Mobile Electronic Medical Records James T. Monastra Virginia Wesleyan College August 6, 2007.

Slides:



Advertisements
Similar presentations
Identify risks with mobile devices: Portable data storage Wireless connections 3 rd party applications Data integrity Data availability 2.
Advertisements

Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Computer Security Computer Security is defined as:
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
15 Tactical Improvements to IT Security Virtual Keyboard, Two Factor Authentication, Active Confirmation and FAA Access to CPS Online Ganesh Reddy.
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
Copyright © 2006 Exportech Portugal. All rights reserved.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
Welcome. Mission To provide our customers with solutions that deliver immediate results by fully understanding their requirements and applying the power.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Security Controls – What Works
1 November Applicability of Biometrics As a Means of Authentication Scholarship for Service William Kwan.
1 Federated, Secure Trust Networks for Distributed Healthcare IT Services Alfred Weaver Samuel Dwyer Andrew Snyder Jim Van Dyke Tim Mulholland James Hu.
Lesson 1-What Is Information Security?. Overview History of security. Security as a process.
Biometrics and Authentication Shivani Kirubanandan.
Marjie Rodrigues
Security-Authentication
Certificate and Key Storage Tokens and Software
Confidential Computer Systems Group HD Lock for Toshiba Notebook August 3rd, 2006.
Alternative Input Devices. Digital Camcorder View recordings on a regular TV or copy them to VHS tape Send MPEG video clips by way of to a mobile.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security Equipment Equipment for preventing unauthorised access to data & information.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
RIVERA SÁNCHEZ-1 CSE 5810 User Authentication in Mobile Healthcare Applications Yaira K. Rivera Sánchez Computer Science & Engineering Department University.
Alternative Input Devices Part B There will be a test on this information (both part a & b).
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
Group 2: Marco Hidalgo Wesley Lao Michelle Marquez-Lim
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
The Tension Between Confidentiality and Accessibility Edward B. Goldman, J.D. Deputy General Counsel University of Michigan October 10, 2007.
HIPAA Compliance. What is it? The federal Health Insurance Portability and Accountability Act of Ensures the privacy rights of patients.
Fujitsu Healthcare Overview Tech Data June 17, 2010.
University Health Care Computer Systems Fellows, Residents, & Interns.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
Children’s Hospital Requirements for Remote Access.
An innovative, electronic personal health record Overview.
Inseparable Keys: Phase III High-Tech Product Innovation (45-827) James Duan, Eric Lin, Ray Loo, Minh Vuong April 17, 2008.
The potential to bring huge benefits to Patients..
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
MODULE TWO: Ethical and Legal Issues. Objectives: Students will: Understand privacy, confidentiality and ethics as they relate to being a volunteer. Define.
Working with HIT Systems
Biometrics.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
 Biometrics refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
Securing Online Banking By Ben White CS 591. Who Federal Financial Institutions Examination Council What To authenticate the identity of retail and commercial.
Ethical & Legal Issues MODULE FIVE:. Objectives: Students will: Understand privacy, confidentiality and ethics as they relate to being a volunteer. Understand.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
The Electronic Personal Health Record (ePHR) Beth Friedmann CS Spring 2007.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
ANNUAL HIPAA AND INFORMATION SECURITY EDUCATION. KEY TERMS  HIPAA - Health Insurance Portability and Accountability Act. The primary goal of the law.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Electronic Health Records (EHR)
Lesson 3- Health Information Technology & Clients
Biometrics.
© Copyright 2008 FingerTec Worldwide. All Rights Reserved.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
State of e-Authentication in Higher Education Bernie Gleason
Seminar Presentation on Biometrics
Biometrics.
A SEMINAR REPORT ON BIOMETRICS
An Introduction to Cloud Computing
GMDCLOUD Integrated Digital Health
CS703 - Advanced Operating Systems
Presentation transcript:

Mobile Electronic Medical Records James T. Monastra Virginia Wesleyan College August 6, 2007

The Remote Medicine Maze

Entering the Maze

The Concept Patient’s medical records are maintained on a secure portable device. Patient’s medical records are maintained on a secure portable device. Information is immediately available to Emergency Technicians. Information is immediately available to Emergency Technicians. Information is available to doctors and hospital staff. Information is available to doctors and hospital staff. Serves as the entry point to remote medical systems. Serves as the entry point to remote medical systems.

State-of-the-Art  Authentication Password / Username Password / Username Smart Cards Smart Cards Particular Biometrics Particular Biometrics  Storage Paper Filing System Paper Filing System

 Password / Username Authenticates user by “something you know” Authenticates user by “something you know” Most common authentication method Most common authentication method Joint responsibility Joint responsibility Memorization Memorization Confidentiality Confidentiality Security Security

 Smart Cards Authenticates user by “something you have” Authenticates user by “something you have” Capable of two-factor authentication Capable of two-factor authentication “Pocket-sized cards with embedded integrated circuits” “Pocket-sized cards with embedded integrated circuits” User-friendly User-friendly Password concerns Password concerns

 Biometric Authentication by “who you are” Authentication by “who you are” “identification based on physiological or behavioral characteristics” “identification based on physiological or behavioral characteristics” Cannot forget, lose, or give away a part of you (except for injury) Cannot forget, lose, or give away a part of you (except for injury)

 Commonly used Biometrics Hand Geometry Hand Geometry Retina Scanner Retina Scanner Speaker Recognition Speaker Recognition Fingerprint Scanner Fingerprint Scanner

 Storage (Paper-filing System) Widely accepted Widely accepted Significant disadvantages Significant disadvantages i. Unavailability ii. Illegibility iii. Inability to be accessed remotely

Biometric authentication Biometric authentication Mobile Electronic Device Mobile Electronic Device Stealth MXP Stealth MXP Solution

 Stealth MXP Memory Experts International Memory Experts International Portable secure storage Portable secure storage Biometric & Password Authentication Biometric & Password Authentication Encryption Encryption

 Requirements Privacy (HIPAA) Privacy (HIPAA) Security (HIPAA) Security (HIPAA) Portability Portability Availability Availability Reliability Reliability User Acceptance User Acceptance

 Privacy and Security  Advanced Encryption Standard (AES)  HMAC-based One Time Password (HOTP)  Rivest, Shamir, Adleman (RSA)  Biometric and Password capabilities  Federal Information Processing Standard

 Portability and Availability  USB Flash Drive  24/7 Patient Access  ACCESS Console and Client software  Multi-patient (Family)

 Reliability and User Acceptance  Strong Security  Easily Mobile  Cost concerns  Incentives

HOSPITAL RECORDS Information Partitioning PERSONAL RECORDS EMERGENCY DATA Personal Contact Information Medical Conditions (Illness, Allergies) Medications Physician’s Contact Information Personal Contact Information Family Contact Information Medical Conditions (Illness, Allergies) Medications Complete Medical History Physician’s Contact Information Insurance Contact Information Personal Contact Information Family Contact Information Medical Conditions (Illness, Allergies) Medications Complete Medical History Physician’s Contact Information Insurance Contact Information Records and Specialty Contact Information

HOSPITAL RECORDS Information Availability PERSONAL RECORDS EMERGENCY DATA Available to All No ID NO Password Available to Selected Personnel Requires ID Requires Password Available to Selected Personnel Available to Medical and Hospital Personnel Requires ID Requires Password

An Example

Any Questions??