| Literature DB >> 33354071 |
Sandeep Grover1, Siddharth Sarkar2, Rahul Gupta3,4,5.
Abstract
Digital psychiatry and e-mental health have proliferated and permeated vastly in the current landscape of mental health care provision. The COVID-19 crisis has accelerated this digital transformation, and changes that usually take many years to translate into clinical practice have been implemented in a matter of weeks. These have outpaced the checks and balances that would typically accompany such changes, which has brought into focus a need to have a proper approach for digital data handling. Health care data is sensitive, and is prone to hacking due to the lack of stringent protocols regarding its storage and access. Mental health care data need to be more secure due to the stigma associated with having a mental health condition. Thus, there is a need to emphasize proper data handling by mental health professionals, and policies to ensure safeguarding patient's privacy are required. The aim of useful, free, and fair use of mental health care data for clinical, business, and research purposes should be balanced with the need to ensure the data is accessible to only those who are authorized. Systems and policies should be in place to ensure that data storage, access, and disposal are systematic and conform to data safety norms.Entities:
Keywords: Cyberpsychiatry; epidemiology; qualitative; review
Year: 2020 PMID: 33354071 PMCID: PMC7736735 DOI: 10.1177/0253717620956732
Source DB: PubMed Journal: Indian J Psychol Med ISSN: 0253-7176
Recommendations for E-Mental Health Professionals for Handling Data
| Do consider what data are to be collected from patients, where would that data be kept, who all would have access to the data, and to what component(s)of the data? |
| Ensure that all the mental health professionals are provided induction training and are updated regularly on local policies and protocols, including data security, login and logout protocols, and data handling. |
| Separate traceable logins should be available for each individual who has access to the patient data. |
| Use software and data storage facilities that have data encryption facility and are adept in implementing data security protocols. |
| Data, when being used for other purposes like research, should be anonymized. Identifying data should be omitted at the time of copying the data. If the data is likely to be used for research, then it is better to inform the patient about it beforehand. |
| Transfer of the data to colleagues and authorities should be documented by electronic logs in terms of what data was shared, when it was shared, how it was shared, and with whom it was shared. |
| Automated logout after inactivity should be the norm at the data entry, and access terminals for that pilferage of data can be avoided. |
| Disposal of obsolete hardware/data storage devices should ensure that the data is wiped clean and securely disposed of. |
| Incidents of being hacked should be reported to law enforcement or proper regulatory authority. |
| Exercise reasonable degree of caution while hiring services/ individuals/ applications for technological solutions for telemedicine services, emphasizing on patient’s privacy and confidentiality. |
Suggestions for Data Handling During Conduct of Mental Health Research
| Conduct of Research Through
Telemedicine |
| Conduct of Secondary Data Research |