Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
1
2
3
4
5

Events

Articles

Jun 27 : Security Challenges of EMRs

security challenges of emrs

Under his recently unveiled fiscal stimulus plan, President Obama seeks to invest up to US$20 Billion in federal funds to achieve widespread deployment of Electronic Medical Records (EMRs). A principal reason for his initiative is to improve our nation’s health care system by reducing long term costs and increasing effectiveness of our health outlays. So what exactly is an Electronic Medical Record and what does this new direction mean for security and privacy professionals?

By Feisal Nanji

CSO — Under his recently unveiled fiscal stimulus plan, President Obama seeks to invest up to US$20 Billion in federal funds to achieve widespread deployment of Electronic Medical Records (EMRs). A principal reason for his initiative is to improve our nation’s health care system by reducing long term costs and increasing effectiveness of our health outlays. So what exactly is an Electronic Medical Record and what does this new direction mean for security and privacy professionals?

At its core, an Electronic Medical Record (EMR) is the effective capture, dissemination, and analysis of medical and health related information for a single patient. All participants in the health care delivery system have a stake in efficient information flows. They include health care providers, insurers, government agencies, claims processors, and patients. Thus the term EMR has a slightly different meaning depending on one’s perspective. Indeed, Electronic Medical Records managed by individuals are termed Personal Health Records (PHRs). PHRs capture all relevant personal health details, including diagnoses, X-Rays, and similar items into a single repository. Individuals are then empowered to make health decisions for themselves, to easily choose among providers, to selectively disclose medical conditions, and to receive optimum care during emergencies. Both Google and Microsoft offer services for individuals to create, manage, and store their PHRs. We expect that there will be an explosion in demand as the computer-savvy population ages.

The focus of this article, however, is on the secure use of EMRs by institutions and health providers in a regulatory arena rife with complexity and with strict privacy and safety requirements. Consider a typical hospital with a relatively well functioning EMR system. Using EMRs, doctors can conduct much of their business totally electronically. This is in sharp contrast to traditional care environments where paper shuffling is the norm. Using EMRs, doctors can review patient histories and charts, obtain laboratory results, generate referrals for specialist consultations, prescribe medicines, and diagnose images all without the use of paper. This sounds utopian, and in many ways it is.

But the soft underbelly of EMRs is the difficulty in adequately securing such records. Key security and privacy concerns for EMR systems include:

— Hacking incidents on EMR systems that lead to altering of patient data or destruction of clinical systems

— Misuse of health information records by authorized users of EMR systems

— Long term data management concerns surrounding EMR systems

— Government or corporate intrusion into private health care matters

At first glance, these issues do not appear to be very difficult to solve. The reality is that hospitals and other care environments are complex institutions with complex workflows. A great many staff need immediate access to medical records. These include emergency technicians, admitting staff, doctors, nurses, and back-office personnel in billing and accounting. A quick fix might be to install role based access control (RBAC) mechanisms that allow for fine-grained permissions.

But in a security and remediation effort we conducted for a large health care provider, we discovered that retrofitting RBAC mechanisms into an existing EMR system was actually quite a complex undertaking. Assigning roles is particularly tricky across various hospital departments and personnel. An inadvertent stripping of viewing rights, for example, could result in a surgeon unable to view critical images in the operating theater. That could easily lead to a catastrophe and so ease of access considerations remain paramount. In our view, this has resulted in most EMR systems implementations to have less than desirable security postures.

Take, for example, an unauthorized disclosure of medical records to the press for an individual with the HIV virus. The effect could be devastating. Unintended outcomes might include family or community ostracism, job loss and denial of medical benefits. While there are legal statutes to prevent harmful effects of such disclosures, practically these may be of little solace to the individual whose record was released. One can imagine an insurer denying claims by insisting that the condition was pre-existing. These situations can and do occur in real life, and hospitals and care providers must take heed.

The probability of a large security breach (of the network or EMR application) also leaves many hospital administrators and compliance officers shuddering over the specter of privacy violations. Health Information Portability and Accounting Act (HIPAA) violations can have severe consequences, and new state regulations such as in California impose considerable penalties for the errant disclosure of medical records.

From our work at a large health care provider, we found that security breaches could be relatively easy to accomplish. Many EMRs are now connected to web applications (or are web applications themselves) making for relatively easy targets. We also found diagnostic systems that have direct connections to the hospital networks. Since these systems also have remote diagnostic capabilities for troubleshooting or downloading new software, installing a worm on the network that incapacitates, for example, all networked X-Ray machines is not out of the realm of possibility.

At one facility, observations that subsequently led us to a focused remediation path included:

1. The compliance organization at the facility was hampered by inadequate technology, resources and processes for monitoring and acting on potential privacy violations.

2. Application security vulnerability identification and management by the EMR vendor was inadequate and sorely needed

3. Security monitoring especially at the application and database level needed substantial improvement.

4. Secure data lifecycle management was not a priority during EMR system deployment. As a result items of specific concern included:

– Haphazard long term data storage and archiving approach

– Inappropriate data purging

– Murky data ownership responsibilities

– Inadequate procedures and systems for information asset discovery

– Inadequate data classification

– Insecure handling of physical media

While contemplating doomsday scenarios alone is not helpful, we believe that hospitals and large health institutions must tackle the notion of security and privacy in a very diligent and holistic way–almost akin to what the financial industry did to secure their transaction systems in the mid 2000’s. Without a concerted effort at every layer of the information infrastructure (device, network, and application), strict policies and use guidelines, and accurate monitoring capabilities, EMR deployments could crawl to a halt. The country needs better answers for securing EMRs. With the imminent outlays proposed by our new President to modernize our health care system, security professionals must step to the fore.

Source

HIMSS Special Part 1: HIT Visionary Zach Fox
Check out industry insight from HIT visionary and DrFirst Executive VP and GM, Zach Fox. Visit DrFirst at HIMSS Booth 6232.
We respect your privacy. Your information is safe and will never be shared.
Don't miss out. Subscribe today.
×
×
WordPress Popup
HIMSS Special Part 1: HIT Visionary David Lareau
Check out industry insight from HIT visionary and Medicomp CEO, David Lareau. Visit Medicomp at HIMSS Booth 3421
We respect your privacy. Your information is safe and will never be shared.
Don't miss out. Subscribe today.
×
×
WordPress Popup
casipoldiyarbetetabetetabetw88w88w88betfokusbetfokuslordbahisparobetparobetbuzbahisbullbahiscasino sérieuxcasino sérieuxcasino sérieuxcasino sérieuxcasino en ligne populairemeilleur site de jeux casino en lignemeilleur site de jeux casino en lignecasino en ligne en francecasino en ligne en francecasino en ligne de confiancebetbinanstwinplayistanbulbahisistanbulbahisistanbulbahisparis sportifs hors arjelonwin üyeliksahabet üyelikrestbet girişpulibetsüperbetinbtcbahiscanlı casino sitelerionline casino1xbet mobilligobet mobilcapitolbetmostbet üyelikbizbet üyelikgobahis girişmatbet girişikimisli girişbordobet girişbetcio girişalfabahisalfabahisbetgoowinxbetwinxbetwinxbetwinxbetbetkanyontaksimbetrexabetrexabetrexabetenobahisbookmaker hors arjelparis sportifs en Italieparier sur les cornersparier sur le nombre de tirsmystake chickenparis hippiques en ligneplinko francecasino diceBetzinoVasyCbetCasino Lucky8betkanyonbetkanyontaksimbettaksimbettaksimbettaksimbetbetistbetistbetistenobahisenobahisenobahisbetkolikbetkoliksmartbahissmartbahissmartbahistrendbettrendbetgamabetgamabetgamabetgamabetaspercasinoaspercasinoaspercasinonisanbetnisanbetnewbahismelbetonbahisbetonredbetonredromabettipobettipobetefes casinobetandreasfixbetbetbababetbababuzbahisbuzbahisbullbahisbullbahisbetsofbetsofall right casinokombinebetbetbinansbetbinansbetbinansmaksatbahisbetbabaorisbetorisbetbizimbahissiyahbethayalbahishayalbahishilbetsantosbettingsantosbettingsantosbettingsantosbettingnerobetnerobetswordbetswordbetswordbetinbahislevabetlevabetlevabetcasiveracasiveracasiverakordonbetkareasbetprincessbetkikbetkikbetkikbetbetmarketbetmarketbetmarketyapbahsinibetingoasyabahishipercasinocasinoperbahisnowsüpertotobetalibahisfaulbetfaulbetrelaxbahisbetingoasyabahiscasinopercasinoperbahisnowbahisnowpiyasabetpiyasabetyonjabetcasinoslotbetibombetibomredwinbitslercresus casinocresus casino aviscresus casino gratuitcresus casino connexioncresus casino connexioncresus casino connexioncresus casino applicationwild sultanwild sultan casino en lignewild sultan aviswild sultan francewild sultan bonuswild sultan vipwild sultan viptortuga casinotortuga casinotortuga casino en lignetortuga casino avistortuga casino bonus sans dépôttortuga casino applicationtortuga casino applicationmadnixmadnix casino avismadnix casino avismadnix casino en lignemadnix casino en lignemadnix casino bonus sans dépôtmadnix casino bonus sans dépôtmadnix casino retraitmadnix casino mon comptemadnix casino mon comptewinouiwinouiwinoui casinowinoui casino connexionwinoui casino connexionwinoui casino en lignemagical spinmagical spin casino50 free spins magical spinmagical spin code promomagical spin code promoazur casinoazur casinoazur casino avisazur casino en ligneazur casino en ligneazur casino mobileazur casino mobileazur casino mon comptelucky8lucky8lucky8lucky8 se connecterlucky8 avislucky8 avislucky8 mon comptebetifybetifybetifybetify avisbetify casinobetify retraitcasino jokacasino jokacasino joka vipcasino joka vipcasino joka connexionjoka casino en lignelucky31lucky31lucky31 casinolucky31 connexionlucky31 avislucky31 avislucky31 francespace fortunaspace fortunaspace fortunaspace fortuna casinospace fortuna avisspace fortuna connexionspace fortuna gmkjackpot bobjackpot bobjackpot bobjackpot bob avis777 jackpot bob777 jackpot bobjackpot bob casino bonus sans dépôtjackpot bob casino bonus sans dépôtamon casinoamon casinoamon casinoamon casinoamon casino en ligneamon casino bonus sans depotamon casino bonus sans depotamon casino applicationamon casino applicationamon casino applicationmoi casinomoi casinomoi casinomoi casino avismoi casino avismoi casino avismoi casino connexionamon casino bonus sans depotmoi casino applicationlucky8 interdit en francebetify connexionjoka casino avisjoka casino avislucky31 blackjackspace fortuna retraitjackpot bob applicationamon casino inscriptionmoi casino en lignejackpot bob inscriptionamon casino retraitamon casino retraitmoi casino inscriptionmoi casino retraitmadnix applicationmadnix inscriptiontortuga casino retraittortuga casino retraittortuga casino compte bloquétortuga casino mon compteazur casino bonusazur casino applicationmagical spin 10 eurosmagical spin retraitbetpas üyelikbetboo üyeliksüperbetin üyelikspace fortuna bonus sans dépôtspace fortuna applicationspace fortuna inscriptionbetify bonusbetify promo codebetify inscriptioncasino joka applicationcasino joka bonus sans dépôtcasino joka inscriptionlucky31 bonus sans depotlucky31 retraitmariobetbetsat üyelikpinup üyeliklucky31 applicationbetpas üyeliksüperbetin üyeliksultanbet üyeliklucky31 inscriptionwild sultan bonus sans depotwild sultan bonus sans depotwild sultan retraitwild sultan retraitwild sultan retraitwild sultan casino bonus sans dépôtcresus casino bonuscresus casino compte bloquécresus casino privéwinoui casino bonus sans dépôtwinoui casino françaiswinoui problèmewinoui applicationwinoui inscriptionbetmatik üyelikmariobet üyelikmariobet üyelikbetsat üyelikbetonred üyelikbetonred üyelikbetonred üyelikbetonred üyelik7slots üyelikstarda üyelikmaslakcasinomaslakcasinomaslakcasinobahisbeyportbetportbetportbetrbetrbetrbetrbetsahabet üyelik1xbet üyeliktipobet üyeliktipobet üyelikmostbet üyelikmostbet üyelikmostbet üyelikmostbet üyelikligobet üyelikbizbet üyelikbahsinebetsahasantabetegobetwolbetkralbetbetorspininterbahisgobahisbordobetbordobetretrobetbetciofreybetfavorisenbetboxbetmabetbetmabetbetmüzebetgitmislibetshowbahisyonjabetviplobyhedefbetlucky8 bonuslucky spinlucky8 bonus sans dépôtlucky8 compte bloquélucky8 compte bloquémakrobetilbetvdcasinomaltcasinomaltcasinoceltabitceltabitlordcasinolordcasinohızlıbahishızlıbahisprestijbetbetzmarkbetzulaenobahismedyabahis