Protecting Patient Information in Outsourced Telehealth Services: Bolting on Security when it cannot be Baked in
نویسندگان
چکیده
Hospitals have increasingly employed outsourcing to lower the cost of healthcare delivery and improve efficiency and quality, thereby, enabling more focus on core competencies of patient care, teaching, and research. Outsourcing presents a challenge for protecting patient information when new services are implemented or integrated into an existing healthcare information system. Enabling new outsourced telehealth services often requires “bolting on” security to legacy systems rather than “baking” it into the system. This article addresses security practices necessary for healthcare organizations implementing new telehealth services as part of an outsourced relationship. While a number of recommendations are available for security readiness assessments pursuant to HIPAA compliance, none directly addresses the challenge of implementing security for outsourced clinical services. A case study is presented for a recent implementation of teleradiology services within a large regional hospital. Using the case, system vulnerabilities are demonstrated and relevant best practices to mitigate exposing patient information are discussed.
منابع مشابه
A Method for Protecting Access Pattern in Outsourced Data
Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...
متن کاملOn the Security of O-PSI a Delegated Private Set Intersection on Outsourced Datasets (Extended Version)
In recent years, determining the common information privately and efficiently between two mutually mistrusting parties have become an important issue in social networks. Many Private set intersection (PSI) protocols have been introduced to address this issue. By applying these protocols, two parties can compute the intersection between their sets without disclosing any information about compone...
متن کاملOutsourced Services and the Applied Models in Bushehr University of Medical Sciences in 2019
Background: Outsourcing as an effective strategy in public management has attracted policy-makers. Awareness of quantity and quality of implementing this strategy can help policy-makers and managers to remove barriers to this policy. This study aimed to investigate outsourced services and the applied models in Bushehr University of Medical Sciences. Materials and Methods: This descriptive cros...
متن کاملارائه مدل انتخاب و ارزیابی تامین کنندگان خدمات برون سپاری بر پایه ی رویکرد تحلیل سلسله مراتبی در بیمارستانها
Background: In recent years, Hashemi Nejad Hospital was outsourced or insourced some of their services to private sector or will have decision to do it. Selection and assessment of suppliers in outsourcing of hospital services is a critical issue. In this study, selecting and evaluating suppliers for outsourcing services in hospitals was evaluated. Materials and Methods: In order to achieve th...
متن کاملSome Multidimensional Unintended Consequences of Telehealth Utilization: A Multi-Project Evaluation Synthesis
Background Telehealth initiatives have bloomed around the globe, but their integration and diffusion remain challenging because of the complex issues they raise. Available evidence around telehealth usually deals with its expected effects and benefits, but its unintended consequences (UCs) and influencing factors are little documented. This study aims to explore, describe and analyze mult...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IJISP
دوره 2 شماره
صفحات -
تاریخ انتشار 2008