Medical Data: It S Only Sensitive If It Hurts When You Touch It
Medical Data: It S Only Sensitive If It Hurts When You Touch It
Medical Data: It S Only Sensitive If It Hurts When You Touch It
Topics
A brief history of confidentiality and
information security in healthcare:
Hippocrates to HIPAA
Security vulnerabilities in healthcare
settings
Why is this so hard to do?
Models for medical information access
Professional Ethics
AMA Principles of Medical Ethics (sect.
4, 1920 edition): A physician shall
Legal Context
Right to control ones bodily integrity
Right to control ones interpersonal
relationships
Utility or instrumental value is trust
between patient and physician.
HIPAA Rules
HIPAA Definitions
Health information means any information,
whether oral or recorded in any form or
medium, that:
1) Is created or received by a health care
provider, and;
2) Relates to past, present, or future physical
or mental health or condition of an
individualor provision of health care..or
payment for provision of health care.
HIPAA definitions
Covered entity - organization responsible for
HIPAA compliance.
Protected Health Information (PHI) information generated in the course of
providing healthcare that can be uniquely
linked to them
Information use = use within organization
Information disclosure = release outside of
organization
Overview of effects of
HIPAA Privacy Rule
Gives individuals the right to:
A written notice of information practices from
health plans and providers
Inspect and copy their Protected Health Info
Obtain a record of disclosures
Request amendments to their medical records
Have reasonable requests for confidential
communications accommodated
Request restrictions on uses and disclosures
Complain about violations to the covered entity
and to HHS
Overview of effects of
HIPAA Privacy Rule
Requires covered entities to:
Make a good faith effort to get signed acknowledgement of
information practices related to Protected Health Information (PHI)
used in treatment, payment and operations (TPO)
Obtain authorization for special additional uses of PHI
Designate a privacy official
Develop policies and procedures (including receiving complaints)
Provide privacy training to their workforce
Develop a system of sanctions for employees who violate the
entitys policies
Meet documentation requirements
Implement appropriate administrative, technical, & physical
safeguards to protect privacy
HIPAA Round 2:
the Security Rule
Overview
Affects HIPAA Covered Entities that
maintain Protected Health Information
(PHI) in electronic form
Directs CEs to develop, implement,
maintain, and document security
measures, and keep them current.
Security Vulnerabilities in
Healthcare Settings
Unintentional disclosures
Well-intentioned but inappropriate
employee behavior
Disgruntled employees
Self-insured employers
? Competitors
VIP patients
Hackers
Data mining
Name
Visit date
Address
Diagnosis
ZIP
Procedure
Birth
date
Medication
Sex
Total charge
Anonymous
Medicare Data
Date
registered
Party
affiliation
Date last
voted
Voter List
Latanya Sweeney, MIT, 1997
Uniqueness in Cambridge
voters
Birth date alone
Birth date & gender
Birth date & 5-digit ZIP
Birth date & full postal code
12%
29%
69%
97%
Second order:
Providers: primary vs. consultant provider,
ancillary support staff
Patient: self, family, legally authorized reps
Payer: billing staff and subcontractors,
clearinghouses, insurers
Society: public health agencies, state medical
boards, law enforcement agencies
Healthcare Information
Access Roles
Community
Support
Internal QA
External
accreditation
orgs
Primary care
Friends
Legally Authorized
Reps
Specialists
Ancillaries
Extended
Family
Immediate
Patient Provider
Family
Admin.
Clinical
Trials
Sponsors
Staff
Claims
Processors
Fraud
Detection Subcontractors
Payer
Public Health
Society
State Licensure
Clearinghouses
Medical
Information
Bureau
Insurers
Business
Consultants
Law
Enforcement
Boards National
Security
Bioterrorism
Detection
$995
Patient-Centered Access to
Secure Systems Online
A National Library of Medicine
Telemedicine Research Contract
Dixie Baker, Ph.D.
Chief Scientist
Center for Information Security Technology
Science Applications International Corp.
Daniel R. Masys, M.D.
Director of Biomedical Informatics
University of California, San Diego
PCASSO functions
Protect healthcare information at multiple levels of
sensitivity
Authorize user actions based on familiar healthcare
roles
End-to-end user accountability
Empower consumers to access their own medical
records
Patient viewable audit trails
Automated e-mail notification of records changes
Security protection extended to user PC
PCASSO users
218 physicians enrolled (started January,
1999)
53 patients enrolled as of 9/30/99 (started
June, 1999)
Enrollment criteria:
Age 18 or older
Receive health care from UCSD
One or more visits in past 6 months
Primary care physician co-signs consent
Patients
Very
Reasonable
77%
Reasonable
25%
16%
Unreasonable
41%
Intolerable
33%
Implementation:
e-Consent objects
Rights management wrappers associated
with clinical information that record the
assertion:
Access to (information)
by an (entity)
for a (purpose)
in a (context)
is {consented to | denied }
Could attach to specific facts, episodes of
care, or complete medical record
Medical Errors
Between 44,000-98,000 preventable deaths
each year in hospitals
Injury rates from 2.9% (general med-surg) to
46% (ICU settings)
7th leading cause of death in US
Likely underestimates due to:
Injury thresholds for reporting
Errors had to be documented in clinical
record
Medical Errors
Majority of errors do not result from individual
recklessness, but from flaws in health system
organization (or lack of organization).
Failures of information management are common: