| Literature DB >> 23937965 |
Eva Henriksen1, Tatjana M Burkow, Elin Johnsen, Lars K Vognild.
Abstract
BACKGROUND: Privacy and information security are important for all healthcare services, including home-based services. We have designed and implemented a prototype technology platform for providing home-based healthcare services. It supports a personal electronic health diary and enables secure and reliable communication and interaction with peers and healthcare personnel. The platform runs on a small computer with a dedicated remote control. It is connected to the patient's TV and to a broadband Internet. The platform has been tested with home-based rehabilitation and education programs for chronic obstructive pulmonary disease and diabetes. As part of our work, a risk assessment of privacy and security aspects has been performed, to reveal actual risks and to ensure adequate information security in this technical platform.Entities:
Mesh:
Year: 2013 PMID: 23937965 PMCID: PMC3751072 DOI: 10.1186/1472-6947-13-85
Source DB: PubMed Journal: BMC Med Inform Decis Mak ISSN: 1472-6947 Impact factor: 2.796
Definitions of values for consequence, likelihood, and risk level used in the risk assessment
| For the hospital or the service: No violation of law; offence that does not lead to reaction; or negligible financial loss which can be recovered; or small reduction of reputation in the short run. For the patient: No impact on health; or negligible financial loss which can be recovered; or small reduction of reputation in the short run. | |
| For the hospital or the service: Offence, less serious violation of law which results in a warning or a reprimand; or financial loss which can be recovered; or reduction of reputation that may influence trust and respect. For the patient: No direct impact on health or a minor temporary impact; or financial loss which can be recovered; or some loss of reputation caused by revelation of less sensitive or offensive health information. | |
| For the hospital or the service: Violation of law which results in minor penalty or fine; or a large financial loss which cannot be recovered; or serious loss of reputation that will affect trust and respect for a long time. For the patient: Reduced health; or some financial loss which cannot be recovered; or serious loss of reputation caused by revealing of sensitive and offending information. | |
| For the hospital or the service: Serious violation of law which results in a penalty or fine; or considerable financial loss which cannot be recovered; or serious loss of reputation which is devastating for trust and respect. For the patient: Death or permanent damage of health; or considerable financial loss which cannot be recovered; or serious loss of reputation which permanently affects life, health, and finances. | |
| Rare, occurs less frequently than every 10th year, or less than 10 % of the times the system/service is used. Detailed knowledge about the system is needed; or special equipment is needed; or it can only be performed deliberately and with the help of internal personnel. | |
| May happen, occurs not more than once a year, or between 10 % and 30 % of the times the system/service is used. Normal knowledge about the system is sufficient; or normally available equipment can be used; or it can be performed deliberately. | |
| Fairly often, occurs several times a year, or between 30 % and 50 % of the times the system/service is used. Can be done with minor knowledge about the system; or without any additional equipment being used; or it can occur because of wrong or careless usage. | |
| Very often, occurs several times a month or more frequent than 50 % of the times the system/service is used. Can be done without any knowledge about the system; or without any additional equipment being used; or it can occur because of wrong or careless usage. | |
| | |
| Acceptable risk. The service can be used with the identified threats, but the threats must be observed to detect changes that could increase the risk level. | |
| Possibly an acceptable risk for this particular service, but each threat must be considered separately and the development of the risk must be monitored on a regular basis, with an assessment of whether remedial measures should be implemented. | |
| Unacceptable risk. Cannot start using the service before risk reducing measures have been implemented. | |
List of threats identified in the risk assessment
| c1 | Unauthorised persons can view/read personal (sensitive) health information because the user has forgotten to switch off (or “log out” from) the RPD. |
| c3 | Unauthorised persons can view/read personal (sensitive) health information because the PIN code (or password or another authentication mechanism) is available/known – e.g. too weak/simple (a general problem) |
| c4 | Unauthorised persons can view/read personal (sensitive) health information because the RPD with stored information is stolen, then restarted and accessed without authorisation. |
| c5 | Video conference (VC) to participant at home (individual sessions): Unauthorised persons present in the patient’s home, outside camera view, may happen to hear personal information given to |
| c6 | Group education via VC (all patients in their own home): Unauthorised persons in a patient’s home, outside camera view, can see and hear |
| c7 | The RPD is compromised because of software weaknesses, making it possible for unauthorised persons to see/log ongoing activity. |
| c8 | Wireless data transfer from sensor to RPD can be intercepted by others. |
| i1 | Unauthorised persons (e.g. grandchildren who play with the sensor) can |
| i3 | Unauthorised persons (e.g. other family members or visitors) can |
| i4 | The patient him-/herself can |
| i7 | The patient him/herself can |
| i8 | Data in the RPD is corrupted - e.g. wrong clock time from a sensor may follow the sensor value and cause existing data to be overwritten. |
| i9 | SW/HW-weaknesses in the RPD that can be exploited (e.g. by malware) in such a way that the information is being damaged or modified. |
| i10 | The RPD is stolen and software, keys or configuration are being exploited for unauthorised communication. |
| i12 | The RPD is being compromised because of SW weaknesses and becomes a relay for attacking healthcare systems, e.g. by sending messages containing executable payload. |
| i14 | Unauthorised persons can remotely configure the RPD, install/update software, etc., thus making the system behave differently than specified. |
| a1 | The service is unavailable for both the patient and the health personnel because the RPD has been stolen. |
| a2 | Data from the RPD cannot be retrieved locally by the patient (SW or HW errors, e.g. disk crash). |
| a3 | Data from the RPD cannot be sent to the health personnel (SW or HW errors). |
| a4 | The RPD is damaged (crushed, fire, dropped to the floor etc.) so that data cannot be retrieved or inserted. |
| a5 | Shutdown because of electricity power failure in the patient’s home. |
| a6 | The patient forgets his PIN-code (or other authentication method) so that data cannot be retrieved from the RPD at home. (Information sent is available at the central server.) |
| a7 | PKI certificates expire. If this happens, it is not possible to send data with valid signatures or to encrypt correctly for the specified recipient. |
| a8 | SW/HW weaknesses in the RPD that can be exploited (e.g. by malware) in such a way that stored information is destroyed/deleted or access is blocked (e.g. Denial of Service attack, DoS) |
| a9 | Patients will not use the system: “Too high-tech”. Fear of surveillance. Feeling of lack of control. Afraid of damaging the system. Think it is difficult to use. |
| a10 | Patients will not use the service because too many errors occur, too often. E.g. in the case of an alert function, error which leads to triggering of the alert. |
| c9 | Unauthorised persons obtain access to personal (sensitive) information during transfer: measurement values from sensors, textual information from patient at home |
| c10 | Unauthorised persons obtain access to personal (sensitive) information being transferred in the two-way video conference, both audio (what is said) and video (see patients in their homes). |
| i15 | Unauthorised persons can modify or delete personal health information during transfer. |
| i18 | Errors during transfer lead to duplication of messages. |
| a11 | Unauthorised persons can delete personal health information during transfer so that it does not reach the intended recipient. |
| a13 | Low network quality (QoS): the quality of the connection is so low that the remote education and exercising is useless. |
| a14 | DoS attack (on the network or a network component) so that the information does not reach the intended recipient. |
| a15 | Low network quality (QoS): data is not transferred, is lost during transfer, or is delayed. |
| a16 | Information corrupted or lost during transfer (caused by errors), i.e. cannot be used by the intended recipient. |
| c11 | Unauthorised persons obtain access to personal health information (in server/database) in the health institution. The server contains information about all patients/participants. If unauthorised persons obtain access, information about several patients can be seen at a time, not just that concerning a single patient. |
| i21 | Information stored on the central server is deliberately manipulated (modified, deleted) by unauthorised persons. |
| i22 | Information stored on the central server is manipulated (modified, deleted) by mistake (e.g. wrong usage) |
| a17 | Permanent loss of data from central server (because of SW errors or HW failures), data are lost or destroyed |
| a18 | Data on the central server are unavailable for a short or a longer time period (e.g. electricity power failure) |
| q1 | The video quality from the patient’s home is inadequate (e.g. because of limited bandwidth, camera type, use of camera, placement of camera, lighting, etc.) for the healthcare workers to be able to instruct the patients. They do not see clearly enough what the patient is doing (exercise, use of medical equipment) |
| q2 | Unacceptable audio quality, e.g. echo, jitter, drop-out. The healthcare workers can hear their own echo in the sound from the participants. The patients at home can hear an echo if the healthcare workers do not use an extra microphone |
Figure 1Risk matrix showing risk level for identified threats.