Documente Academic
Documente Profesional
Documente Cultură
INFORMATION TECHNOLOGY
INFORMATION ARCHITECTURE AND TECHNOLOGIES THAT SUPPORT HEALTH CARE INFORMATION SYSTEMS:
Believe that an exposure to some of the core technologies used to develop and implement common health care information systems is quite useful. This knowledge will help health care executives be more informed decision makers. We discuss tech !"!#ies used i e$ch !% the %!""!&i # c$te#!'ies: System software Data management and access etworks and data communications !nformation processing distribution schemes The !nternet" intranets" and extranets #linical and managerial decision support Trends in user interactions with systems
S(ste) S!%t&$'e:
!n this section we will begin with a general discussion of software and then define programming languages" operating systems" and interface engines$ The'e $'e t&! *$sic t(+es !% s!%t&$'e: %. systems software and &. applications software. These t&! t(+es !% s!%t&$'e h$,e $ c!))! ch$'$cte'istic: Both represent a series of computer programs. 'emember that at its most basic level of functioning the computer recogni(es two things" an electrical impulse that is on and an electrical impulse that is off) these signals are often represented as * and % +or bits,. - human programmer must write programming code to translate the desires of the user into computer actions. There are many different programming languages in use today" and they are continue to evolve. M$chi e "$ #u$#es are the oldest computer programming languages. .achine language programmers had to literally translate each character or operator into binary code" displayed as groups of *s and %s. .achine languages are often referred to as first generation languages. /ortunately" by the %01*s" assembly languages" the sec! d #e e'$ti! "$ #u$#es- were developed" which simplified machine language programming.
The +'!cedu'$" +'!#'$))i # "$ #u$#es +third generation," for example" /2'T'and #2B23" came along shortly after the assembly languages" allowing programmers to write computer programs without being as concerned with manually producing the machine language. T!d$(- %!u'th #e e'$ti! "$ #u$#es ./GLs0- which have many preprogrammed functions" allow individuals to develop applications without writing a single line of program code themselves. The software creates the code in the background" invisibly from the developer4s point of view. !n the data management section we will discuss st'uctu'ed 1ue'( "$ #u$#e .S2L," which is an example of a 563. T&! !the' t(+es of programming frequently used today are ,isu$" +'!#'$))i # $ d !*3ect-!'ie ted +'!#'$))i #. The most common type of ,isu$" +'!#'$))i # is .icrosoft4s 7isual Basic" which allows developers to see the final visual appearance of an application"such as the buttons" scroll8down menus" and windows" as they develop the application. The !*3ect-!'ie ted "$ #u$#es differ from traditional procedural languages in that they allow the programmer to create ob9ects that include the operations +methods, linked to the data. /or example" a master patient index +.:!, ob9ect would contain both the .:! data" such as medical record number" last name" first name" and so forth" and the procedures that use this data" such as assigning the medical record number" retrieving patient names by medical record number" and so forth. 2b9ect8oriented languages allow chunks of code to be reused and facilitate program maintenance. #ommon ob9ect8oriented programming languages are #;; and <ava. O+e'$ti # S(ste)s System software is a series of programs that carry out basic computing functions$ F!' e4$)+"e .anaging the user interface" files" and memory. System software also operates any peripherals linked to the computer" such as printers" monitors" and other devices. System software is what allows developers to create applications without having to include basic computer instructions. The operating system is loaded when a computer is turned on and it is responsible for managing all other programs that are subsequently used by the computer. #ommon types of operating systems are =indows +in several different versions," .ac 2S" >nix" and 3inux.
2perating systems may be proprietary or open source. :roprietary operating systems" such as =indows and .ac 2D. !n the %00*s open source +or nonproprietary, operating systems became viable when a /innish graduate student" 3inus Torvald" developed a variant of the operating system >nix" called 3inux.
I te'%$ce E #i es: -n interface engine is ?a software program designed to simplify the creation and management of interfaces between application systems@ . !nterfaces between applications became increasingly important as health care systems moved from best of breed to more integrated architectures. They wanted to eliminate the need for entering patient demographic information multiple times into separate systems" for example. !n fact" users began to ask for a single sign8on system so they could access all the information they needed through a single user interface. !nterface engines are actually a form of middleware" a class of software that works ?between@ or ?in the middle@ of applications and operating systems. 2ther examples of middleware are applications that check for viruses" medical logic processors" and data encryption software.
- newer database structure is the ob9ect8oriented database +22DB,. The basic component in the 22DB is an ob9ect rather than a table. -n ob9ect includes both data and the relationships among the data in a single conceptual structure. -n ob9ect8oriented database management system +22DB.S, uses classes and subclasses that inherit characteristics from one another in a hierarchical manner. Re"$ti! $" D$t$*$ses:
ADT
LAB
Transaction
D$t$ Dicti! $'ies 2ne very important step in developing a database to use in a health care application is the development of the data dictionary. The data dictionary gives both users and developers a clear understanding of the data elements contained in the database. A t(+ic$" d$t$ dicti! $'( $""!&s %!' the d!cu)e t$ti! !% Table names -ll attribute or field names - description or definition of each data element The data type of the field +text" number" date" and so forth, The format of each data element +such as DD8..8BBBB for the date, The si(e of each field +such as %% characters for a Social Security umber" including the dashes,
-n appropriate range of values for the field +such as integers ******C000000 for a medical record number, =hether or not the field is required +is it a primary key or linking keyD, 'elationships among fields C"i ic$" D$t$ Re+!sit!'ies: .any health care organi(ations" particularly those moving toward electronic medical records" develop clinical data repositories. -lthough these databases can take different forms" in general" the clinical data repository is a large database that gets data from various data stores within application systems across the organi(ation. D$t$ W$'eh!uses $ d D$t$ M$'ts: - data warehouse is a type of large database designed to support decision making in an organi(ation.Traditionally" health care organi(ations have collected data in a variety of on8line transactional processing +23T:, systems" such as the traditional relational database and clinical data repository.
Ch$'$cte'istic
:urpose Source of data
OLTP D$t$*$se
Support transaction processing Business transactions
D$t$ W$'eh!use
Support decision support .ultiple files" databases Data internal and External to the firm. 'ead only Simple and complex database queries with increasing use of data mining to recogni(e patterns in the data.
'elational
'elational
Detailed transactions
7ery limitedCtypically a few weeks or months 2n8line" ongoing process as transactions are captured
.ultiple years
:eriodic process" once per week or once per month #omplex" must combine data from many sources) data must go through a data cleanup process. .a9or effort to clean and integrate data from multiple sources.
D$t$ )$'ts are structurally similar to data warehouses but generally not as large. The typical
data mart is developed for a particular purpose or unit within an organi(ation.
D$t$ Mi i #:
Data mining is another concept closely associated with large databases such as clinical data repositories and data warehouses. Fealth care application vendors may use the term data mining when referring to the user interface of the data warehouse or data repository. Data mining refers to a sophisticated analysis tool that automatically discovers patterns among data in a data store. Net&!'5s $ d D$t$ C!))u ic$ti! s: The term data communications refers to the transmission of electronic data within or among computers and other related devices. The( 'e"$te t! d$t$ c!))u ic$ti! s- +$'ticu"$'"( i he$"th c$'e setti #s: etwork communication protocols etwork types and configurations etwork media and bandwidth etwork communication devices
RELATIONAL DATA6ASE MANAGEMENT SYSTEM COMPONENTS:
!nterface 7ariety of computer languages +7B-" <ava" Delphi" and so forth, Data .anipulation Data .anipulation 3anguage +D.3, Tables Data Definition 3anguage +DD3,
:atient
6oes
7isit
Fas
#linic
Sessi! .L$(e' 9:0 This layer establishes" manages" and terminates connections between applications. The session layer sets up" coordinates" and terminates conversations" exchanges" and dialogues between the applications at each end. !t deals with session and connection coordination. T'$ s+!'t .L$(e' /0 This layer provides transparent transfer of data between end systems" or hosts. !t ensures complete data transfer. Net&!'5 .L$(e' 30 This layer provides switching and routing technologies" creating logical paths" known as virtual circuits" for transmitting data from node to node. 'outing and forwarding are functions of this layer" as well as addressing" !nternet working" error handling" congestion control" and packet sequencing. D$t$ Li 5 .L$(e' :0 -t this layer" data packets are encoded and decoded into bits. !t furnishes transmission protocol knowledge and management and handles errors in the physical layer" flow control" and frame synchroni(ation. The data link layer is divided into two sublayers$ the media access control +.-#, layer and the logical link control +33#, layer. The .-# sublayer controls how a computer on the network gains access to the data and permission to transmit it. The 33# layer controls frame synchroni(ation" flow control" and error checking. Ph(sic$" .L$(e' ;0 This layer conveys the bit streamCelectrical impulse" light" or radio signalC through the network at the electrical and mechanical level. !t provides the hardware means of sending and receiving data on a carrier" including defining cables" cards" and physical aspects. /ast Ethernet and -T. are protocols with physical layer components. DATA FLOW IN THE OSI MODEL: -pplication+layer H, :resentation +3ayer I, Session +3ayer 1, Transport + 3ayer 5, etwork +3ayer J, Data 3ink +3ayer &, :hysical +3ayer %, :hysical layer -pplication+layer H, :resentation +3ayer I, Session +3ayer 1, Transport + 3ayer 5, etwork +3ayer J, Data 3ink +3ayer &, :hysical +3ayer %,
OSI MODEL COMPARED TO THE INTERNET MODEL: OSI M!de" -pplication+layer H, -pplication :resentation +3ayer I, Session +3ayer 1, Transport + 3ayer 5, etwork +3ayer J, Data 3ink +3ayer &, :hysical +3ayer %, Transport etwork !nterface I te' et )!de"
Medi$: 8!t refers to the physical ?wires@ or other transmission devices used on the network. Bandwidth is a measure of media capacity. ETHERNET NETWOR= IN A PHYSICAL STAR:
$%B
#oaxial cable. /iber optic cable .icrowaves Spread spectrum Se',ice C$''ie's:
#ommunications across a =- may involve some type of carrier. These telecommunications carriers provide telephone lines" satellites" modems"and other services that allow data to be transmitted across distances. 6$ d&idth: o Bandwidth is another name for the capacity of a transmission medium. 6enerally" the greater the capacity" or bandwidth" of the medium the greater the speed :>? .anaging Fealth #are !nformation Systems of transmission. Net&!'5 C!))u ic$ti! De,ices:
Hu*- -s its name implies" a hub is a device in which data from a network come together. 2n a
schematic" a hub may appear as the ?box@ where all the Ethernet lines come together for a 3or a segment of the 3- . Today single devices may serve as hubs and switches or even routers.
6'id#e8 - bridge connects networks that use the same communication protocol. !n the 2S!
reference model +/igure K.1," a bridge operates at the data link layer" which is fairly low in the model" which means that it cannot translate signals between networks using different protocols.
R!ute'-- router operates at a higher level" the network layer of the 2S! model.'outers are
more sophisticated devices than bridges. =hereas bridges send on all data they receive" routers are able to help determine the actual destination of specific data.
G$te&$(8 - gateway can connect networks that have different communication protocols.
These devices operate at the transport level of the 2S! model" or higher.
S&itch8 - switch may either be a gateway or a router. !n other words" it may operate
at the router level or at a higher level. There are many types of switches available on the market today. -ll switches will route" or switch" data to their destination
#onsensus. #onsensus8based standards come about when volunteers from various interested groups come together to reach a formal agreement on specifications. The process is generally open and involves considering comment and feedback.
D$t$ I te'ch$ #e St$ d$'ds: Fealth 3evel Seven standards Digital !maging and #ommunications in .edicine +D!#2.,
ational #ouncil for :rescription Drug :rograms + #:D:, - S! M%& standards He$"th Le,e" Se,e St$ d$'ds: %. The data to be exchanged &. The timing of the exchange J. The communication of errors between applications I $dditi! t! )ess$#i # st$ d$'ds- the HL7 !'#$ iA$ti! h$s +u*"ished the %!""!&i #: #linical #ontext .anagement +##., specifications +originally know as ##2=, -rden Syntax for .edical 3ogic Systems EF' functional model Di#it$" I)$#i # $ d C!))u ic$ti! s i Medici e: The stated purpose for the standard was to$ :romote communication of digital image information" regardless of device .anufacturer. /acilitate the development and expansion of picture archiving and communications systems +:-#S, that can also interface with other systems of hospital information. -llow the creation of diagnostic information data bases that can be interrogated by a wide variety of devices distributed geographically The current D!#2. standard accomplishes these purposes by specifying . - set of protocols for network communications. The syntax and semantics of commands which can be used with these protocols. - set of media storage services to be followed" including a file format and medical directory structure. N$ti! $" C!u ci" ! P'esc'i+ti! D'u# P'!#'$)s: The mission of the ational #ouncil for :rescription Drug :rograms + #:D:, is to ?create and promote data interchange standards for the pharmacy services sector of the health care industry" and to provide information and resources that educate the industry and support the diverse needs of its members@.
-merican Fealth !nformation .anagement -ssociation +-F!.-, -merican .edical -ssociation +-.-, -merican urses -ssociation +- -, -merican .edical !nformatics -ssociation +-.!-, #ollege of Fealthcare !nformation .anagement Executives +#F!.E, eFealth !nitiative +eF!, Fealthcare !nformation and .anagement Systems Society +F!.SS, ational -lliance for Fealth !nformation Technology + -F!T, HL7 EHR FUNCTIONAL MODEL OUTLINE: D#%.* #are .anagement D#&.* #linical Decision Support D#J.* 2perations .anagement and #ommunication S%.* #linical Support S&.* .easurement" -nalysis" 'esearch" 'eporting SJ.* -dministrative and /inancial ! %.* EF' Security ! &.* EF' !nformation and 'ecords .anagement ! J.* >nique identity" registry" and directory services ! 5.* Support for Fealth !nformatics N Terminology Standards ! 1.* !nteroperability ! I.* .anage business rules ! H.* =orkflow
C! ti uit( !% C$'e Rec!'d St$ d$'d: Ei#ht e"e)e ts: %. Document identifying information +Feader,$ contains information about the referring source and receiving source" the date" and the reason for the referral or transfer. &. :atient identifying information J. :atient insurance and financial information 5. :atient4s health status 1. -dvance directives I. #are documentation H. #are plan K. :roviders.
Eligibility for a Fealth :lan +M%& &H*A&H%, 'eferral #ertification and -uthori(ation +M%& &HK" or #:D: for retail pharmacy, Fealth #are #laim Status +M%& &HIA&HH, Enrollment and Disenrollment in a Fealth :lan +M%& KJ5, Fealth #are :ayment and 'emittance -dvice +M%& KJ1, Fealth :lan :remium :ayments +M%& K&*, #oordination of Benefits +M%& KJH" or #:D: for retail pharmacy, It i c"udes" !nternational #lassification of Diseases" ninth edition" clinical modification +!#D808#., #ode on Dental :rocedures and omenclature +#DT, Fealthcare #ommon :rocedural #oding System +F#:#S, #urrent :rocedural Terminology" fourth edition +#:T85,. A"" $'e si# i%ic$ t +"$(e's i the est$*"ish)e t !% he$"th c$'e i %!')$ti! st$ d$'ds: -ccredited Standards #ommittee M%& +- S! -S# M%&, Dental #ontent #ommittee of the -merican Dental -ssociation +-D- D##, Fealth 3evel Seven +F3H, ational #ouncil for :rescription Drug :rograms + #:D:, ational >niform Billing #ommittee + >B#, ational >niform #laim #ommittee + >##, N$ti! $" He$"thc$'e I %!')$ti! I %'$st'uctu'e: The F!! has th'ee overlapping dimensions $ %. :ersonal health$ includes a personal health record created and controlled by an individual or family member. &. Fealth care delivery$ includes clinical information from the providers of care" including decision8support programs and practice guidelines) providers would maintain control of their own patients4 health records. J. :ublic health$ this includes such things as vital statistics" population health information" and disease registries to improve the clinical management of population health. Se,e'$" s+eci%ic *$''ie's t! the 'e$"iA$ti! !% the NHII i this e ,i'! )e t h$,e *ee cited : 3ack of standards for system interoperability 3ack of incentives for establishing electronic systems at the point of care !nsufficient funding for related pro9ects :rivacy and security concerns.
The specifications contained in the Security 'ule are designated as either required or addressable. - required specification must be implemented by a #E for that organi(ation to be in compliance. !mplements the specification as stated. !mplements an alternative security measure to accomplish the purposes of the standard or specification. #hooses not to implement anything" provided it can demonstrate that the standard or specification is not reasonable and appropriate and that the standard can still be met. Out"i e !% HIPAA Secu'it( St$ d$'ds: Fi $" Ru"eThe -dministrative Safeguards section contains i e st$ d$'ds$ ;@ Secu'it( )$ $#e)e t %u cti! s: This standard requires the #E to implement policies and procedures to prevent" detect" contain" and correct security violations. There are four implementation specifications for this standard 'isk analysis +required,. The #E must conduct an accurate and thorough assessment of the potential risks to and vulnerabilities of the confidentiality" integrity" and availability of e:F!. 'isk management +required,. The #E must implement security measures that reduce risks and vulnerabilities to a reasonable and appropriate level. Sanction policy +required,. The #E must apply appropriate sanctions against workforce members who fail to comply with the #E4s security policies and procedures. !nformation system activity review +required,. The #E must implement procedures to regularly review records of information system activity" such as audit logs" access reports" and security incident tracking reports. &. -ssigned security responsibility. This standard does not have any implementation specifications. !t requires the #E to identify the individual responsible for overseeing development of the organi(ation4s security policies and procedures. J. =orkforce security. This standard requires the #E to implement policies and procedures to ensure that all members of its workforce have appropriate access to e:F! and to prevent those workforce members who do not have access from obtaining access. There are three implementation specifications for this standard$ -uthori(ation andAor supervision +addressable,. =orkforce clearance procedure +addressable,. Termination procedures +addressable,.
3@ !nformation access management. This standard requires the #E to implement policies and procedures for authori(ing access to e:F!. There are three implementation specifications within this standard. -ccess authori(ation +addressable,. The #E must have a process for granting access to e:F! through a workstation" transaction" program" or other process. -ccess establishment and modification +addressable,. The #E must have a process +based on the access authori(ation, to establish" document" review" and modify a user4s right to access to a workstation" transaction" program" or process. 1. Security awareness and training. This standard requires the #E to implement awareness and training programs for all members of its workforce. This training should include periodic security reminders and address protection from malicious software" log8in monitoring" and password management. I. Security incident reporting. This standard requires the #E to implement policies and procedures to address security incidents. H. #ontingency plan. This standard has five implementation specifications$ Data backup plan +required,. Disaster recovery plan +required,. Emergency mode operation plan +required,. Testing and revision procedures +addressable,. The #E should periodically test and modify all contingency plans. -pplications and data criticality analysis +addressable,. The #E should assess the relative criticality of specific applications and data in support of its contingency plan. K. Evaluation. This standard requires the #E to periodically perform technical and nontechnical evaluations in response to changes that may affect the security of e:F!. 0. Business associate contracts and other arrangements. This standard outlines the conditions under which a #E must have a formal agreement with business associates to exchange e:F!. The Ph(sic$" S$%e#u$'ds secti! c! t$i s %!u' st$ d$'ds: ;@ F$ci"it( $ccess c! t'!"s. This standard requires the #E to implement policies and procedures to limit physical access to its electronic information systems and the facilities in which they are housed to authori(ed users. There are %!u' i)+"e)e t$ti! specifications with this standard$ C C! ti #e c( !+e'$ti! s .$dd'ess$*"e0@ The #E should have a process for allowing facility access to support the restoration of lost data under the disaster recovery plan and emergency mode operation plan. F$ci"it( secu'it( +"$ .$dd'ess$*"e,. The #E must have a process to safeguard the facility and its equipment from unauthori(ed access" tampering" and theft.
Access c! t'!" $ d ,$"id$ti! +$dd'ess$*"e0@ The #E should have a process to control and validate access to facilities based on users4 roles or functions. C M$i te $ ce 'ec!'ds .$dd'ess$*"e0@ The #E should have a process to document repairs and modifications to the physical components of a facility as they relate to security. :@ W!'5st$ti! use: -DThis standard requires the #E to implement policies and procedures that specify the proper functions to be performed and the manner in which those functions are to be performed on a specific workstation or class of workstation that can be used to access e:F!" and that specify the physical attributes of the surroundings of such workstations. 3@ W!'5st$ti! secu'it(. This standard requires the #E to implement physical safeguards for all workstations that are used to access e:F! and to restrict access to authori(ed users. /@ De,ice $ d )edi$ c! t'!"s@ This standard requires the #E to implement policies and procedures for the movement of hardware and electronic media that contain e:F! into and out of a facility and within a facility. There are four implementation specifications with this standard$ Disposal +required,. The #E must have a process for the final disposition of e:F! and of the hardware and electronic media on which it is stored. .edia re8use +required,. The #E must have a process for removal of e:F! from electronic media before the media can be re8used. -ccountability +addressable,. The #E must maintain a record of movements of hardware and electronic media and any person responsible for these items. Data backup and storage +addressable,. The #E must create a retrievable" exact copy of e:F!" when needed" before movement of equipment. The Tech ic$" S$%e#u$'ds secti! h$s %i,e st$ d$'ds: ;@Access c! t'!"s: To access the functionality. :@ Audit c! t'!"s. This standard requires the #E to implement hardware" software" and procedures that record and examine activity in the information systems that contain e:F!. 3@ I te#'it(. This standard requires the #E to implement policies and procedures to protect e:F! from improper alteration or destruction. /@ Pe's! !' e tit( $uthe tic$ti! @ This standard requires the #E to implement procedures to verify that a person or entity seeking access to e:F! is in fact the person or entity claimed. 9@ T'$ s)issi! secu'it(@ This standard requires the #E to implement technical measures to guard against unauthori(ed access to e:F! being transmitted across a network.
The'e $'e t&! i)+"e)e t$ti! s+eci%ic$ti! s &ith this st$ d$'d: I te#'it( c! t'!"s .$dd'ess$*"e,. The #E must implement security measures to ensure that electronically transmitted e:F! is not improperly modified without detection. C E c'(+ti! .$dd'ess$*"e0@ The #E should encrypt e:F! whenever it is deemed appropriate.
The P!"icies- P'!cedu'es- $ d D!cu)e t$ti! secti! h$s t&! st$ d$'ds:
;@ P!"icies $ d +'!cedu'es@ This standard requires the #E to establish and implement policies and procedures to comply with the standards" implementation specifications" and other requirements. :@ D!cu)e t$ti! @ This standard requires the #E to maintain the policies and procedures implemented to comply with the security rule in written form. There are three implementation specifications$ C Ti)e "i)it .'e1ui'ed0@ The #E must retain the documentation for six years from the date of its creation or the date when it was last in effect" whichever is later. C A,$i"$*i"it( .'e1ui'ed0@ The #E must make the documentation available to those persons responsible for implementing the policies and procedures. C U+d$tes .'e1ui'ed,. The #E must review the documentation periodically and update it as needed. Ad)i ist'$ti,e S$%e#u$'ds: 'isk analysis and management #hief security officer System security evaluation Ris5 A $"(sis $ d M$ $#e)e t: ;@ 6!u d$'( de%i iti! During the boundary definition step the organi(ation should develop a detailed inventory of all health information and information systems. This review can be conducted using interviews" inspections" questionnaires" or other means. :@ Th'e$t ide ti%ic$ti! @ !dentifying threats will result in a list of all potential threats to the organi(ation4s health care information systems. The three general types of threats that should be considered are a. atural" such as floods and fires b. Fuman" which can be intentional or unintentional c. Environmental" such as power outages 3@ <u" e'$*i"it( ide ti%ic$ti! . !n this step the organi(ation identifies all the specific vulnerabilities that exist in its own health care information systems. 6enerally"
vulnerabilities take the form of flaws or weaknesses in system procedures or design. /@ Secu'it( c! t'!" $ $"(sis. The organi(ation also needs to conduct a thorough analysis of the security controls that are currently in place. These controls include both preventive controls" such as access controls and authentication procedures" and controls designed to detect actual or potential breaches" such as audit trails and alarms. 9@ Ris5 "i5e"ih!!d dete')i $ti! @ This step in the process involves assigning a risk rating to each area of the health care information system. There are a variety of rating systems that may be employed. =eil recommends using a fairly straightforward high8risk" medium8risk" and low8 risk system of rating. 8@ I)+$ct $ $"(sis. This is the step in which the organi(ation determines what the actual impact of specific security breaches would be. - breach may affect confidentiality" integrity" or availability. !mpact too can be rated as high" medium" or low. 7@ Ris5 dete')i $ti! . The information gathered up to this point in the risk analysis process is now brought together in order to determine the actual level of risk to specific information and specific information systems. The risk determination is based on" a. The likelihood that a certain threat will attempt to exploit a specific vulnerability +high" medium" or low, b. The level of impact should the threat successfully exploit the vulnerability +high" medium" or low, c. The adequacy of planned or existing security controls +high" medium" or low,. K@ Secu'it( c! t'!" 'ec!))e d$ti! s. The final step of the process is to compile a summary report on the findings of the analysis and recommendations for improving security controls. Chie% Secu'it( O%%ice': Each health care organi(ation must have a single individual who is responsible for overseeing the information security program. 6enerally" this individual is identified as the organi(ation4s chief security officer. The chief security officer may report to the chief information officer +#!2, or to another administrator in the health care organi(ation. S(ste) Secu'it( E,$"u$ti! : #hief security officers must periodically evaluate their organi(ation4s health care information systems and networks for proper technical controls and processes. #learly" an established set of health information technical standards for security would facilitate this evaluation process. 2ne source of such standards is the Department of Defense publication Trusted #omputer System Evaluation #riteria +T#SE#,. !t is sometimes referred to as the 2range Book" due to the color of its cover.
The 2range Book provides a rating system broken into four categories" Decision through Decision D. Decision D is the lowest8level security rating" indicating a system with no inherent security features. Ph(sic$" S$%e#u$'ds - security program must address physical as well as technical and administrative safeguards. :hysical safeguards involve protecting the actual computer hardware" software" data" and information from physical damage or loss due to natural" human" or environmental threats. -ssigned security responsibility .edia controls :hysical access controls =orkstation security Assi# ed Secu'it( Res+! si*i"it(: Each component of the health care information system should be secure" and one easily identifiable employee should be responsible for that security. These individuals are in turn accountable to the chief security officer. F!' e4$)+"e" in a nursing department the department manager might be responsible for ensuring that all employees have been trained to understand and use security measures and that they know the importance of maintaining the security of patient information. Medi$ C! t'!"s: The physical media on which health information is stored must be physically protected..edia controls are the policies and procedures that govern the receipt and removal of hardware" software" and computer media such as disks and tapes into and out of the organi(ation and also their movements inside the organi(ation. Ph(sic$" Access C! t'!"s: :hysical access controls are designed to limit physical access to health information to persons authori(ed to see that information. 3ocks and keys are examples of physical access controls. Tech ic$" S$%e#u$'ds: -ccess control Entity authentication -udit trails Data encryption /irewall protection
7irus checking Access C! t'!": #ontrol over access to health data may make use of any one of the following methods$ >ser8based access 'ole8based access #ontext8based access E tit( Authe tic$ti! : -utomatic log8off is a security procedure that causes a computer session to end after a predetermined period of inactivity" such as ten minutes. .ultiple software products are available that allow network administrators to set automatic log8off parameters. Entity authentication can be implemented in a number of different ways in a health care information system. The most common entity authentication method is a password system. 2ther mechanisms include personal identification numbers +:! s," biometric identification systems" telephone callback systems" and tokens. These implementation methods can be used alone or in combination with other systems. Security experts often encourage layered security systems that use more than one security mechanism. Th'ee )eth!ds %!' $uthe tic$ti! - and any two of them used together would constitute a two8factor system$ Something you know" such as a password or personal identification number +:! , Something you have" such as an -T. card" token" or swipe card Something you are" such as a biometric fingerprint" voice scan" or iris or retinal Scan. P$ss&!'d S(ste)s: The most common way to control access to a health care information system is through a combination of the user !D and a password or :! . >ser !Ds and passwords for a system are maintained either as a part of the access control list for the network or local operating system or in a special database. Pe's+ecti,e: P$ss&!'d D!Es $ d D! Ets: DONET: :ick a password that someone who knows you can easily guess +for example" do not use your Social Security umber" birthday" maiden name" pet4s name" child4s name" or car name,.
:ick a word that can be found in the dictionary +because cracker programs can rapidly try every word in the dictionaryO,. :ick a word that is currently newsworthy. :ick a password that is similar to your previous password. Share your password with others. DO: :ick a combination of letters and at least one number. :ick a password with at least eight characters" mixing uppercase and lowercase if your password system is case sensitive. :ick a word that you can easily remember. #hange your password often. 8Biometric !dentification Systems. Telephone #allback :rocedures Tokens -udit Trails$ o o o o !ndividual accountability. 'econstructing electronic events. :roblem monitoring !ntrusion detection.
D$t$ E c'(+ti! : Data encryption is used to ensure that data transferred from one location on a network to another are secure from anyone eavesdropping or seeking to intercept them. This becomes particularly important when sensitive data" such as health information" are transmitted over public networks such as the !nternet or across wireless networks. Secure data are data that cannot be intercepted" copied" modified" or deleted. Some basic terms associated with encryption are plaintext" encryption algorithm" ciphertext" and key. Pu*"ic =e( I %'$st'uctu'e: :ublic key cryptography addresses the basic problems of single" private key systems. !n a public key system" there are two keys" a private key and a public key. Basically" in this two8key system" data encrypted with the public key can be decrypted only by the private key" and data encrypted by the private key can be decrypted only by the public key. ENCRYPTION PROCEDURE@: :lain text :lain Text
Fi'e&$"" P'!tecti! : - firewall is ?a system or combination of systems that supports an access control policy between two networks@ +=hite" &**%,. The term firewall may be used to describe software that protects computing resources or to describe a combination of software" hardware" and policies that protects these resources. The *$sic t(+es !% %i'e&$""s $'e: +%, packet filter" or network level" and +&, proxy servers"or application level. <i'us Chec5i #: #omputer viruses come in many different varieties. The common types may be classified as$ /ile infectors" which attach to program files so that when a program is loaded the virus is also loaded System or boot8record infectors" which infect system areas of diskettes or hard disks .acro viruses" which infect .icrosoft =ord applications" inserting unwanted words or phrases A &!') is a special type of computer virus that stores and then replicates itself. =orms usually transfer from computer to computer via e8mail. These programs have th'ee )$i %e$tu'es$ 8G signature8based scanning" 8G terminate8resident monitoring" and 8G multilevel generic scanning. Secu'it( i $ Wi'e"ess E ,i'! )e t: Securing the handheld devices and laptop computers commonly associated with a wireless network also poses challenges for the health care organi(ation. #ases that do not appear to contain computers. #ables with locks that hook onto tables) once this cable is removed from the computer" an unauthori(ed person cannot turn the computer on.
-larms and software that ?instruct@ the computer to call and ?report@ its location#