SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Introduction to Computer Science
Security and Privacy
Lecture e
This material (Comp 4 Unit 7) was developed by Oregon Health & Science University, funded by the Department
of Health and Human Services, Office of the National Coordinator for Health Information Technology under
Award Number 90WT0001.
This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International
License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/4.0/.
Security and Privacy
Learning Objectives - 1
• Define cybercrime and cybersecurity
(Lecture a)
• List common information technology (IT)
security and privacy concerns (Lecture a)
• List hardware components that are usually
attacked by the hackers (Lecture a)
• Explain some of the common methods of
attack (Lecture b)
2
Security and Privacy
Learning Objectives - 2
• Describe common types of malware
(Lecture b)
• Explain social engineering methods used
by cybercriminals (Lecture b)
• Describe methods and tools available for
protection against cyberattacks (Lecture c)
• Describe practices designed to minimize
the risk of successful cyberattack
(Lecture d)
3
Security and Privacy
Learning Objectives - 3
• Address specifics of wireless device
security (Lecture d)
• Explain security and privacy concerns
associated with EHRs (Lecture e)
• Describe security safeguards used for
health care applications (Lecture e)
• Provide the basics of ethical behavior
online (Lecture e)
4
Health Care
Applications and Security
• U.S. Government’s stated goal:
– Most Americans to have access to electronic
health records (EHRs) by 2014
• Why EHRs?
– Improve quality of care
– Decrease cost
– Ensure privacy and security
• Outsourcing introduces risk
– Countries with different cultural values and EHR
regulations
5
Health Record Security Concerns
• Incorrect health data recorded
• Job discrimination
• Personal privacy violated
• Sharing of data between providers adds
risk
• Use of Internet always introduces risk
6
What is an EHR System?
• Collection of health data about the
business, patients, doctors, nurses
• Health data stored as records in database
system
• Records represent a complete event
– Example:
o A patient’s personal information
o Reason for office visit
o Tests ordered and their results
7
EHRs are… 1
• Used and maintained by health care
providers
• Covered by Health Insurance Portability
and Accountability Act (HIPAA) rules
• Centralized database systems used to
integrate patient intake, medical care,
pharmacy, and billing into one system
8
EHRs are… 2
• Used to send data over the Internet when
departments/entities are not in same
physical location
• Accessible by individual patient
9
EHR Security Q & A - 1
• How is data sent over the Internet?
– It should be sent in an encrypted, secure
manner over the Internet
• Is my personal data safe?
– Much depends on each organization’s
physical record and network security practices
– No data is 100% secure against theft or
misuse
10
EHR Security Q & A - 2
• Who can view my health records?
– Only those who need to know or view the
contents of a health record should be able to
view it
o Patient must authorize all other access
11
Federal Rules Emerge
• HIPAA enacted in 1996
• HIPAA establishes privacy and security
standards established for:
– Health care providers
– Health insurance companies
– Care clearinghouses (organizations that
translate claims data in to and out of HIPAA-
standard format)
12
HIPAA and Privacy
• Privacy Rule
– Requires those covered to provide patients a
“Notice of Privacy Practices” when care is first
provided
– Covers paper and electronic private health
information
• Security Rule
– Covers administrative, physical, and technical
data safeguards that secure electronic health
record data
13
What is Privacy?
• Most privacy laws revolves around privacy
between a person and the government
• “The law of privacy regulates the type of
information which may be collected and
how this information may be used and
stored.”
Wikipedia, 2016
• Privacy relates to people.
14
What is Confidentiality?
• “Confidentiality is commonly applied to
conversations between doctors and patients.
Legal protections prevent physicians from
revealing certain discussions with patients,
even under oath in court. The rule only
applies to secrets shared between physician
and patient during the course of providing
medical care.”
Wikipedia. 2016
• Confidentiality relates to data
15
Steps to Secure EHR - 1
• Authenticate and authorize ALL record
access
– Only those who “need to know” can view
– Only pertinent people can change records
– Limit who can print electronic documents
– All views and changes recorded for audit trail
16
Steps to Secure EHR - 2
• Examples:
– A clerk can view the dates and charges
related to an office visit but nothing about
treatment
– Nurses and doctors can view medical records
only for patients under their direct care
• Security outlines the structure to enforce
privacy and security
17
Steps to Secure EHR - 3
• Device security
– Apply operating system critical updates
immediately
– Install current Anti-virus definitions
– Restrict physical access to servers
– Allow only authenticated device access
18
Steps to Secure EHR - 4
• Secure electronic communications
– Encrypt all EHR communications
– Client-server environment
– Configure user accounts and groups
– Implement network access protection
mechanisms
19
Steps to Secure EHR - 5
• Web environment considerations
– Implement HTTPS for all web transactions
– Validate all data entered into web forms
– Perform regular audits of access and changes
• Implement redundant devices
– Ensures that devices are available as
expected
– Load-balance heavily used hardware devices
20
Steps to Secure EHR - 6
• Prosecute security violations vigorously
• Backup EHR data with secure storage
21
Free Online PHR Systems
– PHRs maintained by individuals
– Some PHRs not covered by HIPAA rules
– Resources
o Microsoft HealthVault - www.healthvault.com/
o WebMD Health Manager -
http://www.webmd.com/phr
22
Ethical Behavior Online
• Mistakes Happens
• Need to Know vs. Want to Know
• Online Ratings
• Data Breaches
23
Security and Privacy
Summary – Lecture e
• Explained security and privacy concerns
associated with Electronic Health Records
(EHRs)
• Described security safeguards used for
health care applications
• Provided basics of ethical behavior when
online
24
Security and Privacy
Summary - 1
• Cybercrime and cybersecurity
• Common IT security and privacy concerns
• Hardware components usually attacked by
the hackers; common methods of attack
• Common types of malware
• Social engineering methods used by
cybercriminals
• Methods and tools available for protection
against cyberattacks
25
Security and Privacy
Summary - 2
• Practices designed to minimize the risk of
successful cyberattack
• Specifics of wireless device security
• Security and privacy concerns associated
with EHRs
• Security safeguards used for health care
applications
• Basics of ethical behavior online
26
Security and Privacy
References – 1 – Lecture e
References
Dyer, K. A. (2011, June 2). Ethical Challenges of Medicine and Health on the Internet: A
Review. Retrieved from http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1761893/
Greysen, S. (2010, July 15). Online Professionalism and the Mirror of Social Media.
Retrieved April 20, 2016, from http://link.springer.com/article/10.1007/s11606-010-
1447-1
Health and Human Services. HHS Announces Project to Help 3.6 Million Consumers
Reap Benefits of Electronic Health Records. [Internet]. 2010 [cited 2011 Nov 07].
Available from: http://www.hhs.gov/news/press/2007pres/10/pr20071030a.html.
Improving Ethics Quality in Health Care. (n.d.). Retrieved April 20, 2016, from
http://www.ethics.va.gov/elprimer.pdf
Informatics Professor, Meaningful Use: A Highly Useful Construct for Informatics.
[Internet]. 2010 May [cited 2011 Nov 07]. Available from:
http://informaticsprofessor.blogspot.com/2010/05/meaningful-use-highly-useful-
construct.html.
Kraus, R. (2004). Ethical and Legal Considerations for Providers of Mental Health
Services Online. In Online Counseling, 2nd ed.: A Handbook for Mental Health
Professionals. San Diego, CA: Elsevier Academic Press.
27
Security and Privacy
References – 2 – Lecture e
References
Wikipedia. Network security. [Internet]. 2010 [cited 2011 Nov 07]. Available from:
http://en.wikipedia.org/wiki/Network_security.
Wikipedia. Wireless security. [Internet]. 2010 [cited 2011 Nov 07]. Available from:
http://en.wikipedia.org/wiki/Wireless_security.
Wikipedia. Wireless LAN security. [Internet]. 2010 [cited 2011 Nov 07]. Available from:
http://en.wikipedia.org/wiki/Wireless_LAN_security.
Wikipedia. Electronic health record. [Internet]. 2010 [cited 2011 Nov 07]. Available from:
http://en.wikipedia.org/wiki/Electronic_health_record.
Wikipedia. Electronic medical record. [Internet]. 2010 [cited 2011 Nov 07]. Available from:
http://en.wikipedia.org/wiki/Electronic_medical_record.
28
Introduction Computer Science
Security and Privacy
Lecture e
This material was developed by Oregon
Health & Science University, funded by the
Department of Health and Human Services,
Office of the National Coordinator for Health
Information Technology under Award
Number 90WT0001.
29

Weitere ähnliche Inhalte

Was ist angesagt?

Health Database and Regulations in Taiwan (APrIGF2018)
Health Database and Regulations in Taiwan (APrIGF2018)Health Database and Regulations in Taiwan (APrIGF2018)
Health Database and Regulations in Taiwan (APrIGF2018)YingChu Chen
 
Information technology in health care management
Information technology in health care managementInformation technology in health care management
Information technology in health care managementmohamedmoosa2
 
Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServicePersonal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServiceYogeshIJTSRD
 
Safety of protected health information (phi)
Safety of protected health information (phi)Safety of protected health information (phi)
Safety of protected health information (phi)Josette Pribilla
 
HIPAA week1
HIPAA week1HIPAA week1
HIPAA week1wbryant1
 
Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)29535814851
 
connected Medical devices IoT Cybersecurity reference architecture Telemedicine
connected Medical devices IoT Cybersecurity reference architecture Telemedicineconnected Medical devices IoT Cybersecurity reference architecture Telemedicine
connected Medical devices IoT Cybersecurity reference architecture TelemedicineAlessandro Sappia
 
Telemedicine software platform for hospitals & healthcare providers an ul...
Telemedicine software platform for hospitals & healthcare providers an ul...Telemedicine software platform for hospitals & healthcare providers an ul...
Telemedicine software platform for hospitals & healthcare providers an ul...AndrewSebastian17
 
IRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical RecordsIRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical RecordsIRJET Journal
 
Medical device security_anirudh
Medical device security_anirudhMedical device security_anirudh
Medical device security_anirudhanirudh duggal
 
8.2 Demonstration Health - IT benifits - Bagmishika Puhan ( Session 8)
8.2   Demonstration Health - IT benifits - Bagmishika Puhan ( Session 8)8.2   Demonstration Health - IT benifits - Bagmishika Puhan ( Session 8)
8.2 Demonstration Health - IT benifits - Bagmishika Puhan ( Session 8)Apollo Hospitals Group and ATNF
 
IRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET Journal
 
Cybersécurité des dispositifs médicaux
Cybersécurité des dispositifs médicauxCybersécurité des dispositifs médicaux
Cybersécurité des dispositifs médicauxMarket iT
 

Was ist angesagt? (19)

Health Database and Regulations in Taiwan (APrIGF2018)
Health Database and Regulations in Taiwan (APrIGF2018)Health Database and Regulations in Taiwan (APrIGF2018)
Health Database and Regulations in Taiwan (APrIGF2018)
 
HIPAA Compliance
HIPAA ComplianceHIPAA Compliance
HIPAA Compliance
 
Hipaa
HipaaHipaa
Hipaa
 
Information technology in health care management
Information technology in health care managementInformation technology in health care management
Information technology in health care management
 
Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServicePersonal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud Service
 
Health Information Technology Workforce Development Program Presentation
Health Information Technology Workforce Development Program PresentationHealth Information Technology Workforce Development Program Presentation
Health Information Technology Workforce Development Program Presentation
 
Safety of protected health information (phi)
Safety of protected health information (phi)Safety of protected health information (phi)
Safety of protected health information (phi)
 
HIPAA week1
HIPAA week1HIPAA week1
HIPAA week1
 
Medical applications using io t
Medical applications using io tMedical applications using io t
Medical applications using io t
 
Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2
 
What is hipaa
What is hipaaWhat is hipaa
What is hipaa
 
connected Medical devices IoT Cybersecurity reference architecture Telemedicine
connected Medical devices IoT Cybersecurity reference architecture Telemedicineconnected Medical devices IoT Cybersecurity reference architecture Telemedicine
connected Medical devices IoT Cybersecurity reference architecture Telemedicine
 
Hi103 week 5 chpt 12
Hi103 week 5 chpt 12Hi103 week 5 chpt 12
Hi103 week 5 chpt 12
 
Telemedicine software platform for hospitals & healthcare providers an ul...
Telemedicine software platform for hospitals & healthcare providers an ul...Telemedicine software platform for hospitals & healthcare providers an ul...
Telemedicine software platform for hospitals & healthcare providers an ul...
 
IRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical RecordsIRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical Records
 
Medical device security_anirudh
Medical device security_anirudhMedical device security_anirudh
Medical device security_anirudh
 
8.2 Demonstration Health - IT benifits - Bagmishika Puhan ( Session 8)
8.2   Demonstration Health - IT benifits - Bagmishika Puhan ( Session 8)8.2   Demonstration Health - IT benifits - Bagmishika Puhan ( Session 8)
8.2 Demonstration Health - IT benifits - Bagmishika Puhan ( Session 8)
 
IRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor data
 
Cybersécurité des dispositifs médicaux
Cybersécurité des dispositifs médicauxCybersécurité des dispositifs médicaux
Cybersécurité des dispositifs médicaux
 

Ähnlich wie Security & Privacy - Lecture E

Comp8 unit6a lecture_slides
Comp8 unit6a lecture_slidesComp8 unit6a lecture_slides
Comp8 unit6a lecture_slidesCMDLMS
 
Standards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health RecordsStandards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health RecordsMEASURE Evaluation
 
Privacy, Confidentiality, and Security Lecture 3_slides
Privacy, Confidentiality, and Security Lecture 3_slidesPrivacy, Confidentiality, and Security Lecture 3_slides
Privacy, Confidentiality, and Security Lecture 3_slidesZakCooper1
 
Privacy, Confidentiality, and Security Lecture 4_slides
Privacy, Confidentiality, and Security Lecture 4_slidesPrivacy, Confidentiality, and Security Lecture 4_slides
Privacy, Confidentiality, and Security Lecture 4_slidesZakCooper1
 
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...Michigan Primary Care Association
 
HIPAA-HITECH-MU Simplified
HIPAA-HITECH-MU SimplifiedHIPAA-HITECH-MU Simplified
HIPAA-HITECH-MU SimplifiedGretchen Husted
 
Regulating Healthcare - Lecture D
Regulating Healthcare - Lecture DRegulating Healthcare - Lecture D
Regulating Healthcare - Lecture DCMDLearning
 
Modern Healthcare Information Technology
Modern Healthcare Information TechnologyModern Healthcare Information Technology
Modern Healthcare Information TechnologyJeffrey Paulette
 
Governance And Data Protection In The Health Sector - Billy Hawkes
Governance And Data Protection In The Health Sector - Billy HawkesGovernance And Data Protection In The Health Sector - Billy Hawkes
Governance And Data Protection In The Health Sector - Billy Hawkeshealthcareisi
 
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMBMeHealthCareSolutions
 
Trust and Governance in Health and Social Care
Trust and Governance in Health and Social Care Trust and Governance in Health and Social Care
Trust and Governance in Health and Social Care Napier University
 
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docxPSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docxwoodruffeloisa
 
Texting and e mail with patients 2020
Texting and e mail with patients 2020Texting and e mail with patients 2020
Texting and e mail with patients 2020RobertAByrdr
 
Privacy, Confidentiality, and Security_lecture 1_slides
Privacy, Confidentiality, and Security_lecture 1_slidesPrivacy, Confidentiality, and Security_lecture 1_slides
Privacy, Confidentiality, and Security_lecture 1_slidesZakCooper1
 
The Ethics of Digital Health
The Ethics of Digital HealthThe Ethics of Digital Health
The Ethics of Digital HealthMegan Ranney
 
Mha 690 discussion 2 Seynabou
Mha 690 discussion 2 SeynabouMha 690 discussion 2 Seynabou
Mha 690 discussion 2 SeynabouSeynaboundiaye
 

Ähnlich wie Security & Privacy - Lecture E (20)

Comp8 unit6a lecture_slides
Comp8 unit6a lecture_slidesComp8 unit6a lecture_slides
Comp8 unit6a lecture_slides
 
Standards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health RecordsStandards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health Records
 
HIPAA
HIPAAHIPAA
HIPAA
 
Privacy, Confidentiality, and Security Lecture 3_slides
Privacy, Confidentiality, and Security Lecture 3_slidesPrivacy, Confidentiality, and Security Lecture 3_slides
Privacy, Confidentiality, and Security Lecture 3_slides
 
Privacy, Confidentiality, and Security Lecture 4_slides
Privacy, Confidentiality, and Security Lecture 4_slidesPrivacy, Confidentiality, and Security Lecture 4_slides
Privacy, Confidentiality, and Security Lecture 4_slides
 
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
 
HIPAA-HITECH-MU Simplified
HIPAA-HITECH-MU SimplifiedHIPAA-HITECH-MU Simplified
HIPAA-HITECH-MU Simplified
 
Regulating Healthcare - Lecture D
Regulating Healthcare - Lecture DRegulating Healthcare - Lecture D
Regulating Healthcare - Lecture D
 
Modern Healthcare Information Technology
Modern Healthcare Information TechnologyModern Healthcare Information Technology
Modern Healthcare Information Technology
 
Governance And Data Protection In The Health Sector - Billy Hawkes
Governance And Data Protection In The Health Sector - Billy HawkesGovernance And Data Protection In The Health Sector - Billy Hawkes
Governance And Data Protection In The Health Sector - Billy Hawkes
 
Healthcare and Cyber Security 2015 :Is India Ready?
Healthcare and Cyber Security 2015 :Is India Ready? Healthcare and Cyber Security 2015 :Is India Ready?
Healthcare and Cyber Security 2015 :Is India Ready?
 
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk Assessment
 
Nursing Informatics
Nursing InformaticsNursing Informatics
Nursing Informatics
 
Trust and Governance in Health and Social Care
Trust and Governance in Health and Social Care Trust and Governance in Health and Social Care
Trust and Governance in Health and Social Care
 
Healthcare and Cyber security
Healthcare and Cyber securityHealthcare and Cyber security
Healthcare and Cyber security
 
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docxPSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx
 
Texting and e mail with patients 2020
Texting and e mail with patients 2020Texting and e mail with patients 2020
Texting and e mail with patients 2020
 
Privacy, Confidentiality, and Security_lecture 1_slides
Privacy, Confidentiality, and Security_lecture 1_slidesPrivacy, Confidentiality, and Security_lecture 1_slides
Privacy, Confidentiality, and Security_lecture 1_slides
 
The Ethics of Digital Health
The Ethics of Digital HealthThe Ethics of Digital Health
The Ethics of Digital Health
 
Mha 690 discussion 2 Seynabou
Mha 690 discussion 2 SeynabouMha 690 discussion 2 Seynabou
Mha 690 discussion 2 Seynabou
 

Mehr von CMDLearning

What is Health Informatics - Lecture B
What is Health Informatics - Lecture BWhat is Health Informatics - Lecture B
What is Health Informatics - Lecture BCMDLearning
 
Evolution of and Trends in Health Care - Lecture D
Evolution of and Trends in Health Care - Lecture DEvolution of and Trends in Health Care - Lecture D
Evolution of and Trends in Health Care - Lecture DCMDLearning
 
Evolution of and Trends in Health Care - Lecture C
Evolution of and Trends in Health Care - Lecture CEvolution of and Trends in Health Care - Lecture C
Evolution of and Trends in Health Care - Lecture CCMDLearning
 
Evolution of and Trends in Health Care - Lecture B
Evolution of and Trends in Health Care - Lecture BEvolution of and Trends in Health Care - Lecture B
Evolution of and Trends in Health Care - Lecture BCMDLearning
 
Evolution of and Trends in Health Care - Lecture A
Evolution of and Trends in Health Care - Lecture AEvolution of and Trends in Health Care - Lecture A
Evolution of and Trends in Health Care - Lecture ACMDLearning
 
Public Healthcare (Part 2) Lecture C
Public Healthcare (Part 2) Lecture CPublic Healthcare (Part 2) Lecture C
Public Healthcare (Part 2) Lecture CCMDLearning
 
Public Healthcare (Part 2) Lecture B
Public Healthcare (Part 2) Lecture BPublic Healthcare (Part 2) Lecture B
Public Healthcare (Part 2) Lecture BCMDLearning
 
Public Healthcare (Part 2) Lecture A
Public Healthcare (Part 2) Lecture APublic Healthcare (Part 2) Lecture A
Public Healthcare (Part 2) Lecture ACMDLearning
 
Public Health (Part 1) Lecture C
Public Health (Part 1) Lecture CPublic Health (Part 1) Lecture C
Public Health (Part 1) Lecture CCMDLearning
 
Public Health (Part 1) Lecture B
Public Health (Part 1) Lecture BPublic Health (Part 1) Lecture B
Public Health (Part 1) Lecture BCMDLearning
 
Public Health (Part 1) Lecture A
Public Health (Part 1) Lecture APublic Health (Part 1) Lecture A
Public Health (Part 1) Lecture ACMDLearning
 
Regulating Healthcare - Lecture E
Regulating Healthcare - Lecture ERegulating Healthcare - Lecture E
Regulating Healthcare - Lecture ECMDLearning
 
Regulating Healthcare - Lecture C
Regulating Healthcare - Lecture CRegulating Healthcare - Lecture C
Regulating Healthcare - Lecture CCMDLearning
 
Regulating Healthcare - Lecture A
Regulating Healthcare - Lecture ARegulating Healthcare - Lecture A
Regulating Healthcare - Lecture ACMDLearning
 
Regulating Healthcare - Lecture B
Regulating Healthcare - Lecture BRegulating Healthcare - Lecture B
Regulating Healthcare - Lecture BCMDLearning
 
Financing Healthcare (Part 2) Lecture C
Financing Healthcare (Part 2) Lecture CFinancing Healthcare (Part 2) Lecture C
Financing Healthcare (Part 2) Lecture CCMDLearning
 
Financing Healthcare (Part 2) Lecture B
Financing Healthcare (Part 2) Lecture BFinancing Healthcare (Part 2) Lecture B
Financing Healthcare (Part 2) Lecture BCMDLearning
 
Financing Healthcare (Part 2) Lecture A
Financing Healthcare (Part 2) Lecture AFinancing Healthcare (Part 2) Lecture A
Financing Healthcare (Part 2) Lecture ACMDLearning
 
Financing Healthcare (Part 2) Lecture D
Financing Healthcare (Part 2) Lecture DFinancing Healthcare (Part 2) Lecture D
Financing Healthcare (Part 2) Lecture DCMDLearning
 
Financing Healthcare (Part 1) Lecture D
Financing Healthcare (Part 1) Lecture DFinancing Healthcare (Part 1) Lecture D
Financing Healthcare (Part 1) Lecture DCMDLearning
 

Mehr von CMDLearning (20)

What is Health Informatics - Lecture B
What is Health Informatics - Lecture BWhat is Health Informatics - Lecture B
What is Health Informatics - Lecture B
 
Evolution of and Trends in Health Care - Lecture D
Evolution of and Trends in Health Care - Lecture DEvolution of and Trends in Health Care - Lecture D
Evolution of and Trends in Health Care - Lecture D
 
Evolution of and Trends in Health Care - Lecture C
Evolution of and Trends in Health Care - Lecture CEvolution of and Trends in Health Care - Lecture C
Evolution of and Trends in Health Care - Lecture C
 
Evolution of and Trends in Health Care - Lecture B
Evolution of and Trends in Health Care - Lecture BEvolution of and Trends in Health Care - Lecture B
Evolution of and Trends in Health Care - Lecture B
 
Evolution of and Trends in Health Care - Lecture A
Evolution of and Trends in Health Care - Lecture AEvolution of and Trends in Health Care - Lecture A
Evolution of and Trends in Health Care - Lecture A
 
Public Healthcare (Part 2) Lecture C
Public Healthcare (Part 2) Lecture CPublic Healthcare (Part 2) Lecture C
Public Healthcare (Part 2) Lecture C
 
Public Healthcare (Part 2) Lecture B
Public Healthcare (Part 2) Lecture BPublic Healthcare (Part 2) Lecture B
Public Healthcare (Part 2) Lecture B
 
Public Healthcare (Part 2) Lecture A
Public Healthcare (Part 2) Lecture APublic Healthcare (Part 2) Lecture A
Public Healthcare (Part 2) Lecture A
 
Public Health (Part 1) Lecture C
Public Health (Part 1) Lecture CPublic Health (Part 1) Lecture C
Public Health (Part 1) Lecture C
 
Public Health (Part 1) Lecture B
Public Health (Part 1) Lecture BPublic Health (Part 1) Lecture B
Public Health (Part 1) Lecture B
 
Public Health (Part 1) Lecture A
Public Health (Part 1) Lecture APublic Health (Part 1) Lecture A
Public Health (Part 1) Lecture A
 
Regulating Healthcare - Lecture E
Regulating Healthcare - Lecture ERegulating Healthcare - Lecture E
Regulating Healthcare - Lecture E
 
Regulating Healthcare - Lecture C
Regulating Healthcare - Lecture CRegulating Healthcare - Lecture C
Regulating Healthcare - Lecture C
 
Regulating Healthcare - Lecture A
Regulating Healthcare - Lecture ARegulating Healthcare - Lecture A
Regulating Healthcare - Lecture A
 
Regulating Healthcare - Lecture B
Regulating Healthcare - Lecture BRegulating Healthcare - Lecture B
Regulating Healthcare - Lecture B
 
Financing Healthcare (Part 2) Lecture C
Financing Healthcare (Part 2) Lecture CFinancing Healthcare (Part 2) Lecture C
Financing Healthcare (Part 2) Lecture C
 
Financing Healthcare (Part 2) Lecture B
Financing Healthcare (Part 2) Lecture BFinancing Healthcare (Part 2) Lecture B
Financing Healthcare (Part 2) Lecture B
 
Financing Healthcare (Part 2) Lecture A
Financing Healthcare (Part 2) Lecture AFinancing Healthcare (Part 2) Lecture A
Financing Healthcare (Part 2) Lecture A
 
Financing Healthcare (Part 2) Lecture D
Financing Healthcare (Part 2) Lecture DFinancing Healthcare (Part 2) Lecture D
Financing Healthcare (Part 2) Lecture D
 
Financing Healthcare (Part 1) Lecture D
Financing Healthcare (Part 1) Lecture DFinancing Healthcare (Part 1) Lecture D
Financing Healthcare (Part 1) Lecture D
 

Kürzlich hochgeladen

VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near MeVIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Memriyagarg453
 
Rajkot Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Rajkot Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetRajkot Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Rajkot Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...Ahmedabad Call Girls
 
Dehradun Call Girls 8854095900 Call Girl in Dehradun Uttrakhand
Dehradun Call Girls 8854095900 Call Girl in Dehradun  UttrakhandDehradun Call Girls 8854095900 Call Girl in Dehradun  Uttrakhand
Dehradun Call Girls 8854095900 Call Girl in Dehradun Uttrakhandindiancallgirl4rent
 
Escorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance Payments
Escorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance PaymentsEscorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance Payments
Escorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance PaymentsAhmedabad Call Girls
 
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetbhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Thrissur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Thrissur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetThrissur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Thrissur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetTirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Call Girl in Bangalore 9632137771 {LowPrice} ❤️ (Navya) Bangalore Call Girls ...
Call Girl in Bangalore 9632137771 {LowPrice} ❤️ (Navya) Bangalore Call Girls ...Call Girl in Bangalore 9632137771 {LowPrice} ❤️ (Navya) Bangalore Call Girls ...
Call Girl in Bangalore 9632137771 {LowPrice} ❤️ (Navya) Bangalore Call Girls ...mahaiklolahd
 
Kochi call girls Mallu escort girls available 7877702510
Kochi call girls Mallu escort girls available 7877702510Kochi call girls Mallu escort girls available 7877702510
Kochi call girls Mallu escort girls available 7877702510Vipesco
 
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetnagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Premium Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bangalor...
Premium Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bangalor...Premium Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bangalor...
Premium Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bangalor...Sheetaleventcompany
 
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Me
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near MeRussian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Me
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Memriyagarg453
 
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetSambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Patna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Patna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetPatna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Patna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Bareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Bareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetBareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Bareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Mangalore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Mangalore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetMangalore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Mangalore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.ktanvi103
 
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetneemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 

Kürzlich hochgeladen (20)

VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near MeVIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
 
Rajkot Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Rajkot Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetRajkot Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Rajkot Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
 
Dehradun Call Girls 8854095900 Call Girl in Dehradun Uttrakhand
Dehradun Call Girls 8854095900 Call Girl in Dehradun  UttrakhandDehradun Call Girls 8854095900 Call Girl in Dehradun  Uttrakhand
Dehradun Call Girls 8854095900 Call Girl in Dehradun Uttrakhand
 
Escorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance Payments
Escorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance PaymentsEscorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance Payments
Escorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance Payments
 
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetbhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Thrissur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Thrissur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetThrissur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Thrissur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetTirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Call Girl in Bangalore 9632137771 {LowPrice} ❤️ (Navya) Bangalore Call Girls ...
Call Girl in Bangalore 9632137771 {LowPrice} ❤️ (Navya) Bangalore Call Girls ...Call Girl in Bangalore 9632137771 {LowPrice} ❤️ (Navya) Bangalore Call Girls ...
Call Girl in Bangalore 9632137771 {LowPrice} ❤️ (Navya) Bangalore Call Girls ...
 
Kochi call girls Mallu escort girls available 7877702510
Kochi call girls Mallu escort girls available 7877702510Kochi call girls Mallu escort girls available 7877702510
Kochi call girls Mallu escort girls available 7877702510
 
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetnagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Premium Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bangalor...
Premium Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bangalor...Premium Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bangalor...
Premium Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bangalor...
 
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Me
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near MeRussian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Me
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Me
 
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetSambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Patna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Patna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetPatna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Patna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Bareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Bareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetBareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Bareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Mangalore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Mangalore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetMangalore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Mangalore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
 
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetneemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 

Security & Privacy - Lecture E

  • 1. Introduction to Computer Science Security and Privacy Lecture e This material (Comp 4 Unit 7) was developed by Oregon Health & Science University, funded by the Department of Health and Human Services, Office of the National Coordinator for Health Information Technology under Award Number 90WT0001. This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/4.0/.
  • 2. Security and Privacy Learning Objectives - 1 • Define cybercrime and cybersecurity (Lecture a) • List common information technology (IT) security and privacy concerns (Lecture a) • List hardware components that are usually attacked by the hackers (Lecture a) • Explain some of the common methods of attack (Lecture b) 2
  • 3. Security and Privacy Learning Objectives - 2 • Describe common types of malware (Lecture b) • Explain social engineering methods used by cybercriminals (Lecture b) • Describe methods and tools available for protection against cyberattacks (Lecture c) • Describe practices designed to minimize the risk of successful cyberattack (Lecture d) 3
  • 4. Security and Privacy Learning Objectives - 3 • Address specifics of wireless device security (Lecture d) • Explain security and privacy concerns associated with EHRs (Lecture e) • Describe security safeguards used for health care applications (Lecture e) • Provide the basics of ethical behavior online (Lecture e) 4
  • 5. Health Care Applications and Security • U.S. Government’s stated goal: – Most Americans to have access to electronic health records (EHRs) by 2014 • Why EHRs? – Improve quality of care – Decrease cost – Ensure privacy and security • Outsourcing introduces risk – Countries with different cultural values and EHR regulations 5
  • 6. Health Record Security Concerns • Incorrect health data recorded • Job discrimination • Personal privacy violated • Sharing of data between providers adds risk • Use of Internet always introduces risk 6
  • 7. What is an EHR System? • Collection of health data about the business, patients, doctors, nurses • Health data stored as records in database system • Records represent a complete event – Example: o A patient’s personal information o Reason for office visit o Tests ordered and their results 7
  • 8. EHRs are… 1 • Used and maintained by health care providers • Covered by Health Insurance Portability and Accountability Act (HIPAA) rules • Centralized database systems used to integrate patient intake, medical care, pharmacy, and billing into one system 8
  • 9. EHRs are… 2 • Used to send data over the Internet when departments/entities are not in same physical location • Accessible by individual patient 9
  • 10. EHR Security Q & A - 1 • How is data sent over the Internet? – It should be sent in an encrypted, secure manner over the Internet • Is my personal data safe? – Much depends on each organization’s physical record and network security practices – No data is 100% secure against theft or misuse 10
  • 11. EHR Security Q & A - 2 • Who can view my health records? – Only those who need to know or view the contents of a health record should be able to view it o Patient must authorize all other access 11
  • 12. Federal Rules Emerge • HIPAA enacted in 1996 • HIPAA establishes privacy and security standards established for: – Health care providers – Health insurance companies – Care clearinghouses (organizations that translate claims data in to and out of HIPAA- standard format) 12
  • 13. HIPAA and Privacy • Privacy Rule – Requires those covered to provide patients a “Notice of Privacy Practices” when care is first provided – Covers paper and electronic private health information • Security Rule – Covers administrative, physical, and technical data safeguards that secure electronic health record data 13
  • 14. What is Privacy? • Most privacy laws revolves around privacy between a person and the government • “The law of privacy regulates the type of information which may be collected and how this information may be used and stored.” Wikipedia, 2016 • Privacy relates to people. 14
  • 15. What is Confidentiality? • “Confidentiality is commonly applied to conversations between doctors and patients. Legal protections prevent physicians from revealing certain discussions with patients, even under oath in court. The rule only applies to secrets shared between physician and patient during the course of providing medical care.” Wikipedia. 2016 • Confidentiality relates to data 15
  • 16. Steps to Secure EHR - 1 • Authenticate and authorize ALL record access – Only those who “need to know” can view – Only pertinent people can change records – Limit who can print electronic documents – All views and changes recorded for audit trail 16
  • 17. Steps to Secure EHR - 2 • Examples: – A clerk can view the dates and charges related to an office visit but nothing about treatment – Nurses and doctors can view medical records only for patients under their direct care • Security outlines the structure to enforce privacy and security 17
  • 18. Steps to Secure EHR - 3 • Device security – Apply operating system critical updates immediately – Install current Anti-virus definitions – Restrict physical access to servers – Allow only authenticated device access 18
  • 19. Steps to Secure EHR - 4 • Secure electronic communications – Encrypt all EHR communications – Client-server environment – Configure user accounts and groups – Implement network access protection mechanisms 19
  • 20. Steps to Secure EHR - 5 • Web environment considerations – Implement HTTPS for all web transactions – Validate all data entered into web forms – Perform regular audits of access and changes • Implement redundant devices – Ensures that devices are available as expected – Load-balance heavily used hardware devices 20
  • 21. Steps to Secure EHR - 6 • Prosecute security violations vigorously • Backup EHR data with secure storage 21
  • 22. Free Online PHR Systems – PHRs maintained by individuals – Some PHRs not covered by HIPAA rules – Resources o Microsoft HealthVault - www.healthvault.com/ o WebMD Health Manager - http://www.webmd.com/phr 22
  • 23. Ethical Behavior Online • Mistakes Happens • Need to Know vs. Want to Know • Online Ratings • Data Breaches 23
  • 24. Security and Privacy Summary – Lecture e • Explained security and privacy concerns associated with Electronic Health Records (EHRs) • Described security safeguards used for health care applications • Provided basics of ethical behavior when online 24
  • 25. Security and Privacy Summary - 1 • Cybercrime and cybersecurity • Common IT security and privacy concerns • Hardware components usually attacked by the hackers; common methods of attack • Common types of malware • Social engineering methods used by cybercriminals • Methods and tools available for protection against cyberattacks 25
  • 26. Security and Privacy Summary - 2 • Practices designed to minimize the risk of successful cyberattack • Specifics of wireless device security • Security and privacy concerns associated with EHRs • Security safeguards used for health care applications • Basics of ethical behavior online 26
  • 27. Security and Privacy References – 1 – Lecture e References Dyer, K. A. (2011, June 2). Ethical Challenges of Medicine and Health on the Internet: A Review. Retrieved from http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1761893/ Greysen, S. (2010, July 15). Online Professionalism and the Mirror of Social Media. Retrieved April 20, 2016, from http://link.springer.com/article/10.1007/s11606-010- 1447-1 Health and Human Services. HHS Announces Project to Help 3.6 Million Consumers Reap Benefits of Electronic Health Records. [Internet]. 2010 [cited 2011 Nov 07]. Available from: http://www.hhs.gov/news/press/2007pres/10/pr20071030a.html. Improving Ethics Quality in Health Care. (n.d.). Retrieved April 20, 2016, from http://www.ethics.va.gov/elprimer.pdf Informatics Professor, Meaningful Use: A Highly Useful Construct for Informatics. [Internet]. 2010 May [cited 2011 Nov 07]. Available from: http://informaticsprofessor.blogspot.com/2010/05/meaningful-use-highly-useful- construct.html. Kraus, R. (2004). Ethical and Legal Considerations for Providers of Mental Health Services Online. In Online Counseling, 2nd ed.: A Handbook for Mental Health Professionals. San Diego, CA: Elsevier Academic Press. 27
  • 28. Security and Privacy References – 2 – Lecture e References Wikipedia. Network security. [Internet]. 2010 [cited 2011 Nov 07]. Available from: http://en.wikipedia.org/wiki/Network_security. Wikipedia. Wireless security. [Internet]. 2010 [cited 2011 Nov 07]. Available from: http://en.wikipedia.org/wiki/Wireless_security. Wikipedia. Wireless LAN security. [Internet]. 2010 [cited 2011 Nov 07]. Available from: http://en.wikipedia.org/wiki/Wireless_LAN_security. Wikipedia. Electronic health record. [Internet]. 2010 [cited 2011 Nov 07]. Available from: http://en.wikipedia.org/wiki/Electronic_health_record. Wikipedia. Electronic medical record. [Internet]. 2010 [cited 2011 Nov 07]. Available from: http://en.wikipedia.org/wiki/Electronic_medical_record. 28
  • 29. Introduction Computer Science Security and Privacy Lecture e This material was developed by Oregon Health & Science University, funded by the Department of Health and Human Services, Office of the National Coordinator for Health Information Technology under Award Number 90WT0001. 29

Hinweis der Redaktion

  1. Welcome to the Introduction to Computer Science: Security and Privacy. This is Lecture e. The component, Introduction to Computer Science, provides a basic overview of computer architecture; data organization, representation and structure; the structure of programming languages; and networking and data communication. It also includes the basic terminology of computing.
  2. The objectives for this unit, Security and Privacy, are to: Define cybercrime and cybersecurity List common information technology, or IT, security and privacy concerns List the hardware components that are usually attacked by hackers Explain some of the common methods of attack
  3. Describe common types of malware Explain social engineering methods used by cybercriminals Describe methods and tools available for protection against cyberattacks Describe practices designed to minimize the risk of successful cyberattack
  4. Address specifics of wireless device security Explain security and privacy concerns associated with Electronic Health Records, or EHRs Describe security safeguards used for health care applications And, provide the basics of ethical behavior online
  5. In this lecture, we will trace the history of the use of electronic health records, or EHRs, in America; discuss the risks inherent in putting health-related information into electronic form, and touch on ethical behavior when on the Internet. For a number of years, the U.S. government had a goal that by 2014 most Americans should have access to EHRs. Putting health records into electronic form means a lot of private and confidential information is now accessible through web browsers and wireless devices. If these devices are not secure, personal medical information is at risk. For example, information could be falsely entered or even changed by somebody with malicious intent. So it is very important that organizations understand the application of security in conjunction with health care. The impetus for EHRs came from the American government. The motivation was to improve quality of care, decrease cost, and insure the privacy and security of the data. One security concern is the current trend of outsourcing medical data entry management to countries outside the United States. If hospitals employ medical transcriptionists in other countries, might these countries have different cultural values and EHR regulations? How can data be protected when it is on the other side of the world being used by people who live by different rules, regulations, and cultural norms?
  6. Other issues include concerns about encountering someone else’s information in your health record, making the information in both records incorrect and compromising security. Additionally, individuals might be discriminated against in employment, denied employment, or even denied health coverage based on pre-existing conditions if private medical information is made public. Personal privacy might be violated, such as when friends, family, and others find out about an embarrassing, but non-infectious medical condition. A final concern about the security of health data involves the sharing of data between providers. Any time data travels over the Internet, there is always a risk to data security and privacy.
  7. An EHR system is a collection of health data about medical practices, patients, doctors, nurses, and all entities involved in the health care process. Health data is stored as a record in a database system. For every visit to a doctor, an entry is recorded in the EHR, and that record is stored in a database. The patient’s name and contact information are one record in the database. The patient’s diagnosis and treatment are other records in the database. Tests ordered and procedures performed are yet another record in the database.
  8. EHR systems are used and maintained by health care providers and others to store health care data. Health care providers, health care clearinghouses, and health plan providers are subject to federal rules governing security and other rules related to EHRs. The primary federal rule governing EHRs is the Health Insurance Portability and Accountability Act, or HIPAA. Organizations that must adhere to HIPAA rules are called “covered entities.” When data in an EHR is maintained by a covered entity, that data is also subject to HIPAA rules. However, free, online, electronic, personal health records are not a covered entity. This means data entered in free, online, electronic, personal health records is not protected by HIPAA rules. EHRs use centralized database systems to integrate functions such as patient intake, medical care, and pharmacy billing into one large database system.
  9. Departments and other entities might not be in the same physical location, so patient data must often travel over the Internet. As we touched on earlier, any time the Internet and data are combined, an element of risk is introduced. Why does data have to travel over the Internet at all? One reason―and there are many―is that when a doctor’s office bills an insurance company, some of the patient’s medical information must travel over the Internet. Through the use of EHRs, people can view their own health record, taking ownership of its contents, insuring accuracy, and even providing content by adding comments for their doctors to read.
  10. Let’s now consider some EHR security question and answers. How is―or how should―data be sent over the Internet? In most cases, data will be sent in an encrypted, secure manner over the Internet. If not, patients should question the security practices being used. Is your personal data safe? The answer to this question depends on each organization’s physical record and network security practices, as governed by their security policy. However, no data is 100 percent secure against theft or misuse, regardless of the applicable security policy. Having a good security policy in place, and then auditing for compliance, can significantly improve success in maintaining data security.
  11. And finally, who can view your private medical records? According to HIPAA, only those who need to know or view the contents of a health record should be able to do so. Patients must authorize all other access to their record.
  12. HIPAA was enacted in 1996 by the federal government. HIPAA establishes privacy and security standards, and requires that health care providers, insurance companies, and care clearinghouses - organizations that translate claims data in to and out of HIPAA-standard format - abide by privacy and security standards.
  13. The HIPAA privacy rule requires covered entities to provide patients with what is known as a “Notice of Privacy Practices” when care is first provided. A patient might receive this notice when visiting a walk-in clinic, for example. The privacy rule covers both paper and electronic private health information. HIPAA also incorporates a security rule that goes farther than the privacy rule in that it covers administrative, physical, and technical data safeguards that must be enacted to secure EHR data. All of these should be outlined in the entity’s security policy.
  14. Most privacy laws revolve around privacy between a person and the government. According to Wikipedia, “The law of privacy regulates the type of information that can be collected and how this information may be used and stored.” Privacy relates to people. For example, a patient’s visit to a doctor is private information.
  15. Confidentiality is different from privacy. According to Wikipedia, “Confidentiality is commonly applied to conversations between doctors and patients. Legal protections prevent physicians from revealing certain discussions with patients, even under oath in court. The rule only applies to secrets shared between physician and patient during the course of providing medical care.” We can infer from this that confidentiality relates to data, data shared between the health provider and the patient. Confidentiality, then, in this context, means that the things discussed with a doctor should remain between the patient and the doctor; they are confidential. To put privacy and confidentiality in context, the fact that someone visited a doctor is private; what the patient and doctor discussed is confidential. Privacy and confidentiality are not mutually exclusive and each slightly overlaps the other in scope.
  16. What steps can be taken to secure an EHR and its records? It is possible to authenticate and authorize all access to electronic health records. Authorization involves permissions. Permissions limit who can view, change, and/or print medical records and electronic documents. Additionally, all views of and changes to medical information should be recorded for audit.
  17. As an example of permissions, a clerk would be able to view the dates and charges related to an office visit, but would not be able to view anything that details the treatment received or the information discussed between patient and doctor. Nurses and doctors can view medical records only for patients under their direct care, but should not view medical records for patients not under their care. An important point is that security outlines the structure through which privacy and confidentiality can be enforced. Putting in place security mechanisms such as requiring usernames and passwords; badges to open doors; and keys to open file cabinets, increases the probability of data privacy and confidentiality.
  18. Device security is important in securing EHR and records. Critical updates to computer operating systems should be applied immediately Antivirus definitions should always be current Physical access to servers that house medical data should be restricted And finally, access to devices must be authenticated
  19. Encryption can also help secure electronic communications. All communication between an EHR system and a destination device should be encrypted. A client-server environment allows maintenance of a domain environment with a server that manages all devices and all objects. User accounts should be configured in groups, and permissions must be provided to the groups. Finally, organizations should implement network access protection mechanisms. For example, if a device attempts to connect to a network, the system should first examine the device to verify that it has had critical updates applied to its operating system. The system should then require that the device attempting to connect to the network has antivirus protection software installed and verify that its firewall is enabled.
  20. EHR transmission over the Internet should require that either Hypertext Transfer Protocol Secure, or HTTPS, or secure web browsing be implemented for all web transactions. In other words, all communication over the Internet should be encrypted. Additionally, all data entered into web forms should have to be validated before that data is stored in a database. And, regular audits of data access and changes in medical records should be occurring. Implementing redundant devices within the data environment helps ensure that devices are available as expected. Having redundant devices allows system administrators to load-balance heavily used hardware devices. For example, rather than using only one server to store database records, an administrator can create a five-server cluster. Then, whichever server is the least busy can respond to requests for database records.
  21. Administrators should prosecute security violations vigorously. If a hacker attacks a network, administrators should immediately report that activity to the authorities. Even internal violations should be pursued and offenders prosecuted. This would discourage others from taking the same actions. Finally, EHR data must be backed up and stored securely.
  22. Many of the concerns related to medical privacy exist because there are a number of EHR options available for use. If an individual uses a personal health record, or PHR system, this usually means that the individual maintains the record. Notice that PHRs differ from EHR systems. PHRs are maintained by individuals and are usually not covered by HIPAA rules because individuals manage their own health record, not the company that is providing an individual with the ability to have the health record. There are links on this slide for Microsoft Health Vault and WebMD’s Health Manager—two examples of available PHRs. Typically, these PHRs are free, allowing an individual to enter all of his or her medical information and share it with a doctor or medical personnel.
  23. This is a good time to discuss ethical behavior online, some of which we’ve already touched on. The very nature of the Internet is openness and accessibility. But when it comes to health care data, we all want our data to be accurate and secure. We all know mistakes happen. Computer data can only be accurate if it was entered correctly in the first place. Occasionally medical codes may get transposed when being entered into an EHR, dosages can get mis-transcribed, or medical notes can be placed in the wrong patient’s chart. These types of mistakes, though undesirable, are understandable. However, ethics become a question when someone’s intent is in conflict with known rules and regulations. For example, it should be obvious that just because you could have access to someone’s medical records doesn’t mean you should go ahead and access them. But all you have to do is a simple Internet search on “celebrity HIPAA violations” to see that even medical professionals, who are trained in the importance of abiding by HIPAA, sometimes exercise poor judgment. Websites, such as healthgrades.com allow users to post ratings about doctors, dentists, and hospitals. But who validates those ratings? How can a website ensure that what is posted is accurate? Could a medical professional be offering incentives for positive reviews? Should the website publishing the ratings be responsible for verifying the ratings it publishes? If so, how would this be done without violating a patient’s privacy? If a server holding EHRs gets hacked and your personal health data gets shared on the Internet, what share of the responsibility should be assigned to your health care professional? To their IT department? To the service that was contracted to keep those records secure? Entire courses are taught on the subject of ethical behavior when online. For now, as technology continues to be increasingly intertwined with health care, health care professionals must continue to question, debate, and examine ethics and ethical behavior in the context of the Internet. Resources are included in the References section of this presentation for those interested in learning more about ethical behavior online and health care.
  24. This concludes lecture e of Security and Privacy. In summary, this lecture: Explained security and privacy concerns associated with Electronic Health Records Described security safeguards used for health care applications And, provided some thoughts on ethical behavior and the Internet
  25. This also concludes the unit on Security and Privacy. In summary, this unit addressed the following topics: Cybercrime and cybersecurity Common IT security and privacy concerns Hardware components usually attacked by hackers and the common methods of attack Common types of malware Social engineering methods used by cybercriminals Methods and tools available for protection against cyberattacks
  26. Practices designed to minimize the risk of successful cyberattack Specifics of wireless device security Security and privacy concerns associated with EHRs Security safeguards used for health care applications And, the basics of ethical behavior online
  27. References slide. No audio.
  28. References slide. No audio.
  29. No audio.