Literature DB >> 26872782

Toward Proper Authentication Methods in Electronic Medical Record Access Compliant to HIPAA and C.I.A. Triangle.

Stephen J Tipton1, Sara Forkey2, Young B Choi3.   

Abstract

This paper examines various methods encompassing the authentication of users in accessing Electronic Medical Records (EMRs). From a methodological perspective, multiple authentication methods have been researched from both a desktop and mobile accessibility perspective. Each method is investigated at a high level, along with comparative analyses, as well as real world examples. The projected outcome of this examination is a better understanding of the sophistication required in protecting the vital privacy constraints of an individual's Protected Health Information (PHI). In understanding the implications of protecting healthcare data in today's technological world, the scope of this paper is to grasp an overview of confidentiality as it pertains to information security. In addressing this topic, a high level overview of the three goals of information security are examined; in particular, the goal of confidentiality is the primary focus. Expanding upon the goal of confidentiality, healthcare accessibility legal aspects are considered, with a focus upon the Health Insurance Portability and Accountability Act of 1996 (HIPAA). With the primary focus of this examination being access to EMRs, the paper will consider two types of accessibility of concern: access from a physician, or group of physicians; and access from an individual patient.

Entities:  

Keywords:  Authentication; Confidentiality; Electronic Health Record (EHR); Electronic Medical Record (EMR); HIPAA; Healthcare privacy; Healthcare record accessibility; Personal Health Record (PHR); Protected Health Information (PHI)

Mesh:

Year:  2016        PMID: 26872782     DOI: 10.1007/s10916-016-0465-x

Source DB:  PubMed          Journal:  J Med Syst        ISSN: 0148-5598            Impact factor:   4.460


  2 in total

1.  Challenges associated with privacy in health care industry: implementation of HIPAA and the security rules.

Authors:  Young B Choi; Kathleen E Capitan; Joshua S Krause; Meredith M Streeper
Journal:  J Med Syst       Date:  2006-02       Impact factor: 4.460

2.  Confidentiality alternatives for exchanging electronic medical records take shape.

Authors:  Dennis Grantham
Journal:  Behav Healthc       Date:  2013 May-Jun
  2 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.