Special Topics in Security and Privacy of Medical Information. Why is securing medical information important? Potential Threats.



Similar documents
System: Menu option System Files has been renamed

The deployment of OHMS TM. in private cloud

Meaningful Use. Michael L. Brody, DPM FACFAOM CCHIT Ambulatory Workgroup HITSP Physician Perspective Technical Committee NYeHC

CHAPTER 6. Discussion and Conclusion. patient health information, such as diagnosis, medicine orders, managing patient

Implementing Electronic Health Records in the Kurdistan Region

How To Use Zh Openemr

Integrating EHR and EDC systems

Personal Health Records

Analytics: The Future of Security

AMBERTON UNIVERSITY e-course SYLLABUS

Understanding. Your Medical Record

HL7 Personal Health Record System Functional Model and Standard & Industry Update

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

AMBERTON UNIVERSITY e-course SYLLABUS

Electronic Health Records: What You Need to Know

MEANINGFUL USE. Community Center Readiness Guide Additional Resource #13 Meaningful Use Implementation Tracking Tool (Template) CONTENTS:

EquiHealth Dashboard AVImark SQL

Addiction Treatment Strategies

55034-Project Server 2013 Inside Out

Premium Server Client Software

Cancer Conferences Portland Service Area

The Total Telehealth Solution

MEDGEN EHR Release Notes: Version 6.2 Build

10231B: Designing a Microsoft SharePoint 2010 Infrastructure

Configuration Guide - OneDesk to SalesForce Connector

Consumer Engagement with Health Information Technology Summary of NeHC Survey Results

NextGen Patient Portal User Guide. Version 2.0

HI-1018: The Electronic Health Record

AMBERTON UNIVERSITY e-course SYLLABUS

Electronic Health Records (EHR) An Educational Session

Electronic Health Records: You will join the Borg

HIPAA Notice of Privacy Practices

Is a Personal Health Record Right for You? Considerations for Californians

IIS, FTP Server and Windows

PORTAL ADMINISTRATION

Mobile Device Management Version 8. Last updated:

Oracle Database Security

Case Studies. Table of Contents

Integrity We are above reproach in everything we do.

Socialized medicine + centralized database = distributed risk By Tamara Wilhite

Project Server 2013 Inside Out Course 55034; 5 Days, Instructor-led

Sunrise Acute Care (SAC) Module 1 New Provider Basic Course

MEANINGFUL USE STAGE 2 USERS GUIDE

Mona Osman MD, MPH, MBA

December Federal Employees Health Benefits (FEHB) Program Report on Health Information Technology (HIT) and Transparency

Electronic Health Records

Frequently Asked Questions

FINANCIAL BENEFITS OF GOING DIGITAL

BCSC Health Center Information

Electronic Health Records

MEDGEN EHR Release Notes: Version 6.2 Build

Accessing The Doctors Clinic Physician Connect

Take Charge of Your Health!

MySQL Security: Best Practices

Blackboard Collaborate Session

AMBERTON UNIVERSITY e-course SYLLABUS

Electronic Prescribing System (EPCS)

HL7 PHR System Functional Model

Patient Guide v Jardogs, LLC. All rights reserved. This document and all contents are protected by the copyright laws as an unpublished work.

Transforming Healthcare in Emerging Markets with EMR adoption

Open-EMR Usability Evaluation Report Clinical Reporting and Patient Portal

Course 55034A: Microsoft Project Server 2013 Inside Out

For ONC S&I DS4P. Dennis Giokas Chief Technology Officer Canada Health Infoway Inc. January 25, 2012

Alert Notification of Critical Results (ANCR) Public Domain Deployment Instructions

NOVA SCOTIA DRUG INFORMATION SYSTEM

Optum Patient Portal. 70 Royal Little Drive. Providence, RI Copyright Optum. All rights reserved. Updated: 3/7/13

Day-Care Environment Communication and Database

Employee Active Directory Self-Service Quick Setup Guide

2009 Progress in Comprehensive Care for Rare Blood Disorders Conference

Wearable Technology Evolution & Security: Grant Brown - Security Strategist Symantec

C A LIFORNIA HEALTHCARE FOUNDATION. Consumers and Health Information Technology: A National Survey

Electronic Health Record

A Case for EHR: 5 Status Quo Myths that Hold You Back and Reduce Your Bottom Line

EHR Introduction for the Practicing Physician

Final Version of the Electronic Health Record (EHR) Survey Questionnaire

AMBERTON UNIVERSITY e-course SYLLABUS

Copyright 2013, 3CX Ltd.

NextGen Patient Portal User Guide. Version 5.7

SYNERGY RADIOLOGY APP PRIVACY POLICY

Use Cases for Argonaut Project. Version 1.1

Online Payroll Remittance Manual for Employers

HP OO 10.X - SiteScope Monitoring Templates

Managing the Privacy and Security of Patient Portals

The Nuts and Bolts of Autodesk Vault Replication Setup

EME6055: Current Trends in Instructional Technology

ETHICAL CONSIDERATIONS IN INTEGRATING PERSONAL HEALTH RECORDS INTO CLINICAL PRACTICE

FollowMyHealth Universal Health Record Patient Access v2.2.1 User Guide

EHR Version 7.1 New Features

YOUR PERSONAL HEALTH RECORD

Care360 EHR Frequently Asked Questions

Administrative Guide

OpenSSO: Simplify Your Single-Sign-On Needs. Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com

Custom Report Data Elements: IT Database Fields. Source: American Hospital Association IT Survey

Sample Assignment 1: Workflow Analysis Directions

SAFELY ENABLING MICROSOFT OFFICE 365: THREE MUST-DO BEST PRACTICES

AMBERTON UNIVERSITY e-course SYLLABUS

BMI 548/BMI 648 Human Computer Interaction in Biomedicine

Information Security It s Everyone s Responsibility

EDF 3214: Human Development and Learning Section 901 Meeting Time: Mondays from 5-9 Room: CPR 256

Transcription:

Special Topics in Security and Privacy of Medical Information Sujata Garera Why is securing medical information important? What are some potential threats to medical information? Potential Threats Compromise of identity 1

Potential Threats Compromise of Privacy Britney Spears, George Clooney, Octomom (Nadya Suleman) are all victims of medical privacy breach Potential Threats Compromise of integrity A persons medical record was falsified with psychiatric history of depression Potential Threats Compromise of Network UNC-Chapel Hill radiology department records compromised Over 160,000 women mammogram records may have been potentially compromised 2

This course Syllabus Medical records and access control Communication standards Medical device security Portable patient record systems Privacy and anonymity techniques for medical data Medical image security Medical identity theft This course Prerequisites Basic knowledge of computers and networking Comfortable with programming Java programming component Have access to a computer for lectures and a microphone headset This course Website http://www.cs.jhu.edu/~sdoshi/jhuisi650 Office Hours By appointment Text Book Lectures based on research papers which will be put online 3

This course Grading Assignments (2): 20% Project: 40% Participation: 40% Discussion sessions 20% Debates 10% General participation 10% This course Collaboration policy No collaboration on assignments unless stated otherwise May work in teams for project Must let me know teams by end of the week Discussion session leads will be assigned by me Email IDs Class mailing list Will create a new mailing list today -- the ISIS mailing list only allows you to use your ISIS id for communication Discussions/announcements would be held on this list Type email id 4

Project (40%) OpenMRS Open source electronic medical record system Java based system with SQL backend and Web app as the front end Customize the medical record system Based on a concept dictionary which forms the core Stores diagnosis, tests, procedures, drug information Wiki: www.openmrs.org Project (40%) Concept Dictionary What happens if you want to store glucose levels? Date Patient Sodium Creatinine Urine Color Monday Smith 1.5 Yellow Wednesday Jones 142 0.7 Project (40%) Date Monday Monday Concept Dictionary Easier to customize for new observations One row per value rather than per patient Observations referenced from central concept dictionary Wednesday Patient Smith Smith Jones Observation Creatinine Urine Color Sodium Value 1.5 Yellow 142 Wednesday Jones Creatinine 0.7 5

Project: OpenMRS structure Project: OpenMRS database Project: OpenMRS interface 6

Project OpenMRS requirements Java Ant Eclipse MySQL Tomcat SVN client: version uploaded is 10938 Preferably work in a unix environment Project: Part I Understanding OpenMRS Explore documentation and presentations and the codebase Configure and setup system Configure roles for hospital setting Configure privileges Configure alerts Source demo data and test the alerts Writeup Project: Part II Designing extensions to OpenMRS Two security features Two functionality features Substantial in nature Motivate need in healthcare setting Detail design of how you plan to accomplish this Task breakdown Extra credit Writeup and Presentation 7

Project: Part III Implementation Well documented code Correct use of security primitives Easy to configure system Test runs Write up Presentation Project Look up project document for grading rubrik Installation instructions and source code on website Can work in teams of 2-3 students Let me know teams by end of week Can use existing modules in OpenMRS SVN Discussion Sessions (20%) Students will lead Sessions will be assigned topic and paper for session Students should identify papers associated with topic Send them to me a week in advance of your session Idea is for students to cultivate a discussion on set topic May introduce activities such as debates etc Should present slides in part of lecture, Email slides to me and I will upload them into AdobeConnect Discussion notes should be maintained by lead and should be sent to me afterwords 8

Assignments (20%) Two assignments Should be done individually All resources used must be cited Should be submitted on due date Medical Records Systems Medical Record Longitudinal history Started with paper based systems Kept in folders which are typically divided into sections Medical Record Systems Issues with paper based systems Patients chart may be unavailable when a healthcare professional needs them Poor organization may lead to waste of time in searching for the right data Data may be illegible Records may be misplaced easily In a 500-bed hospital, a 7-inch stack of laboratory reports must be filed each day! 9

Medical Record Systems Most paper based systems are now being replaced by electronic health record systems Also called computer based patient records All information maintained digitally Medical Record Systems Advantages of EHR Remote access to patient data Legible Logging of accesses possible Flexible layout of data Continuous data processing Helpful in checking for errors Easier to search through PHR systems Personal health record systems Maintained by individual Can be shared with doctors, family members Information usually either imported from labs or entered by the individual E.g. Google Health, Microsoft Health Vault 10

EPR/EHR systems Electronic Patient Record systems Maintained by the provider Usually the doctor enters the information Patients do not have easy access to their own health records EPR vs PHR Synergistic outcomes. PHR data can augment physician collected data Patients motivated to participate in their own healthcare management Patients could receive feedback on the PHR EPR vs PHR Conflicting outcome Patient role may frustrate provider Provider may not trust the PHR data Data may not be up to date in the PHR system 11

Integrating EPR and PHRs Efforts are moving towards this goal Numerous challenges exist Patient control and authentication Synchronization Data formats Data entry Usage of PHR data for diagnostic analysis Content of records Personally identifying information SSN DOB Age Gender Address Content of records Health related information Allergies Blood Type Lab tests results Medical reports Medications Billing information 12

Security Requirements Authentication of user that accesses a record Typically achieved with login credentials into the medical record system Should every authenticated doctor be allowed to accessed every patients record? Security Requirements Access Control permissions must be in place Provide flexibility over which records may be accessed What is a better principle to follow? Open to everyone in system Control based on role Allow only as need be Security Requirements Confidentiality and integrity of data Records must be kept and transferred confidentially How can confidentiality be achieved? The integrity of records must be maintained 13

Security Requirements Non-repudiation to ensure traceability A change made by authorized personnel to a record cannot be denied at a later time This lecture Course overview OpenMRS Medical Records Start exploring OpenMRS documentation and configuring it 14