Security of Electronic Medical Information and Patient Privacy
Abstract
Tujuan penelitian ini adalah untuk mengeksplorasi implementasi keamanan sistem Rekam Medis The responsibility that physicians have to protect their patients from harm extends to protecting the privacy and confidentiality of patient health information including that contained within radiological images. The intent of HIPAA and subsequent HIPAA Privacy and Security Rules is to keep patients’ private information confidential while allowing providers access to and maintaining the integrity ofrelevant information needed to provide care. Failure to comply with electronic protected health information (ePHI) regulations could result in financial or criminal penalties or both. Protected health information refers to anything that can reasonably be used to identify a patient (eg, name, age, date of birth, social security number, radiology examination accession number). The basic tools and techniques used to maintain medical information security and patient privacy described in this article include physical safeguards such as computer device isolation and data backup, technical safeguards such as firewalls and secure transmission modes, and administrative safeguards including documentation of security policies, training of staff, and audit tracking through system logs. Other important concepts related to privacy and security are explained, including user authentication, authorization, availability, confidentiality, data integrity, and nonrepudiation. Patient privacy and security of medical information are critical elements in today’s electronic health care environment. Radiology has led the way in adopting digital systems to make possible the availability of medical information anywhere anytime, and in identifying and working to eliminate any risks to patients.
Downloads
References
[2]CMS. HIPAA—general information. Available at: http://www.cms.hhs. gov/ HIPAAGenInfo. Updated April 2, 2013.Accessed August 28, 2014.
[3]ACR/RSNA. Glossary of terms. Available at http://www.radiologyinfo. org/en/ glossary/glossary1.cfm?pid¼1. Accessed August 8, 2024.
[4]Medical Imaging and Technology Alliance. Security and privacy. Available at: http:// www.medicalimaging.org/policy-and- positions/joint-security-and-privacy- committee-2/. Accessed August 28, 2014.
[5]Dwyer SJ, Reiner BI, Siegel EL. Security issues in the digital medical enterprise. 2nd ed. Society for Computer Applications in Radiology; Leesburg, VA 2024.
[6]Integrating the Healthcare Enterprise. Cookbook: preparingthe IHEprofilesecurity section (risk management in healthcare IT). Available at: http://www.ihe.net/Technical_ Framework/upload/IHE_ITI_Whitepaper_ Security_Cookbook_2008-11-10.pdf. Accessed August 8, 2024.
[7]Integrating the Healthcare Enterprise. IHE IT infrastructure white paper on health information exchange (HIE) security and privacy through IHE profiles. Version 2.0. Available at: http://www.ihe.net/Technical_ Framework/upload/IHE_ITI_Whitepaper_ Security_and_Privacy_of_HIE_ 2008-08-22-2.pdf. Accessed August 8, 2024.
[8]Andriole KP, Khorasani R. Patient privacy and security of electronic medical information for radiologists: the basics. J Am Coll Radiol 2020;7:397-9.
[9]Branstetter B IV.
Copyright (c) 2024 Katherine P. Andriole, Sings Sings
This work is licensed under a Creative Commons Attribution 4.0 International License.