| Literature DB >> 28733949 |
Clemens Scott Kruse1, Brenna Smith2, Hannah Vanderlinden2, Alexandra Nealand2.
Abstract
The privacy of patients and the security of their information is the most imperative barrier to entry when considering the adoption of electronic health records in the healthcare industry. Considering current legal regulations, this review seeks to analyze and discuss prominent security techniques for healthcare organizations seeking to adopt a secure electronic health records system. Additionally, the researchers sought to establish a foundation for further research for security in the healthcare industry. The researchers utilized the Texas State University Library to gain access to three online databases: PubMed (MEDLINE), CINAHL, and ProQuest Nursing and Allied Health Source. These sources were used to conduct searches on literature concerning security of electronic health records containing several inclusion and exclusion criteria. Researchers collected and analyzed 25 journals and reviews discussing security of electronic health records, 20 of which mentioned specific security methods and techniques. The most frequently mentioned security measures and techniques are categorized into three themes: administrative, physical, and technical safeguards. The sensitive nature of the information contained within electronic health records has prompted the need for advanced security techniques that are able to put these worries at ease. It is imperative for security techniques to cover the vast threats that are present across the three pillars of healthcare.Entities:
Keywords: Cryptography; Electronic health record (EHR); Firewall; Protected health information (PHI); Security safeguards
Mesh:
Year: 2017 PMID: 28733949 PMCID: PMC5522514 DOI: 10.1007/s10916-017-0778-4
Source DB: PubMed Journal: J Med Syst ISSN: 0148-5598 Impact factor: 4.460
Fig. 1Database research queries
Summary of security techniques
| Author(s) | Security Techniques |
|---|---|
| Liu et al. [ | Physical safeguard: Physical access control to control for theft (locks on laptops); |
| Amer [ | Technical safeguard: encryption |
| Collier [ | Technical safeguard: encryption, |
| Collier [ | Administrative safeguards: Generators to prevent down time, duplication of all critical hardware, implement comprehensive testing and monitoring strategies |
| Jannetti [ | Technical safeguards: firewalls; encryption and decryption; |
| Wikina [ | Administrative safeguards: implement managerial approval paper patient data releases, response training for missing records |
| Ives [ | Physical safeguard: use locked locations for netework servers |
| Hunter [ | Technical safeguards: Passwords; Antivirus software; Firewalls; Control access; |
| Pisto [ | Technical safeguard: role-based security |
| Wang et al. [ | Administrative safeguard: Employing HIPAA consultants |
| Lemke [ | Technical safeguards: user ID/passwords; data discard; use short-range wireless (Bluetooth); Privacy enhancing technology (PET) that encrypts fax transmissions |
| Cooper et al. [ | Administrative safeguard: perform annual risk assessments |
| Bey et al. [ | Technical safeguards: Passwords. Anti-virus software. Fire walls. Control access. |
| Chen et al. [ | Technical safeguard: ID-based authentication scheme |
| Nikooghadam et al. [ | Technical safeguard: Mobile agents |
| Tejero et al. [ | Technical safeguards: Pseudonymity; encryption; decryption and verification; cryptography (digital signatures, encryption algorithms, digital certificates) |
| Liu et al. [ | Technical safeguard: Firewalls |
| Sittig & Singh [ | Administrative safeguards: Backups, duplication of critical hardware, train personnel in disaster recovery, reduce interfaces between mission-critical systems and others like pharmacy-management, mandate CPOE for all orders, reduce alert-fatigue |
| Wickboldt et al. [ | Phsyical safeguard: Radio Frequency Identification (RFID) |
| Vockley [ | Administrative safeguard: perform annual risk assessments |
| Shank et al. [ | Technical and administrative safeguard: Digital signatures and associated policies for their use |
| Lee et al. [ | Technical safeguard: RBAC Matrix cryptography protocol |
| Masi et al. [ | Technical safeguard: Authenticated assertion issuances |
| Chen et al. [ | Technical safeguard: Cloud computing |
| van Allen [ | Administrative safeguards: training of users to prevent unauthorized disclosure of patient data through inappropriate email, set policies in place regarding social media and social networking, |
Fig. 2The three themes of security safeguards