Chapter 15 : Dependable Systems for Quality care.

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

PROFESSIONAL NURSING PRACTICE
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
CHAPTER © 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2 The Use of Health Information Technology in Physician Practices.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
HIPAA Security Rule Overview and Compliance Program Presented by: Lennox Ramkissoon, CISSP The People’s Hospital HIPAA Security Manager The Hospital June.
CAMP Med Building a Health Information Infrastructure to Support HIPAA Rick Konopacki, MSBME HIPAA Security Coordinator University of Wisconsin-Madison.
Chapter 10 Accounting Information Systems and Internal Controls
© 2005, QEI Inc. all characteristics subject to change. For clarity purposes, some displays may be simulated. Any trademarks mentioned remain the exclusive.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
Security Controls – What Works
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
©Ian Sommerville 2006Critical Systems Slide 1 Critical Systems Engineering l Processes and techniques for developing critical systems.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Introduction to Databases and Database Languages
Software Dependability CIS 376 Bruce R. Maxim UM-Dearborn.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Chapter 1 Database Systems. Good decisions require good information derived from raw facts Data is managed most efficiently when stored in a database.
The Use of Health Information Technology in Physician Practices
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Information ITIL Technology Infrastructure Library ITIL.
Introduction to ISO 9001:2000.
David N. Wozei Systems Administrator, IT Auditor.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
 Dr. Syed Noman Hasany.  Review of known methodologies  Analysis of software requirements  Real-time software  Software cost, quality, testing and.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Chapter 2 Standards for Electronic Health Records McGraw-Hill/Irwin Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved.
Eliza de Guzman HTM 520 Health Information Exchange.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
Dependable Systems For Quality Care
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Working with HIT Systems
IS550: Software requirements engineering Dr. Azeddine Chikh 2. Functional and non-functional requirements.
The IT Vendor: HIPAA Security Savior for Smaller Health Plans?
Electronic Health Record systems: U.S. Federal initiatives and Public/ private partnerships.
Public Trust in Health Information: Foundational Principles for Dependable Systems Dixie B. Baker, Ph.D. Vice President for Technology CTO, Enterprise.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
 BEFORE Inefficient Costly Manually intensive Crisis-driven model of care delivery  AFTER Efficient Consumer-centric Science-based model  Changes brought.
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
Case Study: Applying Authentication Technologies as Part of a HIPAA Compliance Strategy.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
HEALTH AND CARE STANDARDS APRIL Background Ministerial commitment 2013 – Safe Care Compassionate Care Review “Doing Well Doing Better” Standards.
Management Information System In Healthcare
 To explain the relationship between dependability and health care quality and safety.  To identify and explain five guidelines for dependability.
1 Copyright © 2009, 2006, 2003, 2000, 1997, 1994 by Saunders, an imprint of Elsevier Inc. Chapter 23 Nursing Informatics.
EMR Optimization in a Medical Clinic Environment: An Analysis of IT Support By Lydia Maples Senior Thesis Fall 2014.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
LECTURE 5 Nangwonvuma M/ Byansi D. Components, interfaces and integration Infrastructure, Middleware and Platforms Techniques – Data warehouses, extending.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Welcome to the ICT Department Unit 3_5 Security Policies.
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
© 2016 Chapter 6 Data Management Health Information Management Technology: An Applied Approach.
CS457 Introduction to Information Security Systems
44 Nursing: A Concept-Based Approach to Learning Ethics MODULE
Security Engineering.
Final HIPAA Security Rule
County HIPAA Review All Rights Reserved 2002.
HIPAA Security Standards Final Rule
Presentation transcript:

Chapter 15 : Dependable Systems for Quality care

1.To explain the relationship between dependability and health care quality. 2. To identify and explain five guidelines for building dependable systems. 3.To present an informal assessment of the healthcare industry with respect to these guidelines. Objectives :

 Introduction: The healthcare industry is undergoing a dramatic transformation from today’s inefficient costly, manually intensive, crisis driven model of care delivery to a more efficient, consumer centric, science based model that proactively focuses on health management. The technologies that enable the transformation are largely state of the art and include enterprise application integration (EAI); wireless communications; handled and tablet computers; continuous speech recognition; new models for knowledge representation, integration and interpretation; electronic sensor technology; radio frequency identification (RFID) tagging and Robotics.

The functional capabilities these applications and techniques can provide are indeed impressive and can vastly improve the quality of healthcare delivery. The international Council of Nurses (ICN) code of ethics for nurses affirms that the nurse “holds in confidence personal information” and “ensures that use of technology…[is] compatible with the safety, dignity, and rights of people” Fulfilling these ethical obligations is the individual responsibility of the nurse who presumably has the ability and authority to ensure that personal information is protected and that technology is safe. Thus, ethical obligations drive requirements for system reliability, availability, confidentiality, data integrity, responsiveness, and safety attributes collectively referred to as DEPENDABILITY.

What is Dependability? is a measure of the extent to which a system can justifiably be relied on to deliver the services expected from it. Dependability comprises the following six attributes: 1.System reliability: The system consistently behaves in the same way. 2.Service availability : Required services are present and usable when they are needed. 3.Confidentiality : Sensitive information is disclosed only to those authorized to see it. 4.Data integrity : Data are not corrupted or destroyed. 5.Responsiveness: The system responds to user input within an expected and acceptable time period. 6.Safety : The system does not cause harm.

When things go wrong: In August 2003, the blaster and SoBig worm attacks invaded hospitals around the world. In Galsgow, Scotland, 10,000 computers used by city hospitals and emergency services were infected, and systems at one hospital were down for 15 hours. Nearly one third of the computers at Baylor College of Medicine (about 2,100 machines) were infected by the blaster and SoBig worm attacks. The cost to recover from the attacks exceeded $100 K and 2.5 days of productivity were lost campus wide due to system out ages. The bottomline is that systems, networks and software applications are highly complex, and the only safe assumption is that failureswill occur. Thus, dependability is an essential factor in system planningand operations.

Guidelines for Dependable systems: Guideline 1: Architect for Dependability : a fundamental principle of system is that an enterprise system architecture should be developed from the bottom up so that no critical component is dependent on a component less trustworthy of itself. At the bottom of the architecture are the physical and logical networks that supports the enterprise and provide the “pipes” that carry data from system to system. One or more computers are connected to this network and the software foundation of each computer is an operating system that is responsible for managing all of the resources in the computer system. A corollary is that any vulnerabilities that exists in the networks, operating systems, and other services that support the application will propagate up to the applications, creating vulnerabilities for them as well. Single point dependencies should be avoided or eliminated. The simplest design and integration strategy will be the easiest to understand, to maintain, and to recover in case of a failure or disaster.

Guideline 2: Anticipate Failures : in anticipation of failures at the infrastracture level, features that are transparent to software applications should be implemented to detect faults, to fail over to redundant components when faults are detected, and to recover from failures before they become catastrophic. Guideline 3: Anticipate success : the systems planning process should anticipate business success and the consequential need for larger networks, more systems, new applications, and additional integration. Modeling of use case scenarios that anticipate hospital and clinic managers, acquisitions,and a growing patient/ customer base will enable the system designer to visualize the dataflows,system loading and network impact resulting from business growth and success. Such models can provide valuable input into planning for scalability and future integration.

Guideline 4: Hire Meticulous Managers :good systems administrators meticulously monitor and manage system and network performance, using of band tools that do not themselves affect performance. These managers use middleware to manage the workload across the network. They take emergency and disaster planning very seriously: they develop, maintain and judiciously exercise plans and procedures for managing emergencies and recovering from disasters. Guideline 5: Don’t be Adventurous : for dependability, one should use only proven methods, tools, technologies and products that have been in production, under conditions, and at a scale similar to the intended environment. The enterprise with a requirement for dependable systems should not be the first (or second) to adopt anew technology.

Assessing the Healthcare industry > Healthcare clearly has a need for dependable systems both now and after the transformation, as the industry becomes increasingly dependent on IT in the delivery of patient care. This assessment is by no means “ scientific,” nor is it intended to represent “all” healthcare organizations. Rather it coveys observations of the healthcare industry as a whole and the opinions of a passionate advocate of dependable systems for healthcare.

HEALTHCARE ARCHITECTURES : for adherence to the first guideline “architect for dependability” the clinical care provider community gets a barely passing grade of “D”. Healthcare organizations build or perhaps “compose” their systems from the top down rather than from the bottom up. The healthcare professionals select their user interfaces they like, and the IT team negotiates terms with the vendors who offer the systems that generate those interfaces. These systems are familiarly known as “departmental” systems because they are used only in one department, such as registration, laboratory, or Pharmacy, “EAI”or “interface engines” are used to transfer data, most commonly from a clinical system to a billing system.

The Health Insurance Portability and Accountability Act (HIPAA) security regulation prescribes administrative, physical, and technical safeguards for protecting the confidentiality and integrity of health information and the availability of critical system services. The ff. eight required administrative safeguards represent important operational practices that clearly will contribute to system dependability: >Security management, including security analysis and risk management >Assigned Security responsibility >Information access management, including the isolation of clearinghouse functions from other clinical functions. >Security awareness and training >Security incident Procedures, including response and reporting

>Contingency planning, including data backup planning, disaster recovery planning, and planning for emergency mode operations. >Evaluation >Business associate contracts that lock in the obligations of business partners in protecting health information to which they may have access.

The five specified physical safeguards also contribute to system dependability by requiring that facilities, work stations, devices, and media be protected. Most of the required technical safeguards are widely viewed within the security community and security aware industries as “minimal” security controls: 1.Access control, including unique user identification and an emergency access procedure 2.Audit controls 3.Data integrity protection 4.Person or entity authentication 5.Transmission security

Anticipating Failures : For adherence to the second guideline “expect failures” the clinical provider community gets another grade of “D”. Medical technology and prescriptions, as well as clinical treatment protocols, are required to undergo extensive validation before they can be used in clinical practice. Anticipating Success : With respect to the third guideline “expect success” the clinical care provider community has earned a mediocre grade of “C”. Healthcare organizations definitely expect their software applications, computer systems, and networks to works

IT Management : For the fourth guideline “hire meticulous managers” the clinical care provider community has been assigned a mediocre grade of “C”. Many provider organizations truly do recognize the critically of IT to their business success. Adventurous technologies in Healthcare :The fifth and final guideline “don’t be adventurous” is the most difficult to assess for healthcare. On the one hand, healthcare givers typically are not early adopters, but on the other hand, they seem to cast fate to the wind for technologies that catch their collective fancy. So a grade of “C” seems appropriate here.

SALAMAT JAMO! xD davidabad08