As patients face the possibility of copying and
keeping their electronic health records (EHRs) through
portable storage media, they will encounter new risks to the
protection of their private information. In this literature
review. Every public health care has an obligation for
managing medical privacy information. We propose a
method to preserve the privacy and security of patients'
portable medical records in portable storage media to avoid
any inappropriate or unintentional disclosure. There are
some methods that can be used in Protecting Electronic
Health Record, such as: Protect Identifiers, Patient Control,
Confidentiality, Integrity, Authentication, Authorization,
Availability, Non-Repudiation, and using A Hybrid Public
Key Infrastructure Solution (HPKI). The Result of this
literature review will give the best way, according to the
condition of every public health care in managing medical
privacy information of every patient.
Published In : IJCAT Journal Volume 2, Issue 7
Date of Publication : July 2015
Pages : 253 - 258
Figures :03
Tables : 02
Publication Link :Managing Privacy Medical Information on Security
Perspective
Dedy Hartama : Department of Computer Science, University of Sumatera Utara
Hartono : Department of Computer Science, University of Sumatera Utara
Electronic Health Records (EHRs)
Confidentiality
Authentication
Authorization
Non-
Repudiation
Portable EHRs will likely be the trend in the future,
because patientswant to exercise their right to access their
EHRs. This means that when patients have their EHRs
from hospitals, they will take over responsibility for the
information obtained. The Government also have an
important position in making a regulation as a law that
enrolled the Privacy of Medical Information. From the
literature review, we understand that Health Insurance
Portability and Accountability Act (HIPAA) has set
privacy and security regulations forthe US health-care
industry. HIPAA has also established principles for
security standards that global e-health industry trends to
follow. There are some methods that can be used in
Protecting Electronic Health Record, such as: Protect
Identifiers, Patient Control, Confidentiality, Integrity,
Authentication, Authorization, Availability, Non-
Repudiation, and using A Hybrid Public Key
Infrastructure Solution (HPKI).
[1] Assuli, Ofir Ben. 2015. Electronic Health Records,
Adoption, Quality of Care, Legal, and Privacy Issues
and Their Implementation in Emergency Departments.
International Journal Health Policy Vol. 119: pp. 287-
297
[2] Faria, Paula Lobato de, Cordeiro, Joao Valente. 2014.
Health Data Privacy and Confidentiality Rights: Crisis
or Redemption. International Journal of Rev Port
Saude Public Vol. 32(2): pp. 123-133
[3] Ghazvini, Arash and Shukur, Zarina. 2013. Security
Challenges and Success Factors of Electronic
Healthcare System. Proceedings of The 4th
International Conference on Electrical Engineering
(ICEEI 2013): pp. 212-219
[4] Gobuty, David E. 2003. Organizing Security and
Privacy Enforcement ini Medical Imaging Technology.
International Congress Series: pp. 319-329
[5] Häyarinen K, Saranto K, Nykänen P. 2008. Definition,
structure, content, use and impacts of electronic health
records: a review ofthe research literature. International
Journal of Medical InformaticsVol. 77:291–304.
[6] Hu, Jiankun, Chen, Hsiao Hwa, and Hou, Ting Wei.
2010. A Hybrid Public Key Infrastructure Solution
(HPKI) for HIPAA Privacy/Security Regulations.
International Journal of Computer Standars and
Interface Vol. 32: pp. 274 – 280
[7] Huang, Lu Chou, Huei, Chung Chu, Chung, Yueh
Lien, Chia, Hung Hsiao, and Tsai, Kao. 2009. Privacy
Preservation and Information Security Protection for
Patients Portal Electronic Health Records. International
Journal of Computer in Biology and Medicine Vol. 39:
pp. 743-750
[8] J.A. Hansen, N.M. Hansen. 2010. A taxonomy of
vulnerabilities in implantable medical devices.
International Proceedings of the Second Annual
Workshop on Security and Privacy in Medical and
Home-care Systems, SPIMACS ’10, ACM, New York,
USA: pp. 13–20.
[9] Malin BA, El Emam K, O’Keefe CM. 2013.
Biomedical data privacy: problems, perspectives, and
recent advances. International Journal of the American
Medical Informatics AssociationVol. 20(1): pp. 2–6.
[10] Nunez, Carmen Camara, Lopez, Pedro Peris, Tapiador,
Juan E. 2015. Security and Privacy Issues in
Implantable Medical Devices: A Comprehensive
Survey. International Journal of Biomedical
Informatics: pp. 1-18
[11] Perera, Gihan, Holbrook, Anne, Thabane, Lehana,
Foster, Gary, and Willison, Donald J. 2011. Views on
Health Information Sharing and Privacy From Primary
Care Practices Using Electronic Medical Records.
International Journal of Medical Informatics Vol. 80:
pp. 94-101
[12] S.E. Ross, C.T. Lin. 2003. The effects of promoting
patient access to medical records: a review.
International Journal Am Med Inform AssocVol. 10:
pp. 129–138.
[13] Yang, Che Ming, Lin, Herng Ching, Chang, Polun, and
Jian, Wen Shan. 2006. Taiwan’s Perpective on
Electronic Medical Records Security and Privacy
Protection: Lesson Learned from HIPAA. International
Journal of Computer Methods and Programs in
Biomedicine Vol. 82: pp. 277-282