2011年4月17日星期日

Health care in Transition data security

Health IT Boosts Patient Care, Safety
(click the image for a larger view)
Slideshow: Health it stimulates the Patient Care, SafetyAs hospitals move their security efforts, health, security of the data is in transition. External hackers are less a concern these days that insiders snooping on medical and financial records electronic. Hospitals is to share more data with practices of small doctor who may not have sufficient safeguards in place, while mobile devices are extend well beyond institutional walls, networks. In addition, the Federal personal information protection and security standards get more strong, as are penalties for violation of these rules.

"Your greatest [threats] are internal," Terrell Herzig, security officer information of the University of Alabama at Birmingham health system (UAB), said Tuesday at a health it Conference in Atlanta. "." Employees are known for take peaks unauthorized in the files of figures such as local celebrities or prominent citizens, and with more than 50 million uninsured Americans, there is a black market thriving for identification numbers stolen and fraudulent health plan.

"We are emphasizing awareness and education" for employees and medical staff, said Mark Moroses, officer of information Chief of Continuum health partners, a system of five-hospital in New York. "We are trying to do step to have a strong hand in less flagrant violation." The loop of education is what we focus on. ?

Still, after a local newspaper exposed security vulnerabilities in a hospital in Continuum by obtaining an insider to emphasize how access to patient records, economy turns south, helped authorities stop and continue the employee, who was she had stolen patient identities to another hospital, but was not taken. "We did a better job of gathering of evidence," said economy turns south.

"You cannot lock the whole," said Cigdem main Delano, information officer at Morehouse School of Medicine (MSM) in Atlanta, said. "Regardless of what you do, always there is a human factor.

During this time, security and compliance officers are trying to find a delicate balance between the protection of their data and make it systems so difficult to navigate than users - especially these whimsical creatures known as physicians - rebel.

"You can also too have security," said Delano. At least someone in the MSM intended legal Department Ministry of Defense-level security in the clinical computer server room, said. But the school of medicine is not to do something with implications of national security bioterrorism research.

However, UAB has some contracts with the National Institutes of Health that involve potentially sensitive data, but did not want to prevent end users by forcing them to enter a complex password whenever they turned the computer for a few seconds. Herzig and his team chose thin client with the two factors as smart card authentication. If users remove their cards without closing a session, their sessions to remain frozen. They can reinsert cards to other workstations and simply return a personal identification number to return to work.

Continuum has essentially become its computers on wheels dumb terminal, economy turns south, said and next year will have only thin clients available for most end users. This is what Mike Wall, CEO of grid DICOM, a provider of storage Phoenix cloud and the archiving of digital medical images, called a "zero footprint" from the security perspective: no data stored on local computers.

"The whole zero-footprint thing is great, said Herzig, particularly in the era of mobility." "We made the decision that we were going to manage data, step of devices," he said.

Sometimes, however, it is impossible to keep all internal data, such as application to a growing number of patients for electronic copies of medical records and images. This is where the encryption comes in. Herzig talks to find a CD has clearly marked with the name of the patient lying in the hospital parking lot. The image on the disk was not guaranteed.

Apparently, this is a common phenomenon. "All the facilities to go to, there is a problem of CD," said wall, whose company, of course, has an interest in moving images in the cloud.

According to economy turns south, in the two years or more have security providers important information Summers to provide end-end encryption products and services end-to-health organizations. Prior to this, it was rather piecemeal.

"We went through what I affectionately call encryption conniptions", adds Herzig. "She be continuous through the space."


View the original article here


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

没有评论:

发表评论