Data Flow and Management in Radiation Therapy



Similar documents
LAW OFFICE SECURITY for Small Firms and Sole Practitioners. Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan

Stable and Secure Network Infrastructure Benchmarks

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Cloud Computing. Chapter 10 Disaster Recovery and Business Continuity and the Cloud

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.

Hosting Solutions Made Simple. Managed Services - Overview and Pricing

How To Use Quantum Rbs Inc. Small Business Backup

Chapter 8: Security Measures Test your knowledge

Information Technology Security Procedures

Mapping Your Path to the Cloud. A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software.

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Countering and reducing ICT security risks 1. Physical and environmental risks

HIGH AVAILABILITY DISASTER RECOVERY SOLUTION

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Top 10 Reasons for Using Disk-based Online Server Backup and Recovery

Financial Services Need More than Just Backup... But they don t need to spend more! axcient.com

Backup Strategies for Small Business

How To Back Up Your Computer With A Hard Drive On A Usb Or Usb 2 (For Small Businesses)

InsightCloud. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

Information Security It s Everyone s Responsibility

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

Read this guide and you ll discover:

The 7 Disaster Planning Essentials

Cyber Security Awareness

Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services

CMPT 471 Networking II

MSP Service Matrix. Servers

Firewall and UTM Solutions Guide

High Speed Internet - User Guide. Welcome to. your world.

Avaya TM G700 Media Gateway Security. White Paper

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice

Avaya G700 Media Gateway Security - Issue 1.0

Why cloud backup? Top 10 reasons

EHRs and Information Availability: Are You At Risk?

Ovation Security Center Data Sheet

Online Backup by Mozy. Common Questions

Planning and Implementing Disaster Recovery for DICOM Medical Images

Cyber Security Awareness

Manufacturers Need More Than Just Backup... But they don t need to spend more! axcient.com

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.

FAQ. Hosted Data Disaster Protection

Making the leap to the cloud: IS my data private and secure?

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

'Namgis Information Technology Policies

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

Ovation Security Center Data Sheet

5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS

Cyber Security Best Practices

WHY CLOUD BACKUP: TOP 10 REASONS

Apptix Online Backup by Mozy

Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005

The Vital IT Protection- V.I.P. Network Support Program Overview Vital Voice & Data ext 301

Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices

Security. CLOUD VIDEO CONFERENCING AND CALLING Whitepaper. October Page 1 of 9

Computer Backup Strategies

How To Write A Health Care Security Rule For A University

Network/Cyber Security

Business Continuity and Disaster Survival Strategies for the Small and Mid Size Business.

Is online backup right for your business? Eight reasons to consider protecting your data with a hybrid backup solution

Did you know your security solution can help with PCI compliance too?

Top tips for improved network security

ESET Mobile Security Business Edition for Windows Mobile

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

USING GENIE REMOTELY

Disaster Recovery for Small Businesses

IT Networking and Security

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

SERVICE LEVEL AGREEMENT

AVG AntiVirus. How does this benefit you?

COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name

Internet threats: steps to security for your small business

Chapter 7 Information System Security and Control

Michael Longo ext 301

ELECTRONIC MEDICAL RECORDS (EMR) STREAMLINE CH I PROCESS. Ping Xia, Ph.D. Head of Medical Physics Department of Radiation Oncology Cleveland Clinic

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices

Cbeyond Cloud Server Packages

Desktop and Laptop Security Policy

How to Plan for Disaster Recovery

White Paper FASTFILE / Page 1

Client Hardware and Infrastructure Suggested Best Practices

Cisco Advanced Services for Network Security

Transcription:

Data Flow and Management in Radiation Therapy Issues in Data Flow and Data Management in Radiation Oncology DICOM- an Overview with an Emphasis on Therapy - R. Siochi Issues in Data Flow Management in Radiation Oncology: Disaster Recovery - C. Brack

Issues in Data Flow and Data Management in Radiation Oncology The Medical Physics Perspective, Ph.D. DABMP

Learning Objectives: 1. Review the variety of types of patient data common in Radiation Oncology. 2. Understand the basics of HIPAA as it pertains to pertaining that data and business continuity. 3. Understand the various causes of electronic data loss, including viruses, worms, computer system failures and theft. 4. Review how network topology can be used to enhance efficiency as well as provide additional layers of protection for patient data.

Am I in the right room? Do you ever have computer problems? Do you want SAM credit? Pre-requisites: Your computer is plugged in You ve tried rebooting You still have problems.

Overview Radiation Therapy has evolved to the point that all clinical information and processes are computerized. However, this evolution had occurred in relative isolation from other departments which we now want to be integrated with. Patient records are in the hospital EMR, the RO EMR, DI PACS Everything is networked the network is the key.

Evolution Teletherapy units had relays and time/mu were set via mechanical thumb-wheels.

Evolution Teletherapy units had relays and time/mu were set via mechanical thumb-wheels. Computers were added as a front-end and electromechanical controls were hidden from the user.

Evolution Teletherapy units had relays and time/mu were set via mechanical thumb-wheels. Computers were added as a front-end and electromechanical controls were hidden from the user. Computers became the exclusive control system. 3 rd -party R&V systems were added as a second smart computer layer.

Evolution R&V systems evolved into Electronic Medical Records (EMR) including billing and scheduling. Ancillary devices (MLCs, Epics, Gating, kv imaging, etc.) were added to Linacs with additional control computers.

Evolution CT images were transferred from radiology to RT for treatment planning. Patients were simulated on simulators. RT departments acquired their own CTsimulators. RT images are generally not transferred to PACS (radiology). RT imaging expanded to include daily CT, MR-simulators

Evolution Cancer care has changed. Patients used to get either surgery, chemotherapy or cancer. Now, it is common for patients to get combined therapies, 2 or all 3 of the above. This has increased the need for (computer) communication between different departments within the hospital.

HIPAA Health Insurance Portability and Accountability Act Patient data must be available to the patient, therefore, you must not lose it. Patient data must not be available to anyone not authorized. So again, you can t lose it, but you also must not share it, inadvertently or otherwise. Result has significant implications for network security and data backups and archives.

Data Management Multiple sources of data are used in patient care: Outside images brought by patient on disk In-house DI imagining: CT, MR, PET RO images: 4D-CT, PET-CT, MR-sim, DRRs, portal images, kv setups, CB-CT, MVCT Treatment plans: image registrations, field information, dose distributions Can you retrospectively show how a patient s care was determined and carried out? How long can you show that?

Patient Data Patient DICOM DICOM RT Extension Visit Study Study Image RT Image RT Dose RT Structure Set RT Plan RT Treatment Record Objects

Data Management Online Storage for current/recent patients. R&V database Treatment planning database Imaging database Archives for completed patients. How do you restore? How are the archives protected? How long will the archive last? Backups for disaster recovery. Must test backup and restore. How long will you be down after your server dies?

Data Storage RAID (Redundant Array of Inexpensive Disks) disks generally required. Can automatically make duplicate copy of all data, and alert user if one copy/disk fails before both copies are lost. Backup servers are important too. Try to eliminate single points of failure that could disable your clinic. It is not enough to preserve the data; you need real-time access to it.

Data Storage Off-site storage is required as well. If a disaster occurred in the building where the data is housed (e.g. a fire), there should be another copy in a remote location. Test backups. Too often software is used to backup data (even with verification), but no attempt is made to restore it. It is surprising how often restore attempts fail. Reasons can be media has shelf life, software upgrades/incompatibilities, etc.

Volume: Data Storage How much data do you need to store this month? How much data will you need to store next month? How long does it take to transfer the data? How fast do you need to be able to get to the data?

Protection of patient data requires all of the following EXCEPT: 20% 20% 20% 20% 20% 1. Provision of backup for all systems. 2. Proper storage and retention for all electronic data 3. System downtime and recovery plans for unexpected computer downtimes 4. Maintenance of a support manual and how-to guide for computer systems and information 5. Support for DICOM-RT 10

1. Protection of patient data requires all of the following EXCEPT: (a) Provision of backup for all systems (b) Proper storage and retention for all electronic data (c) System downtime and recovery plans for unexpected computer downtimes (d) Maintenance of a support manual and how-to guide for computer systems and information (e) Support for DICOM-RT Answer: (e) -- Support for DICOM-RT DICOM-RT is what we want, but not a requirement of HIPAA. Ref 1: ACR Practice Guideline for Electronic Medical Information Privacy and Security, Rev. 2009. Ref 2: Siochi et al. Information technology resource management in radiation oncology. JACMP 10(4), 2009.

The Network Generally, data can be transferred among all of the computers that are part of the clinic via a local area network (LAN). Computers on the LAN can also reach the internet through a hospital connection point to allow access to external e-mail, the WWW, ftp sites, etc. Multiple functions and multiple users raises many security issues.

LiteBo x LiteBo x LiteBo The Network CT MR Archive HIS / RIS Portal Imaging 1. Image Image All Not DICOM Image Image Image, SS, 2. SS, Plan, Image 3. SS, Plan, Image, SS, 4. All 5. Record Plan Simulator Virtual Sim. TPS Review St. Treatment

The Network Data flow is controlled by routers and switches. Their primary job is to route the data from its source to its destination. Firewalls are hardware devices and software applications designed to restrict connectivity. Limit access from outside the institution (e.g. to stop hackers) Isolate segments of the LAN (e.g. improve workflow) Block specific ports or applications (e.g. no ftp) Intercept/block malware

Computer Threats Virus, worms, hackers and other threats can steal confidential information, corrupt computer systems and disable clinical functions. Legitimate computer use can also interfere with other clinical operations (bandwidth and network traffic). The bad guys can be attacking from the hallway, not just the internet.

Network Security A roadmap of your network should be organized to improve dataflow and security. Hospital firewall (between internet and LAN) does not protect against malware brought in via laptops, memory sticks, e- mail or WWW links. Hospital anti-virus software is not always compatible with clinical computers (MLC, Linux computers, etc.)

Data on Radiation oncology systems is secured by all of the following EXCEPT: 20% 20% 20% 20% 20% 1. Firewalls. 2. User passwords 3. Linux 4. Conventional locks and keys 5. Encryption technology 10

2. Data on Radiation oncology systems is secured by all of the following EXCEPT (a) Firewall(s) (b) User passwords (c) Linux (d) Conventional locks and keys (e) Encryption technology Answer: c - Linux Security must be applied to all systems, Windows, Linux, even Macs.. Ref 1: ACR Practice Guideline for Electronic Medical Information Privacy and Security, Rev. 2009. Ref 2: Siochi et al. Information technology resource management in radiation oncology. JACMP 10(4), 2009

LAN Topology RO computer systems with distinctly different functions should be organized within specific layers of security. This can be accomplished with programmable switches and/or internal firewalls. Real-time clinical devices (Linac controller, MLC controller, etc.) Secondary clinical devices (Treatment planning system, film scanner, etc.) Non-clinical devices (e.g. office desktop computers)

LAN Topology Real-time clinical devices should have their own private LAN (or VLAN) for communication amongst themselves and not allow access except by other computers within the hospital. E.g. MLCs must operate in real-time and cannot be interrupted by misdirected network traffic. R&V system needs to monitor Linac control computer and not be slowed by web browsing or corrupted by e-mail download.

LAN Topology Similarly, other clinical devices should have limited connectivity outside the department (e.g. radiology yes, WWW no) for workflow efficiency, data security, and business continuity. E.g. data transfer from CT-simulator to treatment planning system can be corrupted by excessive network traffic. Virus downloaded via e-mail can end up on CT simulator and disrupt department workflow.

LAN Topology Desktop computers generally need relatively open access to the internet (unsecure). However, because they may contain clinical information and because they are on the LAN, they still need some protection. E.g. ftp protocol (port 21) should be blocked because passwords are transferred unencrypted.

Good network topology can enhance all of the following EXCEPT: 20% 20% 20% 20% 20% 1. Speed of data transfers. 2. Integrity of data transfers. 3. Security of computer systems 4. Data storage space 5. Business continuity. 10

3. Good network topology can enhance all of the following EXCEPT (a) Speed of data transfers (b) Integrity of data transfers (c) Security of computer systems (d) Data storage space (e) Business continuity Answer: d Data storage space Network topology can affect access time for data storage, but not the amount of space available. Ref 1: ACR Practice Guideline for Electronic Medical Information Privacy and Security, Rev. 2009. Ref 2: Siochi et al. Information technology resource management in radiation oncology. JACMP 10(4), 2009.

Portable Devices Portable devices (laptops, USB hard drives, memory sticks) are a significant risk. They can be taken outside the hospital firewall and become infected with any number of malware files. These files are then brought inside the firewall (evading its protection) by employees. The threat is even greater if these portable devices are then connected directly to clinical computers (instead of desktop computers).

Portable Devices Portable devices are also more prone to theft or accidental loss. This creates the potential of exposing a patient s private information to whoever finds/steals the device. Carrying patient data outside the institution should be restricted to limit such losses. Note: all off-site archives contain patient information that has been carried outside the institution.

Portable Devices Within the institution portable devices especially need physical protection: them must be locked/chained so they cannot easily be stolen. Portable devices should also be encrypted. Such data is scrambled and generally can only be unscrambled by someone who knows the encryption password. All computer systems in the institution should require physical and password protection.

Medical physicists Support Team Computer functions, resource needs, team coordinator Professional RO IT Specialists in various systems: network hardware, various operating systems, backup and data archiving Vendors Tools, environment configuration, application training

HIPAA stands for: 20% 20% 20% 20% 20% 1. Health Information Portability and Accountability Act. 2. Health Insurance Portability and Accountability Act. 3. Health Insurance Privacy and Accountability Act 4. Health Information Privacy and Accountability Act 5. Health Information Privacy and Assurance Act. 10

4. HIPAA stands for (a) Health Information Portability and Accountability Act (b) Health Insurance Portability and Accountability Act (c) Health Insurance Privacy and Accountability Act (d) Health Information Privacy and Accountability Act (e) Health Information Privacy and Assurance Act Answer: b - Health Insurance Portability and Accountability Act Remember, one P, two A s. Electronic records are supposed to increase portability and accountability. The privacy that we are all concerned about is just part of the overall act. Ref: ACR Practice Guideline for Electronic Medical Information Privacy and Security, Rev. 2009.

References Institute of Medicine, To Err is Human: Building a Safer Health System. 2000. Nikiforidis et al., Med. Phys. 33, 2006. Kagadis et al., Med. Phys. 35 (1), 2008. ACR Practice Guideline for Electronic Medical Information Privacy and Security, Rev. 2009. Siochi and Brack, Medical Physics 36 (9), 2009. Siochi et al., JACMP 10(4), 2009.