| Literature DB >> 29238448 |
Valerie J M Watzlaf1, Leming Zhou1, Dilhari R Dealmeida1, Linda M Hartman1.
Abstract
The objective of this systematic review was to systematically review papers in the United States that examine current practices in privacy and security when telehealth technologies are used by healthcare providers. A literature search was conducted using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses Protocols (PRISMA-P). PubMed, CINAHL and INSPEC from 2003 - 2016 were searched and returned 25,404 papers (after duplications were removed). Inclusion and exclusion criteria were strictly followed to examine title, abstract, and full text for 21 published papers which reported on privacy and security practices used by healthcare providers using telehealth. Data on confidentiality, integrity, privacy, informed consent, access control, availability, retention, encryption, and authentication were all searched and retrieved from the papers examined. Papers were selected by two independent reviewers, first per inclusion/exclusion criteria and, where there was disagreement, a third reviewer was consulted. The percentage of agreement and Cohen's kappa was 99.04% and 0.7331 respectively. The papers reviewed ranged from 2004 to 2016 and included several types of telehealth specialties. Sixty-seven percent were policy type studies, and 14 percent were survey/interview studies. There were no randomized controlled trials. Based upon the results, we conclude that it is necessary to have more studies with specific information about the use of privacy and security practices when using telehealth technologies as well as studies that examine patient and provider preferences on how data is kept private and secure during and after telehealth sessions.Entities:
Keywords: Computer security; Health personnel; Privacy; Systematic review; Telehealth
Year: 2017 PMID: 29238448 PMCID: PMC5716616 DOI: 10.5195/ijt.2017.6231
Source DB: PubMed Journal: Int J Telerehabil ISSN: 1945-2020
Figure 1A flow diagram of the search and selection process.
Figure 1 description: Figure 1 depicts a flow diagram of the search and selection process. First box a top: Articles identified through database search (N=26,916), PubMed (n=21,540), CINAHL (n=4,785), INSPEC (n-591). Arrow to box below: Articles after removing duplications (n=25,404); arrow to the box to the right: Duplicate records (n=1,512). Next arrow to box below: Articles after first round filtering (n=406); arrow to the box to the right: Articles removed by reviewing titles and abstracts (n=24,998). Next arrow to box below: Articles after second round filtering (n=50); arrow to the box to the right: Articles removed by reviewing full texts (n=356). Next arrow to box below: Articles included after ATA guidelines are added (n=61); arrow to the box to the right: Articles removed by evaluating the security and privacy contents (n=40). Last arrow to the box below: Articles included in systematic review (n=21).
Overview of Reviewed Studies
| Overview of Studies | ||
|---|---|---|
| Time Period | # | % |
| 2004–2005 | 2 | 9.5 |
| 2009–2010 | 4 | 19.0 |
| 2011–2012 | 6 | 28.6 |
| 2013–2014 | 5 | 23.8 |
| 2015–2016 | 4 | 19.0 |
| Total | 21 | 100 |
| Specialties | # | % |
| Telepsychiatry | 2 | 9.5 |
| Teletrauma | 2 | 9.5 |
| Telenursing | 2 | 9.5 |
| Telerehabilitation | 5 | 23.8 |
| Telepathology | 1 | 4.8 |
| Teleburn | 1 | 4.8 |
| Telediabetes | 2 | 9.5 |
| Telesurgery | 1 | 4.8 |
| General telehealth | 5 | 23.8 |
| Total | 21 | 100 |
| Type of Study | # | % |
| Guideline/policy/strategy | 14 | 66.7 |
| Survey/Interview | 3 | 14.3 |
| Usability | 1 | 4.8 |
| Pilot | 1 | 4.8 |
| Opinion | 1 | 4.8 |
| Systematic/literature review | 1 | 4.8 |
| Total | 21 | 100 |
Privacy, Security, and Administrative Content
| Privacy, Security, Administrative Content | # | % |
|---|---|---|
| | ||
| | ||
| Yes, addressed | 14 | 66.7 |
| No, not addressed | 7 | 33.3 |
| | ||
| Yes, addressed | 8 | 38.1 |
| No, not addressed | 13 | 61.9 |
| | ||
| | ||
| Yes, addressed | 14 | 66.7 |
| No, not addressed | 7 | 33.3 |
| | ||
| Yes, addressed | 8 | 38.1 |
| No, not addressed | 13 | 61.9 |
| Privacy, Security, Administrative Content | # | % |
| | ||
| | ||
| Yes, addressed | 10 | 47.6 |
| No, not addressed | 11 | 52.4 |
| | ||
| Yes, addressed | 14 | 66.7 |
| No, not addressed | 7 | 33.3 |
Detailed Summary of All Papers for Privacy, Security and Administrative Content
| Privacy | Security | Administrative | ||||
|---|---|---|---|---|---|---|
| Article Title, Year | Patient Rights (access, amend, right to confidential communications, informed consent etc.) | Use & Disclosure (authorizations, accounting of disclosures, de-identification of data etc.) | Technical (encryption, access control, authentication, data backup, storage, recovery) | Physical (secure server location, backup generator etc.) | Organizational (policies, BAAs, auditing) | Education/Training/Personnel |
| ( | Keep physical surroundings private using audio/video muting; Considered essential to easily change from public to private audio mode. | |||||
| ( | Unauthorized persons should not have access to sensitive information. | Consideration should be given to periodic purging or deletion of telepathology files from mobile devices. | Data transmission must be secure through encryption that meets recognized standards. | Give providers the capability to use remote wiping if device lost or stolen. Back up or store on secure data storage locations. Do not use cloud services if they cannot comply in keeping PHI confidential. | Mobile devices should be kept in the provider’s possession when traveling or in an uncontrolled environment. | Those in charge of technology should know technology security. |
| ( | Informed consent: discuss with patient about the telehealth session and use simple language especially when describing all privacy and security issues such as encryption, store-forward transmissions of data/images, videoconferencing etc. Key topics should include confidentiality and limits to confidentiality in electronic communications; how patient information will be documented and stored. | If transmission data are stored on hard drive, use Federal Information Processing Standard (FIPS) 140–2 encryption AES as acceptable levels of security. Pre-boot authentication should also be used. | Those in charge of the technology should educate users with respect to all privacy and security options. Educate patients on the potential for inadvertently storing data and PHI; intention to record services; methods of storage; how PHI will be shared with authorized users and encrypted for maximum security; recordings will be streamed to protect accidental or unauthorized file sharing or transfer. | |||
| ( | Healthcare providers should provide to the patient verbal/written information related to privacy and security; potential risks and confidentiality in easy to understand language, especially when discussing encryption or potential for technical failures; limits to confidential communication, documentation and storage of patient information. | Access to recordings only granted to authorized users. Stream to protect from accidental or unauthorized file sharing/transfer. | Multi-factor authentication; inactivity timeout function; keep mobile devices with provider always; wipe or disable mobile device if lost or stolen. | All devices should have up to date security software, device management software to provide consistent oversight of applications, device and data configuration and security, backup plan for communication between sites and discussed with the patient. Only allow one session to be open at one time and if there is an attempt to open an additional session the system will automatically log off the first session or block the second session from being opened. | Establish guidelines for periodic purging or deletion. | Providers should give guidance to patients about inadvertently storing PHI and how best to protect privacy. Discuss recording of services, how information will be stored and how privacy will be protected. |
| Nurses must meet medical information and patient privacy requirements of HIPAA, as well as state privacy laws, organizational policies, and ethical standards. | Devices that contain PHI must meet security requirements, and wireless communications must have cybersecurity protection; electronic files must be stored in a manner that ensures privacy and confidentiality since audio and video recordings are susceptible to hacking. | All providers should be educated on how to prevent data breaches when communicating information via telehealth, transmitting images or audio or video files electronically and on how to respond when they do occur. | ||||
| ( | 44% of providers surveyed expressed concerns with privacy issues | 40% of providers surveyed expressed concerns with security issues | Need for secure and private delivery platforms | Personnel shortages in telehealth delivery | ||
| ( | Skype not considered HIPAA compliant since no BAA with Microsoft. Skype was noncompliant with Oklahoma Health Care Authority’s policy. | |||||
| ( | 18.7% need for digital images to be captured and store in EHR at point of care. | 56.2% did not believe that security and privacy risks would be increased when using telemedicine; 31.2% said they did not know enough to respond to the question; and 12.5 % believed there could be increased risk. | ||||
| ( | Privacy, storage, transmission of images and maintenance of video/audio recordings and other PHI must be examined and addressed as transmission of this data over communication lines have concerns of privacy violations. | Access to ownership of data must be addressed with the patient since some patients share this data with a web server owned by a third party that allows providers to log in and access their patient’s data. | ||||
| ( | Many telemedicine researchers are unfamiliar with the field of security in general. The authors found instances of poor encryption standards, designs of communication protocols with no proof of security, HIPAA or HL7 compliance. Reliability and availability of the systems are key since many provide critical life supporting systems for people with diabetes and other chronic illnesses. Data integrity, the quality of security research, network security and cryptography all need to be improved as well, per this systematic review of security of telemedicine systems. | Most of the papers in the systematic review of security in telehealth did not address training, legal liability, or HIPAA and HL7 compliance. Another area that was neglected was research on availability or the measures used to ensure availability of telehealth systems. | ||||
| ( | No federal agency has authority to enact P&S requirements to cover the entire telehealth ecosystem and these authors advocate for the Federal Trade Commission (FTC) to do this. | |||||
| ( | 179 nurses that use telemedicine were surveyed and 11% of nurses surveyed believe it is intrusive; 27% believe it decreases patient privacy and 13% believe it creates a feeling of being spied upon. It is important to change these perceptions of nurses for telehealth technology to expand. | |||||
| ( | Verbal or written informed consent required from patients or representative’s office visit | Establish policy and procedure (P&P) by physicians and hospitals on use of telemedicine that include patient education materials that explain what the patient can expect using telemedicine. | Community-wide education for patients and providers on PHI and maintaining privacy and confidentiality when using telemedicine | |||
| ( | All transmission protocols were compliant with HIPAA. It included Tandberg 880 MXP video conferencing equipment and used Integrated Services Digital Network (ISDN) or the hospitals Internet Protocol (IP) network lines with a bandwidth speed of >384 Kilobits per second (Kbps). Audio and image quality were also suitable for use in clinical services. | |||||
| ( | Families should sign a release for communication and consent for treatment for children; mental health professional should discuss HIPAA provisions with each client as part of the informed consent process. Adolescents were concerned about whether someone could tap into the lines to hear them. | Videotapes of telehealth sessions are an official part of the medical record. | Transmission protocol meets HIPAA requirements | Videotapes kept in secure storage | Practice the 4 C’s: Contracting, Competence, Confidentiality and Control (Koocher) when managing potential risk; | More studies on confidentiality, technology issues needed |
| ( | Checklist includes accessibility, amendment, retention of PHI. | Checklist includes requests for PHI, sharing of PHI with other countries and websites. | Checklist includes encryption, user procedures, audit system activity such as username, password (PW), additional authentication, overall assessment | Check cloud based solutions to make sure secure | Checklist includes the need for BAAs for telerehabilitation store and forward companies and if direct identifiers of PHI included a Data Use Agreement (DUA) required under HIPAA | Use Privacy and Security (P&S) checklist to evaluate system/employees before use |
| ( | When designing telemedicine systems confidentiality and security are major concern. Designing video game driven telerehabilitation (VGDT) is no exception. Patient data should be de-identified and never stored on the patient’s local device. Data should always be encrypted when streaming across a network. | |||||
| ( | Checklist includes accessibility, amendment, retention of PHI, BAAs; Informed consent needed to be signed by patients to include privacy and security issues of telehealth system | Checklist includes requests for PHI, sharing of PHI with other countries and websites, | Checklist includes encryption, user procedures, audit system activity such as username, PW, additional authentication, overall assessment; follow security standards recommended by NIST such as not using username and PW for anything other than telerehabilitation communication, changing it often, using strong usernames and PWs, no computer viruses, and consistently authenticate user communication | Maintain secure transmissions while the session is conducted and when stored and released to internal and external entities | Form team of health and legal professionals to evaluate system for HIPAA, state, and local requirements; educate and train all personnel | |
| ( | Examined accessibility and retention of PHI by employees and others. | Examined requests from legal, sharing of information with other countries, websites. | Encryption, antivirus and audit and security system evaluation was examined. 128-bit Advanced Encryption Standard (AES) Secure Real-Time Transport Protocol (SRTP) recommended by NIST. Only 50% of companies reviewed use some form of encryption. | Sharing of information was not always addressed in vendor policies | Used a HIPAA compliant checklist for top 10 Voice over Internet Protocol (VoIP) companies | |
| ( | Consent for disclosure is needed. | More secure entrance into telehealth system than username and PW. | Impersonation of the system should be prevented. | Develop clear, understandable privacy and security (P&S) policies into the patient consent form | Form a team and use the HIPAA checklist to ensure compliance before using a telehealth system. Review the P&S policies of each system before use. |