Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Chapter 2 Security and Privacy in an Electronic Age
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Threats to Information Technology Crime such as spreading viruses Natural disaster such as flood or fire Human error
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Computer Technology and Crime Computer technology has led to new forms of crime Crimes using computers and crimes against computers Most are both—using computers to harm computers
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Computer Crime Spreading viruses— programs that reproduce themselves and harm computers
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Computer Crime Theft of information Breaking in to private databases, for example, hospital databases, and misusing information
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Computer Crime Theft of services Theft of cable TV
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Computer Crime Fraud Using a computer program to illegally transfer money from one account to another
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Computer Crime Software Piracy Illegally copying copyrighted software
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Security Security systems try to protect computer hardware, software, and data from harm by restricting access, training employees, and passing laws
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Backup Systems No security system is foolproof A backup system is necessary Copies of data Copies of software Off-site
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Privacy Privacy refers to the right to control your personal information
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Threats to Privacy Government databases maintained at the local, state, and federal level include Tax information Welfare information Property ownership Driving records Criminal records
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Threats to Privacy There are legal restrictions on the federal government and what it does with information it collects. There are few restrictions on state and local jurisdictions. Some local jurisdictions sell information. Some put the information on the Internet.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Threats to Privacy Private databases maintained by corporations interested in buying habits to personalize advertising. Hold information on Buying habits Credit rating Health information Reading habits
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Threats to Privacy Databases online with information available for a fee The current existence of companies that will link information from government and private databases
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Privacy, Security, and Health Care: HIPAA Health Insurance Portability and Accountability Act of 1996 (HIPAA) is the first federal legislation to put a national floor under the privacy of medical information. HIPAA encourages the use of electronic medical record (EMR) and encryption to protect its privacy.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Privacy and Security The USA PATRIOT Act weakens privacy protections and requires institutions to give government agents information without informing the person. The future of privacy of medical information under HIPAA and the USA PATRIOT Act (which works against privacy) is not yet known.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Other Privacy Issues: Telemedicine Telemedicine raises issues of the privacy of medical information on networks. Telemedicine raises issues of the privacy of information that routinely crosses state lines.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Other Privacy Issues: is not legally private. in a health care setting can be read by many people, including clerks, secretaries, and health care providers. Offices that use need to inform the patient of who will read it, what issues may be mentioned in s, and the turnaround time.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Other Privacy Issues: The EMR The electronic medical record (EMR), like other information in electronic form, is not secure. HIPAA encourages its use. HIPAA requires security measures for all personally identifiable medical information.