 To explain the relationship between dependability and health care quality and safety.  To identify and explain five guidelines for dependability.

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

David Assee BBA, MCSE Florida International University
Chapter 10. Understand the importance of establishing a health care organization-wide security program. Identify significant threats—internal, external,
PROFESSIONAL NURSING PRACTICE
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
CHAPTER © 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2 The Use of Health Information Technology in Physician Practices.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Workshop on High Confidence Medical Device Software and Systems (HCMDSS) Research & Roadmap June 2-3, 2005 Philadelphia, PA. Manufacturer/Care-Giver Perspective.
© 2005, QEI Inc. all characteristics subject to change. For clarity purposes, some displays may be simulated. Any trademarks mentioned remain the exclusive.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
Security Controls – What Works
Information Security Policies and Standards
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
MANAGING INFORMATION SYSTEM IN HIS IN DEVELOPING COUNTRIES.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Software Dependability CIS 376 Bruce R. Maxim UM-Dearborn.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Chapter 1 Database Systems. Good decisions require good information derived from raw facts Data is managed most efficiently when stored in a database.
Information Security Technological Security Implementation and Privacy Protection.
The Use of Health Information Technology in Physician Practices
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
OVERVIEW OF INFORMATION SYSTEM (IS) AUDITING NORHAFIZAH BINTI ABDUL MUDALIP YAP YONG TECK TAN YUAN JUE TAY QIU JIE GROUP MEMBER:
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Copyright © 2008 Delmar Learning. All rights reserved. Unit 8 Observation, Reporting, and Documentation.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
I MPLEMENTING IT S ECURITY FOR S MALL AND M EDIUM E NTERPRISES Short Presentation by Subhash Uppalapati. - Edgar R. Weippl and Markus Klemen.
N222Y Health Information Technology Module: Improving Quality in Healthcare and Patient Centered Care Looking to the Future of Health IT.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Eliza de Guzman HTM 520 Health Information Exchange.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
Dependable Systems For Quality Care
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Handbook of Informatics for Nurses and Healthcare Professionals Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights.
Working with HIT Systems
Chapter 15 : Dependable Systems for Quality care.
Component 3-Terminology in Healthcare and Public Health Settings Unit 16-Definitions and Concepts in the EHR This material was developed by The University.
The IT Vendor: HIPAA Security Savior for Smaller Health Plans?
Electronic Health Record systems: U.S. Federal initiatives and Public/ private partnerships.
Public Trust in Health Information: Foundational Principles for Dependable Systems Dixie B. Baker, Ph.D. Vice President for Technology CTO, Enterprise.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
 BEFORE Inefficient Costly Manually intensive Crisis-driven model of care delivery  AFTER Efficient Consumer-centric Science-based model  Changes brought.
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
Urban Infrastructure and Its Protection Responding to the Unexpected Interest Group Report.
Case Study: Applying Authentication Technologies as Part of a HIPAA Compliance Strategy.
IS3220 Information Technology Infrastructure Security
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Terminology in Healthcare and Public Health Settings Electronic Health Records Lecture b – Definitions and Concepts in the EHR This material Comp3_Unit15.
Management Information System In Healthcare
© 2016 Cengage Learning ®. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Welcome to the ICT Department Unit 3_5 Security Policies.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill/Irwin Chapter 6 The Privacy and Security of Electronic Health Information.
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
CS457 Introduction to Information Security Systems
Risk management.
Security Engineering.
Final HIPAA Security Rule
HIPAA Security Standards Final Rule
Presentation transcript:

 To explain the relationship between dependability and health care quality and safety.  To identify and explain five guidelines for dependability systems.  To present an informal assessment of the healthcare industry with respect to those guidelines.

 The healthcare industry is undergoing a dramatic transformation from today’s inefficient, costly, manually intensive, crisis- driven model of care delivery to a more efficient, consumer-centric, science-based model that proactively focuses on health management.  This transformation is driven by several factors: The skyrocketing cost of healthcare delivery The exposure of patient-safety problems And an aging ‘’baby boom’’ population that recognizes the potential for information technology (IT) to dramatically reduce the cost and improve the quality of care.

 The Electronic Health Record (EHR) will form the foundation for pervasive, personalized, and scientific-based care.  Other key application are: Clinical information system (CIS) with integrated Outcomes-based decision support Clinical knowledge bases Computerized physical order entry (CPOE) Electronic prescribing Consumer knowledge bases and decision support And supply chain automation

 The technologies that enable the transformation are largely state of the art and include enterprise application integration (EAI); Wireless communication hand-held and tablet computers Continues speech recognition Integration Interpretation Electronic sensor technology Radio frequency identification (RFID) tagging And robotics  The functional capabilities of these application and technologies can provide are indeed impressive and can vastly improve quality of healthcare delivery

 The International Council of Nurses (ICN) Code of Ethics for Nurses affirms that the nurse “holds in confidence personal information” and “insures that use of technology is compatible with the safety, dignity, and rights of people” (ICN, 2000)  As IT assumes a greater role in healthcare decision-making and in the provision of care, the nurse increasingly must rely on IT to help protect the patients personal information and safety.  Thus, ethical obligations drive requirements for: System reliability Availability Confidentiality Data integrity Responsiveness Safety attributes collectively referred to as dependability

 Is a measure of the extent to which a system can justifiability be relied on the deliver the services expected from it.  Dependability comprises six attributes: 1. System reliability : the system consistently behaves in the same way. 2. Service availability : required services are present and usable when they are needed. 3. Confidentiality : sensitive information is disclosed only to those authorized to see it.

4. Data integrity : data are not corrupted or destroyed. 5. Responsiveness : the system responds to users improve within an expected and acceptable time period. 6. Safety : the system does not cause harm.

 All computer system are vulnerable to both human-created threat, such as malicious code attack, and software bugs, and natural threats, such as hardware aging and earthquakes.  Removing all system vulnerable is not practical particularly given complex, heterogeneous environments where software and hardware changes are a part of routine operations  A more practical approach to attaining dependability is to build tolerant system.

 Is a system that anticipate problems; that detect faults, software glitches and intrusions; and that take action so that services can continue and data are protected from corruption, destruction, and authorized disclosure.

 Physical and logical networks that support the enterprise and provide the “pipes” that carry data from system to system.  One or more computers are connected to this network, and the software foundation of each computer is an operating system that is responsible for managing all of the resources in the computer system.  Distributed architecture can tolerate failures more easily than large, centralized system.

 As computers are getting faster systems are getting more and more complex, and design flaws are becoming an increasingly catastrophic problem.  The infrastructure level features that transparent to software application should be implemented to detect faults, to fail over to redundant components when faults are detected, and recover from failures before they become catastrophic.  Security features to detect, disable, and recover from malicious attacks, while preserving system stability and security, should be implemented.

 The system planning process should anticipate business-success and the consequential need for larger networks, more systems, new applications, and additional integration.  Modeling of use-case scenarios that anticipate hospital and clinic mergers, acquisitions, and a growing patient/consumers base will enable the system designer to visualize the data flows, system loading, and network impact resulting from business growth and success.

 Good system administrators meticulous monitor and manage system network performance, using out of band tools that do not themselves affect performance.  They take emergency and disaster planning very seriously; develop, maintain; and judiciously exercise plans and procedures for managing emergencies and recovering from disasters.

 Cute Chutes a small start-up company has announced the availability of a new parachute unit that promises to revolutionize the sport of sky diving.  for dependability, one should use only proven methods, tools, technologies, and products that have been production, under conditions, and at a scale similar to the intended environment.

 Healthcare clearly has a need for dependable system both now and after transformation, as the industry becomes increasingly dependent on IT in the delivery of patient care

 The Health Insurance Portability and Accountability Act (HIPAA) security regulation prescribes administrative, physical, and technical safeguards for protecting the confidentiality and integrity o health information and the availability to critical system services.  HPAA requirement for emergency access that is the ability to override security in an emergency situation is unique to healthcare

 HPAA security requirement for “information system activity review” is an important safeguard to counterbalance the necessity of authorizing many people access to patient’s records.  HPAA security standard is a tremendous contribution toward achieving dependable system in healthcare,the current standards lacks fundamental system assurance requirements that are so important to system dependability.

 Eight required administrative safeguards represent important operational practices that clearly will contribute system dependability: 1.Security management, including security analysis and risk management. 2.Assigned security responsibility. 3.Information access management, including the isolation of clearinghouse functions from other clinical functions. 4.Security awareness and training

5.) Security incident procedures, including response and reporting. 6.) Contingency planning, including data backup planning, disaster recovery planning, and planning for emergency mode operations. 7.) Evaluation. 8.) Business associate contracts that looks in the obligations of business partners in protecting health information to which they may have access.

 Five specified physical safeguards also contribute to system dependability to requiring that facilities, work stations, devices, and media be protected. 1. Access control, including unique user identification and an emergency access procedure 2. Audit controls 3. Data integrity protection 4. Person or entity authentication 5. Transmission security

 Medical applications that hosted on PC’s and personal data assistants (PDAs) have a higher likelihood of failure than application hosted on server machines that are physically protected, managed by trained system administrators, and continuously monitored.  Computers are increasingly being used in safety critical clinical applications, and without careful and appropriate attention to software safety, we can reasonably expect that failures will contribute to the loss of human life.

 Healthcare organizations definitely expect their software applications, computer systems, and networks to work.  Providers assume their systems will work as well as any other medical equipment despite the fact that many of the software applications they use are running on the same kind of PC’s that have failed them at home.  Healthcare organizations do not foresee tat their business success may increase their need for processing power and network capability.

 Organizations have hired IT managers who appreciate the important role of IT in a healthcare environment and who recognize the need for dependable systems that can anticipate and recover from failures.  IT managers who recognize the strong relationship between system dependability and the quality and safety of patient care implement fault-tolerant systems with strong security protection, middleware to manage workload, and tools to continuously monitor the health and performance of their applications, system and network.

 The fifth and final guideline “don’t be adventurous” is the most difficult to assess for healthcare.  On the one hand, healthcare givers typically are not early adopters, but on the other hand, they seem to catch their collective fancy.  Healthcare clinicians, including nurses, historically and typically are very resistant to change, largely because they are taught to be circumspect in considering new approaches, treatment protocols, and drug regimens.

 Before adopting new idea, they investigate it, they talk about it among their colleagues, they watch someone else to try it, and then perhaps, they may try it themselves.  Wireless networking and handheld computers can serve as a good example for technologies that are not yet nature enough for safety-critical applications.  yet, wireless information system are one of the most frequently used technologies in healthcare