| Literature DB >> 35612891 |
Prosper Kandabongee Yeng1, Muhammad Ali Fauzi1, Luyi Sun1, Bian Yang1.
Abstract
BACKGROUND: The loss of human lives from cyberattacks in health care is no longer a probabilistic quantification but a reality that has begun. In addition, the threat scope is also expanding to involve a threat of national security, among others, resulting in surging data breaches within the health care sector. For that matter, there have been provisions of various legislation, regulations, and information security governance tools such as policies, standards, and directives toward enhancing health care information security-conscious care behavior among users. Meanwhile, in a research scenario, there are no comprehensive required security practices to serve as a yardstick in assessing security practices in health care. Moreover, an analysis of the holistic view of the requirements that need more concentration of management, end users, or both has not been comprehensively developed. Thus, there is a possibility that security practice research will leave out vital requirements.Entities:
Keywords: healthcare; information security; legal requirement; security practice
Year: 2022 PMID: 35612891 PMCID: PMC9178444 DOI: 10.2196/30050
Source DB: PubMed Journal: JMIR Hum Factors ISSN: 2292-9495
Figure 1PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) diagram. ICT: information and communication technology.
Data extraction field description.
| No | Category | Description |
| 1 | Paper information | Name, authors, and publication year of the paper |
| 2 | Legal document name | The name of the legal documents found in the paper |
| 3 | Legal document type | This defines the category of law such as regulation, constitutional law, directive, statutory law, policy, and guidelines found in the paper |
| 4 | Legal document jurisdiction | The country in which the legal document applies |
| 5 | Security requirement | The requirement about information security found in the legal document |
| 6 | Privacy requirement | These are the measures or rules that seek to protect the dignity of patients. These include the right to consent and the right to be forgotten to preserve the privacy of an individual |
| 7 | Health care user category | The category of users with the primary responsibility to implement or comply with the related requirement. These include management, end users, and all users. The management category includes top management such as CEOsa, directors, managers, and officers with the responsibility of implementing and complying with the privacy and security requirement |
| 8 | Responsibility level | The user level is responsible for the requirement, and this defines the type of user category who is to take action to observe, enforce, implement, or comply with the security measure. Examples include management, end users, and all users. The management includes top-level staff such as the CEOs, directors, managers, and officers who are responsible for implementing and observing health care security practices. End users include all employees, consultants, suppliers, and others with access to the health system. All user-level categories include responsibilities that are concerned by management and end users |
| 9 | Security category | This refers to the security domain (eg, access control, security governance, access logs, and encryption) of the requirement |
| 10 | Privacy category | This refers to the privacy domain, such as consent and right to privacy, of the requirement and data protection |
aCEO: chief executive officer.
Types of laws (n=75).
| No | Type of law | Count, n (%) |
| 1 | Case law | 1 (1) |
| 2 | Charter | 1 (1) |
| 3 | Code of conduct | 1 (1) |
| 4 | Directive | 7 (9) |
| 5 | Guideline | 4 (5) |
| 6 | Policy | 27 (36) |
| 7 | Recommendation | 1 (1) |
| 8 | Regulation | 13 (17) |
| 9 | Standard | 4 (5) |
| 10 | Statutory law | 16 (21) |
Count of laws based on jurisdiction (n=75).
| No | Country | Count of laws, n (%) |
| 1 | Norway | 35 (47) |
| 2 | Ghana | 9 (12) |
| 11 | Indonesia | 11 (15) |
| 4 | European Union | 17 (23) |
| 5 | International | 3 (4) |
Legal documents from Norway.
| No | Legal document | Type |
| 1 | Code of conduct for information security and data protection in the health care and care services sector version 6.0 [ | Code of conduct |
| 2 | Ministry of Government Administration, Reform and Church Affairs’ requirements specification for PKIa for the public sector [ | Guidelines |
| 3 | General principle to regional control system for information security and privacy [ | Policy |
| 4 | Safety regulator legislation applicable to the enterprise group [ | Policy |
| 5 | Organization of information security work [ | Policy |
| 6 | Safety goals and level for acceptable risk of information security [ | Policy |
| 7 | Security strategy [ | Policy |
| 8 | Security instructions (signed version) [ | Policy |
| 9 | ICTb services and information security for medical devices [ | Policy |
| 10 | Requirements specification—ICT services and information security for MTUc [ | Policy |
| 11 | Security principles and requirements for ICT infrastructure and applications [ | Policy |
| 12 | Anonymization of health and personal information [ | Policy |
| 13 | Use of data processor—treatment of personal information at other legal entity [ | Policy |
| 14 | Use of email and fax [ | Policy |
| 15 | Use of mobile phones [ | Policy |
| 16 | Basis for posting in journal [ | Policy |
| 17 | Storage, archiving, and deletion of health and personal information [ | Policy |
| 18 | Crypto policy [ | Policy |
| 19 | Password policy for the health trusts in Health South-East | Policy |
| 20 | Guidance for approval of data processing from secure third countries [ | Policy |
| 21 | Requirements for coded research data | Policy |
| 22 | Use of email, fax, and SMS text messaging for communication with and about patients [ | Policy |
| 23 | Regional policy for publishing and public services and DMZd [ | Policy |
| 24 | Description of identification procedure in Health South-East [ | Policy |
| 25 | Use of logs for administrative purposes | Policy |
| 26 | Internal control information security [ | Policy |
| 27 | Logging of activity and control of logs [ | Policy |
| 28 | Regional security policy for cloud services [ | Policy |
| 29 | Regulations relating to the Processing of Personal Data [ | Regulation |
| 30 | Norwegian Personal Health Data Filing System Act [ | Statutory law |
| 31 | Act relating to Patients’ Rights | Statutory law |
| 32 | Act relating to the Processing of Personal Data [ | Statutory law |
| 33 | Health Care Personnel Act [ | Statutory law |
| 34 | Health Research Act [ | Statutory law |
| 35 | Act relating to Public Supervision of the Health Service | Statutory law |
aPKI: public key infrastructure.
bICT: information and communication technology.
cMTU: medical technical equipment.
dDMZ: demilitarilized zone.
Legal documents from Ghana.
| No | Legal document | Type |
| 1 | The GHSa Patient’s Charter | Charter |
| 2 | The Medical Profession Regulation and the Infectious Diseases, Cap 78 | Regulation |
| 3 | The Ghana National Health Insurance Regulations of 2004 | Regulation |
| 4 | Data Protection Act of Ghana 843 | Statutory law |
| 5 | The Republic of Ghana’s Constitution | Statutory law |
| 6 | The National Identification Authority Act 707 | Statutory law |
| 7 | Cybersecurity Act of Ghana 2020 | Statutory law |
| 8 | Guidelines for the Use of CCTVb in GHS Facilities | Guidelines |
| 9 | Health sector ICTc policy and strategy | Policy |
aGHS: Ghana Health Services.
bCCTV: closed-circuit television.
cICT: information and communication technology.
Legal documents from Indonesia.
| No | Legal document | Type |
| 1 | Regulation of the Minister of Health of the Republic of Indonesia Number 269/2008 on Medical Record | Regulation |
| 2 | Undang-Undang Republik Indonesia Nomor 29 Tahun 2004 Tentang Praktik Kedokteran | Statutory law |
| 3 | Undang-Undang No. 36/2009 Pasal 103 ayat 1 | Statutory law |
| 4 | Peraturan Menteri Kesehatan Republik Indonesia Nomor 55 Tahun 2013 Tentang Penyelenggaraan Pekerjaan Perekam Medis | Regulation |
| 5 | Undang-Undang Republik Indonesia No 36 Tahun 2014 Tentang Tenaga Kesehatan | Statutory law |
| 6 | Peraturan Pemerintah Republik Indonesia Nomor 46 Tahun 2014 Tentang Sistem Informasi Kesehatan | Regulation |
| 7 | UU 36 Tahun 2009 Tentang Kesehatan | Statutory law |
| 8 | Peraturan Menteri Kesehatan Republik Indonesia Nomor 36 Tahun 2012 Tentang Rahasia Kedokteran | Regulation |
| 9 | Undang-Undang Republik Indonesia Nomor 44 Tahun 2009 Tentang Rumah Sakit | Statutory law |
| 10 | Peraturan Menteri Kesehatan Republik Indonesia Nomor 82 Tahun 2013 Tentang Sistem Informasi Manajemen Rumah Sakit | Regulation |
| 11 | Peraturan Menteri Kesehatan Republik Indonesia Nomor 77 Tahun 2016 Tentang Sistem Klasifikasi Keamanan Dan Akses Arsip Dinamis Di Lingkungan Kementerian Kesehatan | Regulation |
Legal documents from the EUa.
| No | Legal document | Type |
| 1 | Penal Code [ | Case law |
| 2 | Directive 95/46/EC | Directive [ |
| 3 | NISb Directive | Directive [ |
| 4 | The directive on patients’ rights in cross-border health care (Directive 2011/24) | Directive [ |
| 5 | Directive 2009/136/EC amending Directive 2002/58/EC (Privacy Directive) | Directive |
| 6 | Data Protection and Privacy in Electronic Communications—e-Privacy Directive (it replaces Directive 97/66/EC) [ | Directive |
| 7 | Directive 99/93/EC | Directive [ |
| 8 | The Patients’ Rights Directive (2011/24/EU) [ | Directive |
| 9 | Recommendation CM/Rec(2019)2 of the Committee of Ministers to member states on the protection of health-related data [ | Guidelines |
| 10 | GCPc | Guidelines [ |
| 11 | Recommendation No. R (97) 5 of the Committee of Ministers to Member States on the Protection of Medical Data | Recommendation [ |
| 12 | GDPRd [ | Regulation |
| 13 | EU regulation and compliance of national and transborder data flows | Regulation |
| 14 | Medical Device Regulation 2017/745 of EU [ | Regulation |
| 15 | Regulation 2014/910 (the | Regulation |
| 16 | A European standardization group for Security and Privacy of Medical Informatics (CEN TC 251/WG6f) [ | Standard |
| 17 | GEHRg/CENh standards ENVi 12265 and ENV 13606 [ | Standard |
aEU: European Union.
bNIS: Network and Information Security.
cGCP: Good Clinical Practice.
dGDPR: General Data Protection Regulation.
eeIDAS: electronic identification and trust services.
fCEN TC 251/WG6: Commission for European Normalization Technical Committee/Working Group 6.
gGEHR: Good European Health Record.
hCEN: European Committee for Standardization.
iENV: Electronic Healthcare Record Communication for the exchange of electronic health records.
International legal documents.
| No | Legal document | Type |
| 1 | ISOa 27001 | Standard |
| 2 | IECb 80001-1:2010 | Standard |
| 3 | The Universal Declaration of Human Rights | Statutory law |
aISO: International Organization for Standardization.
bIEC: International Electrotechnical Commission.
Legal requirement used in the study.
| No | Requirement | Count, n (%) | Reference |
| 1 | GDPRa | 13 (21.67) | [ |
| 2 | Directive 95/46/EC | 10 (16.67) | [ |
| 3 | Norwegian Personal Health Data Filing System Act | 3 (5) | [ |
| 4 | Act relating to Patients’ Rights | 2 (3.33) | [ |
| 5 | Act relating to the Processing of Personal Data | 2 (3.33) | [ |
| 6 | Directive 2011/24/EU on patients’ rights in cross-border health care | 2 (3.33) | [ |
| 7 | Health Care Personnel Act | 2 (3.33) | [ |
| 8 | Act relating to Public Supervision of the Health Service | 1 (1.67) | [ |
| 9 | Data protection and privacy in electronic communications—e-Privacy Directive | 1 (1.67) | [ |
| 10 | Directive 2002/58/EC | 1 (1.67) | [ |
| 11 | Directive 2009/136/EC | 1 (1.67) | [ |
| 12 | Directive 99/93/EC | 1 (1.67) | [ |
| 13 | EU regulation and compliance of national and transborder data flows | 1 (1.67) | [ |
| 14 | GEHRb/CENc standards ENVd 12265 and ENV 13606 | 1 (1.67) | [ |
| 15 | Good Clinical Practice | 1 (1.67) | [ |
| 16 | Health Research Act | 1 (1.67) | [ |
| 17 | IECe 80001-1:2010 | 1 (1.67) | [ |
| 18 | ISOf 27001 | 1 (1.67) | [ |
| 19 | Medical Device Regulation 2017/745 of EU | 1 (1.67) | [ |
| 20 | Ministry Of Government Administration, Reform and Church affairs’ Requirements specification for PKIg for the public sector | 1 (1.67) | [ |
| 21 | Penal Code | 1 (1.67) | [ |
| 22 | Recommendation CM/Rec(2019)2 of the Committee of Ministers to member States on the protection of health-related data | 1 (1.67) | [ |
| 23 | Recommendation No. R (97) 5 of the Committee of Ministers to Member States on the Protection of Medical Data | 1 (1.67) | [ |
| 24 | Regulation 2014/910 (the “eIDAS Regulation”) | 1 (1.67) | [ |
| 25 | Regulation of the Minister of Health of the Republic of Indonesia Number 269/2008 on Medical Record | 1 (1.67) | [ |
| 26 | Regulations relating to the Processing of Personal Data | 1 (1.67) | [ |
| 27 | The Ghana Health Services Patient’s Charter | 1 (1.67) | [ |
| 28 | The Ghana National Health Insurance Regulations of 2004 | 1 (1.67) | [ |
| 29 | The National Identification Authority Act 707 | 1 (1.67) | [ |
| 30 | The Republic of Ghana’s constitution | 1 (1.67) | [ |
| 31 | The Universal Declaration of Human Rights | 1 (1.67) | [ |
| 32 | UNDANG-UNDANG No.36/2009 and Pasal 103 ayat 1 | 1 (1.67) | [ |
| 33 | Undang-undang republik, Indonesia nomor 29, Tahun 2004 tentang, Praktik kedokteran | 1 (1.67) | [ |
aGDPR: General Data Protection Regulation.
bGEHR: Good European Health Record.
cCEN: European Committee for Standardization.
dENV: Electronic Healthcare Record Communication for the exchange of electronic health records.
eIEC: International Electrotechnical Commission.
fISO: International Organization for Standardization.
fPKI: public key infrastructure.
Privacy requirement category distribution (n=80).
| No | Privacy requirement category | Count, n (%) |
| 1 | Consent | 13 (16) |
| 2 | Disclosure of health data | 12 (15) |
| 3 | Privacy by design | 8 (10) |
| 4 | Right to privacy | 8 (10) |
| 5 | Right of access | 7 (9) |
| 6 | Data protection | 6 (8) |
| 7 | Data processing | 3 (4) |
| 8 | Personal data | 3 (4) |
| 9 | Punitive measures of security and privacy violation | 3 (4) |
| 10 | How to record health data | 2 (3) |
| 11 | Privacy rights | 2 (3) |
| 12 | Storage of health records | 2 (3) |
| 13 | CIAa measures | 1 (1) |
| 14 | Data collection purpose | 1 (1) |
| 15 | Deletion of health data | 1 (1) |
| 16 | Electronic signatures | 1 (1) |
| 17 | Mobile phone processing | 1 (1) |
| 18 | Professional secrecy | 1 (1) |
| 19 | Purpose of health care data processing | 1 (1) |
| 20 | Right to be forgotten | 1 (1) |
| 21 | Right to object | 1 (1) |
| 22 | Termination of consent | 1 (1) |
| 23 | Third parties | 1 (1) |
aCIA: confidentiality, integrity, and availability.
Summary of the most used categories.
| No | Category | Most used |
| 1 | Type of law | Policy, statutory law, regulation, and directive |
| 2 | Jurisdiction | Norway and European Union |
| 3 | Requirement type | Security requirement |
| 4 | Responsibility level | Management |
| 5 | Security requirement category | Data processing, data protection officer, right of access, security by design, access control, email processing, logs, password, encryption, and health data storage |
| 6 | Privacy requirement category | Consent, disclosure of health data, privacy by design, right of access, and data protection |
Security requirement category distribution (n=173).
| No | Security requirement category | Count, n (%) |
| 1 | Data processing | 14 (8.1) |
| 2 | Data protection officer | 14 (8.1) |
| 3 | Right of access | 13 (7.5) |
| 4 | Security by design | 13 (7.5) |
| 5 | Access control | 12 (6.9) |
| 6 | Email processing | 10 (5.8) |
| 7 | Logs | 9 (5.2) |
| 8 | Password | 7 (4.1) |
| 9 | Encryption | 6 (3.5) |
| 10 | Health data storage | 6 (3.5) |
| 11 | Mobile phone processing | 4 (2.3) |
| 12 | Privacy by design | 4 (2.3) |
| 13 | CIAa measures | 3 (1.7) |
| 14 | Data controller | 3 (1.7) |
| 15 | Personal data | 3 (1.7) |
| 16 | Third countries | 3 (1.7) |
| 17 | Data protection | 3 (1.7) |
| 18 | Backup | 2 (1.2) |
| 19 | Documentation | 2 (1.2) |
| 20 | Electronic signature | 2 (1.2) |
| 21 | Establish security governance | 2 (1.2) |
| 22 | Least privileges | 2 (1.2) |
| 23 | Medical devices | 2 (1.2) |
| 24 | Right to be informed | 2 (1.2) |
| 25 | Risk management | 2 (1.2) |
| 26 | Security governance | 2 (1.2) |
| 27 | Third parties | 2 (1.2) |
| 28 | Data breach | 2 (1.2) |
| 29 | Use of ISOb standards | 2 (1.2) |
| 30 | Consent | 1 (0.6) |
| 31 | Data aggregation | 1 (0.6) |
| 32 | Incident reporting | 1 (0.6) |
| 33 | Internal control | 1 (0.6) |
| 34 | Data transfer to non-EUc countries | 1 (0.6) |
| 35 | Deletion of health data | 1 (0.6) |
| 36 | Establish security policies | 1 (0.6) |
| 37 | Health care data hosting | 1 (0.6) |
| 38 | Identity | 1 (0.6) |
| 39 | Internal and external threats | 1 (0.6) |
| 40 | Mobile devices | 1 (0.6) |
| 41 | Monitoring of NISd Directives | 1 (0.6) |
| 42 | Patients from other member states | 1 (0.6) |
| 43 | Physical security | 1 (0.6) |
| 44 | Professional secrecy | 1 (0.6) |
| 45 | Protection against security incidents | 1 (0.6) |
| 46 | Providing information to patients from a member state | 1 (0.6) |
| 47 | Risk assessment | 1 (0.6) |
| 48 | Risk mitigation | 1 (0.6) |
| 49 | Sanction | 1 (0.6) |
| 50 | Technological security measures | 1 (0.6) |
| 51 | Training and education | 1 (0.6) |
aCIA: confidentiality, integrity, and availability.
bISO: International Organization for Standardization.
cEU: European Union.
dNIS: Network and Information Security.
Figure 2Legal requirement framework.
Figure 3Measurement flowchart.