| Literature DB >> 31341542 |
Leming Zhou1, Robert Thieret1, Valerie Watzlaf1, Dilhari Dealmeida1, Bambang Parmanto1.
Abstract
BACKGROUND: Telehealth is a great approach for providing high quality health care services to people who cannot easily access these services in person. However, because of frequently reported health data breaches, many people may hesitate to use telehealth-based health care services. It is necessary for telehealth care providers to demonstrate that they have taken sufficient actions to protect their patients' data security and privacy. The government provided a HIPAA audit protocol that is highly useful for internal security and privacy auditing on health care systems, however, this protocol includes extensive details that are not always specific to telehealth and therefore is difficult to be used by telehealth practitioners.Entities:
Keywords: Privacy; Questionnaire Development; Reliability; Security
Year: 2019 PMID: 31341542 PMCID: PMC6597150 DOI: 10.5195/ijt.2019.6276
Source DB: PubMed Journal: Int J Telerehabil ISSN: 1945-2020
Demographic Information of Study Participants (N = 31)
| Characteristics | n | % |
|---|---|---|
| Male | 17 | 54.8 |
| Female | 14 | 45.2 |
| 18–25 | 1 | 3.2 |
| 26–35 | 2 | 6.5 |
| 36–45 | 6 | 19.4 |
| 46–55 | 7 | 22.6 |
| 56–65 | 13 | 41.9 |
| ≥ 66 | 2 | 6.5 |
| Business Administration | 6 | 19.4 |
| Health Care Administration | 3 | 9.7 |
| Health Science | 4 | 12.9 |
| Information Technology | 3 | 9.7 |
| Nursing | 3 | 9.7 |
| Public Health | 2 | 6.5 |
| Other | 10 | 32.3 |
| Chief Executive Officer | 6 | 19.4 |
| Chief Operating Office | 1 | 3.2 |
| Information Technology Specialist | 1 | 3.2 |
| Physician | 3 | 9.7 |
| Program Manager | 4 | 12.9 |
| Psychiatrist/Psychologist | 2 | 6.5 |
| Social worker | 1 | 3.2 |
| Telehealth supervisor | 2 | 6.5 |
| Other | 11 | 35.5 |
| 0–2 | 9 | 29.0 |
| 3–5 | 4 | 12.9 |
| 6–10 | 3 | 9.7 |
| 11–15 | 2 | 6.5 |
| 16–25 | 9 | 29.0 |
| ≥26 | 4 | 12.9 |
Summary of Participants’ Organization Information
| Organization Characteristics | n | % |
|---|---|---|
| Educational Institute | 4 | 12.9 |
| Hospital | 6 | 19.4 |
| Hospital Network | 3 | 9.7 |
| Independent Practice Association | 2 | 6.5 |
| Managed Care Organization | 1 | 3.2 |
| Physician Group Practice | 4 | 12.9 |
| Other | 11 | 35.5 |
| 1–3 | 6 | 19.4 |
| 4–6 | 9 | 29.0 |
| 7–10 | 4 | 12.9 |
| >10 | 12 | 38.7 |
| 0 | 2 | 6.5 |
| 1–3 | 11 | 35.5 |
| 4–10 | 8 | 25.8 |
| 11–20 | 2 | 6.5 |
| 21–50 | 2 | 6.5 |
| >50 | 6 | 19.4 |
| 0 | 3 | 9.7 |
| 1–3 | 12 | 38.7 |
| 4–10 | 7 | 22.6 |
| 11–20 | 3 | 9.7 |
| 21–50 | 2 | 6.5 |
| >50 | 4 | 12.9 |
Statements of the Telehealth Security Self-Assessment Questionnaire
| D1: Policies |
|---|
| Q1. Does the telehealth system (vendor) have privacy policies in place? |
| Q9. Will PHI generated between the provider and patient be stored in any capacity by the telehealth system (vendor)? |
| Q15. Is the patient’s or representative’s informed consent obtained before the telehealth session begins? |
| Q21. Is PHI generated during the telehealth session accessible to others outside of the organization (such as law enforcement, government officials, etc.) as long as they have proper authorization? |
| Q22. Does the telehealth system (vendor) include details about encryption algorithms (such as the length of the key, for example, AES-256, the key management approach, and what specific data are encrypted)? |
| Q25. If there was a technology breakdown, is there a data backup plan (e.g., be able to create and maintain exact copies of ePHI, establish what ePHI should be backed up, such as telehealth sessions/data) in place? |
| Q28. Is employee training provided on computer network privacy and security AND mobile device privacy and security? |
| Q31. Is proper user authentication (username, passwords, fingerprinting, PINs, and security questions) established before logging into the telehealth session? |
| Q36. Is prior written patient authorization required before any PHI content, developed as part of the telehealth session, is shared with other requestors? |
| Q40. Do you connect only to secure networks (e.g., HTTPS, VPN, TLS, SSL) when using telehealth systems and avoid unsecure networks (e.g., public Wi-Fi)? |
Summary of Responses to Statements in Each Domain. The Domains Are Sorted by Percentage of Participants Who Answered “Yes”
| Domains | n (%) | ||
|---|---|---|---|
| Yes (0) | No (1) | I don’t know (2) | |
| 232 (93.5) | 7 (2.8) | 9 (3.6) | |
| 137 (88.4) | 7 (4.5) | 11 (7.1) | |
| 96 (77.4) | 5 (4.0) | 23 (18.5) | |
| 69 (74.2) | 3 (3.2) | 21 (22.6) | |
| 68 (73.1) | 15 (16.1) | 10 (10.8) | |
| 133 (71.5) | 38 (20.4) | 15 (8.1%) | |
| 66 (71.0) | 3 (3.2) | 24 (25.8) | |
| 216 (69.7) | 34 (11.0) | 60 (19.4) | |
| 16 (51.6) | 10 (32.3) | 5 (16.1) | |
| 92 (49.5) | 56 (30.1) | 38 (20.4) | |
Descriptive Analysis of the Responses to the Telehealth Security and Privacy Self-assessment Questionnaire (N=31)
| Domains | Statements | n (%) | ||
|---|---|---|---|---|
| Yes (0) | No (1) | I don’t know (2) | ||
| Q1 | 31 (100) | 0 (0) | 0 (0) | |
| Q2 | 31 (100) | 0 (0) | 0 (0) | |
| Q3 | 27 (87.1) | 2 (6.5) | 2 (6.5) | |
| Q4 | 26 (83.9) | 4 (12.9) | 1 (3.2) | |
| Q5 | 30 (96.8) | 0 (0) | 1 (3.2) | |
| Q6 | 26 (83.9) | 1 (3.2) | 4 (12.9) | |
| Q7 | 30 (96.8) | 0 (0) | 1 (3.2) | |
| Q8 | 31 (100) | 0 (0) | 0 (0) | |
| Q9 | 17 (54.8) | 11 (35.5) | 3 (9.7) | |
| Q10 | 13 (41.9) | 9 (29.0) | 9 (29.0) | |
| Q11 | 24 (77.4) | 0 (0) | 7 (22.6) | |
| Q12 | 18 (58.1) | 8 (25.8) | 5 (16.1) | |
| Q13 | 9 (29.0) | 19 (61.3) | 3 (9.7) | |
| Q14 | 11 (35.5) | 9 (29.0) | 11 (35.5) | |
| Q15 | 28 (90.3) | 2 (6.5) | 1 (3.2) | |
| Q16 | 21 (67.7) | 7 (22.6) | 3 (9.7) | |
| Q17 | 17 (54.8) | 14 (45.2) | 0 (0) | |
| Q18 | 21 (67.7) | 9 (29.0) | 1 (3.2) | |
| Q19 | 27 (87.1) | 2 (6.5) | 2 (6.5) | |
| Q20 | 19 (61.3) | 4 (12.9) | 8 (25.8) | |
| Q21 | 16 (51.6) | 10 (32.3) | 5 (16.1) | |
| Q22 | 21 (67.7) | 2 (6.5) | 8 (25.8) | |
| Q23 | 26 (83.9) | 0 (0) | 5 (16.1) | |
| Q24 | 19 (61.3) | 1 (3.2) | 11 (35.5) | |
| Q25 | 24 (77.4) | 0 (0) | 7 (22.6) | |
| Q26 | 22 (71.0) | 1 (3.2) | 8 (25.8) | |
| Q27 | 23 (74.2) | 2 (6.5) | 6 (19.4) | |
| Q28 | 29 (93.5) | 2 (6.5) | 0 (0) | |
| Q29 | 24 (77.4) | 4 (12.9) | 3 (9.7) | |
| Q30 | 15 (48.4) | 9 (29.0) | 7 (22.6) | |
| Q31 | 28 (90.3) | 2 (6.5) | 1 (3.2) | |
| Q32 | 28 (90.3) | 3 (9.7) | 0 (0) | |
| Q33 | 28 (90.3) | 1 (3.2) | 2 (6.5) | |
| Q34 | 26 (83.9) | 0 (0) | 5 (16.1) | |
| Q35 | 27 (87.1) | 1 (3.2) | 3 (9.7) | |
| Q36 | 28 (90.3) | 2 (6.5) | 1 (3.2) | |
| Q37 | 20 (64.5) | 2 (6.5) | 9 (29.0) | |
| Q38 | 23 (74.2) | 1 (3.2) | 7 (22.6) | |
| Q39 | 25 (80.6) | 0 (0) | 6 (19.4) | |
| Q40 | 27 (87.1) | 3 (9.7) | 1 (3.2) | |
| Q41 | 22 (71.0) | 7 (22.6) | 2 (6.5) | |
| Q42 | 24 (77.4) | 1 (3.2) | 6 (19.4) | |
| Q43 | 21 (67.7) | 1 (3.2) | 9 (29.0) | |
| Q44 | 20 (64.5) | 2 (6.5) | 9 (29.0) | |
| Q45 | 19 (61.3) | 6 (19.4) | 6 (19.4) | |
| Q46 | 13 (41.9) | 7 (22.6) | 11 (35.5) | |
| Q47 | 20 (64.5) | 3 (9.7) | 8 (25.8) | |
| Q48 | 22 (71.0) | 2 (6.5) | 7 (22.6) | |
| Q49 | 28 (90.3) | 2 (6.5) | 1 (3.2) | |
Telehealth Privacy and Security Vulnerabilities Examined by the Telehealth Privacy and Security Self-assessment Questionnaire
| Domain | Vulnerabilities |
|---|---|
| Lack of monitoring if transmitted data during a telehealth session is stored on the patient’s computer or other device’s hard drive. | |
| Unsure of whether or not PHI generated during the telehealth sessions is accessible to others outside of the organization who have proper authorization. | |
| Did not always utilize a VPN to access important websites. | |
| Lacked mobile application security research before downloading and were unsure about having a disaster recovery plan and security evaluation. | |
| Did not always know if their telehealth system vendor included details about encryption algorithms. | |
| Did not always know if encryption keys are periodically updated to meet their privacy and security protocol. | |
| The patient informed consent did not always include that telehealth sessions may be recorded and pictures may be taken and stored; the privacy and security features of the telehealth system; and did not address environment and surrounding security recommendations. | |
| Did not always know whether or not the organization provided the patients with information pertaining to the security risks of information transfer between the organization and the telehealth system vendor. | |
| Lack of knowledge on whether the data backup plan was reviewed and updated on a regular basis (at least yearly) with a technology breakdown for the telehealth program. | |
| Lack of knowledge on whether appropriate redundant systems are in place for their telehealth system. | |
| Not always certain if there were certified privacy and security professionals to evaluate requests for PHI from the telehealth sessions. | |
| Not always certain if patients receive an accounting of disclosures upon written request. | |
| Not always aware if a patient’s request for a restriction of users and disclosures of PHI that is generated from the telehealth system is honored. |