Clinical Information System Security Policy
Clinical Information System Security Policy
Clinical Information System Security Policy
CS2305B
Introduction
The patients information is the most important data for
clinical affairs.
ACH95 (Keeping Information Confidential)
Doctors and other clinical professionals are worried
that making personal health information more widely available may endanger patient confidentiality
Clinician
Clinician (licensed professional such as a doctor, nurse,
dentist physiotherapist or pharmacist) who has access in the line of duty to personal health information and is
may access personal health information under the supervision of a healthcare professional (but the professional remains responsible for their conduct)
Patient
Patient (the individuals concerned or the individuals
representative)
The rules may depend on the wishes of the patient If the patient is a child, parent or guardian of a child will be
System
System(hardware, software, communications and manual
privilege of the patient, so only he way waive it and the consent must be informed, voluntary and competent
record kept on a computer system at all. It is unethical to discriminate against a patient who demands that his
insiders
Eg : most of the big UK banks now let any teller access
any customer's account (private detectives bribe tellers to get account information)
Security Policy
Principle 1 : Access control
Each identifiable clinical record shall be marked with an
Security Policy
Principle 2 : Record opening
A clinician may open a record with herself and the
with herself, the patient and the referring clinician on the access control list
Security Policy
Principle 3 : Control
One of the clinicians on the access control list must be
Security Policy
Principle 4 : Consent and notification
The responsible clinician must notify the patient of the
case
Security Policy
Principle 5 : Persistence
No-one shall have the ability to delete clinical
expired
Security Policy
Principle 6 : Attribution
All accesses to clinical records shall be marked on the
time
An audit trail must also be kept of all deletions
Security Policy
Principle 7 : Information flow
Information derived from record A may be appended to
in A's
Security Policy
Principle 8 : Aggregation control
There shall be effective measures to prevent the
Security Policy
Principle 9 : The Trusted Computing Base
Computer systems that handle personal health
information shall have a subsystem that enforces the above principles in an effective way
Its effectiveness shall be subject to evaluation by
independent experts
Conclusions
Based on the experience, we can conclude that the threats
to the confidentiality, integrity and availability of personal health information enforced the medical sector to developed a Clinical Information System that can give the high level protection to patients data.
Clinicians making decisions must be compliance with CISS
Policy
Conclusions
Nowadays, there is a lot of Clinical Information System but
still have a weakness that can cause the data of patients spread
So we need to enhance the already system so that we can
Reference: Dr Rose, J. A., (1996). Security in Clinical Information System. Computer Laboratory University of Cambridge.
THE END