Patient Records: Challenges for and Approaches to Safety and Security



Similar documents
Secondary Use of the EHR via Pseudonymisation

Secondary Use of the EHR via Pseudonymisation

Medical Requirements for Data Protection

INTERNATIONAL CONFERENCE ON HARMONISATION OF TECHNICAL REQUIREMENTS FOR REGISTRATION OF PHARMACEUTICALS FOR HUMAN USE E15

COCIR Contribution to the General Data Protection Regulation 1 and European Parliament LIBE report 2

Response of the German Medical Association

Healthcare Coalition on Data Protection

Network Security in Building Networks

ECRIN (European Clinical Research Infrastructures Network)

What s wrong with SAAS login?

A Study on Secure Electronic Medical DB System in Hospital Environment

1. WHY ARE ELECTRONIC MEDICAL RECORDS IMPORTANT FOR PERSONALIZED MEDICINE?

Information Security Basic Concepts

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

IMPLEMENTING BIG DATA IN TODAY S HEALTH CARE PRAXIS: A CONUNDRUM TO PATIENTS, CAREGIVERS AND OTHER STAKEHOLDERS - WHAT IS THE VALUE AND WHO PAYS

TMF: Improving the Organisation and Infrastructure of Medical Research in Cooperative Structures

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Essential Nursing Competencies and Curricula Guidelines for Genetics and Genomics: Outcome Indicators

Brainloop Cloud Security

Seven Things To Consider When Evaluating Privileged Account Security Solutions

GT 6.0 GSI C Security: Key Concepts

Regulatory Issues in Genetic Testing and Targeted Drug Development

Annette Pollex-Krüger, Johannes Drepper, Sebastian C. Semler. Telematikplattform für Medizinische Forschungsnetze (TMF) e.v.

White Paper. The risks of authenticating with digital certificates exposed

Current and Future Research into Network Security Prof. Madjid Merabti

Integration of Genetic and Familial Data into. Electronic Medical Records and Healthcare Processes

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

COCIR contribution to the public consultation on Personal Data Protection in the EU 1

Academic cloud computing interoperability use cases

Electronic Medical Records and Genomics: Possibilities, Realities, Ethical Issues to Consider

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

COSC 472 Network Security

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Zone Labs Integrity Smarter Enterprise Security

Getting a Secure Intranet

A leader in the development and application of information technology to prevent and treat disease.

Consultation Response Medical profiling and online medicine: the ethics of 'personalised' healthcare in a consumer age Nuffield Council on Bioethics

1. Introduction to ehealth:

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

VPN. Date: 4/15/2004 By: Heena Patel

Workshop on Establishing a Central Resource of Data from Genome Sequencing Projects

Research Data Networks: Privacy- Preserving Sharing of Protected Health Informa>on

Data Protection: From PKI to Virtualization & Cloud

Securing Distribution Automation

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

Telematikplattform für Medizinische Forschungsnetze (TMF) e.v. Berlin / GERMANY

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

Integration of genomic data into electronic health records

How To Make A Trustless Certificate Authority Secure

Pretty Good Privacy (PGP)

Guidelines for health professionals about DNA / Biobanking in Europe

Information for patients and the public and patient information about DNA / Biobanking across Europe

Wireless VPN White Paper. WIALAN Technologies, Inc.

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Ask Us About Clinical Trials

The ehealth platform as a support of high quality healthcare and administrative simplification

How To Change Medicine

Six Challenges for the Privacy and Security of Health Information. Carl A. Gunter University of Illinois

ISM/ISC Middleware Module

Health Informatics Research and Development in Europe

Privacy 101. A Brief Guide

A Note on the Security in the Card Management System of the German E-Health Card

Opinion and recommendations on challenges raised by biometric developments

Delivery date: 18 October 2014

Guidelines for Establishment of Contract Areas Computer Science Department

Remote Services. Managing Open Systems with Remote Services

Information Security

Ethical and Public Health Implications of Genomic and Personalised Medicine. Dr Ingrid Slade

Defense In-Depth to Achieve Unbreakable Database Security

The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.

Baltimore UniCERT. the world s leading PKI. global e security

PRIVACY AND DATA SECURITY MODULE

EHR STRATEGY FINLAND. Kari Harno Helsinki University Central Hospital

Database Forensics Secure Business Austria

Genomic medicine in Australia. Professor Warwick Anderson Chief Executive Officer National Health and Medical Research Council

Third Party Security Requirements Policy

Evaluation of different Open Source Identity management Systems

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Medical Technologies and Data Protection Issues - QUESTIONNAIRE

Taking Part in Research at University Hospitals Birmingham

INTRODUCTION TO CRYPTOGRAPHY

Big data in cancer research : DNA sequencing and personalised medicine

Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare

Part A) I. Focus areas from the perspective of the German Government s on automated and connected driving

Medical research and data sharing how open can we be? Dr Renate Gertz AHRC Centre School of Law University of Edinburgh Scotland

The Art of Intervenability for Privacy Engineering

LifeLines Cohort Study. Salome Scholtens, Manager Research Office

Continuity of Care Record (CCR) in Germany? PROREC activities on the way to EHR interoperability

Central Agency for Information Technology

Inspection of Encrypted HTTPS Traffic

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

A Survey on Untransferable Anonymous Credentials

A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Chapter 1: Introduction

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations

Securing the E-Health Cloud

Integrating Bioinformatics, Medical Sciences and Drug Discovery

Transcription:

Patient Records: Challenges for and Approaches to Safety and Security Klaus Pommerening IMBEI, Universitätsmedizin Mainz ehealth Workshop, London, 16 June 2011

5 Challenges of ehealth for the Next Years 1. Electronic Patient Records and Health Telematics 2. Personalised Medicine, genetic data, and Biobanking 3. Assistive Technology (Ambient Assisted Living, AAL) 4. Using data for medical research 5. Dependable IT systems 2/ 30

1. EPR and Health Telematics Electronic Patient Records The patient record of today (or the near future) is an EPR Shared between health care institutions, online Transparent and accessible for the patient Lifelong for the patient Expectations: Better documentation, better quality control, more safety Availability of information Enhancement of healthcare processes Better communication Support of ehealth and telemedicine Cost reduction in health care 3/ 30

1. EPR and Health Telematics Challenges for Safety and Security of EPR The EPR is sensitive and will become even more sensitive by inclusion of genetic, AAL, and research data (see below) by new use cases Strong requirements for safety and security: Availability, integrity, confidentiality Safety (EPR as source of trouble): Can the EPR harm the patient? Availability, system stability, reliability, integrity, correctness What about a misdiagnosis in the EPR? May a physician rely on an EPR when the patient has the right to delete or hide Items? Security (EPR as target): Can someone misuse the EPR? Security of EPR at service provider, in the network, in the Health Cloud? Data once leaked out will remain public forever. 4/ 30

1. EPR and Health Telematics Technical Approaches to Safety and Security Network component architecture with trusted service providers, independent TTPs* Implementation and enforcement of policies and access rights and access restrictions Consideration of standards and certification offerings Use of cryptography (encryption, digital signature, strong authentication), encrypted communication, PKI** Encrypted or pseudonymised storage Hardware and network security Advantage of EPR over paper record: Non-repudiation and integrity by digital signature Better access control Logging of accesses [* Trusted Third Parties ** Public Key Infrastructure] 5/ 30

1. EPR and Health Telematics Example: Health Telematics in Germany Encrypted storage of EPR (central or distributed) Access implies decryption Needs health professional s and patient s keys (from smartcards) Access control enforced by cryptographic means (access password = cryptographic key) However: Access by a priori unknown health professionals only possible, when there is a master key (hybrid encryption) Who knows the master key? Emergency access by physician s key alone (with extended logging) Distributed architecture with many trusted third parties and trusted services Is there a weak link in the chain? Elegant and convincing in White Papers, stumbling in pilot projects, not yet rolled out 6/ 30

1. EPR and Health Telematics Problems with the Technical Approach to IT Security Technical approach alone is insufficient Stable framework of mandatory legal and organisational regulations required Technical and organisational measures should derive from comprehensive policy. Existing security technology adequate for Health Telematics, but security is fragile and requires extreme care. Sometimes failures are irreparable (patient dies, information leaks out), current IT doesn t adapt well to such an environment. Security measures tend to be complex. How complex should ehealth infrastructure be? Complexity is the main enemy of security. KISS = Keep it Small and Simple. 7/ 30

1. EPR and Health Telematics Example: Smartcards the Key to Security? Smartcards for patient and health professionals as secure devices for access control Access to EPR needs both of them (except in emergency situations). Use of smartcard OK for patient (except when card missing) Cumbersome for doctors in hospitals Vision: RFID* bracelets and Login/ logout on the fly Complexity for users reduced (hidden from users by system) [* Radio Frequency IDentification] 8/ 30

2. Personalised Medicine, genetic data, Biobanking Pharmacogenomics and Pharmacogenetics Enzymes may influence the effect of drugs. = proteins produced by genetic activity Personalised medicine tries to adapt diagnosis and therapy to the individual genetic constellation of the patient. Identify responders, avoid ineffective therapies Adjust doses Reduce unwanted secondary effects For the moment mostly in a research context Growing relevance for routine care The EPR will contain genetic data (maybe the complete genome?). 9/ 30

2. Personalised Medicine, genetic data, Biobanking Example of Therapeutic Success Enzyme activity of TPMT* affects toxicity of drug AZA**. Dose recommendations established. [* Thiopurine methyltransferase] Polymorphisms in TPMT [** Azathioprine (immunosuppr.)] TPMT*1 Normal enzyme activity TPMT*2 G238C Reduced enzyme activity TPMT*3A G460A, A719G Reduced enzyme activity TPMT*3B G460A Reduced enzyme activity TPMT*3C A719G Reduced enzyme activity TPMT*3D G292T No enzyme activity [Source: W. Siffert] 10 / 30

2. Personalised Medicine, genetic data, Biobanking Most variants in a gene consist of only 1 SNP*, a different base pair somewhere in the double helix. [* Single Nucleotid Polymorphism] [Source: Wikipedia] 11 / 30

2. Personalised Medicine, genetic data, Biobanking 70 SNPs suffice for identification. High Insufficient for future genomic research Privacy Medium Needed to find genetic relationships Low Insufficient for privacy protection 5 75 100 125 1000 2000 3000 4000 Independent SNPs [Source: Lin/Owen/Altman Science 305 (2004)] 12 / 30

2. Personalised Medicine, genetic data, Biobanking Challenges for Privacy by Genetic Information Special features of genetic data: availability, indivisibility (in samples), identifiability Genetic data are no secrets: Easy to get reference samples. Genetic data are identifiers: 70 SNPs suffice. A single prognostic or therapeutic application typically involves 5 20 SNPs. Perspective: The Race for the 1000 $ Genome : complete sequencing of the individual genome However: Genetic data alone are not as informative as first believed. Predispositions, not evolution of individual, not actual diagnoses 13 / 30

2. Personalised Medicine, genetic data, Biobanking Biobank Collection of samples and derived material (DNA, RNA, ) Useful only with clinical annotation. Valuable basis for genetic, translational, clinical, and epidemiological research. Long term storage intended for future research. Biomaterial (samples, extracts) contains comprehensive information and may serve as identifier. The inherent identification risk of genetic data may expose the corresponding clinical data. and also associated sociodemographic or lifestyle data in projects of genetic epidemiology. 14 / 30

2. Personalised Medicine, genetic data, Biobanking Approaches to Safety and Security Genetic data as part of EPR OK as long as used in a treatment context only and subject to the strong access restrictions of the EPR Unsuitable for data export or anonymous access Data warehouses, biobanks, economic evaluations, Scientific Use of EPR containing genetic data only in restricted setting Approved projects, see below Recommendations for data warehouses and biobanks: Store genetic data separately from clinical data, combine them only as necessary. Restrict public use and check query results for re-identification potential. 15 / 30

3. Assistive Technology AAL Data in the EPR With emerging assistive technologies the EPR will contain large collections of body and environmental parameters from sensors, socioeconomic data, lifestyle and behavioural data. This makes the EPR a high-dimensional individual data record with high re-identification risk Significant overlap with external knowledge from social networks and other internet activities (movement profiles, daily activities, ordering of drugs, search queries, ). Date and time of a single consultation may suffice for identification. AAL settings comprise a mixture of medical care and social services. Delineation of medical treatment context legally relevant but difficult. Requires sophisticated access rules. 16 / 30

3. Assistive Technology Further Challenges for AAL data How to ensure rights of individuals? Informational self-determination for data collection difficult Voluntariness and consequences of consent questionable Automated decisions dangerous (e.g. adjust drug dose?) IT security for mobile IT, Vulnerable technology: sensor networks, mobile devices. Manipulation may endanger lives ( Pacemaker online ). Embedded chips with low performance make cryptographic algorithms inefficient. How to handle software updates for medical devices? (that run versions of standard operating systems) 17 / 30

3. Assistive Technology Approaches to Safety and Security of AAL data PKI for sensor networks needs special efficient algorithms There is no communication security without a working PKI. PKI provides strong mutual authentication, encrypted communication, protection against manipulations. Approach for respecting patients rights: the gateway Patient may configure, even switch off, data transfer. Patient can see what data leave his home. Strong detailed access restrictions to AAL data in EPR many different user roles involved No intransparent enforced automatisms (decisions, data transfers) 18 / 30

4. Data for medical research Using data for medical research Research : Each kind of (secondary) use of EPR data outside the treatment context: evaluations, statistics, benchmarks, Large long term data pools and biobanks crucial for medical progress Example: rare diseases, sole chance for finding new diagnostic and therapeutic approaches Research requires that EPR data should be kept, not deleted. Healthcare and research are tightly connected. Same data needed in both domains. Main investigators in clinical trials and experts participate in treatment. Data from clinical trials in the EPR even more dimensions Interregional or international cooperation necessary, in particular for rare diseases 19 / 30

[Primary use/ treatment context] [Secondary use/ research context] Patient-Physician Relationship Barrier: Professional Discretion Clinical research health care research Export allowed, if - anonymous data, - informed consent, -law Registries/ Biobanks, epidemiological research direct data capture 20 / 30

4. Data for medical research Ethical Aspects of Secondary Use Privacy of patient-physician relationship essential for success of treatment Use of EPR data for research ethically OK as long as useful for the patient and restricted to the medical domain Patient profiles by insurance companies or employers not OK, because against the interests of the patients. Deletion vs permanency of EPR data for future research? Patients rights: Self-determination, transparency, revocation Informed consent and its limitations Who has the benefit from research? Research may be useful for the actual patients themselves, but maybe only for future patients. Patients are highly motivated for participation in research projects. 21 / 30

4. Data for medical research Challenges for medical research Transferring data from health care into a research context (in most cases) allowed only with informed consent In Germany high legal obstacles No efficient anonymisation of EPR data possible: High dimensional data records Re-identification risk (genetic data, social and behavioural data, medical images, unique combinations of innocuous data) External (in particular future) knowledge unknown, e.g. data from social networks Protecting data over long time periods Increasing trend to cooperation and networking also internationally (data collection and evaluation, genetic analyses) Balance between public transparency of research and privacy of medical data? 22 / 30

4. Data for medical research Approaches to Security (Anonymisation and) pseudonymisation Pseudonymisation offers far better usability of data but requires considerable organisational effort. Strong organisational framework with transparent responsibilities and depseudonymisation rules Approval procedure for projects that need EPR data, genetic data, biomaterial involving steering committee, data protection officer, ethics committee Strong IT security also for research projects In Germany: TMF* Data Protection Schemes** Tries to balance freedom of research and individuals rights * Technologie- und Methodenplattform für die vernetzte medizinische Forschung, www.tmf-ev.de ** KP et al. Integrating ehealth and medical research: The TMF data protection scheme. In: B. Blobel et. al (Eds): ehealth: Combining Health Telematics, Telemedicine, Biomedical Engineering and Bioinformatics to the Edge. Aka, Berlin 2008, 5 10 23 / 30

How to Pseudonymise Data: The Trusted Third Party (TTP) scheme Data source MDAT (= Medical Data) Pass along with Ticket or pass through in encrypted form External project or central data base IDAT (= Identity Data) TTP Pseudonym Data leak L85FD23S...... Maier, Johannes 6AZCB661 Maier, Josef KY2P96WA Maier, Jupp L85FD23S...... eavesdropper IDAT Pseudonym 24 / 30

5. Dependable IT systems Dependable IT systems Trustworthy (dependable) IT systems and networks General situation: challenge since >30 years, situation becomes worse What can go wrong will go wrong (see Peter Neumann s Risks Digest*). Computer related risks and vulnerabilities ubiquitous Dimensions: Availability, integrity, non-repudiation, confidentiality. How far can we trust our standard IT systems hardware, operating systems, software? How far can we trust external service providers? Will they get the security right? Privacy of EPR is not a question of shifting liabilities, but of fundamental rights. Comparing security of ehealth with home banking inadequate * www.risks.org 25 / 30

5. Dependable IT systems Challenges for dependable IT The EPR uses a highly vulnerable technology PCs and network infrastructure not trustworthy Intransparent operating systems Software, that permanently phones home Trusted Computing (TC) technology used for the profit of content industry, against the user Active content (macros) in files of every kind as vehicles for malware Tunnel techniques to evade firewalls Hundreds of targets for hackers. Implementation of IT security technology (TC, PKI, Smartcards,...) missing or inadequate. Techniques exist since at least 20 years, but rarely used Example: Smartcards in health care, Struif ca 1992 working prototype 26 / 30

5. Dependable IT systems Example: New Communication Technology Hospitals and general practitioners are online : Mobile technology Wireless networks Use of internet services Medical devices online Remote services Telemedicine Cloud computing, social networks: Naive use by employees of hospitals or practitioners Naive use by patients This causes many security problems and gaps. No mix of private and professional use! (Beware the scientists!) 27 / 30

Approaches to Safety and Security We have the means technology and schemes to make the EPR safe and secure in a world where know-how is adequately distributed and applied, where errors and bugs are a rare exception. Dear Developers: Devote a small percentage of the resources that go into the development of cool new features to knowhow in security. Consult Ross Anderson s book Security Engineering. Rent a hacker as consultant. Dear CIOs: Don t run for the latest cool new features only, also acquire security know-how and ask for security. 28 / 30

Layers of EPR Safety and Security Ethical layer: Values, principles, laws Management (governance) layer: Policies, access rules, trust relations, responsibilities, awareness Application layer: Policy enforcement, access control, trustworthy services Methodological layer: Network architecture and services, cryptography, pseudonymisation Technical layer: Secure hardware, secure OSs, network security 29 / 30

Summary The EPR is a highly sensitive object and needs as much protection as possible. By including genetic, AAL, and research data it will become even more sensitive. Protect Patient-Physician relationship as strongly as possible. For secondary use: Anonymisation is illusory, high re-identification risk is unavoidable, instead use pseudonyms, rely on transparency and control, engage ethic committees, scientific societies, patient communities. Strive for standards and certification. The protection of the EPR by current IT is insufficient. It will become even more insufficient by running for the newest innovations and by adding more complexity. Beware the next bug! There remain conflicts and even contradictions in requirements that are not easily solved. Balance sought between conflicting goals. 30 / 30