| Literature DB >> 25945177 |
Valerie J M Watzlaf1, Sohrab Moeini1, Laura Matusow1, Patti Firouzan1.
Abstract
In a previous publication the authors developed a privacy and security checklist to evaluate Voice over Internet Protocol (VoIP) videoconferencing software used between patients and therapists to provide telerehabilitation (TR) therapy. In this paper, the privacy and security checklist that was previously developed is used to perform a risk analysis of the top ten VoIP videoconferencing software to determine if their policies provide answers to the privacy and security checklist. Sixty percent of the companies claimed they do not listen into video-therapy calls unless maintenance is needed. Only 50% of the companies assessed use some form of encryption, and some did not specify what type of encryption was used. Seventy percent of the companies assessed did not specify any form of auditing on their servers. Statistically significant differences across company websites were found for sharing information outside of the country (p=0.010), encryption (p=0.006), and security evaluation (p=0.005). Healthcare providers considering use of VoIP software for TR services may consider using this privacy and security checklist before deciding to incorporate a VoIP software system for TR. Other videoconferencing software that is specific for TR with strong encryption, good access controls, and hardware that meets privacy and security standards should be considered for use with TR.Entities:
Keywords: HIPAA; Voice over Internet Protocol (VOIP); evaluation; privacy; security; telerehabilitation
Year: 2011 PMID: 25945177 PMCID: PMC4296799 DOI: 10.5195/ijt.2011.6070
Source DB: PubMed Journal: Int J Telerehabil ISSN: 1945-2020
Figure 1Personal Information
Figure 2Retention of Personal Information
Figure 3Retention Information from Legal Authorities
Figure 4Sharing Personal Information Outside Country
Figure 5Link to Other Websites
Figure 6Encryption
Figure 7Anti-virus Protection
Figure 8Retention of Personal Information
Figure 9Security Evaluation