 19. Processed for the purpose of discharging regulatory functions; and
  • 20.
  • 21. Observations ::: Actors in action: Ministry of Health officials, doctors, consultants (local or foreign), patients (local or foreign), third parties (vendors, contractors, service providers and sub-contractors) ::: Many actors, different liabilities ::: Exemption: Ministry of Health officials, Federal and State Government doctors – leads to uncertainty in comprehensively applying the PDPA 201 although these actors are dealing directly with patients (as data subjects) and consultants
  • 22. Observations ::: Consultants: How their relationship is defined in THIS? ::: Patients: How secured the patients’ personal sensitive data are processed, managed and retained throughout THIS? What happens to the data of demised patients? Who owns it? And whether PDPA 2010 addresses the period of retention on the same? ::: Third parties: Is contractual obligations suffice?
  • 23. Observations ::: Transfer of doctors/patients: Whethersuch transfers reach the adequacy level within the PDPA 2010 - is/are yet to be tested. ::: Secondary Opinion: Whether seeking such secondary opinion outside Malaysia deemed to be adequate under the PDPA 2010 - is yet to be tested :::Transborder data flow: Whether such transborder data flow from a Malaysian hospital to another hospital deemed to be regarded as commercial transaction – is yet to be tested
  • 24. Observations ::: THIS dilemma 1:Different hospitals, different service providers (system integrators) – Standardisation challenge ::: THIS dilemma 2: Different policies on the integrated systems, and different levels of information security & privilege access – privilege management ::: THIS dilemma 3: At least, there are 3-4 parties involved in a specific application architecture. A back-to-back arrangement on data protection & privacy compliance is technically sophisticated
  • 25. Interim recommendation ‘360 degree data health check’
  • 26. Interim recommendation ::: Rationale 1: To be able to understand the inter-relationship ::: Rationale 2: To be able to assess the limitations ::: Rationale 3: To be able to recommend workable information governance model for THIS
  • 27. Interim recommendation ::: How to achieve this?: Pilot interview and semi-structured interview (qualitative) ::: Expected period of outcome: By the fourth quarter of 2011 or the latest, first quarter of 2012. ::: Dissemination strategy: Publication in the Malaysian Journal of Public Health and series of workshops & presentations before the Ministry of Health: Expected by first quarter of 2012.
  • 28. References Articles & Policy Papers Dr. Nor Bizura Abdul Hamid of Planning and Development Division, Ministry of Health Malaysia’s presentation on Hospital Information System – Malaysian Experience Dr. Saadon Ibrahim of Clinical Information Technology Coordinator, Hospital Sultan Ismail Malaysia’s presentation on Privilege Management and Access Control in HIS hospitals Economic Transformation Programme – A Roadmap for Malaysia, Chapter 16, healthcare (p1-36) Ganthan Narayana Samy, Rabiah Ahmad and Zuraini Ismail, Threats to Health Information Security, Journal of Information Assurance and Security 5 (2010) 146-153 Health Facts 2009, Health Informatics Centre, Planning and Development Division Ministry of Health Malaysia (July 2010) Sapiah Sulaiman and Rose Alinda Alias, Information Ethics in Malaysia paperless Hospital, Proceedings of the Postgraduate Annual Research Seminar 2006 Suhaila Samsuri, Rabiah Ahmad and Zuraini Ismail, Towards Implementing a Privacy Policy: An Observation on Existing Practices in Hospital Information System, Journal of e-health Management, Vol. 2011 (2011), Article ID345834. The 10th Malaysian Plan (2010-2014)
  • 29. References Book Abu Bakar Munir & Siti Hajar Yasin, Personal Data Protection in Malaysia, Law and Practice, Sweet & Maxwell Asia (2010) Websites MSC Malaysia <www.mscmalaysia.my> PEMANDU, Economic Transformation Programme <http://etp.pemandu.gov.my/> Ministry of Health Malaysia <http://www.moh.gov.my/> Malaysia Health Fact 2009 <http://www.moh.gov.my/images/gallery/stats/heal_fact/healthfact-P_2009.pdf>
  • 30. Conclusion It is hoped that the impact of this research will be able to address the application of PDPA 2010 within the Total Hospital Information System (THIS). It is also hoped that the outcome of dissemination shall become a blueprint headway to responding any potential issues relating to data protection and privacy compliance in Malaysia’s healthcare.
  • 31.
  • 32. Thank YouE: <noriswadi@gmail.com> &<noris@qconsultant.com>