Você está na página 1de 18

History of Health Information

Technology in the U.S.


History of Privacy and
Security Legislation
Lecture b Best Practices for
Information Security
This material Comp5_Unit10 was developed by The University of Alabama Birmingham, funded by the epartment of !ealth
and !uman "ervi#es, $ffi#e of the %ational Coordinator for !ealth &nformation Te#hnology under Award %umber
1U'($C0000')
History of Privacy and
Security Legislation
Learning Objectives

Describe security recommendations in the


199 re!ort entitled "#or the $ecord%
&
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
National esearch !ouncil "N!#
ecommended Security Practices

1991 committee convened

*ommittee on 2aintaining Privacy and Security in Health *are


3!!lications of the 4ational Information Infrastructure5
*ommission on Physical Sciences5 2athematics5 and
3!!lications5 4ational $esearch *ouncil

199 boo) !ublished


#or the $ecord6 Protecting 7lectronic Health Information

#ree e8ecutive summary available from6


htt!6//999-na!-edu/catalog/1191-html
Source6 :4ational $esearch *ouncil5 199;
,
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
N! ecommended Practices

Individual authentication of users

Strong authentication

7nter!rise<9ide authentication
=
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
N! ecommended Practices

Individual authentication of users

Strong authentication

7nter!rise<9ide authentication

Access controls

3ccess validation
1
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
N! ecommended Practices

Individual authentication of users

Strong authentication

7nter!rise<9ide authentication

Access controls

3ccess validation

Audit trails

Inter<organi>ational audit trails

Patient access to audit logs

Im!roved authori>ation forms


?
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
Security Practices

Health I' (or)force *urriculum


+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
Security Practices

Physical security and disaster recovery


@
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
Security Practices

Physical security and disaster recovery

Protection of remote access points


9
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
Security Practices

Physical security and disaster recovery

Protection of remote access !oints

Protection of external electronic


communications
1.
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
Security Practices

Soft9are disci!line
11
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
Security Practices

Soft9are disci!line

System assessment
1&
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
Security Practices

Soft9are disci!line

System assessment

Electronic authentication of records


1,
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
Security Policies

Explicit security policies

Security *ommittees

Information Security Afficer


1=
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
Security Policies

78!licit security !olicies

Security *ommittees

Information Security Afficer

Education and Training


11
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
Security Policies

78!licit security !olicies

Security *ommittees

Information Security Afficer

7ducation and 'raining

Sanctions
1?
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
History of Privacy and Security
Legislation
Summary $ Lecture b

"#or the $ecord% recommendations

3dministrative5 technical5 !hysical security

Incor!orated in HIP33 Security $ule

Best !ractices5 but challenging to im!lement


1
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
History of Privacy and Security
Legislation
eferences $ Lecture b
1@
Health I' (or)force *urriculum
+ersion
,-./S!ring &.1&
History of Health Information 'echnology in the 0-S-
History of Privacy and Security
Legislation
Lecture b
References
*ommittee on 2aintaining Privacy and Security in Health *are 3!!lications of the 4ational Information
Infrastructure5 *ommission on Physical Sciences5 2athematics5 and 3!!lications5 4ational $esearch *ouncil- #or
the record6 !rotecting electronic health information BInternetC- (ashington :D*;6 4ational 3cademy PressD 199-
3vailable from6 htt!6//999-na!-edu/catalog/1191-html

Você também pode gostar