Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
31
1
2
3
4
5
6
8
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
31
1
2
3
Bruker Corporation to Present at the 37th Annual J.P. Morgan Healthcare Conference
Bruker Corporation (NASDAQ: BRKR) announced today it will participate in the 37th annual J.P. Morgan Healthcare Conference in San Francisco. Frank Laukien, Chairman, President & CEO and Gerald Herman, CFO [...]
Allergan to Present at the 37th Annual J.P. Morgan Healthcare Conference
2019-01-07    
3:30 pm
Allergan plc (NYSE: AGN), a leading global biopharmaceutical company, today announced that Chairman and CEO Brent Saunders will present at the 37th Annual J.P. Morgan Healthcare Conference in San Francisco, [...]
Johnson & Johnson to Participate in 37th Annual JP Morgan Health Care Conference
2019-01-07    
3:30 pm
Johnson & Johnson (NYSE: JNJ) will participate in the 37th Annual JP Morgan Health Care Conference on Monday, Jan. 7th, at the Westin St. Francis in San Francisco.  Joseph J. [...]
Halozyme Therapeutics To Present At The 37th Annual J.P. Morgan Healthcare Conference
2019-01-09    
10:30 am
Halozyme Therapeutics, Inc. (NASDAQ: HALO), a biotechnology company developing novel oncology and drug-delivery therapies, will be presenting at the 37th Annual J.P. Morgan Healthcare Conference in San [...]
International Conference on Chemistry, Chemical Engineering and Chemical Process
2019-01-30 - 2019-01-31    
All Day
It is a great pleasure and an honor to extend to you a warm invitation to attend the "International Conference on Chemistry, Chemical Engineering and [...]
Streamline HCP Workflow • Drive Patient Education • Navigate the Specialty Prescribing Landscape
2019-02-01    
12:00 am
The original and most comprehensive conference series dedicated entirely to strategies for effective utilization of e-Rx and EHR technologies is back for 2019. Whether new [...]
Articles

3 EHR Security Lessons from Anthem’s Security Breach

3 ehr security

Exclusive Article by Ronald Vatalaro at EMRIndustry.com

As the medical industry goes high-tech with the implementation of electronic health records (EHR), credit card companies are not the only targets catching the eye of cybercriminals.

A massive security breach made public in February at Anthem, the nation’s second largest health insurer, sheds light on the importance of security and vigilance as healthcare providers and others bring sensitive patient information into the world of e-healthcare.

About the Anthem Breach

The breach at Anthem, the medical insurer of one in nine Americans, occurred on Dec. 10, 2014. The compromise went undetected until Jan. 27, 2015, when a database administrator became aware of someone using his credentials to perform a suspicious query.

Just two days later, Anthem reported the findings of its internal investigation to federal authorities and the breach was made public on Feb. 4.

Anthem’s breach makes it very clear that vigilance is necessary as EHRs are implemented in practices and facilities across the country.

Safe data storage with networks and security processes designed to protect patient information that includes account numbers, names, addresses, Social Security numbers and more, must be created.

3 Key Takeaways

The highly publicized breach at Anthem teaches lessons all healthcare-related providers using EHRs can benefit from.

Three main takeaways from the cyberattack pinpoint the responsibilities providers and support agencies, such as insurance companies, have in safeguarding their patient and/or client information:

System Considerations

Selection of systems to handle the need for EHR must go beyond program features and bells and whistles. Organizations must seek out products that deliver security features consistent with their needs and the sensitivity of the information stored on patients’ behalf.

Sound EHRs offer the ability to limit access and provide screening controls so only authorized staff can access sensitive information.

In addition, user activity logging features provide audit trails that record all navigation in the system while features that require users to justify manual printing of information limit the potential for unauthorized screen printing and unauthorized downloading of information.

Seeking out and demanding informatics systems that offer these safeguards and more is fast becoming critical.

Recommendations for HIM Professionals

Health Information Management professionals find themselves in not just the role of organizing, collecting and managing patient data, but also making sure it is protected.

With that in mind, HIM professionals must ensure their EHRs offer the functionality necessary for the organization to meet regulatory and operational requirements while safeguarding patient information.

Recommendations for doing so include:

  • Identifying the location of information in the organization to verify state-specific guidelines
  • Identifying functions in the system that create risk and working to limit or restrict their use
  • Identifying security features that deliver higher levels of protection and implementing their use to safeguard sensitive information
  • When choosing an EHR system, it falls on HIM professionals to systematically and independently evaluate the system without relying on vendor information to gauge system functionality
  • Creating partnerships with IT counterparts to ensure the best functionality and security on a day-to-day basis

Security Features to Consider

Making sure EHRs deliver the necessary level of security to avoid breaches such as Anthem’s requires inclusion of a number of security features in the system itself.

These distinct features can make a difference in providing appropriate levels of protection:

  • Role-based security that restricts access to information based on pre-established categories of patients, encounters and documents based on specific job requirements of the user
  • VIP status indicators that enable restriction of identified patients and encounters to only those with VIP permissions
  • Ability to create an alias to mask patient identity
  • Ability to restrict physician access to only those patients the doctor serves as the physician of record for
  • Blocking abilities for specific progress notes or lab results
  • Ability to track and mask sensitive entries for release of information

Where to Turn for More Assistance

HIM professionals and others interested in learning more about how to safeguard sensitive patient data will find the federal government provides a clearinghouse of information on privacy and security via HealthIT.gov.

This website provides step-by-step plans for ensuring patient privacy and security, offers advice on how to integrate privacy and security into a medical practice and discusses privacy and security in regard to meaningful use, among other crucial topics.

As EHRs take the practice of medicine further into the high-tech world, cybercriminals are taking note. Safeguarding sensitive information is critical for protecting patients and their identities.

As the Anthem breach demonstrates, this brave new world is giving rise to potential pitfalls that HIM professionals must serve as sentinels against.

Ron Vatalaro works at Bisk Education with the USF Health online and writes about health informatics. Ron holds an advanced degree in Business Administration with a concentration in technology.

Take the USF Health Online 2015 Health IT Industry Survey .