| Literature DB >> 25945194 |
Valerie R Watzlaf1, Briana Ondich1.
Abstract
Consumer-based, free Voice and video over the Internet Protocol (VoIP) software systems such as Skype and others are used by health care providers to deliver telerehabilitation and other health-related services to clients. Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by practitioners, health information managers, and other healthcare entities. This pilot usability study examined whether four respondents who used the top three, free consumer-based, VoIP software systems perceived these VoIP technologies to be private, secure, and HIPAA compliant; most did not. While the pilot study limitations include the number of respondents and systems assessed, the protocol can be applied to future research and replicated for instructional purposes. Recommendations are provided for VoIP companies, providers, and clients/consumers.Entities:
Keywords: HIPAA; Voice over the Internet Protocol (VoIP); telerehabilitation
Year: 2012 PMID: 25945194 PMCID: PMC4296813 DOI: 10.5195/ijt.2012.6096
Source DB: PubMed Journal: Int J Telerehabil ISSN: 1945-2020
Checklist for privacy and security information provided by consumer-based, free VoIP systems.
| Personal information is accessible to others (e.g., via listening in; shared content; others can amend PHI) | |||
| Retains PHI
recorded and stored? specifies how long PHI is retained?) | |||
| Would comply with requests for PHI from legal authorities | |||
| Shares PHI with other countries | |||
| Links PHI to other websites | |||
| Shares user’s public profile | |||
| Employs anti-spyware/virus protection | |||
| Employs encryption | |||
| Allows, removes, and/or blocks callers | |||
| Audits system activity | |||
| Employs security evaluation |
Evaluation Protocol and Results
| Type your user name and password upon entering the system. | Should something other than a password be used to authorize entrance into the videoconferencing system? | 75 % of the respondents across all three systems responded yes to the question. Respondents indicated that additional security to access the system should be implemented (e.g., biologic data, finger print, eye scan). Respondents also indicated that a Virtual Private Network (VPN) should be utilized. | |
| Determine your default settings for communicating. | How would you rank the privacy and security of your default settings when conducting a video therapy session? Likert scale, 1–5 (1= not at all private and secure; 5= very private and secure) | 1.9 average across all systems; respondents had low confidence in the privacy and security of the default settings. | |
| Determine how long your history will be kept and what it includes. | Do you think that video therapy sessions can be recorded by the VoIP company? | 83% of respondents indicated that they believed the video therapy session could be recorded by the VoIP company. | |
| Determine if the company provides personal information when requested by legal authorities. | Do you think a complete and accurate consent to disclosure should be made to all users each time that information is requested or released? | 92% of respondents said yes, consent to disclosure should be made to all users each time information is requested or released. This is especially true as it relates to patient data – a HIPAA requirement. | |
| Determine the system encryption level. | How would you rate the encryption of this VoIP system? Likert scale, 1–5 (1= not at all encrypted; 5= very encrypted) | 2.6 average across all systems; respondents indicated low-moderate confidence in the encryption level of the VoIP systems. | |
| Determine whose responsibility it is to prevent eavesdropping during a video conference with anti-virus/anti-spyware. | Should it be the user’s or VoIP’s responsibility to prevent eavesdropping during a video conference with a client? | 42% VoIP | |
| View your public profile. | Do you feel that the public should see less or more of your information than they can currently see? | 83% of respondents prefer less information be publicly available. | |
| Make a call to a simulated client. | How secure do you feel with your video conferencing options? Likert scale, 1–5 (1=not at all secure; 5=very secure) | 2.8 average across all systems; respondents were moderately secure with their video conferencing options. | |
| Determine if server logs are generated for audit trail purposes. | Do you think that server logs should be included in all VoIP systems? | 83% respondents indicated that server logs should be included in all VoIP systems. | |
| Evaluate the system for privacy and security. | How secure/private do you think this system is if used for a video therapy session between you and your client? Likert scale, 1–5 (1= not at all secure/private; 5= very secure/private) | Overall across all systems: |