| Literature DB >> 21169173 |
Kylie Bennett1, Anthony James Bennett, Kathleen Margaret Griffiths.
Abstract
Security considerations are an often overlooked and underfunded aspect of the development, delivery, and evaluation of e-mental health interventions although they are crucial to the overall success of any eHealth project. The credibility and reliability of eHealth scientific research and the service delivery of eHealth interventions rely on a high standard of data security. This paper describes some of the key methodological, technical, and procedural issues that need to be considered to ensure that eHealth research and intervention delivery meet adequate security standards. The paper concludes by summarizing broad strategies for addressing the major security risks associated with eHealth interventions. These include involving information technology (IT) developers in all stages of the intervention process including its development, evaluation, and ongoing delivery; establishing a wide-ranging discourse about relevant security issues; and familiarizing researchers and providers with the security measures that must be instituted in order to protect the integrity of eHealth interventions.Entities:
Mesh:
Year: 2010 PMID: 21169173 PMCID: PMC3057317 DOI: 10.2196/jmir.1468
Source DB: PubMed Journal: J Med Internet Res ISSN: 1438-8871 Impact factor: 5.428
Figure 1A summary of key security issues in the eHealth intervention environment
Examples of questions that are relevant to the deployment environment
| Area | Question | What it Means |
| Data: servers | Where are the servers located? | Knowledge of all physical locations where the data will reside, including off-site or redundant systems |
| What are the physical protection measures for the servers? | Knowledge of the strength of physical access controls such as door locks/access cards, locks in server racks, monitored closed circuit television | |
| Who has access to the servers? How is this access controlled and monitored? | Knowledge of who has physical and electronic access to servers, who grants this access, and how access is revoked when no longer needed or at the end of a staff member’s employment | |
| What is the disposal policy for old or failed hardware? | Knowledge of how old drives and media are secured is necessary. Appropriate measures include secure erasure and physical destruction. | |
| What remote access is there to data on the servers, and who has access to these data? | Identification of the means by which data can be remotely accessed, such as over file shares or use of remote access utilities, and who has access to these | |
| Data: backups | Where are backups stored? | Knowledge of all physical locations where backup media will be stored, including off-site locations |
| How are backups transported to storage? | If backup storage is physically separate from servers, ensuring that backups are safely transported to storage locations | |
| Who has access to the backups? How is this access controlled and monitored? | Identification of who can access the backups, who grants this access and how it is revoked when no longer needed or at the end of a staff member’s employment | |
| Is encryption used? Who has access to the keys/passwords? | Encryption reduces the risk of a breach if media are lost, stolen, or disposed of incorrectly. If there is no encryption, safe physical storage becomes even more critical. | |
| What is the disposal policy for old/failed media? | Knowledge of how old backup media are secured is necessary. Appropriate measures include secure erasure and physical destruction. | |
| Servers | Are server operating systems and software updated with required security patches? | Ensuring that there is a mechanism or policy in place whereby security patches are applied to servers and supporting software within an appropriate time frame |
| Network security | Are firewalls in use on the network, how and where? | Firewalls filter unwanted and potentially malicious traffic. Multiple layers of firewalls reduce the risk of internal attacks. |
| Are mechanisms in place for intrusion detection? | Ensuring that an attack or potential attack can be identified enabling it to be prevented or handled quickly | |
| Policies | What security policies, protocols, and processes are in place? | Establishing that a formal security policy has been adopted and that risk mitigation is a high priority |
| How are security policies monitored and enforced? | Ensuring that security protocols are actively implemented is necessary. A policy or risk mitigation strategy needs to be applied in practice to be useful. |
Examples of questions and actions that are relevant to procedural security
| Area | Question/Action | What it Means |
| Data | Are appropriate access controls applied to data? | Ensuring appropriate permissions and access controls are applied to files on network shares and any other access controls as relevant |
| Encryption of portable devices such as laptops, external hard drives, and USB keys | These devices may be lost, stolen, or misplaced and thus represent a potentially significant threat to data security. If there is a chance these devices could be used to store confidential information (or data which could enable reidentification of information), then they should be encrypted. Applications such as TrueCrypt (http://www.truecrypt.org/) can support this. | |
| Encryption of desktop computers, if appropriate | Encrypting systems that come into contact with confidential information reduces the risk of a breach in the event of theft or incorrect disposal. | |
| Is identifying information really stored separately from the data? | Electronic storage means it can be difficult to physically separate identifying information from deidentified data. At the very least, electronic access controls should be set up to ensure virtual separation. It may be appropriate for a data manager to manage these access controls. | |
| Storage of email correspondence and other electronic records in encrypted environments | Confidential records should be stored in an encrypted format. | |
| Is data transferred between staff or collaborators? Under what circumstances and how is the transfer undertaken? | Staff need to understand the security risks of communication technologies such as email, and procedures needed to be implemented to address these risks in different situations. For example, email addresses and other identifying information need to be removed if forwarding user emails for discussion with colleagues, and restricted access environments should be used for transfer of data sets. | |
| Hardware | Is there a policy and procedure in place for the disposal of old hardware and media? | Old computers and media should be securely erased before they are sold or recycled. If appropriate, storage devices should be physically destroyed. |
| Policy | Have processes been established for handling a breach if it were to occur? | Any breach needs to be handed effectively—knowing the steps that need to be taken is vital. This should include both steps for handling the breach itself and necessary review and rectification of processes to avoid future breaches. |
| Has a policy been developed which addresses the risks of relevant technologies (email, external drives, remote access, etc)? | The tools available to an organization can pose substantial security risks if used inappropriately, but staff without an IT/security background may be unaware of this. Relevant risks need to be assessed and strategies/tools put in place to assist in mitigating them. | |
| Has a policy for handling staff turnover been developed? | Departure of staff from the organization needs to be handled suitably, including the return of any hardware (PDAs, external drives, laptops, etc), any documents that may be stored remotely (confidential or otherwise), and, if appropriate, the sanitization of computers. | |
| Are new and existing staff educated about security risks and trained to implement privacy measures? | Policies need to be communicated to all staff, including reminders on a regular basis. If security is not part of day-to-day operations, then a breach may be more likely to occur. Staff need to understand how to appropriately apply security policies in their field of work. | |
| Is there regular review and monitoring of relevant policies and their application? | Policies and associated outcomes need to be enforced and reviewed regularly so that they can be modified as required. |