Managing Privacy Medical Information on Security Perspective  
  Authors : Dedy Hartama; Hartono

 

As patients face the possibility of copying and keeping their electronic health records (EHRs) through portable storage media, they will encounter new risks to the protection of their private information. In this literature review. Every public health care has an obligation for managing medical privacy information. We propose a method to preserve the privacy and security of patients' portable medical records in portable storage media to avoid any inappropriate or unintentional disclosure. There are some methods that can be used in Protecting Electronic Health Record, such as: Protect Identifiers, Patient Control, Confidentiality, Integrity, Authentication, Authorization, Availability, Non-Repudiation, and using A Hybrid Public Key Infrastructure Solution (HPKI). The Result of this literature review will give the best way, according to the condition of every public health care in managing medical privacy information of every patient.

 

Published In : IJCAT Journal Volume 2, Issue 7

Date of Publication : July 2015

Pages : 253 - 258

Figures :03

Tables : 02

Publication Link :Managing Privacy Medical Information on Security Perspective

 

 

 

Dedy Hartama : Department of Computer Science, University of Sumatera Utara

Hartono : Department of Computer Science, University of Sumatera Utara

 

 

 

 

 

 

 

Electronic Health Records (EHRs)

Confidentiality

Authentication

Authorization

Non- Repudiation

Portable EHRs will likely be the trend in the future, because patientswant to exercise their right to access their EHRs. This means that when patients have their EHRs from hospitals, they will take over responsibility for the information obtained. The Government also have an important position in making a regulation as a law that enrolled the Privacy of Medical Information. From the literature review, we understand that Health Insurance Portability and Accountability Act (HIPAA) has set privacy and security regulations forthe US health-care industry. HIPAA has also established principles for security standards that global e-health industry trends to follow. There are some methods that can be used in Protecting Electronic Health Record, such as: Protect Identifiers, Patient Control, Confidentiality, Integrity, Authentication, Authorization, Availability, Non- Repudiation, and using A Hybrid Public Key Infrastructure Solution (HPKI).

 

 

 

 

 

 

 

 

 

[1] Assuli, Ofir Ben. 2015. Electronic Health Records, Adoption, Quality of Care, Legal, and Privacy Issues and Their Implementation in Emergency Departments. International Journal Health Policy Vol. 119: pp. 287- 297 [2] Faria, Paula Lobato de, Cordeiro, Joao Valente. 2014. Health Data Privacy and Confidentiality Rights: Crisis or Redemption. International Journal of Rev Port Saude Public Vol. 32(2): pp. 123-133 [3] Ghazvini, Arash and Shukur, Zarina. 2013. Security Challenges and Success Factors of Electronic Healthcare System. Proceedings of The 4th International Conference on Electrical Engineering (ICEEI 2013): pp. 212-219 [4] Gobuty, David E. 2003. Organizing Security and Privacy Enforcement ini Medical Imaging Technology. International Congress Series: pp. 319-329 [5] Häyarinen K, Saranto K, Nykänen P. 2008. Definition, structure, content, use and impacts of electronic health records: a review ofthe research literature. International Journal of Medical InformaticsVol. 77:291–304. [6] Hu, Jiankun, Chen, Hsiao Hwa, and Hou, Ting Wei. 2010. A Hybrid Public Key Infrastructure Solution (HPKI) for HIPAA Privacy/Security Regulations. International Journal of Computer Standars and Interface Vol. 32: pp. 274 – 280 [7] Huang, Lu Chou, Huei, Chung Chu, Chung, Yueh Lien, Chia, Hung Hsiao, and Tsai, Kao. 2009. Privacy Preservation and Information Security Protection for Patients Portal Electronic Health Records. International Journal of Computer in Biology and Medicine Vol. 39: pp. 743-750 [8] J.A. Hansen, N.M. Hansen. 2010. A taxonomy of vulnerabilities in implantable medical devices. International Proceedings of the Second Annual Workshop on Security and Privacy in Medical and Home-care Systems, SPIMACS ’10, ACM, New York, USA: pp. 13–20. [9] Malin BA, El Emam K, O’Keefe CM. 2013. Biomedical data privacy: problems, perspectives, and recent advances. International Journal of the American Medical Informatics AssociationVol. 20(1): pp. 2–6. [10] Nunez, Carmen Camara, Lopez, Pedro Peris, Tapiador, Juan E. 2015. Security and Privacy Issues in Implantable Medical Devices: A Comprehensive Survey. International Journal of Biomedical Informatics: pp. 1-18 [11] Perera, Gihan, Holbrook, Anne, Thabane, Lehana, Foster, Gary, and Willison, Donald J. 2011. Views on Health Information Sharing and Privacy From Primary Care Practices Using Electronic Medical Records. International Journal of Medical Informatics Vol. 80: pp. 94-101 [12] S.E. Ross, C.T. Lin. 2003. The effects of promoting patient access to medical records: a review. International Journal Am Med Inform AssocVol. 10: pp. 129–138. [13] Yang, Che Ming, Lin, Herng Ching, Chang, Polun, and Jian, Wen Shan. 2006. Taiwan’s Perpective on Electronic Medical Records Security and Privacy Protection: Lesson Learned from HIPAA. International Journal of Computer Methods and Programs in Biomedicine Vol. 82: pp. 277-282